925 resultados para identity work
Resumo:
Following the seminal work on personal identity of Erikson, Marcia's identity status model has been one of the most enduring paradigms. The Ego Identity Process Questionnaire (EIPQ; Balistreri, Busch-Rossnagel, & Geissinger, 1995) is a widely used measure of identity status. The purpose of this study was to evaluate the factor structure and the reliability of a French version of the EIPQ. The hypothesized structures were not confirmed. In light of the failed attempts to validate the original version, an alternative short-form version of the EIPQ (EIPQ-SF), maintaining the integrity of the original model, was developed in one sample and cross-validated in another sample. Additionally, theoretically consistent associations between the EIPQ-SF dimensions and self-esteem confirmed convergent validity. Globally, the results indicated that the French short-version of the EIPQ might be a useful instrument for the assessment of the identity statuses in adolescence and emerging adulthood.
Resumo:
Purpose We propose a social identity model of leader prototypes to address why the maleness of leader prototypes is more pronounced among men than among women (e.g., Schein, 2001). Specifically, we argue that individuals project their ingroup prototype (e.g., a male prototype) onto a valued other category (e.g., leaders) (e.g., Wenzel, Mummendey, Weber, & Waldzus, 2003) in order to maintain a positive ingroup (e.g., gender) identity. We hypothesized that both women and men engage in ingroup projection of their gender prototype on their leader prototype, and we expected this effect to be stronger for men than women. We also investigated intelligence as a moderator of ingroup projection. Methodology Participants (276 students, University of Lausanne) assessed to what extent attributes on a list of gender traits were characteristic of a successful leader. We computed relative ingroup similarity scores (e.g., Waldzus & Mummendey, 2004) representing the difference between how characteristic ingroup traits are for a successful leader, and how characteristic outgroup traits are for a successful leader. Results Results showed that men engaged in ingroup projection while women engaged in outgroup projection, and that men engaged in ingroup projection to a greater extent. We also found a small, but positive effect of intelligence on ingroup projection among men. Limitations The use of a student sample might limit the external validity of our findings. Implications Our findings contribute to research on the under-representation of women in managerial roles, and introduce intelligence as a predictor of ingroup projection. Value Our study allows for a more fine-grained understanding of the cognitive representations of leaders of men and women.
Resumo:
Following their detection and seizure by police and border guard authorities, false identity and travel documents are usually scanned, producing digital images. This research investigates the potential of these images to classify false identity documents, highlight links between documents produced by a same modus operandi or same source, and thus support forensic intelligence efforts. Inspired by previous research work about digital images of Ecstasy tablets, a systematic and complete method has been developed to acquire, collect, process and compare images of false identity documents. This first part of the article highlights the critical steps of the method and the development of a prototype that processes regions of interest extracted from images. Acquisition conditions have been fine-tuned in order to optimise reproducibility and comparability of images. Different filters and comparison metrics have been evaluated and the performance of the method has been assessed using two calibration and validation sets of documents, made up of 101 Italian driving licenses and 96 Portuguese passports seized in Switzerland, among which some were known to come from common sources. Results indicate that the use of Hue and Edge filters or their combination to extract profiles from images, and then the comparison of profiles with a Canberra distance-based metric provides the most accurate classification of documents. The method appears also to be quick, efficient and inexpensive. It can be easily operated from remote locations and shared amongst different organisations, which makes it very convenient for future operational applications. The method could serve as a first fast triage method that may help target more resource-intensive profiling methods (based on a visual, physical or chemical examination of documents for instance). Its contribution to forensic intelligence and its application to several sets of false identity documents seized by police and border guards will be developed in a forthcoming article (part II).
Resumo:
Forensic intelligence has recently gathered increasing attention as a potential expansion of forensic science that may contribute in a wider policing and security context. Whilst the new avenue is certainly promising, relatively few attempts to incorporate models, methods and techniques into practical projects are reported. This work reports a practical application of a generalised and transversal framework for developing forensic intelligence processes referred to here as the Transversal model adapted from previous work. Visual features present in the images of four datasets of false identity documents were systematically profiled and compared using image processing for the detection of a series of modus operandi (M.O.) actions. The nature of these series and their relation to the notion of common source was evaluated with respect to alternative known information and inferences drawn regarding respective crime systems. 439 documents seized by police and border guard authorities across 10 jurisdictions in Switzerland with known and unknown source level links formed the datasets for this study. Training sets were developed based on both known source level data, and visually supported relationships. Performance was evaluated through the use of intra-variability and inter-variability scores drawn from over 48,000 comparisons. The optimised method exhibited significant sensitivity combined with strong specificity and demonstrates its ability to support forensic intelligence efforts.
