956 resultados para ”we” identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The differentiation of cytotrophoblasts into syncytiotrophoblasts in the placenta has been employed as a model to investigate stage specific expression as well as regulation of genes during this process. While the cytotrophoblasts are highly invasive and proliferative with relatively less capacity to synthesize pregnancy related proteins, the multinucleated syncytiotrophoblasts are non-proliferative and non-invasive. However, syncytiotrophoblasts are the site of synthesis of a variety of protein, peptide and steroid hormones as well as several growth factors. Both the freshly isolated cytotrophoblasts from human placenta as well as the BeWo cell, a choriocarcinoma cell line model which retain several characteristic of cytotrophoblasts has been employed by us to study regulation of differentiation. In the present study, we have employed the differential display RT-PCR analysis (DD-RT-PCR) to evaluate gene expression changes during Forskolin induced in vitro differentiation of BeWo cells. We have identified several genes which are differentially expressed during differentiation and the differential expression of 10 transcripts was confirmed by Northern blot analysis. Based on the identity of the transcripts an attempt has been made to relate the known function of the gene products, to changes observed during differentiation. Of the several transcripts, one of the transcripts, namely Secretory Leukocyte Protease Inhibitor (SLPI) which is known to have multiple functions was found to increase 15-fold in the syntiotrophoblast.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dance is a potential asset for peacebuilding, creating opportunities for nonverbal, embodied learning, exploring identity, and relationships. Peace scholars consider identity and relationships to the ‘other’ as key components in transforming conflict. Focusing on a case study in Mindanao, the Philippines, this paper explores the potential of dance in a peacebuilding context through embodied identity and relationships. In Mindanao, deep-seated cultural prejudices contribute to ongoing conflict entwined with identity. The permeable membrane (Cohen, Gutiérrez & Walker, 2011) is the organising framework describing the constant interaction between artists, facilitators, participants, and communities. It expands peace scholar John Paul Lederach’s concept of the moral imagination, requiring the capacity to envisage one’s self within a web of relationships. In this paper multiple methods of qualitative research including personal interviews are used to further the discussion regarding dance’s potential to diversify the nonverbal tools available for peacebuilding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article contributes to the discussion by analysing how users of the leading online 3D printing design repository Thingiverse manage their intellectual property (IP). 3D printing represents a fruitful case study for exploring the relationship between IP norms and practitioner culture. Although additive manufacturing technology has existed for decades, 3D printing is on the cusp of a breakout into the technological mainstream – hardware prices are falling; designs are circulating widely; consumer-friendly platforms are multiplying; and technological literacy is rising. Analysing metadata from more than 68,000 Thingiverse design files collected from the site, we examine the licensing choices made by users and explore the way this shapes the sharing practices of the site’s users. We also consider how these choices and practices connect with wider attitudes towards sharing and intellectual property in 3D printing communities. A particular focus of the article is how Thingiverse structures its regulatory framework to avoid IP liability, and the extent to which this may have a bearing on users’ conduct. The paper has three sections. First, we will offer a description of Thingiverse and how it operates in the 3D printing ecosystem, noting the legal issues that have arisen regarding Thingiverse’s Terms of Use and its allocation of intellectual property rights. Different types of Thingiverse licences will be detailed and explained. Second, the empirical metadata we have collected from Thingiverse will be presented, including the methods used to obtain this information. Third, we will present findings from this data on licence choice and the public availability of user designs. Fourth, we will look at the implications of these findings and our conclusions regarding the particular kind of sharing ethic that is present in Thingiverse; we also consider the “closed” aspects of this community and what this means for current debates about “open” innovation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We conducted an experiment to investigate the impact of sport scandal on consumer attitudes toward a range of sport stakeholders. We examined the effects of fans’ social identity (fan of scandalized team vs. fan of rival team), scandal severity (single perpetrator vs. multiple perpetrators) and the sponsor brand’s response to the scandal (sponsorship retention vs. termination) on consumers’ attitudes toward the implicated team, the scandal perpetrators, the sport, and sponsor brand. We find evidence of differential reactions to scandal reflecting social identity, such that fans support their own team despite increased scandal severity but negatively judge a rival team’s transgressions. Results suggest that