976 resultados para Model Identity


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In order to explicate Murakami's version of the official culture, I have analyzed the novel with the works of several different theorists. Primarily, I drew my own understanding of the official culture from Raymond Williams's examination of culture in Marxism and Literature. His terminology became helpful in writing about the operation of the System and the Town, though it did not define that operation precisely. Williams's work also introduced me to the theory behind the official culture's manipulation and exclusion of historical aspects in order to create their "official" version of history, from which the official culture draws its identity. For further analysis of the treatment of history, I turned to Friedrich Nietzsche's On the Advantage and Disadvantage of History for Life. Though it examines the official culture's manipulation of history in a much more in-depth manner, it seems to have influenced Murakami's treatment of individual memories and cultural histories. For instance, the herd ofunicoms in the End of the World resembles Nietzsche's description of the ''unhistorical herd," or has the potential to resemble it. With these theories I was able to access the mechanisms of cultural control that Murakami depicts in the form of the System and the Town, and from there I was able to develop a model for how the narrator struggles to subvert that control. Both sides of that struggle are depicted and re-imagined many times throughout Hard-Boiled Wonderland and the End of the World.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present a nonperturbative study of the (1 + 1)-dimensional massless Thirring model by using path integral methods. The regularization ambiguities - coming from the computation of the fermionic determinant - allow to find new solution types for the model. At quantum level the Ward identity for the 1PI 2-point function for the fermionic current separates such solutions in two phases or sectors, the first one has a local gauge symmetry that is implemented at quantum level and the other one without this symmetry. The symmetric phase is a new solution which is unrelated to the previous studies of the model and, in the nonsymmetric phase there are solutions that for some values of the ambiguity parameter are related to well-known solutions of the model. We construct the Schwinger-Dyson equations and the Ward identities. We make a detailed analysis of their UV divergence structure and, after, we perform a nonperturbative regularization and renormalization of the model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

By means of an identity that equates the elliptic genus partition function of a supersymmetric sigma model on the N-fold symmetric product (SX)-X-N of X ((SX)-X-N=X-N/S-N, where S-N is the symmetric group of N elements) to the partition function of a second-quantized string theory, we derive the asymptotic expansion of the partition function as well as the asymptotic for the degeneracy of spectrum in string theory. The asymptotic expansion for the state counting reproduces the logarithmic correction to the black hole entropy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We evaluate the one-loop fermion self-energy for the gauged Thirring model in (2+1) dimensions. with one massive fermion flavor. We do this in the framework of the causal perturbation theory. In contrast to QED3, the corresponding two-point function turns out to be infrared finite on the mass shell. Then, by means of a Ward identity, we derive the on-shell vertex correction and discuss the role played by causality for non-renormalizable theories.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The leading-twist pion-distribution amplitude is obtained at a low normalization scale of order ρc (inverse average size of an instanton). Pion dynamics, consistent with gauge invariance and low-energy theorems, is considered within the instanton vacuum model. The results are QCD-evolved to higher momentum-transfer values and are in agreement with recent data from CLEO on the pion transition form factor. It is also shown that some previous calculations violate the axial Ward-Takahashi identity. © 2001 MAIK Nauka/Interperiodica.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Germline and early embryo development constitute ideal model systems to study the establishment of polarity, cell identity, and asymmetric cell divisions (ACDs) in plants. We describe here the function of the MATH-BTB domain protein MAB1 that is exclusively expressed in the germ lineages and the zygote of maize (Zea mays). mab1 (RNA interference [RNAi]) mutant plants display chromosome segregation defects and short spindles during meiosis that cause insufficient separation and migration of nuclei. After the meiosis-to-mitosis transition, two attached nuclei of similar identity are formed in mab1 (RNAi) mutants leading to an arrest of further germline development. Transient expression studies of MAB1 in tobacco (Nicotiana tabacum) Bright Yellow-2 cells revealed a cell cycle-dependent nuclear localization pattern but no direct colocalization with the spindle apparatus. MAB1 is able to form homodimers and interacts with the E3 ubiquitin ligase component Cullin 3a (CUL3a) in the cytoplasm, likely as a substrate-specific adapter protein. The microtubule-severing subunit p60 of katanin was identified as a candidate substrate for MAB1, suggesting that MAB1 resembles the animal key ACD regulator Maternal Effect Lethal 26 (MEL-26). In summary, our findings provide further evidence for the importance of posttranslational regulation for asymmetric divisions and germline progression in plants and identified an unstable key protein that seems to be involved in regulating the stability of a spindle apparatus regulator(s).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Organizational and institutional scholars have advocated the need to examine how processes originating at an individual level can change organizations or even create new organizational arrangements able to affect institutional dynamics (Chreim et al., 2007; Powell & Colyvas, 2008; Smets et al., 2012). Conversely, research on identity work has mainly investigated the different ways individuals can modify the boundaries of their work in actual occupations, thus paying particular attention to ‘internal’ self-crafting (e.g. Wrzesniewski & Dutton, 2001). Drawing from literatures on possible and alternative self and on positive organizational scholarship (e.g., Obodaru, 2012; Roberts & Dutton, 2009), my argument is that individuals’ identity work can go well beyond the boundaries of internal self-crafting to the creation of new organizational arrangements. In this contribution I analyze, through multiple case studies, healthcare professionals who spontaneously participated in the creation of new organizational arrangements, namely health structures called Community Hospitals. The contribution develops this form of identity work by building a grounded model. My findings disclose the process that leads from the search for the enactment of different self-concepts to positive identities, through the creation of a new organizational arrangement. I contend that this is a particularly complex form of collective identity work because it requires, to be successful, concerted actions of several internal, external and institutional actors, and it also requires balanced tensions that – at the same time - enable individuals’ aspirations and organizational equilibrium. I name this process organizational collective crafting. Moreover I inquire the role of context in supporting the triggering power of those unrealized selves. I contribute to the comprehension of the consequences of self-comparisons, organizational