896 resultados para Group identity -- Colorado -- Longmont
Resumo:
A study of women leaders in the Colorado Mountain Club (CMC) demonstrated that this group perceived pace as an impediment to leadership growth. This study is an exploratory-quantitative inquiry that assessed the views of 20 of the active women hike leaders in the Denver group. The author designed a survey of factors women hike leaders would rate according to their CMC experiences. Although there are more women members of the Denver group, women leaders comprise only 30% of the leadership group The results from this first ever survey of CMC's women leaders provides a knowledge base for CMC and other interested parties. This study clearly demonstrated the need for more research into its topic of women in leadership positions.
Resumo:
Mode of access: Internet.
Resumo:
Previous research indicates that people who are highly identified with their groups tend to remain committed to them under threat. This study examines the generalizability, of this effect to (a) a real-life context involving the perception that others view the ingroup (Australians) as intolerant of minorities and (b) various dimensions of social identification. The sample comprised 213 respondents to a random mail survey. Perceived threat was inversely related to self-stereotyping (i.e. perceptions of self-ingroup similarity), but only for individuals with weak subjective ties to other group members. Threat perceptions were also predictive of enhanced judgments of within-group variability on threat-relevant dimensions, particularly for individuals with weaker ingroup ties. Various strategies for coping with a threatened social identity are linked to different facets of social identification.
Resumo:
We articulate the role of norms within the social identity perspective as a basis for theorizing a number of manifestly communicative phenomena. We describe how group norms are cognitively represented as context-dependent prototypes that capture the distinctive properties of groups. The same process that governs the psychological salience of different prototypes, and thus generates group normative behavior, can be used to understand the formation, perception, and diffusion of norms, and also how some group members, for example, leaders, have more normative influence than others. life illustrate this process across a number of phenomena and make suggestions for future interfaces between the social identity perspective and communication research. We believe that the social identity approach represents a truly integrative force for the communication discipline.
Resumo:
While classic intergroup theories have specified the processes explaining situational shifts in social identification, the processes whereby social identities change more profoundly and become integrated within the self have to be proposed. To this aim, the present studies investigate the processes by which group members integrate a new social identity as they are joining a new group. Combining a social identity approach and stress and coping models, this research tests if social factors (i.e., needs satisfied by fellow group members, social support), have an impact on the adaptation strategies group members use to deal with the novelty of the situation and to fit into their new group (seeking information & adopting group norms vs. disengaging). These strategies, in turn, should predict changes in level of identification with the new social group over time, as well as enhanced psychological adjustment. These associations are tested among university students over the course of their first academic year (Study 1), and among online gamers joining a newly established online community (Study 2). Path analyses provide support for the hypothesised associations. The results are discussed in light of recent theoretical developments pertaining to intraindividual changes in social identities and their integration in the self.
Resumo:
There is a paucity of literature regarding the construction and operation of corporate identity at the stakeholder group level. This article examines corporate identity from the perspective of an individual stakeholder group, namely, front-line employees. A stakeholder group that is central to the development of an organization’s corporate identity as it spans an organization’s boundaries, frequently interacts with both internal and external stakeholders, and influences a firm’s financial performance by building customer loyalty and satisfaction. The article reviews the corporate identity, branding, services and social identity literatures to address how corporate identity manifests within the front-line employee stakeholder group, identifying what components comprise front-line employee corporate identity and assessing what contribution front-line employees make to constructing a strong and enduring corporate identity for an organization. In reviewing the literature the article develops propositions that, in conjunction with a conceptual model, constitute the generation of theory that is recommended for empirical testing.
Resumo:
We consider whether the impact of entrepreneurial orientation on business performance is moderated by the company affiliation with business groups. Within business groups, we explore the trade-off between inter-firm insurance that enables risk-taking, and inefficient resource allocation. Risk-taking in group affiliated firms leads to higher performance, compared to independent firms, but the impact of proactivity is attenuated. Utilizing Indian data, we show that risk-taking may undermine rather than improve business performance, but this effect is not present in business groups. Proactivity enhances performance, but less so in business groups. Firms can also enhance performance by technological knowledge acquisition, but these effects are not significantly different for various ownership categories.
Resumo:
Leadership is a socially constructed concept shaped by the context, values and experiences of society (Klenke, 1996); the historical context of gender and ethnicity in society affects views about leadership and who merits a leadership role. Therefore, developing an understanding of Hispanic women students’ leadership identity development is critical in broadening how we define leadership and develop leadership education. The purpose of this qualitative case study was to explore and describe the leadership identity development of a select group of women leaders at a Hispanic Serving Institution (HSI) in the southeast. A psychosocial approach to the study was utilized. In-depth interviews and focus groups were conducted with 11 self-identified Hispanic women students of sophomore, junior or senior standing with varying degrees of involvement in leadership activities at Florida International University. Participants were asked questions related to four topics; (a) leadership, (b) gender, (c) ethnic identity, and (d) influences that contributed to their understanding of self as leader. Five topics emerged from the data presented by the participants’: (a) encouraging relationships, (b) meaningful experiences, (c) self development, (d) the role of gender, and (e) impact of ethnicity. These themes contributed to the leadership identity development of the participants. Findings indicate that leadership identity development for Hispanic women college students at this HSI is complex. The concept of leadership identity development presented in the literature was challenged as findings indicate that the participants’ experiences living and attending a school in a majority-minority city influenced their development of a leadership identity. The data indicate that leadership is not gender or ethnicity neutral as differences exist in expectations of men and women in leadership roles. Gender expectations posed particular challenges for these women student leaders. The prescriptive nature of stage-based models was problematic as findings indicated leadership identity development a complicated and continuing process influenced strongly by relationships and experiences. This study enhanced knowledge of the ways that Hispanic women students become leaders and the influences that shape their leadership experiences which can assist higher education professionals in developing leadership programs and courses that address gender, multiculturalism and awareness of self as leader.
