• No results found

Work-based identity

Work-based identity and work engagement as potential antecedents of task performance and turnover intention: Unravelling a complex relationship

Work-based identity and work engagement as potential antecedents of task performance and turnover intention: Unravelling a complex relationship

... between work-based identity and work ...performance, work-based identity and work ...leave), work-based identity and work ...social ...

17

Critical elements in defining work-based identity in a post-apartheid South Africa

Critical elements in defining work-based identity in a post-apartheid South Africa

... the work-identification process relates to transitions into the ...The work-identification process is presumed to be constructed during social interaction in the organisational ...orientated ...

15

The Job Demands-Resources model as predictor of work identity and work engagement: A comparative analysis

The Job Demands-Resources model as predictor of work identity and work engagement: A comparative analysis

... on work engagement in the South African context (Barkhuizen & Rothmann, 2008; Fourie, Rothmann & Van de Vijver, 2008; Mostert, Cronje & Pienaar, 2006), however, there is very little research done on ...

11

Cognitive Appraising Factors in Perceived Career Development of Factory Workers

Cognitive Appraising Factors in Perceived Career Development of Factory Workers

... on work values and career orientations with communalities and impact on career paths, found correlation between work values and career orientation, which reflects a significant association with career ...

12

Making a mess of academic work: experience, purpose and identity

Making a mess of academic work: experience, purpose and identity

... Actor-network theory (ANT) provides a useful theoretical resource for exploring the messy realities of work and the workplace. As we have explained elsewhere (Zukas and Malcolm, 2007), there are many versions of ...

22

Work, trauma and identity: A perspective from counselling psychology

Work, trauma and identity: A perspective from counselling psychology

... In their grounded theory study of interviews with 20 targets of bullying Hallberg and Strandmark (2006) also found bullying to be perceived as a traumatic event causing the bullied person to be ‘marked for life’ which ...

267

Exploring Social Identity and Experiences at Work for DACA Recipients.

Exploring Social Identity and Experiences at Work for DACA Recipients.

... For each participant, once the worksheet was completed, an interview was conducted at times and locations that were convenient, and lasted approximately 45 to 75 minutes. The interviews consisted of questions that ...

141

JPG1809H Spaces of work: value, identity, agency, justice

JPG1809H Spaces of work: value, identity, agency, justice

... of work – and also whose work – has been taken into account in geographical scholarship and to explore a number of prominent debates concerning labour, work and employment within (and geography over ...

7

The challenges of identity work: Developing Ricoeurian narrative identity in organisations

The challenges of identity work: Developing Ricoeurian narrative identity in organisations

... our work is complex (Glynn, 1998), not least when there are mismatches between this sense of who we are and the demands of our job role or organisation (Dukerich et ...‘dirty work’ (Beech, 2008). ...

18

How members of high identity demand organizations perform identity work relating to organization membership

How members of high identity demand organizations perform identity work relating to organization membership

... social identity when a social identity is lost and regained, it does not fully explain some of the data in Chapter 5, Four Identity Work ...

270

Provisioning of Authentication and Confidentiality for Content Based Publish/Subscribe System

Provisioning of Authentication and Confidentiality for Content Based Publish/Subscribe System

... Input style is that the method of changing a user-oriented description of the input into a computer-based system. This style is very important to avoid errors within the information input method and show the right ...

10

Establishing identity and meaningfulness through identity claims   Expressions of organisational and professional identity and work meaning by teachers in higher education

Establishing identity and meaningfulness through identity claims Expressions of organisational and professional identity and work meaning by teachers in higher education

... their work can be affected by four sources: the self, other persons, the work context and spiritual ...The work context includes design of job tasks, organisational mission, financial circumstances, ...

31

Aspects of identity in the work of Douglas Strachan (1875 1950)

Aspects of identity in the work of Douglas Strachan (1875 1950)

... Figure 77 Detail from Window 1: Days of Creation, the Shrine, Scottish National War Memorial, Douglas Strachan, 1925-27.. Figure 78 Detail from Window 1: Adam and Eve, the Shrine, Scotti[r] ...

420

The identity work of leadership in a professionalised context : the case of nursing

The identity work of leadership in a professionalised context : the case of nursing

... Direct access to source data / documents The CRF and all source documents shall made be available at all times for review by the Chief Investigator, Sponsor’s designee and inspection by [r] ...

248

Work and the blind identity in Japan with reference to the British experience

Work and the blind identity in Japan with reference to the British experience

... principles of Labour Tillet Bill of 1920 which they had wanted to see on the Statute Book.14 Table 3-1 shows the main differences between the Blind Persons Act 1920 and the Tillet Bill. From the viewpoint of the National ...

310

IJCSMC, Vol. 3, Issue. 9, September 2014, pg.176 – 189 RESEARCH ARTICLE On the Node Clone Detection in Wireless Sensor Networks

IJCSMC, Vol. 3, Issue. 9, September 2014, pg.176 – 189 RESEARCH ARTICLE On the Node Clone Detection in Wireless Sensor Networks

... is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes ...

14

Appropriate lightweight cryptosystems for 
		Wireless Sensor Networks

Appropriate lightweight cryptosystems for Wireless Sensor Networks

... As pointed before, Bilinear Pairings have a significant role in the proposed lightweight cryptographic schemes especially in the resource-constrained platforms such as sensor nodes. Since the use of Bilinear Pairings is ...

7

Anonymous Attribute based Encryption Scheme to Control Cloud Data Access Authority and Anonymity

Anonymous Attribute based Encryption Scheme to Control Cloud Data Access Authority and Anonymity

... Anony Control and Anony Control-F is proposed this permits the cloud servers to regiment the clients access benefits without the knowledge of clients personal data. In Anony Control incomplete data is uncovered and in ...

6

SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD

SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD

... of identity-based techniques to provide alternative grid security ...customised identity-based key agreement protocol which nicely with the Grid Security Infrastructure (GSI) and provides a ...

10

Synthesis and Enzymatic Studies of Selenium Derivatized Nucleosides, Nucleotides and Nucleic Acids

Synthesis and Enzymatic Studies of Selenium Derivatized Nucleosides, Nucleotides and Nucleic Acids

... My work installed in the gallery at Georgia State University consists of a series of seven layers, each suspended from the ceiling and stretching to the floor, and a series of physically distorted photographs of ...

27

Show all 10000 documents...

Related subjects