Search results for 'Gays Identity' (try it on Scholar)

1000+ found
Order:
  1. Jan Willem Duyvendak (1996). The Depoliticization of the Dutch Gay Identity, or Why Dutch Gays Aren't Queer. In Steven Seidman (ed.), Queer Theory/Sociology. Blackwell
     
    Export citation  
     
    My bibliography  
  2. Annamarie Jagose (1996). Queer Theory: An Introduction. New York University Press.
    "Annamarie Jagose knows that queer theory did not spring full-blown from the head of any contemporary theorist. It is the outcome of many different influences and sources, including the homophile movement, gay liberation, and lesbian feminism. In pointing to the history of queer theory-a history that all too often is ignored or elided-Jagose performs a valuable service." -Henry Abelove, co-editor of The Lesbian and Gay Studies Reader The political and academic appropriation of the term queer over the last several years (...)
     
    Export citation  
     
    My bibliography   8 citations  
  3. Steven Seidman (ed.) (1996). Queer Theory/Sociology. Blackwell.
    This book aims to productively engage the pioneering work of Queer theorists and point toe way towards a new sociological Queer studies.
    Direct download  
     
    Export citation  
     
    My bibliography   5 citations  
  4.  22
    William B. Turner (2000). A Genealogy of Queer Theory. Temple University Press.
    As such, the book will interest readers of gay/lesbian/bisexual/transgender studies, intellectual history, political theory, and the history of gender/sexuality ...
    Direct download  
     
    Export citation  
     
    My bibliography   3 citations  
  5. Annamarie Jagose (1996). Queer Theory. Melbourne University Press.
  6. Elizabeth Weed & Naomi Schor (eds.) (1997). Feminism Meets Queer Theory. Indiana University Press.
  7. Lynne Alice & Lynne Star (eds.) (2004). Queer in Aotearoa New Zealand. Dunmore Press.
  8.  10
    Donald E. Hall (2009). Reading Sexualities: Hermeneutic Theory and the Future of Queer Studies. Routledge.
    Sexual hermeneutics -- Desirably queer futures -- Transcending the self -- Global conversations -- Radical sexuality and ethical responsibility -- Conclusion. How sex changes.
    Direct download  
     
    Export citation  
     
    My bibliography  
  9. Sonu Bedi (2013). Beyond Race, Sex, and Sexual Orientation: Legal Equality Without Identity. Cambridge University Press.
    The conventional interpretation of equality under the law singles out certain groups or classes for constitutional protection: women, racial minorities, and gays and lesbians. The United States Supreme Court calls these groups 'suspect classes'. Laws that discriminate against them are generally unconstitutional. While this is a familiar account of equal protection jurisprudence, this book argues that this approach suffers from hitherto unnoticed normative and political problems. The book elucidates a competing, extant interpretation of equal protection jurisprudence that avoids these (...)
    No categories
     
    Export citation  
     
    My bibliography  
  10. Nancy J. Evans & Vernon A. Wall (1992). Beyond Tolerance: Gays, Lesbians and Bisexuals on Campus. Upa.
    Written especially for student affairs professionals, administrators, and faculty and student leaders, this ground-breaking book is a vital resource for those facing the complex and challenging issues that confront gays, lesbians, and bisexuals on campus. Eighteen scholars and practitioners examine the controversies surrounding identity development, homophobia, career planning, gay and lesbian student organizations and many other concerns unique to this population. It combines theory and practical applications for developing awareness and initiating collegiate programs. It also includes a comprehensive (...)
     
    Export citation  
     
    My bibliography  
  11. David Alderson & Linda R. Anderson (2000). Territories of Desire in Queer Culture Refiguring Contemporary Boundaries. Monograph Collection (Matt - Pseudo).
     
    Export citation  
     
    My bibliography  
  12. Stephen Maddison (2000). Fags, Hags, and Queer Sisters: Gender Dissent and Heterosocial Bonds in Gay Culture. St. Martin's Press.
  13.  47
    David Bell & Gill Valentine (eds.) (1994). Mapping Desire: Geographies of Sexualities. Routledge.
    Discover the truth about sex in the city (and the country). Mapping Desire explores the places and spaces of sexuality from body to community, from the "cottage" to the Barrio, from Boston to Jakarta, from home to cyberspace. Mapping Desire is the first book to explore sexualities from a geographical perspective. The nature of place and notions of space are of increasing centrality to cultural and social theory. Mapping Desires presents the rich and diverse world of contemporary sexuality, exploring how (...)
    Direct download  
     
    Export citation  
     
    My bibliography   2 citations  
  14. Georgia Warnke (2008). After Identity: Rethinking Race, Sex, and Gender. Cambridge University Press.
    Social and political theorists have traced in detail how individuals come to possess gender, sex and racial identities. This book examines the nature of these identities. Georgia Warnke argues that identities, in general, are interpretations and, as such, have more in common with textual understanding than we commonly acknowledge. A racial, sexed or gendered understanding of who we and others are is neither exhaustive of the 'meanings' we can be said to have nor uniquely correct. We are neither always, or (...)
    No categories
     
    Export citation  
     
    My bibliography  
  15.  84
    Alexander Sandgren (forthcoming). Which Witch is Which? Exotic Objects and Intentional Identity. Synthese:1-19.
    This paper is about intentional identity, the phenomenon of intentional attitudes having a common focus. I present an argument against an approach to explaining intentional identity, defended by Nathan Salmon, Terence Parsons and others, that involves positing exotic objects. For example, those who adopt this sort of view say that when two astronomers had beliefs about Vulcan, their attitudes had a common focus because there is an exotic object that both of their beliefs were about. I argue that (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  16.  53
    Steven French (2006). Identity in Physics: A Historical, Philosophical, and Formal Analysis. Oxford University Press.
    Steven French and Decio Krause examine the metaphysical foundations of quantum physics. They draw together historical, logical, and philosophical perspectives on the fundamental nature of quantum particles and offer new insights on a range of important issues. Focusing on the concepts of identity and individuality, the authors explore two alternative metaphysical views; according to one, quantum particles are no different from books, tables, and people in this respect; according to the other, they most certainly are. Each view comes with (...)
    Direct download  
     
    Export citation  
     
    My bibliography   52 citations  
  17. Eric T. Olson (1997). The Human Animal: Personal Identity Without Psychology. Oxford University Press.
    Most philosophers writing about personal identity in recent years claim that what it takes for us to persist through time is a matter of psychology. In this groundbreaking new book, Eric Olson argues that such approaches face daunting problems, and he defends in their place a radically non-psychological account of personal identity. He defines human beings as biological organisms, and claims that no psychological relation is either sufficient or necessary for an organism to persist. Olson rejects several famous (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   92 citations  
  18. Paula M. L. Moya (2006). What's Identity Got to Do with It? Mobilizing Identities in the Multicultural Classroom. In Linda Alcoff, Michael Hames-Garcis, Satya Mohanty & Paula Moya (eds.), Identity Politics Reconsidered. Palgrave Macmillan
    In this book chapter, Moya argues that recognizing, indeed mobilizing, identities in the classroom is a necessary part of educating for a just and democratic society. Only a truly multi-perspectival, multicultural education can create the conditions needed to alter the negative identity contingencies that minority students commonly face, while creating opportunities for all students. By treating identities as epistemic resources and mobilizing them, we can draw out their knowledge-generating potential and allow them to contribute positively to the production and (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  19.  70
    Michael Tye (2003). Consciousness and Persons: Unity and Identity. MIT Press.
    In Consciousness and Persons: Unity and Identity, Michael Tye takes on the thorny issue of the unity of consciousness and answers these important questions: What exactly is the unity of consciousness? Can a single person have a divided consciousness? What is a single person? Tye argues that unity is a fundamental part of human consciousness -- something so basic to everyday experience that it is easy to overlook. For example, when we hear the sound of waves crashing on a (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   57 citations  
  20. Einar Duenger Bohn (2014). Unrestricted Composition as Identity. In Donald Baxter & Aaron Cotnoir (eds.), Composition as Identity. Oxford University Press
    In this paper I argue that composition as identity entails unrestricted composition. I also briefly consider a new take on the special composition question.
    Translate
      Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  21.  65
    David DeGrazia (2005). Human Identity and Bioethics. Cambridge University Press.
    When philosophers address personal identity, they usually explore numerical identity: what are the criteria for a person's continuing existence? When non-philosophers address personal identity, they often have in mind narrative identity: Which characteristics of a particular person are salient to her self-conception? This book develops accounts of both senses of identity, arguing that both are normatively important, and is unique in its exploration of a range of issues in bioethics through the lens of identity. (...)
    Direct download  
     
