Search results for 'Lesbians Identity' (try it on Scholar)

1000+ found
Order:
  1. Annamarie Jagose (1996). Queer Theory: An Introduction. New York University Press.
    "Annamarie Jagose knows that queer theory did not spring full-blown from the head of any contemporary theorist. It is the outcome of many different influences and sources, including the homophile movement, gay liberation, and lesbian feminism. In pointing to the history of queer theory-a history that all too often is ignored or elided-Jagose performs a valuable service." -Henry Abelove, co-editor of The Lesbian and Gay Studies Reader The political and academic appropriation of the term queer over the last several years (...)
     
    Export citation  
     
    My bibliography   8 citations  
  2.  6
    Barry O'Leary (2008). “We Cannot Claim Any Particular Knowledge of the Ways of Homosexuals, Still Less of Iranian Homosexuals …”: The Particular Problems Facing Those Who Seek Asylum on the Basis of Their Sexual Identity. [REVIEW] Feminist Legal Studies 16 (1):87-95.
    Many lesbians and gay men apply for asylum in the U.K. each year on the basis that they fear persecution in their home country because of their sexual orientation. The legal basis for claiming asylum on the ground of sexual identity is now well established. Nevertheless, making these claims remains very difficult for applicants. Western cultural expectations around sexual identity often mix with homophobic assumptions about sexual behaviour to present applicants as “not sufficiently gay”. Furthermore, applicants may (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  3. Shane Phelan (ed.) (1997). Playing with Fire: Queer Politics, Queer Theories. Routledge.
    The last five years have witnessed the birth of a vibrant new group of young scholars who are writing about queer law, politics, and policy--topics which are no longer treated as of interest only to lesbians and gay men, but which now garner the attention of political theorists of all stripes. Playing With Fire --the first scholarly collection on queer politics by US political theorists--opens the intersection of lesbian and gay studies and political theory to a wide audience. It (...)
     
    Export citation  
     
    My bibliography  
  4. Steven Seidman (ed.) (1996). Queer Theory/Sociology. Blackwell.
    This book aims to productively engage the pioneering work of Queer theorists and point toe way towards a new sociological Queer studies.
    Direct download  
     
    Export citation  
     
    My bibliography   5 citations  
  5.  21
    William B. Turner (2000). A Genealogy of Queer Theory. Temple University Press.
    As such, the book will interest readers of gay/lesbian/bisexual/transgender studies, intellectual history, political theory, and the history of gender/sexuality ...
    Direct download  
     
    Export citation  
     
    My bibliography   3 citations  
  6. Annamarie Jagose (1996). Queer Theory. Melbourne University Press.
  7. Lynne Alice & Lynne Star (eds.) (2004). Queer in Aotearoa New Zealand. Dunmore Press.
  8.  14
    Jacquelyn N. Zita (1992). Male Lesbians and the Postmodernist Body. Hypatia 7 (4):106 - 127.
    This essay explores the criteria for lesbian identity attribution through the case study of "male lesbians": biological males who claim to be lesbians. I analyze such sex/gender identity attribution through the lens of postmodernism, which provides a workable theoretical framework for "male lesbian" identities. My conclusions explore the historicity and cultural constructedness of the body's sex/gender identities, revealing the limitations of both "the postmodernized body" and "the essentialized modernist body.".
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  9. Nancy J. Evans & Vernon A. Wall (1992). Beyond Tolerance: Gays, Lesbians and Bisexuals on Campus. Upa.
    Written especially for student affairs professionals, administrators, and faculty and student leaders, this ground-breaking book is a vital resource for those facing the complex and challenging issues that confront gays, lesbians, and bisexuals on campus. Eighteen scholars and practitioners examine the controversies surrounding identity development, homophobia, career planning, gay and lesbian student organizations and many other concerns unique to this population. It combines theory and practical applications for developing awareness and initiating collegiate programs. It also includes a comprehensive (...)
     
    Export citation  
     
    My bibliography  
  10. Sean P. O'Connell (2000). Outspeak: Narrating Identities That Matter. State University of New York Press.
    Examines the pleasures, perils, and promises of professing one's sexual identity.
    No categories
    Direct download  
     
    Export citation  
     
    My bibliography  
  11. Adria E. Schwartz (1998). Sexual Subjects: Lesbians, Gender and Psychoanalysis. Routledge.
    _Sexual Subjects,_ a psychoanalytic book informed by gender theory, queer theory and feminism, addresses the tensions inherent in writing about lesbians and sexuality in the postmodern age. Adria Schwartz masterfully intertwines clinical anecdotes with engaging theoretical questions that examine the construction of important categories of identity--woman, feminist, mother, lesbian, and homo/hetero/bisexual. Schwartz also addresses specific issues which are problematic but nonetheless meaningful to self-identified lesbians such as roles in gender play, lesbian "bed death," and raising non-traditional families. (...)
    No categories
     
