نتایج جستجو برای: group identity
تعداد نتایج: 1084722 فیلتر نتایج به سال:
This research applies identity theory to understand whether moral identity processes operate similarly or differently depending on group affiliation (gender, race, and religion). A survey measuring facets of the moral identity, moral behavior, and emotions was administered to 315 subjects. Findings support the moral identity as a general human process which does not vary significantly by gender...
The research presented in this paper reports on three phases of an empirical user study that examines the relationship between identity and technology using contextual interviews, focus groups and cultural probes. The study revealed that federated systems potentially have real relevance for users who are increasingly willing to supply information and even sacrifice their privacy if they are giv...
This paper describes how social identity group “fingerprints” can be extracted from a document collection by applying topic analysis methods in a novel way. The results of document classification experiments suggest that these group-level attributes provide better predictions of group affiliation than document-level attributes. Applications of this method for forensic authorship analysis are al...
A relevance, distinctiveness and plausibility (RDP) analysis is a conceptual framework that can be used to identify when potential confounds are a problem for interpreting experimental results. We illustrate this analysis using the creation or enhancement of natural group identity by the means of priming manipulations as employed in the experiments of five target papers. Such priming manipulati...
Since rock became the subject of academic study, its attendant ideology has been scrutinised and its mythical and Romantic components exposed. Largely absent from this account has been a thorough analysis of the phenomenon of the ‘band’. The role of individual acts and the wider contexts in which they worked has been discussed at the expense of an examination of an important form of music-makin...
An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...
This paper reveals that a subset of subjects adopting extreme behavior underlies intergroup bias. In a simple task, we replicate previous results that, on average, subjects are less inequity averse allocating income to out-group members. Using a with-in subject design and new econometric techniques, however, we find a group division does not matter for most subjects; social preferences are the ...
We introduce the concept of escrowed identity, an application of key-escrow ideas to the problem of authentication. In escrowed identity , one party A does not give his identity to another party B, but rather gives him information that would allow an authorized third party E to determine A's identity. However, B receives a guarantee that E can indeed determine A's identity. We consider a number...
In two samples of Latino biculturals, we examined the link between bicultural identity integration (BII; degree of compatibility vs. opposition perceived between ethnic and mainstream cultural orientations; Benet-Martı́nez & Haritatos, 2005) and the psychological overlap/distance between the personality traits ascribed to the self, a typical Latino, and a typical Anglo American. As predicted, BI...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید