741 resultados para Identities
Resumo:
Educational aspirations during lower secondary school and choice of upper secondary education are important for young people’s future trajectories into higher education and labour market positions. In line with ideas about reflexive, autonomous individuals (Giddens, 1991), choice of education is often represented as a young person’ individual decision, and educational guidance as aimed at discovering what ‘fits’ an individual’s personality, interests and abilities. Educational aspirations and choices are also social patterns that are reproduced. Some population categories represent exceptions from expected patterns of social reproduction of educational level and professions. In several countries, one such category is young people from families with migration experiences (Lauglo, 2000; Modood, 2004). In Norway, students have a legal right to non-compulsory upper secondary schooling and 96 percent of the students continue from lower to upper secondary school. In spite of positive developments regarding minority youths’ completion of upper secondary and higher education in later years, studies still persistently show lower educational attainment among minority youth, particularly among boys (Fekjaer, 2006). However, in lower secondary school, minor ity youth tend to have markedly higher educational aspirations and stronger learning motivation than their majority peers, as well as greater effort in school and strong adherence to school values (Lauglo, 2000) despite lower educational attainment or lower socio-economic backgrounds. In addition, gender differences in educational aspirations seem to be smaller among minority youth. The principal objective of the study in progress that will be presented in this paper, is to describe how processes relating to gendered, ethnic and class-based identities influence young people’s educational choices. The study is undertaken as a PhD project in social anthropology. The methodological approach is ethnographic longitudinal fieldwork in two multicultural lower secondary schools in Oslo. The study is part of a larger project that also include quantitative analyses of longitudinal data covering 9th graders in Oslo 2006 through four data collections during lower and upper secondary school.
Resumo:
És un fet que la globalització defineix i articula les nostres societats. El present treball neix amb la voluntat de cercar com i què la fa avançar en l'àmbit cultural, però també amb el desig d'aprofundir en aquests elements tradicionals que defineixen les particulars identitats culturals regionals, fruit d'una diversitat que també participa en el procés global de construcció cultural europeu.
Resumo:
AbstractDigitalization gives to the Internet the power by allowing several virtual representations of reality, including that of identity. We leave an increasingly digital footprint in cyberspace and this situation puts our identity at high risks. Privacy is a right and fundamental social value that could play a key role as a medium to secure digital identities. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications. So, an identity layer in which identity and privacy management services are loosely coupled, publicly hosted and available to on-demand calls could be more realistic and an acceptable situation. Identity and privacy should be interoperable and distributed through the adoption of service-orientation and implementation based on open standards (technical interoperability). Ihe objective of this project is to provide a way to implement interoperable user-centric digital identity-related privacy to respond to the need of distributed nature of federated identity systems. It is recognized that technical initiatives, emerging standards and protocols are not enough to guarantee resolution for the concerns surrounding a multi-facets and complex issue of identity and privacy. For this reason they should be apprehended within a global perspective through an integrated and a multidisciplinary approach. The approach dictates that privacy law, policies, regulations and technologies are to be crafted together from the start, rather than attaching it to digital identity after the fact. Thus, we draw Digital Identity-Related Privacy (DigldeRP) requirements from global, domestic and business-specific privacy policies. The requirements take shape of business interoperability. We suggest a layered implementation framework (DigldeRP framework) in accordance to model-driven architecture (MDA) approach that would help organizations' security team to turn business interoperability into technical interoperability in the form of a set of services that could accommodate Service-Oriented Architecture (SOA): Privacy-as-a-set-of- services (PaaSS) system. DigldeRP Framework will serve as a basis for vital understanding between business management and technical managers on digital identity related privacy initiatives. The layered DigldeRP framework presents five practical layers as an ordered sequence as a basis of DigldeRP project roadmap, however, in practice, there is an iterative process to assure that each layer supports effectively and enforces requirements of the adjacent ones. Each layer is composed by a set of blocks, which determine a roadmap that security team could follow to successfully implement PaaSS. Several blocks' descriptions are based on OMG SoaML modeling language and BPMN processes description. We identified, designed and implemented seven services that form PaaSS and described their consumption. PaaSS Java QEE project), WSDL, and XSD codes are given and explained.
Resumo:
Gifted children develop asynchronously, often advanced for their age cognitively, but at or between their chronological and mental ages socially and emotionally (Robinson, 2008). In order to help gifted children and adolescents develop and practice social and emotional self-regulation skills, we investigated the use of an Adlerian play therapy approach during pen-and-paper role-playing games. Additionally, we used Goffman's (1961, 1974) social role identification and distance to encourage participants to experiment with new identities. Herein, we propose a psychosocial model of interactions during role-playing games based on Goffman's theory and Adlerian play therapy techniques, and suggest that role-playing games are an effective way of intervening with gifted children and adolescents to improve their intra- and interpersonal skills. We specifically targeted intrapersonal skills of exercising creativity, becoming self-aware, and setting individual goals by raising participants' awareness of their privately logical reasons for making decisions and their levels of social interest. We also targeted their needs and means of seeking significance in the group to promote collaboration and interaction skills with other gifted peers through role analysis, embracement, and distancing. We report results from a case study and conclude that role-playing games deserve more attention, both from researchers and clinical practitioners, because they encourage change while improving young clients' social and emotional development.