    Export citation  
     
    My bibliography  
  12.  36
    David Bell & Gill Valentine (eds.) (1994). Mapping Desire: Geographies of Sexualities. Routledge.
    Discover the truth about sex in the city (and the country). Mapping Desire explores the places and spaces of sexuality from body to community, from the "cottage" to the Barrio, from Boston to Jakarta, from home to cyberspace. Mapping Desire is the first book to explore sexualities from a geographical perspective. The nature of place and notions of space are of increasing centrality to cultural and social theory. Mapping Desires presents the rich and diverse world of contemporary sexuality, exploring how (...)
    Direct download  
     
    Export citation  
     
    My bibliography   2 citations  
  13.  21
    Wendy Lynne Lee & Laura M. Dow (2001). Queering Ecological Feminism: Erotophobia, Commodification, Art, and Lesbian Identity. Ethics and the Environment 6 (2):1-21.
    : Utilizing examples from recent art, we critique Greta Gaard's argument that an inclusive ecofeminism must account for the role played by erotophobia in oppression. We suggest that while Gaard offers valuable insight into how fear of the erotic contributes to maintaining heteropatriarchal institutions, it fails to account for forms of oppression specific to lesbians. Moreover, Gaard's analysis unwittingly reinforces the conceptual, hence political, economic, and social invisibility of lesbians that, following Marilyn Frye, we argue is not merely (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  14.  69
    Einar Duenger Bohn (forthcoming). Composition as Identity and Plural Cantor's Theorem. Logic and Logical Philosophy.
    I argue that Composition as Identity blocks the plural version of Cantor's Theorem, and that therefore the plural version of Cantor's Theorem can no longer be uncritically appealed to. As an example, I show how this result blocks a recent argument by Hawthorne and Uzquiano.
    Direct download  
     
    Export citation  
     
    My bibliography  
  15.  45
    Steven French (2006). Identity in Physics: A Historical, Philosophical, and Formal Analysis. Oxford University Press.
    Steven French and Decio Krause examine the metaphysical foundations of quantum physics. They draw together historical, logical, and philosophical perspectives on the fundamental nature of quantum particles and offer new insights on a range of important issues. Focusing on the concepts of identity and individuality, the authors explore two alternative metaphysical views; according to one, quantum particles are no different from books, tables, and people in this respect; according to the other, they most certainly are. Each view comes with (...)
    Direct download  
     