where fans are concerned, sponsors may be better served to continue with a sponsorship following scandal than to terminate, even for some forms of severe scandal. However, termination may receive more positive evaluation from rival team fans; hence continuation of sponsorship needs to accompany a tempered approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In quantum theory, symmetry has to be defined necessarily in terms of the family of unit rays, the state space. The theorem of Wigner asserts that a symmetry so defined at the level of rays can always be lifted into a linear unitary or an antilinear antiunitary operator acting on the underlying Hilbert space. We present two proofs of this theorem which are both elementary and economical. Central to our proofs is the recognition that a given Wigner symmetry can, by post-multiplication by a unitary symmetry, be taken into either the identity or complex conjugation. Our analysis often focuses on the behaviour of certain two-dimensional subspaces of the Hilbert space under the action of a given Wigner symmetry, but the relevance of this behaviour to the larger picture of the whole Hilbert space is made transparent at every stage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A discursive article examining the proposition that provisions for young people in care should be formally extended beyond their 18th birthday when care normally ends. Debate exists as to whether this should include a legislative extension to Care as has happened in some overseas jurisdictions or whether it is more appropriate to simply extend access to dedicated support provisions. The article concludes that both may have a place as long as the complexity of young people's situations is adequately responded to.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study in its entirety focused on factors related to adolescents decisions concerning drug use. The term drug use is taken here to include the use of tobacco products, alcohol, narcotics, and other addictive substances. First, the reasons given for drug use (attributions) were investigated. Secondly, the influence of personal goals, the beliefs involved in decision making, psychosocial adjustment including body image and involvement with peers, and parental relationships on drug use were studied. Two cohorts participated in the study. In 1984, a questionnaire on reasons for drug use was administered to a sample of adolescents aged 14-16 (N=396). A further questionnaire was administered to another sample of adolescents aged 14-16 (N=488) in 1999. The results for both cohorts were analyzed in Articles I and II. In Articles III and IV further analysis was carried out on the second cohort (N=488). The research report presented here provides a synthesis of all four articles, together with material from a further analysis. In a comparison of the two cohorts it was found that the attributions for drug use had changed considerably over the intervening fifteen-year period. In relation to alcohol and narcotics use an increase was found in reasons involving inner subjective experiences, with mention of the good feeling and fun resulting from alcohol and narcotics use. In addition, the goals of alcohol consumption were increasingly perceived as drinking to get drunk, and for its own sake. The attributions for the adolescents own smoking behavior were quite different from the attributions for smoking by others. The attributions were only weakly influenced by the participants gender or by their smoking habits, either in 1984 or 1999. In relation to participants own smoking, the later questionnaire elicited more mention of inner subjective experiences involving "good feeling. In relation to the perceived reasons for other people s smoking, it elicited more responses connected with the notion of "belonging. In the second sample, the results indicated that the levels of body satisfaction among adolescent girls are lower than those among adolescent boys. Overall, dissatisfaction with one's physical appearance seemed to relate to drug use. Girls were also found to engage in more discussions than boys; this applied to (i) discussion with peers (concerning both intimate and general matters), and (ii) discussion with parents (concerning general matters). However, more than a quarter of the boys (out of the entire population) reported only low intimacy with both parents and peers. If both drinking and smoking were considered, it seemed that girls in particular who reported drinking and smoking also reported high intimacy with parents and peers. Boys who reported drinking and smoking reported only medium intimacy with parents and peers. In addition, having an intimate relationship with one's peers was associated with a greater tendency to drink purely in order to get drunk. Overall, the results seemed to suggest that drug use is connected with a close relationship with peers and (surprisingly) with a close relationship with parents. Nevertheless, there were also indications that to some extent peer relationships can also protect adolescents from smoking and alcohol use. The results, which underline the complexity of adolescent drug use, are taken up in the Discussion section. It may be that body image and/or other identity factors play a more prominent role in all drug use than has previously been acknowledged. It does appear that in the course of planning support campaigns for adolescents at risk of drug use, we should focus more closely on individuals and their inner world. More