    Export citation  
     
    My bibliography   41 citations  
  22. Adam Henschke (2010). Did You Just Say What I Think You Said? Talking About Genes, Identity and Information. Identity in the Information Society 3 (3):435-456.
    Genetic information is becoming increasingly used in modern life, extending beyond medicine to familial history, forensics and more. Following this expansion of use, the effect of genetic information on people’s identity and ultimately people’s quality of life is being explored in a host of different disciplines. While a multidisciplinary approach is commendable and necessary, there is the potential for the multidisciplinarity to produce conceptual misconnection. That is, while experts in one field may understand their use of a term like (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  23. Simone Gozzano (2012). Type-Identity Conditions for Phenomenal Properties. In Simone Gozzano & Christopher S. Hill (eds.), New Perspective on Type Identity. The Mental and the Physical. Cambridge University Press 111.
    In this essay I shall argue that the crucial assumptions of Kripke's argument, i.e. the collapse of the appearance/reality distinction in the case of phenomenal states and the idea of a qualitatively identical epistemic situation, imply an objective principle of identity for mental-state types. This principle, I shall argue, rather than being at odds with physicalism, is actually compatible with both the type-identity theory of the mind and Kripke's semantics and metaphysics. Finally, I shall sketch a version of (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  24.  70
    Vanessa Paz Dennen (2009). Constructing Academic Alter-Egos: Identity Issues in a Blog-Based Community. [REVIEW] Identity in the Information Society 2 (1):23-38.
    Choosing to interact with others in an online forum provides an opportunity for exploring one’s own identity. With each new group joined, a person must make decisions about self-presentation and react to an audience. Such decisions continue as social interactions occur and relationships develop. This paper discusses how bloggers who have affiliated with each other to form a loosely knit community develop largely pseudonymous identities along with norms surrounding the development and performance of identity. The study is ethnographic (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  25.  7
    Georgios Steiris (2016). Byzantine Philosophers of the 15th Century on Identity and Otherness. In Georgios Steiris, Sotiris Mitralexis & George Arabatzis (eds.), The Problem of Modern Greek Identity: from the Εcumene to the Nation-State. Cambridge Scholars Publishing 173-199.
    Those who work with topics related to Modern Greek identity usually start discussing these issues by quoting the famous Georgios Gemistos Pletho (c.1360-1454): we, over whom you rule and hold sway, are Hellenes by genos (γένος), as is witnessed by our language and ancestral education. Although Woodhouse thought of Pletho as the last of the Hellenes, others prefer to denounce him the last of the Byzantines and the first and foremost Modern Greek. During the 14th and 15th centuries, a (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  26.  23
    Ernesto Schwartz-Marín & Irma Silva-Zolezzi (2010). “The Map of the Mexican’s Genome”: Overlapping National Identity, and Population Genomics. [REVIEW] Identity in the Information Society 3 (3):489-514.
    This paper explores the intersections between national identity and the production of medical/population genomics in Mexico. The ongoing efforts to construct a Haplotype Map of Mexican genetic diversity offers a unique opportunity to illustrate and analyze the exchange between the historic-political narratives of nationalism, and the material culture of genomic science. Haplotypes are central actants in the search for medically significant SNP’s, as well as powerful entities involved in the delimitation of ancestry, temporality and variability. By following the circulation (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  27.  37
    Lawrence A. Shapiro & Thomas W. Polger (2012). Identity, Variability, and Multiple Realization in the Special Sciences. In Hill Christopher & Gozzano Simone (eds.), New Perspectives on Type Identity: The Mental and the Physical. Cambridge University Press 264.
    Issues of identity and reduction have monopolized much of the philosopher of mind’s time over the past several decades. Interestingly, while investigations of these topics have proceeded at a steady rate, the motivations for doing so have shifted. When the early identity theorists, e.g. U. T. Place ( 1956 ), Herbert Feigl ( 1958 ), and J. J. C. Smart ( 1959 , 1961 ), fi rst gave voice to the idea that mental events might be identical to (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  28.  23
    Ruth Halperin & James Backhouse (2008). A Roadmap for Research on Identity in the Information Society. Identity in the Information Society 1 (1):71-87.
    As research into identity in the information society gets into its stride, with contributions from many scholarly disciplines such as technology, social sciences, the humanities and the law, a moment of intellectual stocktaking seems appropriate. This article seeks to provide a roadmap of research currently undertaken in the field of identity and identity management showing how the area is developing and how disparate contributions relate to each other. Five different perspectives are proposed through which work in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  29.  44
    Colin Gavaghan (2010). A Whole New... You? ‘Personal Identity’, Emerging Technologies and the Law. Identity in the Information Society 3 (3):423-434.