Resumo:
Malondialdehyde (MDA) is a natural and widespread genotoxin. Given its potentially deleterious effects, it is of interest to establish the identities of the cell types containing this aldehyde. We used in situ chemical trapping with 2-thiobarbituric acid and mass spectrometry with a deuterated standard to characterize MDA pools in the vegetative phase in Arabidopsis thaliana. In leaves, MDA occurred predominantly in the intracellular compartment of mesophyll cells and was enriched in chloroplasts where it was derived primarily from triunsaturated fatty acids (TFAs). High levels of MDA (most of which was unbound) were found within dividing cells in the root tip cell proliferation zone. The bulk of this MDA did not originate from TFAs. We confirmed the localization of MDA in transversal root sections. In addition to MDA in proliferating cells near the root tip we found evidence for the presence of MDA in pericyle cells. Remodeling of non-TFA-derived MDA pools occurred when seedlings were infected with the fungus Botrytis cinerea. Treatment of uninfected seedlings with mediators of plant stress responses (jasmonic acid or salicylic acid) increased seedling MDA levels over 20-fold. In summary, major pools of MDA are associated with cell division foci containing stem cells. The aldehyde is pathogen-inducible in these regions and its levels are increased by cellular mediators that impact defense and growth.
Resumo:
Depending on the context, Christians, Muslims and Jews have constructed their own religion, perceived the religions of others, and articulated relations between religions in different ways. This paper examines the rise in history of the three communities, which came to identify themselves through their religions and have been highly sensitive to differences. It indicates common features and parallels of which adherents may have been more or less conscious. The central question in such research is what persons and groups mean in particular situations when they call themselves Christian, Muslim or Jewish. The variety of personal and group identities in the three religious communities has been concealed partly by religious leaderships concerned with the survival of their flocks, and partly by the use of the general concepts of Christianity, Islam and Judaism with which believers have been called to identify. These concepts have shut people into separate religious pigeonholes and could thus be used to support ethnic, social and other rivalries. This pigeonholing has also confronted more spiritually-oriented people with problems of social identity, religious belonging and spiritual authenticity.
Resumo:
(Résumé de l'ouvrage) This volume embodies an uptodate and sensitive set of studies exploring the ongoing negotiation of European Muslim identities in Europe. The Editor argues there has been hitherto a three-fold response on the part of Muslims in Europe (some of whom are now 3rd generation Europeans) - integrationism, isolationism, and escapism. Today the latter two responses are giving way, it is argued, to an active shaping of Muslim European identities. The central issue remains: what degree of freedom and what potential for cultural and religious diversity can minorities have in an outwardly secular and plural European society?
Resumo:
En aquest treball faig un estudi i anàlisi de les identitats lingüístiques d'un grup de persones que conformen una mostra qualitativa. Es tracta d'un grup reduït de parlants de diferents edats i pertanyents a l'àrea lingüística del Principat. Amb aquesta recerca pretenc comprendre millor la relació entre llengua i identitat en el context sociolingüístic català.
Resumo:
L'existència dels parlars juvenils ens recorda el fet que totes les formes de cultura, i les identitats mateixes de les persones, van estretament lligades a les maneres de parlar que els són pròpies. El que segueix és doncs una reflexió sobre aquest lligam, aquestes relacions tan estretes entre les cultures i les identitats per una banda, i les maneres de parlar i les llengües per l'altra. La primera part del llibre tracta sobre les diverses identitats de gènere que vaig detectar dins els grups estudiats. El lector es preguntarà potser què és això de les identitats de gènere, i per què són tan importants. Els estudis del gènere tracten sobre el funcionament de la divisió sexual en la nostra societat, és a dir, sobre els diversos papers que homes i dones tenen en el mercat laboral, en la política, en la família, etc. A partir de tots aquests conceptes, a la segona part del llibre procediré a explicar quines identitats i ideologies anaven associades a les diverses formes de parlar (argot juvenil, accent andalús) i a l'ús de les llengües catalana i castellana. I aquí es veurà també perquè és important estudiar les diverses veus que apareixen en la nostra parla.
