666 resultados para Fictional identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

History and Identity in the Late Antique Near East gathers together the work of distinguished historians and early career scholars with a broad range of expertise to investigate the significance of newly emerged, or recently resurrected, ethnic identities on the borders of the eastern Mediterranean world. It focuses on the "long late antiquity" from the eve of the Arab conquest of the Roman East to the formation of the Abbasid caliphate. The first half of the book offers papers on the Christian Orient on the cusp of the Islamic invasions. These papers discuss how Christians negotiated the end of Roman power, whether in the selective use of the patristic past to create confessional divisions or the emphasis of the shared philosophical legacy of the Greco-Roman world. The second half of the book considers Muslim attempts to negotiate the pasts of the conquered lands of the Near East, where the Christian histories of Hira or Egypt were used to create distinctive regional identities for Arab settlers. Like the first half, this section investigates the redeployment of a shared history, this time the historical imagination of the Qu'ran and the era of the first caliphs. All the papers in the volume bring together studies of the invention of the past across traditional divides between disciplines, placing the re-assessment of the past as a central feature of the long late antiquity. As a whole, History and Identity in the Late Antique Near East represents a distinctive contribution to recent writing on late antiquity, due to its cultural breadth, its interdisciplinary focus, and its novel definition of late antiquity itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It seems to be impossible for the liberal state to embrace a Christian identity, because ‘liberalism’ is exactly a device for separating state and religion. Discussing the implications of a recent decision of the European Court of Human Rights, Lautsi v. Italy (2011), I argue that this is not necessarily so. If paired with a liberal commitment to pluralism, a Christian identity might even be more inclusive of minority religions than a narrowly ‘liberal’ state identity, which has been the dominant response in Western Europe to the challenge of immigrant diversity, especially that of Muslim origins.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article addresses ethical consumer behavior and uses the purchase of Fair Trade (FT) coffee to gain insights into determinants of ‘moral behavior’ in the marketplace. Our primary concern is to clarify which theoretical concepts and determinants are more useful than others in explaining FT consumption. We compare the explanatory power of consumer budget restrictions, consumer identity, social and personal norms, social status, justice beliefs, and trust. Our second aim is methodological; we contrast data on self-reported consumption of FT coffee with experimental data on hypothetical choices of different coffee products. To gain insights into the robustness of our measurement and findings, we test our propositions using two samples of undergraduate students from Germany and the United States. Our data show that consumer identity and personal norms are the major determinants of FT consumption in both samples, the results from survey-based data and from our experimental data are similar in this regard. Further, we demonstrate that studies based on a limited number of determinants might overestimate effects; the effect of justice beliefs for instance vanishes if other determinants are taken into account.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The strength of top-down indirect effects of carnivores on plants (trophic cascades) varies greatly and may depend on the identity of the intermediate (herbivore) species. If the effect strength is linked to functional traits of the herbivores then this would allow for more general predictions. Due to the generally sub-lethal effects of herbivory in terrestrial systems, trophic cascades manifest themselves in the first instance in the fitness of individual plants, affecting both their numerical and genetic contributions to the population. We directly compare the indirect predator effects on growth and reproductive output of individual Vicia faba plants mediated by the presence of two aphid species: Acyrtosiphon pisum is characterised by a boom and bust strategy whereby colonies grow fast and overexploit their host plant individual while Megoura viciae appear to follow a more prudent strategy that avoids over-exploitation and death of the host plant.Plants in the field were infested with A. pisum, M. viciae or both and half the plants were protected from predators. Exposure to predators had a strong impact on the biomass of individual plants and the strength of this effect differed significantly between the different herbivore treatments.A. pisum had a greater direct impact on plants and this was coupled with a significantly stronger indirect predator effect on plant biomass.Although the direct impact of predators was strongest on M. viciae, this was not transmitted to the plant level, indicating that the predator-prey interactions strength is not as important as the plant-herbivore link for the magnitude of the indirect predator impact. At the individual plant level, the indirect predator effect was purely due to consumptive effects on herbivore densities with no evidence for increased herbivore dispersal in response to presence of predators. The nature of plant-herbivore interactions is the key to terrestrial trophic cascade strength. The two herbivores that we compared were similar in feeding mode and body size but differed their way how they exploit host plants, which was the important trait explaining the strength of the trophic cascade.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Linguistic palaeontology permits the identification of two language families whose linguistic ancestors pose the likeliest candidates for the original domesticators of rice, viz. Hmong-Mien and Austroasiatic. In the 2009 model, the ancient Hmong-Mien was identified as the primary domesticators of Asian rice, and the ancient Austroasiatics as the secondary domesticators. Recent rice genetic research leads to the modification of this model for rice domestication, but falls short of identifying the original locus of rice domestication. At the same time, the precise whereabouts of the Austroasiatic homeland remains disputed. Linguistic evidence unrelated to rice agriculture has been adduced to support a southern homeland for Austroasiatic somewhere within the Bay of Bengal littoral. The implications of new rice genetic research are discussed, the linguistic palaeontological evidence is reassessed, and an enduring problem with the archaeology of rice agriculture is highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we find that (i) Organizational Threats and (ii) Social Threats stemming from the user environment constitute two underlying dimensions of the construct “Privacy Concerns in Online Social Networks”. Using a Structural Equation Model, we examine the impact of the identified dimensions of concern on the Amount, Honesty, and Conscious Control of individual self-disclosure on these sites. We find that users tend to reduce the Amount of information disclosed as a response to their concerns regarding Organizational Threats. Additionally, users become more conscious about the information they reveal as a result of Social Threats. Network providers may want to develop specific mechanisms to alleviate identified user concerns and thereby ensure network sustainability.