    In this article, I argue that lawmakers must abandon their previous reluctance to engage with questions of personal identity. While frequently seen as an esoteric subject, of limited interest outside of academic philosophy departments, I attempt to show that, in fact, assumptions about PI—and its durability in the face of certain psychological or genetic changes—underpin many current legal rules. This is most perhaps obviously exemplified with regard to reproductive technologies. Yet the Parfitian challenge to identify a victim of ‘bad’ (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  30.  36
    Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva (2009). Privacy Concerns and Identity in Online Social Networks. Identity in the Information Society 2 (1):39-63.
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  31.  36
    Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.
    This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The framework for human-centred identity presented here identifies a set of design properties that can impact the lived experience of the individuals (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  32.  16
    Andrea J. Baker (2009). Mick or Keith: Blended Identity of Online Rock Fans. [REVIEW] Identity in the Information Society 2 (1):7-21.
    This paper discusses the “blended identity” of online rock fans to show that the standard dichotomy between anonymous and real life personas is an inadequate description of self-presentation in online communities. Using data from an ethnographic, exploratory study of an online community and comparison groups including interviews, an online questionnaire, fan discussion boards, and participant/observation, the research analyzes fan identity online and then offline. Rolling Stones fans often adopt names that illustrate their allegiance to the band, along with (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  33.  33
    D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government and governmentality. This approach draws attention to the wide assemblage of public and (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  34.  27
    Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. [REVIEW] Identity in the Information Society 2 (1):1-5.
    The Web 2.0, with online social technologies such as social networking services, blogs, wikis, or microbloging, has brought the vision of the Internet as a social landscape in which people are engaged in a multitude of social activities. This editorial of the special issue ‘Social Web and Identity’ discusses the importance of identity in the context of the Social Web, introducing the different papers of this special issue and the different aspects associated to these online identities. The topics (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  35.  11
    Ian Angell (2008). As I See It: Enclosing Identity. [REVIEW] Identity in the Information Society 1 (1):23-37.
    This article claims that an ‘enclosure of the commons’ is underway, which reaches far beyond intellectual property, to a point where, through profiling, ‘identity’ has itself become enclosed property that can be owned by another. With a detour through the natures of both money and innovation, this paper looks at the imperative driving ‘intellectual property rights.’ By introducing the notion of biopiracy, it shows how ‘invasion of privacy’ is justified, and ends with “a world of rapacious, state-aided ‘privatization’” of (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  36.  9
    David G. W. Birch (2008). Psychic ID: A Blueprint for a Modern National Identity Scheme. [REVIEW] Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  37.  20
    Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim (2010). Towards Inclusive Identity Management. Identity in the Information Society 3 (3):515-538.
    The article argues for a shift of perspective in identity management research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and mechanisms has been security concerns as defined in the field of security engineering. By default the highest security level has been recommended and implemented, (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  38.  20
    Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  39.  18
    Tarvi Martens (2010). Electronic Identity Management in Estonia Between Market and State Governance. Identity in the Information Society 3 (1):213-233.
    The present paper summarizes the development of the national electronic Identity Management System (eIDMS) in Estonia according to a conceptual framework developed in an European comparative research project outlined in the first chapter of this special issue. Its main function is to amend the picture of the European eIDMS landscape by presenting a case with high involvement of the private sector and thereby checking the generalizations from the comparisons of Austria, Belgium, Germany and Spain, presented by Kubicek and Noack (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  40.  15
    Teemu Rissanen (2010). Electronic Identity in Finland: ID Cards Vs. Bank IDs. [REVIEW] Identity in the Information Society 3 (1):175-194.
    This chapter describes the introduction and diffusion of the Finnish Electronic Identity Card (FINEID card). FINEID establishes an electronic identity (eID), based on the civil registry and placed on an identity chip card issued by Finnish government to Finnish citizens and permanent residents from age 18 and older. It is a non-mandatory electronic identity card introduced in 1999 in order to replace the older citizen ID card. It serves as a travel document and is intended to (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  41.  15
    Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.
    Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity management framework is described for tracking the history of how a person’s identity information is handled after it is transferred across domains of control and for (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  42.  11
    Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou (2009). Federated Identity Management in Mobile Dynamic Virtual Organizations. Identity in the Information Society 2 (2):115-136.
    Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and mobility (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  43.  7
    David Murakami Wood & Rodrigo Firmino (2009). Empowerment or Repression? Opening Up Questions of Identification and Surveillance in Brazil Through a Case of 'Identity Fraud'. Identity in the Information Society 2 (3):297-317.
    A real but typical case of identity fraud is used to open up the complex web of identification systems in Brazil. It is argued that identification has two poles related to the nature of citizenship—repression and inclusion—and that reactions from citizens to new identification schemes can be attributed to how they view the purpose of the cards in these terms. In Brazil, a sense of inclusion and citizenship based on a fear of anonymity and exclusion predominates leading to widespread (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  44.  9
    Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and evaluate service (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  45.  3
    Sébastien Canard, Eric Malville & Jacques Traoré (2009). A Client-Side Approach for Privacy-Preserving Identity Federation. Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  46. Athanasia Theodoropoulou (2016). Cardinal Bessarion on a Hellenic Identity and Peloponnesian State-A Comparison with the Modern Greek Crisis. In Georgios Steiris, George Arabatzis & Sotiris Mitralexis (eds.), The Problem of Modern Greek Identity: From the Ecumene to the Nation-State. Cambridge Scholars Publishing 201-214.
    Nine years before the fall of Constantinople, in 1444, cardinal Bessarion in his third and last letter addressed to Constantine Palaeologus, Despot of Mystra, expressed his deep concern about the economic, political, cultural, social and moral crisis, maintaining that the multidimensional crisis would inevitably lead to Byzantium’s decline. Bessarion stresses that the aristocracy’s biased policy, the burdensome taxation, the low level of business activity, the complete lack of technological advancements and the deficient education system not only shaped the Peloponnesian state (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  47. Mauro Dorato & Matteo Morganti (2013). Grades of Individuality. A Pluralistic View of Identity in Quantum Mechanics and in the Sciences. Philosophical Studies 163 (3):591-610.
    This paper offers a critical assessment of the current state of the debate about the identity and individuality of material objects. Its main aim, in particular, is to show that, in a sense to be carefully specified, the opposition between the Leibnizian ‘reductionist’ tradition, based on discernibility, and the sort of ‘primitivism’ that denies that facts of identity and individuality must be analysable has become outdated. In particular, it is argued that—contrary to a widespread consensus—‘naturalised’ metaphysics supports both (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   10 citations  
  48. Stan Klein & Shaun Nichols (2012). Memory and the Sense of Personal Identity. Mind 121 (483):677-702.
    Memory of past episodes provides a sense of personal identity — the sense that I am the same person as someone in the past. We present a neurological case study of a patient who has accurate memories of scenes from his past, but for whom the memories lack the sense of mineness. On the basis of this case study, we propose that the sense of identity derives from two components, one delivering the content of the memory and the (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   6 citations  
  49. Shelley Weinberg (2011). Locke on Personal Identity. Philosophy Compass 6 (6):398-407.
    Locke’s account of personal identity has been highly influential because of its emphasis on a psychological criterion. The same consciousness is required for being the same person. It is not so clear, however, exactly what Locke meant by ‘consciousness’ or by ‘having the same consciousness’. Interpretations vary: consciousness is seen as identical to memory, as identical to a first personal appropriation of mental states, and as identical to a first personal distinctive experience of the qualitative features of one’s own (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  50.  61
    Longinos Marin, Salvador Ruiz & Alicia Rubio (2009). The Role of Identity Salience in the Effects of Corporate Social Responsibility on Consumer Behavior. Journal of Business Ethics 84 (1):65 - 78.
    Based on the assumption that consumers will reward firms for their support of social programs, many organizations have adopted corporate social responsibility (CSR) practices. Drawing on social identity theory, a model of influence of CSR on loyalty is developed and tested using a sample of real consumers. Results demonstrate that CSR initiatives are linked to stronger loyalty both because the consumer develops a more positive company evaluation, and because one identifies more strongly with the company. Moreover, identity salience (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   24 citations  
1 — 50 / 1000