    Export citation  
     
    My bibliography   51 citations  
  16. Eric T. Olson (1997). The Human Animal: Personal Identity Without Psychology. Oxford University Press.
    Most philosophers writing about personal identity in recent years claim that what it takes for us to persist through time is a matter of psychology. In this groundbreaking new book, Eric Olson argues that such approaches face daunting problems, and he defends in their place a radically non-psychological account of personal identity. He defines human beings as biological organisms, and claims that no psychological relation is either sufficient or necessary for an organism to persist. Olson rejects several famous (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   91 citations  
  17.  56
    Michael Tye (2003). Consciousness and Persons: Unity and Identity. MIT Press.
    In Consciousness and Persons: Unity and Identity, Michael Tye takes on the thorny issue of the unity of consciousness and answers these important questions: What exactly is the unity of consciousness? Can a single person have a divided consciousness? What is a single person? Tye argues that unity is a fundamental part of human consciousness -- something so basic to everyday experience that it is easy to overlook. For example, when we hear the sound of waves crashing on a (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   57 citations  
  18.  67
    Vanessa Paz Dennen (2009). Constructing Academic Alter-Egos: Identity Issues in a Blog-Based Community. [REVIEW] Identity in the Information Society 2 (1):23-38.
    Choosing to interact with others in an online forum provides an opportunity for exploring one’s own identity. With each new group joined, a person must make decisions about self-presentation and react to an audience. Such decisions continue as social interactions occur and relationships develop. This paper discusses how bloggers who have affiliated with each other to form a loosely knit community develop largely pseudonymous identities along with norms surrounding the development and performance of identity. The study is ethnographic (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  19. Adam Henschke (2010). Did You Just Say What I Think You Said? Talking About Genes, Identity and Information. Identity in the Information Society 3 (3):435-456.
    Genetic information is becoming increasingly used in modern life, extending beyond medicine to familial history, forensics and more. Following this expansion of use, the effect of genetic information on people’s identity and ultimately people’s quality of life is being explored in a host of different disciplines. While a multidisciplinary approach is commendable and necessary, there is the potential for the multidisciplinarity to produce conceptual misconnection. That is, while experts in one field may understand their use of a term (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  20. Simone Gozzano (2012). Type-Identity Conditions for Phenomenal Properties. In Simone Gozzano & Christopher S. Hill (eds.), New Perspective on Type Identity. The Mental and the Physical. Cambridge University Press 111.
    In this essay I shall argue that the crucial assumptions of Kripke's argument, i.e. the collapse of the appearance/reality distinction in the case of phenomenal states and the idea of a qualitatively identical epistemic situation, imply an objective principle of identity for mental-state types. This principle, I shall argue, rather than being at odds with physicalism, is actually compatible with both the type-identity theory of the mind and Kripke's semantics and metaphysics. Finally, I shall sketch a version of (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  21.  45
    Cody Gilmore (2015). Personal Identity, Consciousness, and Joints in Nature. Journal of Ethics 19 (3-4):443-466.
    Many philosophers have thought that the problem of personal identity over time is not metaphysically deep. Perhaps the debate between the rival theories is somehow empty or is a ‘merely verbal dispute’. Perhaps questions about personal identity are ‘nonsubstantive’ and fit more for conceptual analysis and close attention to usage than for theorizing in the style of serious metaphysics, theorizing guided by considerations of systematicity, parsimony, explanatory power, and aiming for knowledge about the objective structure of (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  22.  20
    Ernesto Schwartz-Marín & Irma Silva-Zolezzi (2010). “The Map of the Mexican’s Genome”: Overlapping National Identity, and Population Genomics. [REVIEW] Identity in the Information Society 3 (3):489-514.
    This paper explores the intersections between national identity and the production of medical/population genomics in Mexico. The ongoing efforts to construct a Haplotype Map of Mexican genetic diversity offers a unique opportunity to illustrate and analyze the exchange between the historic-political narratives of nationalism, and the material culture of genomic science. Haplotypes are central actants in the search for medically significant SNP’s, as well as powerful entities involved in the delimitation of ancestry, temporality and variability. By following the circulation (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  23.  20
    Ruth Halperin & James Backhouse (2008). A Roadmap for Research on Identity in the Information Society. Identity in the Information Society 1 (1):71-87.
    As research into identity in the information society gets into its stride, with contributions from many scholarly disciplines such as technology, social sciences, the humanities and the law, a moment of intellectual stocktaking seems appropriate. This article seeks to provide a roadmap of research currently undertaken in the field of identity and identity management showing how the area is developing and how disparate contributions relate to each other. Five different perspectives are proposed through which work in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  24.  31
    Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva (2009). Privacy Concerns and Identity in Online Social Networks. Identity in the Information Society 2 (1):39-63.
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  25.  33
    Colin Gavaghan (2010). A Whole New... You? ‘Personal Identity’, Emerging Technologies and the Law. Identity in the Information Society 3 (3):423-434.
    In this article, I argue that lawmakers must abandon their previous reluctance to engage with questions of personal identity. While frequently seen as an esoteric subject, of limited interest outside of academic philosophy departments, I attempt to show that, in fact, assumptions about PI—and its durability in the face of certain psychological or genetic changes—underpin many current legal rules. This is most perhaps obviously exemplified with regard to reproductive technologies. Yet the Parfitian challenge to identify a victim of ‘bad’ (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  26.  32
    Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.