Resumo:
This is a study of team social networks, their antecedents and outcomes. In focusing attention on the structural configuration of the team this research contributes to a new wave of thinking concerning group social capital. The research site was a random sample of Finnish work organisations. The data consisted of 499 employees in 76 teams representing 48 different organisations. A systematic literature review and quantitative methods were used in conducting the research: the former primarily to establish the current theoretical position on the relationships among the variables and the latter to test these relationships. Social network analysis was the primary method used in identifying the social-network relations among the work-team members. The first and key contribution of this study is that it relates the structuralnetwork properties of work teams to behavioural outcomes, attitudinal outcomes and, ultimately, team performance. Moreover, it shows that addressing attitudinal outcomes is also important in terms of team performance; attitudinal outcomes (team identity) mediated the relationship between the team’s performance and its social network. The second contribution is that it examines the possible antecedents of the social structure. It is thus one response to Salancik’s (1995) call for a network theory in that it explains why certain network characteristics exist. Itdemonstrates that irrespective of whether or not a team is heterogeneous in terms of age or gender, educational diversity may protect it from centralisation. However, heterogeneity in terms of gender turned out to have a negative impact on density. Thirdly, given the observation that the benefits of (team) networks are typically theorised and modelled without reference to the nature of the relationships comprising the structure, the study directly tested whether team knowledge mediated the effects of instrumental and expressive network relationships on team performance. Furthermore, with its focus on expressive networks that link the workplace to a more informal world, which have been rather neglected in previous research, it enhances knowledge of teams andnetworks. The results indicate that knowledge sharing fully mediates the influence of complementarities between dense and fragmented instrumental network relationships, thus providing empirical validation of the implicit understanding that networks transfer knowledge. Fourthly, the study findings suggest that an optimal configuration of the work-team social-network structure combines both bridging and bonding social relationships.
Resumo:
Career identity exploration is a central component of the lives of undergraduate university students. Although students are encouraged to explore, it is unclear whether different methods of exploration are better suited for certain individuals. In the present study, quantitative data were collected to examine the relationship between shyness and various methods of exploration. Two hundred fifty-seven university undergraduate students (29 male), ranging in age from 17-25 years completed a 60-minute self-report questionnaire. Shyness, identity, identity distress, subjective dimensions of exploration (satisfaction with exploration, reasons for not exploring, helpfulness of exploration methods), foci of exploration (non-social, social, self, and environmental), approaches to exploration (breadth, depth), and moderating variables (social support, sociability) were measured. Shyness was positively correlated with moratorium (high exploration, low commitment) and uncorrelated with the other identity statuses. Shyness was also positively correlated with identity distress, and a predicted interaction between shyness and identity diffusion predicting career identity distress was supported. Shyness was negatively correlated with satisfaction with amount of exploration engaged in to-date. In addition, shyness was correlated with the likelihood of selecting too stressful and too anxiety provoking as reasons for engaging in less exploration than one would like. Expected relationships between shyness and beliefs about, and engagement in, various methods of exploration were largely non-significant. Exceptions to this were the negative correlations between shyness and engagement in social exploration, and beliefs about the helpfulness of social self-exploration, both of which were significant at a trend level. A predicted interaction between shyness and social support predicting total social exploration was supported, showing that high social support buffers the negative relationship between shyness and exploration; such a moderating relationship did not exist, however, between sociability, shyness and social exploration. Results suggest that although shy university students are engaged in career exploration, they are experiencing feelings of distress and dissatisfaction with their career identity exploration and development. Thus, to help shy students become successfiil in their exploration, it is important for counsellors, family members, and peers to be aware of the feelings the individuals are experiencing and help them reduce the anxiety and stress associated with the exploration process. One promising method, supported by the results in this study, is by encouraging shy individuals to explore with social support.
Resumo:
The purpose of this project was to discern the inherent tension present in narratives told by adolescents with a visual impairment as they attempted to make sense of their experiences, specifically those surrounding risk. Mediated action, based on the foundational work of Vygotsky and Bakhtin, was used as both a theoretical and methodological approach; it is the theory that there are two components that constitute any human action: the "agent," or the person who is doing the acting, and the "mediational means" that he or she is using to accomplish the action in question. Tension ensues as neither is able to fully explain human behaviour. Ten adolescents with a visual impairment participated in a narrative interview, revealing numerous counter-narratives surrounding risk-taking, including "experimentation undertaken using good judgment." Participants offered examples of how they engaged, appropriated, resisted and transformed the dominant narratives of disability and adolescence in their identity formation.
Resumo:
This thesis explores notions of contemporary Metis identity through the lens of visual culture, as articulated in the works of three visual artists of Metis ancestry. I discuss the complexities of being Metis with reference to specific art works by Christi Belcourt, David Garneau and Rosalie Favell. In addition to a visual culture analysis of these three Metis artists, I supplement my discussion of Metis identity with a selection of autoethnographic explorations of my identity as a Metis woman through out this thesis. The self-reflexive aspect of this work documents the ways in which my understanding of myself as a Metis woman have been deepened and reworked in the process of conducting this research, while also offering an expanded conception of contemporary Metis culture. I present this work as an important point of departure for giving a greater presence to contemporary Metis visual culture across Canada:
Resumo:
This qualitative study was conducted to explore tenured faculty members’ understandings of their roles as professors. Tenure is an institutional means to enact academic freedom, which allows tenured faculty members to investigate topics of their choosing free from external influence. Academic freedom also enables faculty members to be public intellectuals who shape and critique social policies and make knowledge assertions. In effect, the faculty members are institutionally protected to speak truth to power. Purposeful sampling of 9 participants from 2 universities yielded 3 major themes: professorial identity (shaped by such factors as career stage, university culture, and faculty affiliation), professorial power (powers that participants experienced as well as the ways in which they exercised power), and professorial silencing (as a response to fiscal realities coupled with numerous governance issues). While participants were cognizant of the powers that affected their freedoms, they were less aware of the ways in which their position afforded them powers. Subtle but more potent forms of power were at play for tenured professors, but the participants saw themselves as having to work within institutional and financial constraints that limited their freedom to speak out on controversial issues. Faculty members were, thus, silenced and at times chose to self-silence. The context of the present-day university, governance models, and the financial issues affecting universities and departments worked in concert to silence this critical voice in society.
Resumo:
Document de travail
Resumo:
Ayant réalisé neuf longs-métrages entre 1988 et 2007, aussi que plusieurs campagnes publicitaires, vidéo-clips, courts-métrages et projets collectifs, Wong Kar-wai est un des réalisateurs contemporains les plus importants actuellement. Issu de l'industrie cinématographique fortement commerciale de Hong Kong, Wong est parvenu à attirer l'attention du circuit international des festivals de cinéma avec son style visuel unique et son récit fragmenté. Considéré par plusieurs critiques comme le poète de la recherche d’identité de Hong Kong après 1997, Wong Kar-wai défie toutes les tentatives de catégorisation. L’étude qui se poursuivit ici a donc pour objet essentiel de fournir une analyse attentive et complète de son oeuvre, tout en se concentrant sur les traits stylistiques qui donnent à ses films une unité. Ces caractéristiques correspondent à une certaine façon de raconter des histoires, de composer des personnages et des récits, de manipuler le temps et d'utiliser des ressources techniques de sorte que ses films offrent une identité cohérente. L'objectif est d'analyser les différents composants de ses images pour découvrir comment ses films communiquent les uns avec les autres afin de créer une identité unique. Pour atteindre cet objectif, je pose comme hypothèse de travail que le cinéma de Wong est marqué par une structure dualiste qui permet à ses films de présenter des qualités contradictoires simultanément. La plupart de mes arguments se concentrent sur le travail du philosophe français Gilles Deleuze, qui a proposé une théorie du cinéma divisé entre l’image-mouvement et l’image-temps. Je considère que sa théorie fournit un cadre valide sur lequel les films de Wong peuvent être projetés. Tandis que ma recherche se concentre sur l’interprétation textuelle des films, je profiterais également d’une analyse comparative.
