Search results

1 – 10 of over 99000
Book part
Publication date: 20 October 2020

Jan E. Stets, Peter J. Burke, Richard T. Serpe and Robin Stryker

In this chapter, we advance an understanding of identity theory (IT) as originally created by Sheldon Stryker and developed over the past 50 years. We address misunderstandings of…

Abstract

In this chapter, we advance an understanding of identity theory (IT) as originally created by Sheldon Stryker and developed over the past 50 years. We address misunderstandings of IT concepts and connections. We provide definitions of key ideas in IT, propositions that identify important relationships, and scope conditions that outline the circumstances to which IT applies. Our goal is to provide scholars with an accurate view of IT so that it can continue to advance the science of human behavior in sociology and beyond.

Article
Publication date: 16 August 2022

Wenjing Zhang and Dong Li

The mobile medical consultation (MMC) service is growing rapidly, but not all consumers are always willing to actively engage with it. To address this issue, based on IT identity

499

Abstract

Purpose

The mobile medical consultation (MMC) service is growing rapidly, but not all consumers are always willing to actively engage with it. To address this issue, based on IT identity theory, this study explores the underlying mechanism of how two types of platform-related consumer experience influence MMC platform identity, in turn, result in consumer negatively-valenced engagement in MMC.

Design/methodology/approach

The data was collected from 400 consumers with the experience of MMC and analyzed by the partial least square (PLS) method.

Findings

The findings unfold that these two distinct consumer experience, servicescape experience (i.e. perceived telepresence and perceived platform surveillance) and service search experience (i.e. perceived diagnosticity and perceived serendipity), are associated with MMC platform identity and consumer negatively valenced engagement with MMC.

Originality/value

Research on consumer negatively-valenced engagement in the field of MMC is still in a nascent stage. The study identifies consumer experience in accordance with the unique context of the MMC platform and fills the research gap on the role of IT identity in consumer negatively valenced engagement.

Details

Industrial Management & Data Systems, vol. 122 no. 11
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 15 December 2020

Flavia Mabel Rinaldi, Lucía Maglio, Iliana Pisarro and Laura Basterrechea

This presentation intends to illustrate through the example of a few specific cases of urban actions and projects, those instances in which the existence of built heritage leads…

Abstract

Purpose

This presentation intends to illustrate through the example of a few specific cases of urban actions and projects, those instances in which the existence of built heritage leads to the recognition of identity and valuable contribution as a tool to regenerate, promote residence and economic development.

Design/methodology/approach

Introducing a conceptual framework for identity and culture it is possible to start the recognition of buildings, spaces, stories that configure own particularity to cities. And those would be the elements that would be configured as tools to involve the actions and transformation of the area. Studying each one of the heritage elements detected it is possible to trace a chorus line that impulse the new activity proposal.

Findings

Cases presented in this article were really astonishing in terms of impact and provoked many favorable externalities around them. It is possible to confirm that history and stories as good as buildings and determined places can help regeneration with its own promotion and new ideas applied for better results.

Originality/value

In fact, heritage as a concept, cultural tangible and intangible, is a powerful tool to regenerate cities, to promote economical activity and bind communities toward social development.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. 11 no. 2
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 20 July 2015

Hamid Nach

The purpose of this paper is to examine how people respond when their identity is challenged as they use computerized information systems in organizational settings. Using the…

Abstract

Purpose

The purpose of this paper is to examine how people respond when their identity is challenged as they use computerized information systems in organizational settings. Using the critical realism perspective, the author built on the identity control theory and suggested a set of generative mechanisms that shed light on how individuals respond to the challenges that information technology (IT) poses to their identities when performing their jobs and how it affects their sense of self.

Design/methodology/approach

The author conducted a field study in a Canadian health-care institution with the objective to examine how doctors and nurses coped with challenges posed by an Electronic Health Records system to their identities and how these systems shaped their identities. The author’s data are essentially qualitative. The author used retroduction as a mode off inference which combines both induction and deduction. The author hypothesized a set of identity mechanisms that are enacted as a response to a threat posed by IT in the work place. The author uses the evidence from the field study to verify the existence of these mechanisms and uncover new constructs and relationships that could enrich the understanding of the phenomenon.

