Search results
1 – 10 of over 99000Jan E. Stets, Peter J. Burke, Richard T. Serpe and Robin Stryker
In this chapter, we advance an understanding of identity theory (IT) as originally created by Sheldon Stryker and developed over the past 50 years. We address misunderstandings of…
Abstract
In this chapter, we advance an understanding of identity theory (IT) as originally created by Sheldon Stryker and developed over the past 50 years. We address misunderstandings of IT concepts and connections. We provide definitions of key ideas in IT, propositions that identify important relationships, and scope conditions that outline the circumstances to which IT applies. Our goal is to provide scholars with an accurate view of IT so that it can continue to advance the science of human behavior in sociology and beyond.
Details
Keywords
Wenjing Zhang and Dong Li
The mobile medical consultation (MMC) service is growing rapidly, but not all consumers are always willing to actively engage with it. To address this issue, based on IT identity…
Abstract
Purpose
The mobile medical consultation (MMC) service is growing rapidly, but not all consumers are always willing to actively engage with it. To address this issue, based on IT identity theory, this study explores the underlying mechanism of how two types of platform-related consumer experience influence MMC platform identity, in turn, result in consumer negatively-valenced engagement in MMC.
Design/methodology/approach
The data was collected from 400 consumers with the experience of MMC and analyzed by the partial least square (PLS) method.
Findings
The findings unfold that these two distinct consumer experience, servicescape experience (i.e. perceived telepresence and perceived platform surveillance) and service search experience (i.e. perceived diagnosticity and perceived serendipity), are associated with MMC platform identity and consumer negatively valenced engagement with MMC.
Originality/value
Research on consumer negatively-valenced engagement in the field of MMC is still in a nascent stage. The study identifies consumer experience in accordance with the unique context of the MMC platform and fills the research gap on the role of IT identity in consumer negatively valenced engagement.
Details
Keywords
Flavia Mabel Rinaldi, Lucía Maglio, Iliana Pisarro and Laura Basterrechea
This presentation intends to illustrate through the example of a few specific cases of urban actions and projects, those instances in which the existence of built heritage leads…
Abstract
Purpose
This presentation intends to illustrate through the example of a few specific cases of urban actions and projects, those instances in which the existence of built heritage leads to the recognition of identity and valuable contribution as a tool to regenerate, promote residence and economic development.
Design/methodology/approach
Introducing a conceptual framework for identity and culture it is possible to start the recognition of buildings, spaces, stories that configure own particularity to cities. And those would be the elements that would be configured as tools to involve the actions and transformation of the area. Studying each one of the heritage elements detected it is possible to trace a chorus line that impulse the new activity proposal.
Findings
Cases presented in this article were really astonishing in terms of impact and provoked many favorable externalities around them. It is possible to confirm that history and stories as good as buildings and determined places can help regeneration with its own promotion and new ideas applied for better results.
Originality/value
In fact, heritage as a concept, cultural tangible and intangible, is a powerful tool to regenerate cities, to promote economical activity and bind communities toward social development.
Details
Keywords
The purpose of this paper is to examine how people respond when their identity is challenged as they use computerized information systems in organizational settings. Using the…
Abstract
Purpose
The purpose of this paper is to examine how people respond when their identity is challenged as they use computerized information systems in organizational settings. Using the critical realism perspective, the author built on the identity control theory and suggested a set of generative mechanisms that shed light on how individuals respond to the challenges that information technology (IT) poses to their identities when performing their jobs and how it affects their sense of self.
Design/methodology/approach
The author conducted a field study in a Canadian health-care institution with the objective to examine how doctors and nurses coped with challenges posed by an Electronic Health Records system to their identities and how these systems shaped their identities. The author’s data are essentially qualitative. The author used retroduction as a mode off inference which combines both induction and deduction. The author hypothesized a set of identity mechanisms that are enacted as a response to a threat posed by IT in the work place. The author uses the evidence from the field study to verify the existence of these mechanisms and uncover new constructs and relationships that could enrich the understanding of the phenomenon.
