Buy asht.eu ?

Products related to Identity:


  • Office Corded Telephone Caller Identity Display Improve Communication Efficiency
    Office Corded Telephone Caller Identity Display Improve Communication Efficiency


    Price: 29.32 $ | Shipping*: 0.00 $
  • Intercultural Communication and Identity
    Intercultural Communication and Identity

    This Element asserts how identity as a construct enables a critical awareness of how speakers position themselves and are positioned by others in intercultural encounters.It discusses how identity vis-à-vis culture has been theorized through social psychological, poststructuralist, and critical lenses, and how identity is discursively constructed and mediated.Rejecting essentialist notions of language and culture, this Element demonstrates how inscriptions of identity such as race, ethnicity, nationality, and class can be used to critically examine the dynamics of situated intercultural encounters and to understand how such interactions can index competing and colluding ideologies.By examining identity research from different parts of the world, it casts a light on how identities are performed in diverse intercultural contexts and discusses research methodologies that have been employed to examine identity in intercultural communication.

    Price: 17.00 £ | Shipping*: 3.99 £
  • English Home Offices Telephone with Caller Identity Simple Communication and Boost Productivity Efficiency Communication E65C
    English Home Offices Telephone with Caller Identity Simple Communication and Boost Productivity Efficiency Communication E65C


    Price: 44.87 $ | Shipping*: 0.00 $
  • Regulating Transnational Heritage : Memory, Identity and Diversity
    Regulating Transnational Heritage : Memory, Identity and Diversity

    There is a vast body of international and national law that regulates cultural heritage.However, the current regulation remains quite blind to the so called "transnational heritage".This is heritage where there is no community recognized in law that it can be directly attributed to and that can be responsible for its safekeeping and preservation.It can also be items of heritage where the claim of ownership is disputed between two or more peoples or communities.Transnational heritage challenges the idea of monolithic, mono-cultural, ethno-national states.There are a number of examples of such cultural heritage, for instance the Buddhist Bamiyan statutes in Afghanistan, Palmyra in Syria, the Jewish heritage of Iraq, or various items that are currently housed in large, often Western, museums, as a result of colonial practices.This book explores the regulation of transnational heritage.By discussing many cases of transnational heritage and the problems that arise due to the lack of regulation the book analyses the manifestations of memories and constructions of communities through heritage.It focuses particularly on the concept of community.How are communities constructed in cultural heritage law and what falls outside of the definitions of community?The book underlines that the issues surrounding transnational heritage involve more than a communal right to culture.It is argued that transnational heritage also directly affects wider matters of law such as citizenship, human rights, sovereignty, as well as the movement of people and cultural goods.

    Price: 39.99 £ | Shipping*: 0.00 £
  • How might a communication diary look like in dissociative identity disorder?

    A communication diary in dissociative identity disorder (DID) might include entries from different alters, each expressing their thoughts, feelings, and experiences. The diary may show shifts in handwriting, tone, and perspective as different alters take control of the writing. It could also include notes about internal communication between alters, such as leaving messages for each other or coordinating actions. The diary may serve as a tool for the individual to track and understand their different identities and their interactions with each other.

  • Are the effects of the media on Erikson's identity development plausible?

    Yes, the effects of the media on Erikson's identity development are plausible. The media plays a significant role in shaping individuals' sense of self and identity by providing them with various images, values, and beliefs to internalize. Exposure to different media representations can influence how individuals perceive themselves and others, impacting their identity formation process. Additionally, the media can also contribute to the exploration of different identities and help individuals navigate the complexities of identity development as they are exposed to diverse perspectives and experiences.

  • What creates identity?

    Identity is created through a combination of factors such as personal experiences, cultural background, social interactions, and self-perception. Our upbringing, beliefs, values, and relationships all play a role in shaping who we are and how we see ourselves. Additionally, external influences such as societal norms, media representation, and historical context can also impact our identity formation. Ultimately, identity is a complex and multifaceted concept that is continuously evolving as we navigate through life.

  • What is gender identity?

    Gender identity is a deeply-held sense of one's own gender, which may or may not align with the sex assigned at birth. It is a personal understanding of oneself as male, female, a blend of both, or neither. Gender identity is separate from biological sex and can be fluid and diverse, encompassing a wide range of identities beyond the traditional binary of male and female. It is an integral aspect of a person's identity and how they perceive themselves in relation to the world.