    This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The framework for human-centred identity presented here identifies a set of design properties that can impact the lived experience of the individuals (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  27.  24
    Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. [REVIEW] Identity in the Information Society 2 (1):1-5.
    The Web 2.0, with online social technologies such as social networking services, blogs, wikis, or microbloging, has brought the vision of the Internet as a social landscape in which people are engaged in a multitude of social activities. This editorial of the special issue ‘Social Web and Identity’ discusses the importance of identity in the context of the Social Web, introducing the different papers of this special issue and the different aspects associated to these online identities. The topics (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  28.  16
    Tarvi Martens (2010). Electronic Identity Management in Estonia Between Market and State Governance. Identity in the Information Society 3 (1):213-233.
    The present paper summarizes the development of the national electronic Identity Management System (eIDMS) in Estonia according to a conceptual framework developed in an European comparative research project outlined in the first chapter of this special issue. Its main function is to amend the picture of the European eIDMS landscape by presenting a case with high involvement of the private sector and thereby checking the generalizations from the comparisons of Austria, Belgium, Germany and Spain, presented by Kubicek and Noack (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  29.  16
    Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  30.  17
    D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government and governmentality. This approach draws attention to the wide assemblage of public and (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  31.  5
    Ian Angell (2008). As I See It: Enclosing Identity. [REVIEW] Identity in the Information Society 1 (1):23-37.
    This article claims that an ‘enclosure of the commons’ is underway, which reaches far beyond intellectual property, to a point where, through profiling, ‘identity’ has itself become enclosed property that can be owned by another. With a detour through the natures of both money and innovation, this paper looks at the imperative driving ‘intellectual property rights.’ By introducing the notion of biopiracy, it shows how ‘invasion of privacy’ is justified, and ends with “a world of rapacious, state-aided ‘privatization’” (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  32.  6
    Andrea J. Baker (2009). Mick or Keith: Blended Identity of Online Rock Fans. [REVIEW] Identity in the Information Society 2 (1):7-21.
    This paper discusses the “blended identity” of online rock fans to show that the standard dichotomy between anonymous and real life personas is an inadequate description of self-presentation in online communities. Using data from an ethnographic, exploratory study of an online community and comparison groups including interviews, an online questionnaire, fan discussion boards, and participant/observation, the research analyzes fan identity online and then offline. Rolling Stones fans often adopt names that illustrate their allegiance to the band, along with (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  33.  12
    Teemu Rissanen (2010). Electronic Identity in Finland: ID Cards Vs. Bank IDs. [REVIEW] Identity in the Information Society 3 (1):175-194.
    This chapter describes the introduction and diffusion of the Finnish Electronic Identity Card (FINEID card). FINEID establishes an electronic identity (eID), based on the civil registry and placed on an identity chip card issued by Finnish government to Finnish citizens and permanent residents from age 18 and older. It is a non-mandatory electronic identity card introduced in 1999 in order to replace the older citizen ID card. It serves as a travel document and is intended to (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  34.  4
    David G. W. Birch (2008). Psychic ID: A Blueprint for a Modern National Identity Scheme. [REVIEW] Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  35.  11
    Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim (2010). Towards Inclusive Identity Management. Identity in the Information Society 3 (3):515-538.
    The article argues for a shift of perspective in identity management research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and mechanisms has been security concerns as defined in the field of security engineering. By default the highest security level has been recommended and implemented, (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  36.  10
    Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.
    Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity management framework is described for tracking the history of how a person’s identity information is handled after it is transferred across domains of control and for (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  37.  6
    David Murakami Wood & Rodrigo Firmino (2009). Empowerment or Repression? Opening Up Questions of Identification and Surveillance in Brazil Through a Case of 'Identity Fraud'. Identity in the Information Society 2 (3):297-317.
    A real but typical case of identity fraud is used to open up the complex web of identification systems in Brazil. It is argued that identification has two poles related to the nature of citizenship—repression and inclusion—and that reactions from citizens to new identification schemes can be attributed to how they view the purpose of the cards in these terms. In Brazil, a sense of inclusion and citizenship based on a fear of anonymity and exclusion predominates leading to widespread (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  38.  8
    Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and evaluate service (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  39.  8
    Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou (2009). Federated Identity Management in Mobile Dynamic Virtual Organizations. Identity in the Information Society 2 (2):115-136.
    Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and mobility (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  40.  2
    Sébastien Canard, Eric Malville & Jacques Traoré (2009). A Client-Side Approach for Privacy-Preserving Identity Federation. Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  41.  44
    David DeGrazia (2005). Human Identity and Bioethics. Cambridge University Press.
    When philosophers address personal identity, they usually explore numerical identity: what are the criteria for a person's continuing existence? When non-philosophers address personal identity, they often have in mind narrative identity: Which characteristics of a particular person are salient to her self-conception? This book develops accounts of both senses of identity, arguing that both are normatively important, and is unique in its exploration of a range of issues in bioethics through the lens of identity. (...)
    Direct download  
     