Findings
The results allowed to verify and provide an updated view of the proposed generative mechanisms that are triggered when identity is put to challenge by IT in the workplace. The identified mechanisms are, identity adjusting, IT threat neutralizing and emotion regulating. Their outcomes, which are, reinforced identity, redefined identity, ambivalent identity and anti-identity are much dependent on the availability and the breadth of personal and organizational resources people have at their disposal.
Originality/value
The research offers a vantage point on how identities unfold in the course of interaction with technology. It contributes by providing empirically grounded mechanisms that shed light on how people response to threats posed by computerized information systems to identity and the various self-conceptions that ensue.
Details
Keywords
Shea X. Fan, Sophia Xiaoxia Duan and Hepu Deng
Improving digital work experience is critical for the job performance of individuals and the competitiveness of organizations due to their increasing use. This paper investigates…
Abstract
Purpose
Improving digital work experience is critical for the job performance of individuals and the competitiveness of organizations due to their increasing use. This paper investigates how organization support affects the digital work experience of individuals differently depending on their levels of information technology (IT) identity.
Design/methodology/approach
Drawing upon the IT identity literature and the conservation of resources (COR) theory, a conceptual model is developed, tested and validated using the data collected in Australia through an experimental design in which IT identity is manipulated.
Findings
This study reveals a nuanced impact of organization support on shaping digital work experience. Specifically, it finds that technical support is more effective in improving the digital work experience of individuals with a high level of IT identity, whereas well-being support is more effective in enhancing the digital work experience of individuals with a low level of IT identity.
Originality/value
This research contributes to the IT identity literature by introducing a novel experimental design to manipulate IT identity in the digital work context. It also contributes to the digital work literature by introducing a resource perspective for identifying well-being support, technical support and IT identity as the key resources in shaping digital work experience and calling for attention to IT identity as a boundary condition on the effectiveness of organization support. The findings can help organizations formulate better strategies and policies to improve digital work experience by providing tailored support to individuals with different levels of IT identity.
Details
Keywords
To examine bad credit experiences in the context of identity to understand the entanglement between bad credit and the deformation of identity.
Abstract
Purpose
To examine bad credit experiences in the context of identity to understand the entanglement between bad credit and the deformation of identity.
Methodology/approach
A qualitative method using depth interviews and hermeneutical analysis.
Findings
Bad credit is a major life event and plays a critical role in identity. By restricting or eliminating identity construction and maintenance through consumption, identities are deformed. Consumer identities are deformed as they are consumed by the identity deformation process as normal patterns of consumption that have built and supported their identities are disrupted and demolished. Bad credit is overwhelmingly consumptive of consumers – it consumes their time, energy, patience, lifestyle, relationships, social connections, and perhaps most importantly, it consumes their identity as it deforms who they are.
Research limitations/implications
Researchers need to examine more closely not just the creation and maintenance of identity, but also how identity is deformed and deconstructed through consumption experiences that can no longer be enjoyed.
Social implications
Government agencies may want to reexamine policies toward the granting of credit to reduce the incidence of loading up consumers with credit they are not able to pay for. The deformation of identity may result in anti-social behavior, although our study does not address this directly.
Originality/value
This study is different from previous work in several ways. We focus on identity deformation due to bad credit. By analyzing a crisis response that transcends the specific impetus of bad credit, we extend identity theory by developing an insight into “identities-in-crisis.” We also provide a theoretical framework and explore how consumers’ identities are deformed and renegotiated.
Details
Keywords
To establish the concept of identity as the bridging concept of cybernetics and sociology.
Abstract
Purpose
To establish the concept of identity as the bridging concept of cybernetics and sociology.
Design/methodology/approach
The approach is a pincers movement. On the one hand, it is argued that there has been a move towards an identity society; identity is a foundational concept for an understanding of contemporary society. On the other hand, the paper argues that in the work of Beer, identity became the key to his proposal that the VSM is the optimal form of variety management in a social system. The study is based on an extension and application of Finalizierungstheorie to the problem.