Similar search terms for Identity:


  • Identity Security for Software Development : Building with Identity, Secrets, and Credentials
    Identity Security for Software Development : Building with Identity, Secrets, and Credentials

    Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices

    Price: 47.99 £ | Shipping*: 0.00 £
  • Paul and His Colleagues : Identity, Collaboration, and Community
    Paul and His Colleagues : Identity, Collaboration, and Community

    Trevor Burke considers Paul’s colleagues and their different relationships with Paul, whether as equals, subordinates, and whether well-known or obscure, tracing how Paul refers to those with whom he associated in his letters.Burke examines these different figures in Paul’s life in depth, including the remarkably large number of women mentioned, and shows how they played key roles through a range of activities in helping establish and maintain Paul’s communities, including, preaching, teaching, visiting, baptizing, and the co-authoring of his letters. Burke employs a sociolinguistic approach to understand Paul’s social relations, arguing that the language Paul uses in his letters is the means whereby he constructs his social network.That is, Paul does not need to use a title (e.g., ‘apostle’) to indicate his role and function or that of his colleagues; rather, he ‘grammaticalizes’ social relations in his letters through his deliberate choice of lexeme (e.g., proper noun) and syntax (e.g., secondary clause) which signifies the value and contribution—and at times disapproval—of those with whom he joined forces.

    Price: 85.00 £ | Shipping*: 0.00 £
  • Innovation in Music: Technology and Creativity
    Innovation in Music: Technology and Creativity

    Innovation in Music: Technology and Creativity is a groundbreaking collection bringing together contributions from instructors, researchers, and professionals.Split into two sections, covering composition and performance, and technology and innovation, this volume offers truly international perspectives on ever-evolving practices. Including chapters on audience interaction, dynamic music methods, AI, and live electronic performances, this is recommended reading for professionals, students, and researchers looking for global insights into the fields of music production, music business, and music technology.

    Price: 53.99 £ | Shipping*: 0.00 £
  • Identity, Oppression, and Diversity in Archaeology : Career Arcs
    Identity, Oppression, and Diversity in Archaeology : Career Arcs

    Identity, Oppression, and Diversity in Archaeology documents how racism, classism, sexism, heterosexism, and ableism affect the demographics of archaeology and discusses how knowledge that archaeologists produce is shaped by the discipline’s demographic homogeneity. Previous research has shown that, like many academic fields, archaeology is numerically dominated by straight white cisgender people, and those in positions of authority are predominantly men.This book examines how and why those demographic trends persist.It also elucidates how individual archaeologists’ social identities shape the research they conduct, and therefore, how our demographics affect and limit our knowledge production on a disciplinary scale.It explains how, through unflinching reflection, proactive policymaking, and sincere community-building, we can build a diverse and inclusive discipline. This book will appeal to archaeologists who have an interest in diversity and inclusion within the discipline as well as scholars in other disciplines who are engaged in research on diversity in academia.

    Price: 36.99 £ | Shipping*: 0.00 £
  • What is identity politics?

    Identity politics refers to the political activity and movements that are based on the shared experiences and identities of specific social groups, such as race, gender, sexual orientation, or religion. It involves organizing and advocating for the rights and interests of these groups, often in response to systemic discrimination and inequality. Identity politics seeks to address the unique challenges and perspectives of marginalized communities and to promote social justice and equality for all individuals.

  • What is Supergirl's identity?

    Supergirl's identity is Kara Zor-El, a Kryptonian who is the cousin of Superman. She is also known as Kara Danvers, her human alter ego. As Supergirl, she possesses superhuman strength, speed, and the ability to fly, and she uses her powers to protect the Earth from various threats. In her civilian identity as Kara Danvers, she works as a reporter and tries to balance her personal life with her superhero responsibilities.

  • Is gender identity sexist?

    Gender identity itself is not inherently sexist. Gender identity is a deeply personal and individual experience that reflects a person's internal sense of their own gender, which may or may not align with the sex they were assigned at birth. However, societal norms, expectations, and stereotypes around gender can be sexist, as they often reinforce traditional gender roles and perpetuate inequality between genders. It is important to separate the concept of gender identity from these societal constructs in order to promote understanding and acceptance of diverse gender identities.

  • What is identity theft?

    Identity theft is a type of crime where someone wrongfully obtains and uses another person's personal information, such as their name, Social Security number, or credit card details, without their permission. This stolen information is then used to commit fraud or other illegal activities, often resulting in financial loss or damage to the victim's reputation. Identity theft can have serious consequences for the victim, including damage to their credit score, difficulty obtaining loans or credit, and potential legal issues. It is important for individuals to safeguard their personal information and regularly monitor their financial accounts to detect any suspicious activity.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.