    Export citation  
     
    My bibliography   41 citations  
  42. Kit Fine (2016). Identity Criteria and Ground. Philosophical Studies 173 (1):1-19.
    I propose formulating identity criteria as generic statements of ground, thereby avoiding objections that have been made to the more usual formulations.
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  43. Mauro Dorato & Matteo Morganti (2013). Grades of Individuality. A Pluralistic View of Identity in Quantum Mechanics and in the Sciences. Philosophical Studies 163 (3):591-610.
    This paper offers a critical assessment of the current state of the debate about the identity and individuality of material objects. Its main aim, in particular, is to show that, in a sense to be carefully specified, the opposition between the Leibnizian ‘reductionist’ tradition, based on discernibility, and the sort of ‘primitivism’ that denies that facts of identity and individuality must be analysable has become outdated. In particular, it is argued that—contrary to a widespread consensus—‘naturalised’ metaphysics supports both (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   8 citations  
  44. Stan Klein & Shaun Nichols (2012). Memory and the Sense of Personal Identity. Mind 121 (483):677-702.
    Memory of past episodes provides a sense of personal identity — the sense that I am the same person as someone in the past. We present a neurological case study of a patient who has accurate memories of scenes from his past, but for whom the memories lack the sense of mineness. On the basis of this case study, we propose that the sense of identity derives from two components, one delivering the content of the memory and the (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  45.  88
    Robert A. Wilson & Bartlomiej Lenart (2014). Extended Mind and Identity. In Jens Clausen & Neil Levy (eds.), Handbook of Neuroethics. Springer 423-439.
    Dominant views of personal identity in philosophy take some kind of psychological continuity or connectedness over time to be criterial for the identity of a person over time. Such views assign psychological states, particularly those necessary for narrative memory of some kind, special importance in thinking about the nature of persons. The extended mind thesis, which has generated much recent discussion in the philosophy of mind and cognitive science, holds that a person’s psychological states can physically extend beyond (...)
    Direct download  
     
    Export citation  
     
    My bibliography   2 citations  
  46. Hannes Leitgeb & James Ladyman (2008). Criteria of Identity and Structuralist Ontology. Philosophia Mathematica 16 (3):388-396.
    In discussions about whether the Principle of the Identity of Indiscernibles is compatible with structuralist ontologies of mathematics, it is usually assumed that individual objects are subject to criteria of identity which somehow account for the identity of the individuals. Much of this debate concerns structures that admit of non-trivial automorphisms. We consider cases from graph theory that violate even weak formulations of PII. We argue that (i) the identity or difference of places in a structure (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   26 citations  
  47.  90
    Dawn Jakubowski (2004). Feminism, Identity and Difference (Review). Hypatia 19 (2):170-171.
    Feminism, Identity, and Difference (1999), edited by Susan Hekman, focuses on a set of issues raised by contemporary feminist theory, such as identity politics and the problem of difference, and their implications for feminist politics. In Chapter One, "Identity Crises: Identity, Identity Politics and Beyond," Hekman gives an overview of the various problems created by contemporary feminist theories rooted in identity politics.
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  48.  54
    Longinos Marin, Salvador Ruiz & Alicia Rubio (2009). The Role of Identity Salience in the Effects of Corporate Social Responsibility on Consumer Behavior. Journal of Business Ethics 84 (1):65 - 78.
    Based on the assumption that consumers will reward firms for their support of social programs, many organizations have adopted corporate social responsibility (CSR) practices. Drawing on social identity theory, a model of influence of CSR on loyalty is developed and tested using a sample of real consumers. Results demonstrate that CSR initiatives are linked to stronger loyalty both because the consumer develops a more positive company evaluation, and because one identifies more strongly with the company. Moreover, (...) salience is shown to play a crucial role in the influence of CSR initiatives on consumer loyalty when this influence occurs through consumer-company identification. A strong identifier is not necessarily in a constant state of salience, but activating identity salience of a particular consumer social identity (a company) will affect consumer reactions to product stimuli, increasing consumer loyalty. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   24 citations  
  49.  3
    Assya Pascalev, Mario Pascalev & James Giordano (forthcoming). Head Transplants, Personal Identity and Neuroethics. Neuroethics:1-8.
    The possibility of a human head transplant poses unprecedented philosophical and neuroethical questions. Principal among them are the personal identity of the resultant individual, her metaphysical and social status: Who will she be and how should the “new” person be treated - morally, legally and socially - given that she incorporates characteristics of two distinct, previously unrelated individuals, and possess both old and new physical, psychological, and social experiences that would not have been available without the transplant? We (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  50.  21
    Scott John Vitell, Mark N. Bing, H. Kristl Davison, Anthony P. Ammeter, Bart L. Garner & Milorad M. Novicevic (2009). Religiosity and Moral Identity: The Mediating Role of Self-Control. [REVIEW] Journal of Business Ethics 88 (4):601-613.
    The ethics literature has identified moral motivation as a factor in ethical decision-making. Furthermore, moral identity has been identified as a source of moral motivation. In the current study, we examine religiosity as an antecedent to moral identity and examine the mediating role of self-control in this relationship. We find that intrinsic and extrinsic dimensions of religiosity have different direct and indirect effects on the internalization and symbolization dimensions of moral identity. Specifically, intrinsic religiosity plays a role (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   21 citations  
1 — 50 / 1000