Social Identity Theory Sample Clauses

Social Identity Theory. In Social Identity Theory identity is conceptualised as being a product of our affiliation with other individuals who are perceived to have similar characteristics and social status as ourselves (XxXxxxxx and XxXxxxxx 2008). Social identity theory (SIT) can be a useful way of analysing organisations and social groups, particularly with regards to the categorisation of groups and the resulting group behaviours (Xxxxxxxx and Mael 1989). The formation of groups from individuals who share similar attitudes and beliefs create a set of behaviours and norms which are used to define and create cohesion within the group, and to provide a reference for which others can be excluded (Xxxxxxxx and Xxxx 1989, Xxxxxxxx and Xxxxxx 2014b). Xxxxxx and Xxxxxx (1986) describe how Xxxxxxx and outgroup behaviour develops from social group membership; a feeling of solidarity and unity with those within the group (ingroup) and rejection and marginalisation of those outside of the group (outgroup). Social group membership provides a stable social identity that allows individuals to identify with those others with whom they feel that they belong. This behaviour is considered to be essential to provide the individual with a sense of self- worth and to create a connection between the individual’s identity and the identity of the social group (Xxxx 2006). The group membership of an individual as a framework for understanding the formation of professional identity in nursing is an appealing one as it is based upon a shared understanding about the role and function of the professional group. However, nursing care is, by nature, diverse, subjective and encompasses a wide range of activities. Therefore, any arbitrary definition of such a group role and function becomes problematic. Whilst it can be assumed that student nurses intend to become a member of the professional group (by virtue of their entry to the undergraduate programme), there is a tacit assumption that the student, and the profession as a whole, share a common sense of what this group identity is and how nursing is defined, which might not be the case.
AutoNDA by SimpleDocs
Social Identity Theory. With their introduction of social identity theory, Tajfel and Xxxxxx (1979) began to explore the psychological basis of intergroup discrimination. According to their theory, a person does not have a unique “personal self” but several selves that correspond to overlapping contexts of group membership. For example, a person may simultaneously define herself as a member of a particular race, sex, family, and organization. Social psychologists claim that once she categorizes herself with others based on perceived similarities, she will gradually stop thinking of herself as an individual and instead begin to act like a representative of that particular group (Tajfel and Xxxxxx, 1986). Interestingly, an individual can simultaneously identify with multiple groups and may behave differently depending on which “identity” is most salient at a given time. In a study of Asian-American female undergraduates, Shih et al. (1999) found that subjects’ performance on a math test varied depending on which of their multidimensional social identities was made salient through a pre-test questionnaire. Participants earned the highest test scores when the questionnaire emphasized subjects’ Asian identity and lowest when it emphasized their female identity. Similarly, Xxxxxxxx et al. (2007) found that risk and time preferences conformed to common stereotypes when ethnic, gender, or racial identity was made prominent. Since its introduction, the concept of social identity has proven influential in understanding behavior in fields such as social psychology (Xxxxxxxx and Xxxxx, 1985; Xxxxx and Xxxx, 0000), sociology (Stets and Xxxxx, 2000), anthropology (Sokefeld, 1999), political science (XxXxxxxxx, 2009), and accounting (Xxxxx, 2003); and economists have recently joined the discussion. While standard economic theory has historically focused on individual-level incentives in decision-making, economists now apply social identity theory to analyses of the economics of poverty, household discrimination, and gender discrimination (Xxxxxxx and Kranton, 2000); education (Xxxxxxx and Kranton, 2002); and contract theory (Xxxxxxx and Kranton, 2005). An increasing number of experimental studies also explore the effects of social identity on individuals’ decisions. Within this field studies fall into two broad categories: those inducing group identity in the lab and those using natural and pre-existing identities. The former category, experiments that induce group identity, includes studies ex...

Related to Social Identity Theory

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • National Item Identification Number (NIIN) The number assigned to each approved Item Identification under the Federal Cataloging Program. It consists of nine numeric characters, the first two of which are the National Codification Bureau (NCB) Code. The remaining positions consist of a seven digit non-significant number.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Your Member Identification Card Your BCBSRI member ID card is your key to getting healthcare coverage. It shows your healthcare provider that you’re part of the nation’s most trusted health plan. All BCBSRI members receive ID cards, which provide important information about your coverage. This card is for identification only, and you must show it whenever you receive healthcare services. Please note you must be a current member to receive covered services. Tips for keeping your card safe: • Carry it with you at all times. • Keep it in a safe location, just as you would with a credit card or money. • Let BCBSRI know right away if it is lost or stolen.

  • Personal Identification Number We will issue you a Personal Identification Number (PIN) for use with your Card at VISA NET automatic teller machines (ATM’s). These numbers are issued to you for your security purposes. These numbers are confidential and should not e disclosed to third parties. You are responsible for safekeeping your PIN. You agree not to disclose or otherwise make available your PIN to anyone not authorized to sign on your Accounts. To keep your Account secure, please do not write your PIN on your Card or keep it in the same place as your Card.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Taxpayer Identification Numbers and Backup Withholding You agree that we may withhold taxes from any dividends or interest earned on your account as required by federal, state or local law or regulations. Your failure to furnish a correct Taxpayer Identification Number ("TIN") or meet other requirements may result in backup withholding. If your account is subject to backup withholding, we must withhold and pay to the Internal Revenue Service ("IRS") a percentage of dividends, interest, and certain other payments. If you fail to provide your TIN within a reasonable time we will close your account and return the balance to you, less any applicable service fees.

  • Personal Identification Number (PIN) 4.B.2.1. The Bank also provides the Cardholder with a Personal Identification Number (PIN), which is equivalent to the Cardholder’s signature. Although the Cardholder may change the PIN as many times as he wishes by inserting his Card in any ATM of the Bank (or anywhere else that the Bank may announce in the future) and following the instructions displayed on the screen, this number is strictly personal and the Cardholder must memorize it, refrain from recording it on the Card or any other document, even in disguised form, hide the ATM or EFT/POS keyboard when typing the PIN, avoid revealing it or giving it to third parties and generally prevent it from being revealed to any third party. It constitutes gross negligence on the Cardholder’s part to keep the PIN in any readable form. The PIN is produced electronically under strictly controlled security conditions that make its reproduction absolutely impossible and is notified to the Cardholder through one of the means stated in the letter accompanying the Card. The PIN can be used only with the Card for which it was issued.

  • Vendor Identity and Contact Information It is Vendor’s sole responsibility to ensure that all identifying vendor information (name, EIN, d/b/a’s, etc.) and contact information is updated and current at all times within the TIPS eBid System and the TIPS Vendor Portal. It is Vendor’s sole responsibility to confirm that all e-correspondence issued from xxxx-xxx.xxx, xxxxxxx.xxx, and xxxxxxxxxxxxxxxx.xxx to Vendor’s contacts are received and are not blocked by firewall or other technology security. Failure to permit receipt of correspondence from these domains and failure to keep vendor identity and contact information current at all times during the life of the contract may cause loss of TIPS Sales, accumulating TIPS fees, missed rebid opportunities, lapse of TIPS Contract(s), and unnecessary collection or legal actions against Vendor. It is no defense to any of the foregoing or any breach of this Agreement that Vendor was not receiving TIPS’ electronic communications issued by TIPS to Vendor’s listed contacts.

Time is Money Join Law Insider Premium to draft better contracts faster.