Resumo:
The primary function of secondary plant metabolites is thought to be defence against herbivores. The frequent occurrence of these same noxious compounds in floral nectar, which functions primarily to attract pollinators, has been seen as paradoxical. Although these compounds may have an adaptive purpose in nectar, they may also occur as a nonadaptive consequence of chemical defence in other plant parts. If nectar chemistry reflects physiological constraints or passive leakage from other tissues, we expect that the identity and relative concentration of nectar cardenolides to be correlated with those of other plant parts; in contrast, discordant distributions of compounds in nectar and other tissues may suggest adaptive roles in nectar. We compared the concentrations and identities of cardenolides in the nectar, leaves and flowers of 12 species from a monophyletic clade of Asclepias. To measure putative toxicity of nectar cardenolides, we then examined the effects of a standard cardenolide (digoxin) on the behaviour of bumblebees, a common generalist pollinator of Asclepias. We found that the average cardenolide concentrations in nectar, leaves and flowers of the 12 Asclepias species were positively correlated as predicted by nonadaptive hypotheses. However, significant differences in the identities and concentrations of individual cardenolides between nectar and leaves suggest that the production or allocation of cardenolides may be independently regulated at each plant part. In addition, cardenolide concentrations in leaves and nectar exhibited no phylogenetic signal. Surprisingly, bumblebees did not demonstrate an aversion to digoxin-rich nectar, which may indicate that nectar cardenolides have little effect on pollination. Although the idea that discordant patterns of secondary metabolites across tissue types may signal adaptive functions is attractive, there is evidence to suggest constraint contributes to nectar secondary chemistry. Further work testing the ecological impacts of such patterns will be critical in determining the functional significance of nectar cardenolides
Resumo:
El treball pretén aportar un coneixement de caràcter psicosocial sobre els contextos on els professionals del sistema jurídic-penal ofereixen atenció a les víctimes de violència de gènere, concretament, les unitats i oficines habilitades per recollir la denúncia o atestat dins de les comissaries dels Mossos d’esquadra i els jutjats d´instrucció de la dona. L´àmbit territorial va ser Barcelona i Girona. Es va obtenir informació sobre judicis realitzats a l´Audiència provincial, així com documents legals en relació al tema. S’ha analitzat les necessitats i dificultats juntament amb la identificació dels recursos psicosocials que aporten tant aquests professionals com les dones que han patit o estan patit un procés de maltractament per part de la parella. La pretensió es oferir una mirada particular per suggerir transformacions que facilitin el procés d´atenció en aquests contextos, sovint difícil i, que comporta conseqüències emocionals per part de les víctimes i dels mateixos agents que les atenen. S’ha partit de les narracions de les víctimes i dels agents jurídics, com pràctiques socials a partir de les quals podem detectar valors, posicions, normes, emocions i efectes de gènere que permetrà dirigir la intervenció. Com a eines d´anàlisi s’ha fet ús els repertoris interpretatius els quals han permès analitzar les construccions socials i els seus efectes al voltant del maltracte, de les identitats de les víctimes i els victimaris.
Resumo:
We present a KAM theory for some dissipative systems (geometrically, these are conformally symplectic systems, i.e. systems that transform a symplectic form into a multiple of itself). For systems with n degrees of freedom depending on n parameters we show that it is possible to find solutions with n-dimensional (Diophantine) frequencies by adjusting the parameters. We do not assume that the system is close to integrable, but we use an a-posteriori format. Our unknowns are a parameterization of the solution and a parameter. We show that if there is a sufficiently approximate solution of the invariance equation, which also satisfies some explicit non–degeneracy conditions, then there is a true solution nearby. We present results both in Sobolev norms and in analytic norms. The a–posteriori format has several consequences: A) smooth dependence on the parameters, including the singular limit of zero dissipation; B) estimates on the measure of parameters covered by quasi–periodic solutions; C) convergence of perturbative expansions in analytic systems; D) bootstrap of regularity (i.e., that all tori which are smooth enough are analytic if the map is analytic); E) a numerically efficient criterion for the break–down of the quasi–periodic solutions. The proof is based on an iterative quadratically convergent method and on suitable estimates on the (analytical and Sobolev) norms of the approximate solution. The iterative step takes advantage of some geometric identities, which give a very useful coordinate system in the neighborhood of invariant (or approximately invariant) tori. This system of coordinates has several other uses: A) it shows that for dissipative conformally symplectic systems the quasi–periodic solutions are attractors, B) it leads to efficient algorithms, which have been implemented elsewhere. Details of the proof are given mainly for maps, but we also explain the slight modifications needed for flows and we devote the appendix to present explicit algorithms for flows.
Resumo:
One of the major problems when using non-dedicated volunteer resources in adistributed network is the high volatility of these hosts since they can go offlineor become unavailable at any time without control. Furthermore, the use ofvolunteer resources implies some security issues due to the fact that they aregenerally anonymous entities which we know nothing about. So, how to trustin someone we do not know?.Over the last years an important number of reputation-based trust solutionshave been designed to evaluate the participants' behavior in a system.However, most of these solutions are addressed to P2P and ad-hoc mobilenetworks that may not fit well with other kinds of distributed systems thatcould take advantage of volunteer resources as recent cloud computinginfrastructures.In this paper we propose a first approach to design an anonymous reputationmechanism for CoDeS [1], a middleware for building fogs where deployingservices using volunteer resources. The participants are reputation clients(RC), a reputation authority (RA) and a certification authority (CA). Users needa valid public key certificate from the CA to register to the RA and obtain thedata needed to participate into the system, as now an opaque identifier thatwe call here pseudonym and an initial reputation value that users provide toother users when interacting together. The mechanism prevents not only themanipulation of the provided reputation values but also any disclosure of theusers' identities to any other users or authorities so the anonymity isguaranteed.