research on this field is clearly needed, and therefore some ideas for future research are also presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper disentangles how organization members' “passion orchestra” is related to their entrepreneurial intentions in the particularly relevant context of academia. Drawing on passion literature and identity theory, we propose and test a model linking two central parts of researchers' “passion orchestra”, namely entrepreneurial and obsessive scientific passion, directly and indirectly, to spin-off and start-up intentions. While spin-off intentions refer to intentions to found a firm based upon research results, start-up intentions denote intentions to start any type of company. Using a sample of 2308 researchers from 24 European universities, our findings reveal that higher levels of entrepreneurial passion are associated with both stronger spin-off and start-up intentions. Further, obsessive scientific passion is positively associated with researchers' intentions to create a spin-off, and negatively with their propensity to establish a start-up. Entrepreneurial self-efficacy and affective organizational commitment mediate these effects. Finally, the two types of passion show characteristic interactions. Obsessive scientific passion moderates the entrepreneurial passion–intentions relationship such that it strengthens spin-off intentions. Our results highlight that recasting the individual driven by a singular passion to one with a “passion orchestra” provides a more holistic understanding of the new venture creation process. Implications for research and practice are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

”Does the community really count? – identity process and social capital as elements in surviving in insecurity and uncertainty” is a combination of five articles. The aim of this study is to answer the question: how or in which ways is it possible to find the role of identity process and social capital in surviving in insecurity and uncertainty? In the introduction part the concepts of community and social capital are examined. Then I will study the articles and try to find out what kinds of elements of identity process and social capital in them can be found in order to survive in the societal change. The study consists of the introduction part and the articles. The articles are: 1. “Is Becoming a Researcher Some Kind of Role-playing” - Roles of the Researcher in the Process of Forming the Identity 2. What Composes Collective Identity in the Polytechnic Community? 3. Opportunities to Succeed or Fear of Failure? -Entrepreneurship from the Youngsters` Point of View 4. Learning Risk-taking Competences 5. “Bricolage”, or Just Putting Things Together? The starting point for the study is the feeling of insecurity that surrounds a person living in the present society: you cannot be sure with whom you are going to co-operate tomorrow. In the “Good Old Days” the harmonious communities “protected” their members and worked strongly toward common aims. Nowadays, partly because of urbanisation, we are so busy that we only have time to take care of ourselves, or rather to say: just of myself. As Bauman (2001) puts it: people turn to communities in which they feel like home. They still long for communality. For Mead (1962) the group and the communality plays a big role: a person needs others to become the whole ”Self.” In acting with others a person can gain much more than working alone (Field 2003). But, as Day (2006) puts it, the reality of community as discovered by empirical reserach is a great deal messier than the abstract and idealized versions used by theorists. Keywords: uncertainty, insecurity, communality, identity process, social capital, significant groups, survival.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The goal of the study is to build an image of deafness and of the lives of the deaf from their own per-spectives. The lives of deaf sign language users are analysed through the concept of identity. The start-ing point for the study is the idea that identities are moulded and structured in action and interaction and are, therefore, continuous processes. The terminology and ideas used in the present study are mostly based on Erving Goffman s (1971, 1986) work in which he sees identity as a representation of self. Via our language and our actions we build and present an image of ourselves to others and to ourselves alike. The research aims at answering the following questions concerning the lives of deaf sign language users: how do deaf people build an image of themselves as deaf people, what kind of meanings does deafness acquire in their lives, and what opportunities do they have to be perceived by others as they feel they are, i.e. to present their true self . In order to answer these questions, the narratives provided by eighteen deaf young adults, aged 25 35, in narrative interviews carried out in sign language, have been analysed. The methodology used is that of a data-based, qualitative analysis and narrative analy-sis. The study follows the lines of prior qualitative research carried out in the field of sociology of health and in the study of everyday life. The subjects are divided into three groups according to the linguistic environment dominant in the family: 1) a deaf child in a deaf family, 2) a deaf child in a hearing family using sign language, and 3) a deaf child in a hearing family where sign language was not used. The childhood family has great significance in