Resumo:
Ce mémoire examine la question de la formation de l'identité en tant que procédure compliquée dans laquelle plusieurs éléments interviennent. L'identité d'une personne se compose à la fois d’une identité propre et d’une autre collective. Dans le cas où l’identité propre est jugée sévèrement par les autres comme étant déviante, cela poussera la personne à, ou bien maintenir une image compatible avec les prototypes sociaux ou bien résister et affirmer son identité personnelle. Mon travail montre que l'exclusion et la répression de certains aspects de l'identité peuvent causer un disfonctionnement psychique difficile à surmonter. Par contre, l'acceptation de soi et l’adoption de tous les éléments qui la constituent conduisent, certes après une longue lutte, au salut de l’âme et du corps. Le premier chapitre propose une approche psychosociale qui vise à expliquer le fonctionnement des groupes et comment l'interaction avec autrui joue un rôle décisif dans la formation de l'identité. Des éléments extérieurs comme par exemple les idéaux sociaux influencent les comportements et les choix des gens. Toutefois, cette influence peut devenir une menace aux spécificités personnelles et aux traits spécifiques. Le deuxième chapitre examine la question des problèmes qu’on risque d’avoir au cas où les traits identitaires franchiraient les normes sociales. Nous partons du problème épineux de la quête de soi dans Giovanni's Room de James Baldwin. L'homosexualité de David était tellement refusée par la société qu’elle a engendrée chez lui des sentiments de honte et de culpabilité. Il devait choisir entre le sacrifice des aspects de soi pour satisfaire les paradigmes sociaux ou bien perdre ce qu’il a de propre. David n'arrive pas à se libérer. Il reste prisonnier des perceptions rigides au sujet de la masculinité et de la sexualité. Mon analyse se focalise essentiellement sur l'examen des différents éléments théoriques qui touchent la question du sexe et de la sexualité. Le résultat est le suivant : plus les opinions dominantes sont rigides et fermes, plus elles deviennent une prison pour l’individu. Par contre, plus elles sont tolérantes et flexibles, plus elles acceptent les diversités de l'identité humaine. Dans le dernier chapitre, j'examine la question de la représentation des relations entre les caractères masculins dans Just Above My Head. L'homosexualité est présentée comme un moyen sacré pour exprimer l'amour. Les caractères révèlent leurs sentiments implicitement à travers les chants spirituel tel que le gospel ou bien explicitement à travers la connexion physique. Dans ce roman, Baldwin montre que c'est seulement grâce à la sincérité et à l'amour que l'individu peut atteindre la libération du soi.
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.
Resumo:
El presente trabajo describe la identidad organizacional de una antigua Universidad Colombiana – Universidad del Rosario – desde 1890 hasta 1991. Esta descripción detallada se realizó con el propósito de hacer preguntas y señalar algunos de los desafíos que esta universidad se encontrará al educar las nuevas generaciones de la nación para la sociedad del conocimiento. Este documento también describe brevemente las características más importantes de la sociedad del conocimiento, así como las características de las universidades que desarrollan sus actividades en ella. También, se hace una síntesis sobre el estado de desarrollo de la sociedad del conocimiento en Colombia. Finalmente, se extraen algunas conclusiones a acerca de las oportunidades de cambio que tendrá la identidad Rosarista para continuar siendo relevante en el siglo XXI.
Resumo:
If education is to be about ‘human flourishing’ (De Ruyter, 2004) as well as preparation for adulthood and work, then religious and citizenship education would seem to have a key contribution towards this goal, both offering opportunities for the exploration and development of a robust sense of identity. However, despite the opposition of most religious educators, religious education has been treated by successive UK governments simply as a form of inculcation into a homogenous notion of citizenship based on nominal church attendance. Moreover, the teaching of the relatively new subject of citizenship education, whilst recognising that the sense of identity and allegiance is complex, has not regularly included faith perspectives. I argue that the concept of ‘spiritual development’, which centres on an existential sense of identity, offers a justification for combining lessons in both religious and citizenship education. I conclude on a cautionary note, arguing that pupils need to be given a critical awareness of ways in which such identities can be provided for them by default, particularly since consumer culture increasingly makes use of ‘spiritual’ language and imagery.