Findings
Identity is the key concept for the articulation of cybernetics and sociology. There has been a singular failure to apply cybernetic ideas to sociological materials in a manner that has met with the approval and satisfaction of the sociological community. Beer's formulation of the identity phenomenon and its extrapolation in the social sphere proposes a solution to this long‐standing problem.
Practical implications
The approach allows for a broad ranging multi‐level research programme in sociological cybernetics to be formulated and pursued in a manner congenial to the accumulation of a substantial knowledge base ranging from micro‐ to macro‐issues.
Originality/value
This paper presents a unique synthesis of cybernetics and sociology building on and extending the work of Beer in the field of managerial cybernetics.
Details
Keywords
Sally Smith, Thomas N. Garavan, Anne Munro, Elaine Ramsey, Colin F. Smith and Alison Varey
The purpose of this study is to explore the role of professional and leader identity and the maintenance of identity, through identity work as IT professionals transitioned to a…
Abstract
Purpose
The purpose of this study is to explore the role of professional and leader identity and the maintenance of identity, through identity work as IT professionals transitioned to a permanent hybrid role. This study therefore contributes to the under-researched area of permanent transition to a hybrid role in the context of IT, where there is a requirement to enact both the professional and leader roles together.
Design/methodology/approach
The study utilised a longitudinal design and two qualitative methods (interviews and reflective diaries) to gather data from 17 IT professionals transitioning to hybrid roles.
Findings
The study findings reveal that IT professionals engage in an ongoing process of reconciliation of professional and leader identity as they transition to a permanent hybrid role, and they construct hybrid professional–leader identities while continuing to value their professional identity. They experience professional–leader identity conflict resulting from reluctance to reconcile both professional and leader identities. They used both integration and differentiation identity work tactics to ameliorate these tensions.
Originality/value
The longitudinal study design, the qualitative approaches used and the unique context of the participants provide a dynamic and deep understanding of the challenges involved in performing hybrid roles in the context of IT.
Details
Keywords
Ana Burcharth, Pernille Smith and Lars Frederiksen
This paper investigates how a new entrepreneurial identity forms in conjunction with prior work-related identities during sponsored self-employment after an emotional job loss.
Abstract
Purpose
This paper investigates how a new entrepreneurial identity forms in conjunction with prior work-related identities during sponsored self-employment after an emotional job loss.
Design/methodology/approach
The authors empirically examine why some dismissed employees failed and others succeeded in transitioning from a wage-earner career via corporate sponsorship to a career as an entrepreneur, investigating how those employees meaningfully constructed (or did not) an entrepreneurial identity.
Findings
The authors' findings show that the simultaneous preservation of central attributes of prior work-related identities and the engenderment of new entrepreneurial attributes support the formation of an entrepreneurial identity and that a liminal state, in which people practice entrepreneurship at work, may facilitate identity transition.
Originality/value
This paper demonstrates that the initial entrepreneurial endeavor is based on prior work-related identity and identity congruence between prior work-related identities and a projected entrepreneurial identity is of great importance for the identity transition. However, the authors also show that incongruence may in some cases turn into congruence if entrepreneurs are given the opportunity to experiment with provisional entrepreneurial selves in a risk-free environment (so-called liminal states).
Details
Keywords
Patrícia R. Sousa, João S. Resende, Rolando Martins and Luís Antunes
The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving…
Abstract
Purpose
The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios.
Design/methodology/approach
The paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whether blockchain should be used in all scenarios, according to the importance of each feature for different use cases.
Findings
Based on analysis of existing systems, Sovrin is the IdM system that covers more features and is based on blockchain. For each of the evaluated use cases, Sovrin and UniquID were the chosen systems.
Research limitations/implications
This paper opens new lines of research for IdM systems in IoT, including challenges related to device identity definition, privacy preserving and new security mechanisms.
Originality/value
This paper contributes to the ongoing research in IdM systems for IoT. The adequacy of blockchain is not only analyzed considering the technology; instead the authors analyze its application to real environments considering the required features for each use case.
Details