Findings

The results allowed to verify and provide an updated view of the proposed generative mechanisms that are triggered when identity is put to challenge by IT in the workplace. The identified mechanisms are, identity adjusting, IT threat neutralizing and emotion regulating. Their outcomes, which are, reinforced identity, redefined identity, ambivalent identity and anti-identity are much dependent on the availability and the breadth of personal and organizational resources people have at their disposal.

Originality/value

The research offers a vantage point on how identities unfold in the course of interaction with technology. It contributes by providing empirically grounded mechanisms that shed light on how people response to threats posed by computerized information systems to identity and the various self-conceptions that ensue.

Details

Management Research Review, vol. 38 no. 7
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 9 January 2024

Shea X. Fan, Sophia Xiaoxia Duan and Hepu Deng

Improving digital work experience is critical for the job performance of individuals and the competitiveness of organizations due to their increasing use. This paper investigates…

Abstract

Purpose

Improving digital work experience is critical for the job performance of individuals and the competitiveness of organizations due to their increasing use. This paper investigates how organization support affects the digital work experience of individuals differently depending on their levels of information technology (IT) identity.

Design/methodology/approach

Drawing upon the IT identity literature and the conservation of resources (COR) theory, a conceptual model is developed, tested and validated using the data collected in Australia through an experimental design in which IT identity is manipulated.

Findings

This study reveals a nuanced impact of organization support on shaping digital work experience. Specifically, it finds that technical support is more effective in improving the digital work experience of individuals with a high level of IT identity, whereas well-being support is more effective in enhancing the digital work experience of individuals with a low level of IT identity.

Originality/value

This research contributes to the IT identity literature by introducing a novel experimental design to manipulate IT identity in the digital work context. It also contributes to the digital work literature by introducing a resource perspective for identifying well-being support, technical support and IT identity as the key resources in shaping digital work experience and calling for attention to IT identity as a boundary condition on the effectiveness of organization support. The findings can help organizations formulate better strategies and policies to improve digital work experience by providing tailored support to individuals with different levels of IT identity.

Details

Industrial Management & Data Systems, vol. 124 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 1 August 2017

Larry D. Compeau

To examine bad credit experiences in the context of identity to understand the entanglement between bad credit and the deformation of identity.

Abstract

Purpose

To examine bad credit experiences in the context of identity to understand the entanglement between bad credit and the deformation of identity.

Methodology/approach

A qualitative method using depth interviews and hermeneutical analysis.

Findings

Bad credit is a major life event and plays a critical role in identity. By restricting or eliminating identity construction and maintenance through consumption, identities are deformed. Consumer identities are deformed as they are consumed by the identity deformation process as normal patterns of consumption that have built and supported their identities are disrupted and demolished. Bad credit is overwhelmingly consumptive of consumers – it consumes their time, energy, patience, lifestyle, relationships, social connections, and perhaps most importantly, it consumes their identity as it deforms who they are.

Research limitations/implications

Researchers need to examine more closely not just the creation and maintenance of identity, but also how identity is deformed and deconstructed through consumption experiences that can no longer be enjoyed.

Social implications

Government agencies may want to reexamine policies toward the granting of credit to reduce the incidence of loading up consumers with credit they are not able to pay for. The deformation of identity may result in anti-social behavior, although our study does not address this directly.

Originality/value

This study is different from previous work in several ways. We focus on identity deformation due to bad credit. By analyzing a crisis response that transcends the specific impetus of bad credit, we extend identity theory by developing an insight into “identities-in-crisis.” We also provide a theoretical framework and explore how consumers’ identities are deformed and renegotiated.

Details

Qualitative Consumer Research
Type: Book
ISBN: 978-1-78714-491-0

Keywords

Article
Publication date: 1 January 2006

Paul A. Stokes

To establish the concept of identity as the bridging concept of cybernetics and sociology.

1232

Abstract

Purpose

To establish the concept of identity as the bridging concept of cybernetics and sociology.

Design/methodology/approach

The approach is a pincers movement. On the one hand, it is argued that there has been a move towards an identity society; identity is a foundational concept for an understanding of contemporary society. On the other hand, the paper argues that in the work of Beer, identity became the key to his proposal that the VSM is the optimal form of variety management in a social system. The study is based on an extension and application of Finalizierungstheorie to the problem.

