779 resultados para The limits of identity
Resumo:
Mode of access: Internet.
Resumo:
"Initially supported by a grant for youth development activities from the Ford Foundation and completed with support from the National Institute for Mental Health (Grant M-1780)"
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-05
Resumo:
T he aim of this study was to determine whether identity-by-descent (IBD) information for affected sib pairs (ASPs) can be used to select a sample of cases for a genetic case-control study which will provide more power for detecting association with loci in a known linkage region. By modeling the expected frequency of the disease allele in ASPs showing IBD sharing of 0, 1, or 2 alleles, and considering additive, recessive, and dominant disease models, we show that cases selected from IBD 2 families are best for this purpose, followed by those selected from IBD 1 families; least useful are cases selected from IBD 0 families.
Rethinking the preparation of HPE teachers: Ruminations on knowledge, identity, and ways of thinking
Resumo:
The United States has exerted a major influence on Southeast Asia, especially since World War II. As both a promoter of neoliberal reform and as the key strategic actor in the wider East Asian region, the impact of U.S. power has been immense. But both the Asian economic crisis and its aftermath, and the more recent war on terror, have highlighted the contradictory impact of evolving U.S. foreign policy and intervention in the region. At both an elite and a mass level there is evidence of resentment about, and hostility toward, U.S. policy and its perceived negative effects. This article outlines how U.S. foreign policy has impacted the region in the economic, political, and security spheres, and argues that not only has it frequently not achieved its goals, but it may in fact be undermining both America's long-term hegemonic position in the region and any prospects for political liberalization.
Resumo:
Questions of identity have become increasingly central to the study of foreign policy and security, particularly in constructivist debates. But very few of the resulting insights have been applied to the Korean situation, where discussions about security and inter-Korean relations remain dominated by strategic and geopolitical issues. The main task of this article is to address this shortcoming by examining the experience of North Korean defectors in South Korea and the precedent of German unification. Both of these domains of inquiry reveal that identity differences between North and South persist far beyond the ideological and political structures that created them in the first place. Born out of death, fear, and longing for revenge, these identity patterns lie at the heart of Korea's security dilemmas. Unless taken seriously by scholars and decision makers, the respective tensions between identity and difference will continue to cause major political problems. (Key words: Inter-Korean relations, North Korean defectors, German unification)
Resumo:
Two studies compared leader-member exchange (LMX) theory and the social identity theory of leadership. Study 1 surveyed 439 employees of organizations in Wales, measuring Work group salience, leader-member relations, and perceived leadership effectiveness. Study 2 surveyed 128 members of organizations in India, measuring identification not salience and also individualism/collectivism. Both studies provided good support for social identity predictions. Depersonalized leader-member relations were associated with greater leadership effectiveness among high- than low-salient groups (Study 1) and among high than low identifiers (Study 2). Personalized leadership effectiveness was less affected by salience (Study 1) and unaffected by identification (Study 2). Low-salience groups preferred personalized leadership more than did high-salience groups (Study 1). Low identifiers showed no preference but high identifiers preferred depersonalized leadership (Study 2). In Study 2, collectivists did not Prefer depersonalized as opposed to personalized leadership, whereas individualists did, probably because collectivists focus more on the relational self.
Resumo:
Growth in the sophistication of information technology (IT) has led to the increasing importance of information accessibility in the workplace. The pervasiveness of the resultant knowledge-based economy has centered attention on issues of employee group identity. In this article we explore how employee perceptions of group membership guide the change outcomes of an organization implementing new information technology. Using a social identity framework, we investigate the salient intergroup relationships of two groups of employees (management and IT implementation teams) and how employees use their different group memberships to reframe positions of authority or knowledge around technology change. We discuss the extent to which perceptions of social identity legitimate institutional structures already in place despite the potential of new technology.