Products related to Identity:
-
Identity and Digital Communication : Concepts, Theories, Practices
This comprehensive text explores the relationship between identity, subjectivity and digital communication, providing a strong starting point for understanding how fast-changing communication technologies, platforms, applications and practices have an impact on how we perceive ourselves, others, relationships and bodies.Drawing on critical studies of identity, behaviour and representation, Identity and Digital Communication demonstrates how identity is shaped and understood in the context of significant and ongoing shifts in online communication.Chapters cover a range of topics including advances in social networking, the development of deepfake videos, intimacies of everyday communication, the emergence of cultures based on algorithms, the authenticities of TikTok and online communication’s setting as a site for hostility and hate speech.Throughout the text, author Rob Cover shows how the formation and curation of self-identity is increasingly performed and engaged with through digital cultural practices, affirming that these practices must be understood if we are to make sense of identity in the 2020s and beyond.Featuring critical accounts, everyday examples and analysis of key platforms such as TikTok, this textbook is an essential primer for scholars and students in media studies, psychology, cultural studies, sociology, anthropology, computer science, as well as health practitioners, mental health advocates and community members.
Price: 35.99 £ | Shipping*: 0.00 £ -
Intercultural Communication and Identity
This Element asserts how identity as a construct enables a critical awareness of how speakers position themselves and are positioned by others in intercultural encounters.It discusses how identity vis-à-vis culture has been theorized through social psychological, poststructuralist, and critical lenses, and how identity is discursively constructed and mediated.Rejecting essentialist notions of language and culture, this Element demonstrates how inscriptions of identity such as race, ethnicity, nationality, and class can be used to critically examine the dynamics of situated intercultural encounters and to understand how such interactions can index competing and colluding ideologies.By examining identity research from different parts of the world, it casts a light on how identities are performed in diverse intercultural contexts and discusses research methodologies that have been employed to examine identity in intercultural communication.
Price: 17.00 £ | Shipping*: 3.99 £ -
Innovation in Information Technology
Price: 110.00 £ | Shipping*: 0.00 £ -
Cybersecurity and Identity Access Management
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention.It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft.The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage.This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.
Price: 69.99 £ | Shipping*: 0.00 £
-
How dangerous is the digital identity wallet?
The digital identity wallet can be dangerous if not properly secured. If it falls into the wrong hands, it can lead to identity theft, financial fraud, and other forms of cybercrime. However, with proper security measures such as strong passwords, two-factor authentication, and encryption, the digital identity wallet can be a secure and convenient way to manage and protect personal information. It is important for users to be vigilant and take necessary precautions to protect their digital identity wallet from potential threats.
-
How might a communication diary look like in dissociative identity disorder?
A communication diary in dissociative identity disorder (DID) might include entries from different alters, each expressing their thoughts, feelings, and experiences. The diary may show shifts in handwriting, tone, and perspective as different alters take control of the writing. It could also include notes about internal communication between alters, such as leaving messages for each other or coordinating actions. The diary may serve as a tool for the individual to track and understand their different identities and their interactions with each other.
-
Are the effects of the media on Erikson's identity development plausible?
Yes, the effects of the media on Erikson's identity development are plausible. The media plays a significant role in shaping individuals' sense of self and identity by providing them with various images, values, and beliefs to internalize. Exposure to different media representations can influence how individuals perceive themselves and others, impacting their identity formation process. Additionally, the media can also contribute to the exploration of different identities and help individuals navigate the complexities of identity development as they are exposed to diverse perspectives and experiences.
-
What creates identity?
Identity is created through a combination of factors such as personal experiences, cultural background, social interactions, and self-perception. Our upbringing, beliefs, values, and relationships all play a role in shaping who we are and how we see ourselves. Additionally, external influences such as societal norms, media representation, and historical context can also impact our identity formation. Ultimately, identity is a complex and multifaceted concept that is continuously evolving as we navigate through life.