Findings

Identity is the key concept for the articulation of cybernetics and sociology. There has been a singular failure to apply cybernetic ideas to sociological materials in a manner that has met with the approval and satisfaction of the sociological community. Beer's formulation of the identity phenomenon and its extrapolation in the social sphere proposes a solution to this long‐standing problem.

Practical implications

The approach allows for a broad ranging multi‐level research programme in sociological cybernetics to be formulated and pursued in a manner congenial to the accumulation of a substantial knowledge base ranging from micro‐ to macro‐issues.

Originality/value

This paper presents a unique synthesis of cybernetics and sociology building on and extending the work of Beer in the field of managerial cybernetics.

Details

Kybernetes, vol. 35 no. 1/2
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 11 May 2020

Sally Smith, Thomas N. Garavan, Anne Munro, Elaine Ramsey, Colin F. Smith and Alison Varey

The purpose of this study is to explore the role of professional and leader identity and the maintenance of identity, through identity work as IT professionals transitioned to a…

Abstract

Purpose

The purpose of this study is to explore the role of professional and leader identity and the maintenance of identity, through identity work as IT professionals transitioned to a permanent hybrid role. This study therefore contributes to the under-researched area of permanent transition to a hybrid role in the context of IT, where there is a requirement to enact both the professional and leader roles together.

Design/methodology/approach

The study utilised a longitudinal design and two qualitative methods (interviews and reflective diaries) to gather data from 17 IT professionals transitioning to hybrid roles.

Findings

The study findings reveal that IT professionals engage in an ongoing process of reconciliation of professional and leader identity as they transition to a permanent hybrid role, and they construct hybrid professional–leader identities while continuing to value their professional identity. They experience professional–leader identity conflict resulting from reluctance to reconcile both professional and leader identities. They used both integration and differentiation identity work tactics to ameliorate these tensions.

Originality/value

The longitudinal study design, the qualitative approaches used and the unique context of the participants provide a dynamic and deep understanding of the challenges involved in performing hybrid roles in the context of IT.

Details

Information Technology & People, vol. 34 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 27 June 2022

Ana Burcharth, Pernille Smith and Lars Frederiksen

This paper investigates how a new entrepreneurial identity forms in conjunction with prior work-related identities during sponsored self-employment after an emotional job loss.

Abstract

Purpose

This paper investigates how a new entrepreneurial identity forms in conjunction with prior work-related identities during sponsored self-employment after an emotional job loss.

Design/methodology/approach

The authors empirically examine why some dismissed employees failed and others succeeded in transitioning from a wage-earner career via corporate sponsorship to a career as an entrepreneur, investigating how those employees meaningfully constructed (or did not) an entrepreneurial identity.

Findings

The authors' findings show that the simultaneous preservation of central attributes of prior work-related identities and the engenderment of new entrepreneurial attributes support the formation of an entrepreneurial identity and that a liminal state, in which people practice entrepreneurship at work, may facilitate identity transition.

Originality/value

This paper demonstrates that the initial entrepreneurial endeavor is based on prior work-related identity and identity congruence between prior work-related identities and a projected entrepreneurial identity is of great importance for the identity transition. However, the authors also show that incongruence may in some cases turn into congruence if entrepreneurs are given the opportunity to experiment with provisional entrepreneurial selves in a risk-free environment (so-called liminal states).

Details

International Journal of Entrepreneurial Behavior & Research, vol. 28 no. 7
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 2 June 2020

Patrícia R. Sousa, João S. Resende, Rolando Martins and Luís Antunes

The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving…

Abstract

Purpose

The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios.

Design/methodology/approach

The paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whether blockchain should be used in all scenarios, according to the importance of each feature for different use cases.

Findings

Based on analysis of existing systems, Sovrin is the IdM system that covers more features and is based on blockchain. For each of the evaluated use cases, Sovrin and UniquID were the chosen systems.

Research limitations/implications

This paper opens new lines of research for IdM systems in IoT, including challenges related to device identity definition, privacy preserving and new security mechanisms.

Originality/value

This paper contributes to the ongoing research in IdM systems for IoT. The adequacy of blockchain is not only analyzed considering the technology; instead the authors analyze its application to real environments considering the required features for each use case.

Details

Journal of Enterprise Information Management, vol. 35 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 99000