identity variance, and positive identity. The study bears important insights on how identity work originating from individuals can influence organizational outcomes and larger social systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A growing body of literature indicates a modestly positive association between religiosity and spirituality as predictors of psychological health (anxiety and depression), suggesting they serve as personal resiliency factors. The purpose of this study was to expand our understanding of the relationships among these constructs. Using Lazarus's Transactional Model of Stress as a theoretical framework, we examined: (a) the extent to which spirituality and religiosity mediated and/or moderated the association between perceived stress and psychological health and (b) whether there was a moderated (religiosity) mediation (spirituality) between stress and health. The Perceived Stress Scale, Daily Spiritual Experiences Scale, Religious Commitment Inventory, and Hospital Anxiety and Depression Scale were administered to measure the following constructs: stress, spirituality, religiosity, and psychological health. This study utilized a nonexperimental, quantitative, correlational, cross-sectional, moderated-mediation design, and included a convenience sample of 331 research participants. Both spirituality and religiosity moderated stress and health. However, only spirituality partially mediated the relationship. In addition, religiosity did not moderate the mediating effects of spirituality. Overall, this study confirmed the role of both religiosity and spirituality as effective resiliency resources.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We examine the impact of identity preferences on the interrelation between incentives and performance measurement. In our model, a manager identifies with an organization and loses utility to the extent that his actions conflict with effort-standards issued by the principal. Contrary to prior arguments in the literature, we find conditions under which a manager who identifies strongly with the organization receives stronger incentives and faces more performance evaluation reports than a manager who does not identify with the organization. Our theory predicts that managers who experience events that boost their identification with the firm can decrease their effort in short-term value creation. We also find that firms are more likely to employ less precise but more congruent performance measures, such as stock prices, when contracting with managers who identify little with the organization. In contrast, they use more precise but less congruent measures, such as accounting earnings, when contracting with managers who identify strongly with the firm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Linguistic palaeontology permits the identification of two language families whose linguistic ancestors pose the likeliest candidates for the original domesticators of rice, viz. Hmong-Mien and Austroasiatic. In the 2009 model, the ancient Hmong-Mien was identified as the primary domesticators of Asian rice, and the ancient Austroasiatics as the secondary domesticators. Recent rice genetic research leads to the modification of this model for rice domestication, but falls short of identifying the original locus of rice domestication. At the same time, the precise whereabouts of the Austroasiatic homeland remains disputed. Linguistic evidence unrelated to rice agriculture has been adduced to support a southern homeland for Austroasiatic somewhere within the Bay of Bengal littoral. The implications of new rice genetic research are discussed, the linguistic palaeontological evidence is reassessed, and an enduring problem with the archaeology of rice agriculture is highlighted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we find that (i) Organizational Threats and (ii) Social Threats stemming from the user environment constitute two underlying dimensions of the construct “Privacy Concerns in Online Social Networks”. Using a Structural Equation Model, we examine the impact of the identified dimensions of concern on the Amount, Honesty, and Conscious Control of individual self-disclosure on these sites. We find that users tend to reduce the Amount of information disclosed as a response to their concerns regarding Organizational Threats. Additionally, users become more conscious about the information they reveal as a result of Social Threats. Network providers may want to develop specific mechanisms to alleviate identified user concerns and thereby ensure network sustainability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Changes in the nature of work and organizations have led to an increased need for self-directed career management (SDCM). However, there is no consensus in the literature of what constitutes SDCM and many related concepts have been proposed. Integrating previous research across different conceptualizations of SDCM, the paper proposes four critical career resources which are essential for career development in the modern context: human capital resources, social resources, psychological resources, and identity resources. Implications of this framework for counselling practice are presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The present study explores what mechanism might be responsible for the reported link between presence of a calling in one’s career and life satisfaction. It is proposed that vocational identity achievement acts as one important mediator of this relation and that the effects can be observed even when controlling for core self-evaluations (CSEs). The study used a short-term longitudinal design based on a sample of 269 German college students from different majors. The results confirmed the mediation model, with calling predicting vocational identity achievement 6 months later and identity serving as a stronger predictor of life satisfaction, all controlling for CSEs. However, contrary to previous research, presence of calling was not directly related to life satisfaction and even showed a negative relation when vocational identity achievement was controlled. The results are interpreted to suggest a multifaceted relation between calling and life satisfaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Images of the medieval past have long been fertile soil for the identity politics of subsequent periods. Rather than “authentically” reproducing the Middle Ages, medievalism therefore usually tells us more about the concerns and ideological climate of its own time and place of origin. To dramatise the nascent nation, Shakespeare resorts to medievalism in his history plays. Centuries later, the BBC-produced television mini-serial The Hollow Crown – adapting Shakespeare’s second histories tetralogy – revamps this negotiation of national identity for the “Cultural Olympiad” in the run-up to the 2012 London Olympics. In this context of celebratory introspection, The Hollow Crown weaves a genealogical narrative consisting of the increasingly “glorious” medieval history depicted and “national” Shakespearean heritage in order to valorise 21st-century “Britishness”. Encouraging a reading of the histories as medieval history, the films construct an ostensibly inclusive, liberal-minded national identity grounded in this history. Moreover, medieval kingship is represented in distinctly sentimentalising and humanising terms, fostering emotional identification especially with the no longer ambivalent Hal/Henry V and making him an apt model for present-day British grandeur. However, the fact that the films in return marginalise female, Scottish, Irish and Welsh characters gives rise to doubts as to whether this vision of Shakespeare’s Middle Ages really is, as the producers claimed, “for everybody”.