the way a child constructs his or her identity as a deaf person. The process of construct-ing an identity in the first group can be defined as being automatic or inherited, in the second group the process can be described as being a collective/joint identity-building process, whereas in the third group the process is ambivalent and delayed. The opportunities the deaf have in building their identi-ties as deaf people have been examined through the concept of a collective story reservoir. Research shows that the deaf have, at least partly, a different collective story reservoir that they can rely on from the one the hearing have. Interaction with other deaf people and access to the collective story reservoir is important, because it enables the deaf to form an idea of their own deafness and the life of a deaf person. Three different ways of understanding deafness can be conceptualized from the narratives of the inter-viewed deaf people. In the outdated counter-narrative and the reductive narrative of deafness as an abnormality, the subjects are not capable of seeing themselves as forming part of the narratives or identifying themselves with the ways the deaf are depicted. Yet, the characterizations prevalent in them are the ones that the deaf constantly come across in their day-to-day lives. The narrative through which the subjects depict themselves and their lives can be defined as a pluralistic narrative. The plu-ralistic narrative consists of three elements: the coexistence of the world of the deaf and that of the hearing, the orientation to sign language, and the replacement of local networks with global networks. Although modern Finnish society and its varied social services and subsidy systems enable the realiza-tion of the kind of life described in the pluralistic narrative, the issues of power and inequality still frequently emerge in the narratives in which the deaf young adults described themselves and their lives. Two kinds of power mechanisms can be perceived in the descriptions: belittling and excluding power. These considerably diminish the opportunities of sign language users to create the kind of life that would reflect their personalities while limiting the chances for presenting the self to others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis I examine the U.S. foreign policy discussion that followed the war between Russia and Georgia in August 2008. In the politically charged setting that preceded the presidential elections, the subject of the debate was not only Washington's response to the crisis in the Caucasus but, more generally, the direction of U.S. foreign policy after the presidency of George W. Bush. As of November 2010, the reasons for and consequences of the Russia-Georgia war continue to be contested. My thesis demonstrates that there were already a number of different stories about the conflict immediately after the outbreak of hostilities. I want to argue that among these stories one can discern a “neoconservative narrative” that described the war as a confrontation between the East and the West and considered it as a test for Washington’s global leadership. I draw on the theory of securitization, particularly on a framework introduced by Holger Stritzel. Accordingly, I consider statements about the conflict as “threat texts” and analyze these based on the existing discursive context, the performative force of the threat texts and the positional power of the actors presenting them. My thesis suggests that a notion of narrativity can complement Stritzel’s securitization framework and take it further. Threat texts are established as narratives by attaching causal connections, meaning and actorship to the discourse. By focusing on this process I want to shed light on the relationship between the text and the context, capture the time dimension of a speech act articulation and help to explain how some interpretations of the conflict are privileged and others marginalized. I develop the theoretical discussion through an empirical analysis of the neoconservative narrative. Drawing on Stritzel’s framework, I argue that the internal logic of the narrative which was presented as self-evident can be analyzed in its historicity. Asking what was perceived to be at stake in the conflict, how the narrative was formed and what purposes it served also reveals the possibility for alternative explanations. My main source material consists of transcripts of think tank seminars organized in Washington, D.C. in August 2008. In addition, I resort to the foreign policy discussion in the mainstream media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Let X(t) be a right continuous temporally homogeneous Markov pro- cess, Tt the corresponding semigroup and A the weak infinitesimal genera- tor. Let g(t) be absolutely continuous and r a stopping time satisfying E.( S f I g(t) I dt) < oo and E.( f " I g'(t) I dt) < oo Then for f e 9iJ(A) with f(X(t)) right continuous the identity Exg(r)f(X(z)) - g(O)f(x) = E( 5 " g'(s)f(X(s)) ds) + E.( 5 " g(s)Af(X(s)) ds) is a simple generalization of Dynkin's identity (g(t) 1). With further restrictions on f and r the following identity is obtained as a corollary: Ex(f(X(z))) = f(x) + k! Ex~rkAkf(X(z))) + n-1E + (n ) )!.E,(so un-1Anf(X(u)) du). These identities are applied to processes with stationary independent increments to obtain a number of new and known results relating the moments of stopping times to the moments of the stopped processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.