Similar search terms for Identity:
-
Cornwall, Connectivity and Identity in the Fourteenth Century
The links between Cornwall, a county frequently considered remote and separate in the Middle Ages, and the wider realm of England are newly discussed. WINNER: The Federation of Old Cornwall Societies (FOCS) Holyer an Gof Cup for non-fiction, 2020. Stretching out into the wild Atlantic, fourteenth-century Cornwall was a land at the very ends of the earth.Within itsboundaries many believed that King Arthur was a real-life historical Cornishman and that their natal shire had once been the home of mighty giants.Yet, if the county was both unusual and remarkable, it still held an integral place in the wider realm of England. Drawing on a wide range of published and archival material, this book seeks to show how Cornwall remained strikingly distinctive while still forming part of the kingdom.It argues that myths,saints, government, and lordship all endowed the name and notion of Cornwall with authority in the minds of its inhabitants, forging these people into a commonalty.At the same time, the earldom-duchy and the Crown together helped to link the county into the politics of England at large.With thousands of Cornishmen and women drawn east of the Tamar by the needs of the Crown, warfare, lordship, commerce, the law, the Church, and maritime interests, connectivity with the wider realm emerges as a potent integrative force. Supported by a cast of characters ranging from vicious pirates and gentlemen-criminals through to the Black Prince, the volume sets Cornwall in the latest debates about centralisation, devolution, and collective identity, about the nature of Cornishness and Englishness themselves. S.J. DRAKE is a Research Associate at the Institute of Historical Research.He was born and brought up in Cornwall.
Price: 34.99 £ | Shipping*: 0.00 £ -
Identity Security for Software Development : Building with Identity, Secrets, and Credentials
Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices
Price: 47.99 £ | Shipping*: 0.00 £ -
Social Media Freaks : Digital Identity in the Network Society
Social media has been transforming American and global cultural life for over a decade.It has flattened the divide between producer and audience found in other forms of culture while also enriching some massive corporations.At the core of Social Media Freaks is the question: Does social media reproduce inequalities or is it a tool for subverting them?Social Media Freaks presents a virtual ethnography of social media, focusing on issues of identity and inequality along five dimensions-race, class, gender, sexuality, and disability.It presents original and secondary findings, while also utilizing social theory to explain the dynamics of social media.It teaches readers how to engage social media as a tool for social activism while also examining the limits of social media's value in the quest for social change.
Price: 37.99 £ | Shipping*: 0.00 £ -
The Oxford Handbook of Identity Development
Identity is defined in many different ways in various disciplines in the social sciences and sub-disciplines within psychology.The developmental psychological approach to identity is characterized by a focus on developing a sense of the self that is temporally continuous and unified across the different life spaces that individuals inhabit.Erikson proposed that the task of adolescence and young adulthood was to define the self by answering the question: Who Am I?There have been many advances in theory and research on identity development since Erikson's writing over fifty years ago, and the time has come to consolidate our knowledge and set an agenda for future research. The Oxford Handbook of Identity Development represents a turning point in the field of identity development research.Various, and disparate, groups of researchers are brought together to debate, extend, and apply Erikson's theory to contemporary problems and empirical issues.The result is a comprehensive and state-of-the-art examination of identity development that pushes the field in provocative new directions.Scholars of identity development, adolescent and adult development, and related fields, as well as graduate students, advanced undergraduates, and practitioners will find this to be an innovative, unique, and exciting look at identity development.
Price: 65.00 £ | Shipping*: 0.00 £
-
What is a specialist in application development for information technology?
A specialist in application development for information technology is a professional who specializes in designing, creating, and maintaining software applications that meet the specific needs of an organization. They have expertise in programming languages, software development methodologies, and database management. These specialists work closely with clients and stakeholders to understand their requirements and develop customized solutions to improve efficiency, productivity, and overall business operations. They are responsible for ensuring that the applications are user-friendly, secure, and scalable to meet the evolving needs of the organization.
-
What is a specialist in information technology in application development?
A specialist in information technology in application development is a professional who focuses on creating and maintaining software applications. They have expertise in programming languages, software development methodologies, and application design. Their role involves analyzing user needs, designing application solutions, writing code, testing and debugging applications, and ensuring that they meet the required specifications and standards. These specialists often work closely with other IT professionals and stakeholders to deliver high-quality, user-friendly applications.
-
What is gender identity?
Gender identity is a deeply-held sense of one's own gender, which may or may not align with the sex assigned at birth. It is a personal understanding of oneself as male, female, a blend of both, or neither. Gender identity is separate from biological sex and can be fluid and diverse, encompassing a wide range of identities beyond the traditional binary of male and female. It is an integral aspect of a person's identity and how they perceive themselves in relation to the world.
-
What is identity politics?
Identity politics refers to the political activity and movements that are based on the shared experiences and identities of specific social groups, such as race, gender, sexual orientation, or religion. It involves organizing and advocating for the rights and interests of these groups, often in response to systemic discrimination and inequality. Identity politics seeks to address the unique challenges and perspectives of marginalized communities and to promote social justice and equality for all individuals.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.