Resumo:
The purpose of this research is to identify the impact of recent organizational change upon the culture of firefighting. The experiences of female firefighters were utilized as a measure of cultural change. A purposive sample of twenty-seven male and female firefighters were interviewed in a semi-structured format about their experiences in the fire service. This research found that the culture of firefighting has adjusted to the presence of previously excluded groups by forging a division among the identities and roles of male and female firefighters. The white, male firefighters, who have traditionally constituted a majority of the workforce, have continued to identify with traditional firefighter roles and reported high levels of cohesion. In contrast, the female firefighters showed a greater variance in their identification with traditional roles and decreased levels of cohesion with the main body of the group.
Resumo:
Developing the social identity theory of leadership (e.g., [Hogg, M. A. (2001). A social identity theory of leadership. Personality and Social Psychology Review, 5, 184–200]), an experiment (N=257) tested the hypothesis that as group members identify more strongly with their group (salience) their evaluations of leadership effectiveness become more strongly influenced by the extent to which their demographic stereotype-based impressions of their leader match the norm of the group (prototypicality). Participants, with more or less traditional gender attitudes (orientation), were members, under high or low group salience conditions (salience), of non-interactive laboratory groups that had “instrumental” or “expressive” group norms (norm), and a male or female leader (leader gender). As predicted, these four variables interacted significantly to affect perceptions of leadership effectiveness. Reconfiguration of the eight conditions formed by orientation, norm and leader gender produced a single prototypicality variable. Irrespective of participant gender, prototypical leaders were considered more effective in high then low salience groups, and in high salience groups prototypical leaders were more effective than less prototypical leaders. Alternative explanations based on status characteristics and role incongruity theory do not account well for the findings. Implications of these results for the glass ceiling effect and for a wider social identity analysis of the impact of demographic group membership on leadership in small groups are discussed.
Resumo:
This research study investigated the factors that influenced the development of teacher identity in a small cohort of mature-aged graduate pre-service teachers over the course of a one-year Graduate Diploma program (Middle Years). It sought to illuminate the social and relational dynamics of these pre-service teachers’ experiences as they began new ways of being and learning during a newly introduced one-year Graduate Diploma program. A relational-ontological perspective underpinned the relational-cultural framework that was applied in a workshop program as an integral part of this research. A relational-ontological perspective suggests that the development of teacher identity is to be construed more as an ontological process than an epistemological one. Its focus is more on questions surrounding the person and their ‘becoming’ a teacher than about the knowledge they have or will come to have. Hence, drawing on work by researchers such as Alsup (2006), Gilligan, (1982), Isaacs, (2007), Miller (1976), Noddings, (2005), Stout (2001), and Taylor, (1989), teacher identity was defined as an individual pre-service teacher’s unique sense of self as a teacher that included his or her beliefs about teaching and learning (Alsup, 2006; Stout, 2001; Walkington, 2005). Case-study was the preferred methodology within which this research project was framed, and narrative research was used as a method to document the way teacher identity was shaped and negotiated in discursive environments such as teacher education programs, prior experiences, classroom settings and the practicum. The data that was collected included student narratives, student email written reflections, and focus group dialogue. The narrative approach applied in this research context provided the depth of data needed to understand the nature of the mature-aged pre-service teachers’ emerging teacher identities and experiences in the graduate diploma program. Findings indicated that most of the mature-aged graduate pre-service teachers came in to the one-year graduate diploma program with a strong sense of personal and professional selves and well-established reasons why they had chosen to teach Middle Years. Their choice of program involved an expectation of support and welcome to a middle-school community and culture. Two critical issues that emerged from the pre-service teachers’ narratives were the importance they placed on the human support including the affirmation of themselves and their emerging teacher identities. Evidence from this study suggests that the lack of recognition of preservice teachers’ personal and professional selves during the graduate diploma program inhibited the development of a positive middle-school teacher identity. However, a workshop program developed for the participants in this research and addressing a range of practical concerns to beginning teachers offered them a space where they felt both a sense of belonging to a community and where their thoughts and beliefs were recognized and valued. Thus, the workshops provided participants with the positive social and relational dynamics necessary to support them in their developing teacher identities. The overall findings of this research study strongly indicate a need for a relational support structure based on a relational-ontological perspective to be built into the overall course structure of Graduate Pre-service Diplomas in Education to support the development of teacher identity. Such a support structure acknowledges that the pre-service teacher’s learning and formation is socially embedded, relational, and a continual, lifelong process.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.