Evaluating the Role of Chromophore Side Group Identity in Mediating Solution-Phase Rotational Motion

2007 ◽  
Vol 111 (4) ◽  
pp. 558-566 ◽  
Author(s):  
Kelly P. Greenough ◽  
G. J. Blanchard
Author(s):  
MARION A. WEISSENBERGER-EIBL ◽  
TIM HAMPEL

The not-invented-here (NIH) syndrome describes a negatively-shaped attitude of employees towards externally generated knowledge. Despite being cited as one of the largest barriers in the transfer of external knowledge, empirical evidence on interventions to overcome NIH remains scarce. To address this research gap, we design a brief and specificrecategorisational-intervention on basis of the common in-group identity model in order to change employees’ attitudes towards external knowledge directly. Additionally, we take into account the effects of affirmations as a frequently mentioned countermeasure to NIH and also investigate the role of dual identities in recategorisation. To test our hypothesis, we conducted a large field experiment with a total of 1,097 employees within a multinational organisation. Results revealed that (I) organisational identification and status are positively related to higher levels of NIH, (II) a recategorisational-intervention completely removes the NIH bias and leads to a significant increase in the evaluation of external knowledge.


Author(s):  
Mohamed Omar Moftah Medon ◽  
Ali Mohamed Aneba

<p>The tolerance in Islam springs from Sharia in both its primary and secondary sources.  There are abundance evidences found in the Qur'an and Sunnah which order people to tolerate and avoid terror. Qur'an and Sunnah as a  primary sources of Sharia do not accept terror, but invite people to have a sense of tolerance and kindness and non-extremism in Islamic dealings. Islam unrecognized a differentiation among people, except the quality of their <em>taqwa</em>. That is why  there is no different between Arabs and non-Arabs. Therefore, the primary sources of Islam have no any relation with terror and killing of the innocent. Such an example, killing the innocent is done toward a certain direction, side, group, doctrine, political thought, or sect that are the reasons of terror and enmity which increase force within communities.</p><strong><em></em></strong><strong><em></em></strong>


2017 ◽  
Vol 19 (46) ◽  
pp. 31345-31351 ◽  
Author(s):  
Juan Ramón Avilés-Moreno ◽  
Giel Berden ◽  
Jos Oomens ◽  
Bruno Martínez-Haya

Protonated arginine interacts with 12-crown-4 through the guanidinium side group. In the complex with the N-substituted analog cyclen, the dominant conformation is the result of the proton transfer from the carboxylic acid group of the amino acid to the macrocycle.


Author(s):  
Mrigank Verma ◽  
Manabendra Chandra

Here, we demonstrate the utility of the second harmonic generation (SHG) for refractometric sensing in the solution phase. We employ an aqueous colloid of gold nanorods as our sensors and,...


Author(s):  
Angeline Chiu
Keyword(s):  

This chapter shows how Brett Ratner, working from Steve Moore’s 2009 graphic novel as a foundation for the 2014 film Hercules, utilized the role of companions in this innovative framing of the Hercules myth. It focuses on an overlooked aspect of the narrative. Instead of Hercules performing his labors alone, Ratner’s version of the myth uses an ensemble cast to support the legendary warrior, creating a group identity rather than just an individual heroic identity. The companions all come from mythological bases of their own, but contribute here to a composite identity of heroism. The result is a more effective hero, as well as a resulting focus on storytelling.


2020 ◽  
pp. 123-147
Author(s):  
Michael Krona

The significance of visual propaganda in war has never been as debated as since the Islamic State (IS) started gaining global attention for its sophisticated media campaigns in 2014. Although IS propaganda contains several narratives, the videos of beheadings have for years been at the centre of attention. This graphic violence involves deliberate choices in terms of image composition, lighting, camera-angles, and overall editing techniques deployed to reach maximum effects its targeted audiences. These videos are not only evidence of tactical choices in hybrid warfare, but also mediated communicative artefacts. This chapter aims to dissect this mediation of performative violence: the visualization of beheadings as multi-layered media artefacts, produced with the dual objective to incite fear among adversaries and strengthen the in-group identity of the organization. How videos of IS beheadings are designed is crucial to understand the role of visual propaganda in IS contemporary warfare. The chapter is based on qualitative visual analysis of beheading videos produced by IS official media wings between 2014 and 2017 with particular focus on image composition and sequencing, contextualized through a theoretical discussion about how power and retaliatory humiliation are constructed through the visual performativity of violence.


2017 ◽  
Vol 203 ◽  
pp. 485-507 ◽  
Author(s):  
Lee Brammer

The role of the closing lecture in a Faraday Discussion is to summarise the contributions made to the Discussion over the course of the meeting and in so doing capture the main themes that have arisen. This article is based upon my Closing Remarks Lecture at the 203rdFaraday Discussion meeting on Halogen Bonding in Supramolecular and Solid State Chemistry, held in Ottawa, Canada, on 10–12thJuly, 2017. The Discussion included papers on fundamentals and applications of halogen bonding in the solid state and solution phase. Analogous interactions involving main group elements outside group 17 were also examined. In the closing lecture and in this article these contributions have been grouped into the four themes: (a) fundamentals, (b) beyond the halogen bond, (c) characterisation, and (d) applications. The lecture and paper also include a short reflection on past work that has a bearing on the Discussion.


2019 ◽  
Vol 21 (4) ◽  
pp. 1689-1699 ◽  
Author(s):  
Katherine A. Parrish ◽  
Mary King ◽  
Marshall R. Ligare ◽  
Grant E. Johnson ◽  
Heriberto Hernández

This study examined the solution-phase exchange reactions of triphenylphosphine (PPh3) ligands on Au8L72+ (L = PPh3) gold clusters with three different tolyl ligands using electrospray ionization mass spectrometry to provide insight into how steric differences in the phosphines influence the extent of ligand exchange and the stability of the resulting mixed-phosphine clusters.


HUMANIS ◽  
2019 ◽  
pp. 57
Author(s):  
A.A. Tri Anggarukma K D ◽  
I Gede Putu Sudana ◽  
I Made Winaya

This paper is entitled “The Analysis Code Switching Found in The Novel “Critical Eleven”. The aims of this study  are to describe the types, function and to the analyse reasons of code switching used by the novelist. The data  in this study were taken from all chapters of the novel entitled “Critical Eleven”by Ika Natassa. Firstly, the code switching that occurs in novel were identified and then they were classified and analyzed based on their types, function, and reasons of code switching. The collected data were analyzed  using three theories;  first the theory by Poplack as the main theory used in this study; this theory was used to analyze the three types of code swtching, they are: Tag Switching, Inter-Sentental Switching, Intra-Sentential Switching. The second theory proposed by Apple and Muyken was used to anlyze the function of code switching. They divided the functions into six categories, which are: Referential Function, Directive Function, Expressive Function, Phatic Function, Metalinguistic Function, Poetic Function. The theory proposed by Grosjean was used to analyze the reason of code switching.  There are ten reasons of code switching; they are: To Fill A Linguistic Need For Lexical Item, Set Phrase, Discouse Marker Or Sentence Filler,To Continue Last Language Used (Triggering}, To Qoute Someone, To Emphasize, To Spesify Speaket Addressee, To Qualify Message: Amplify Or Emphasize, To Specify Speaker Involvement, To Mark And Emphasize Group Identity (Solidarity), To Convey Confidentially, Anger, Annoyance, To  Exclude Someone From Conversation, To Change Role Of Speaker: Rise Status, Add Authority, Show Expertise.But from the six functions of code switching  applied, there are only five functions of code switching found in the novel; they are Referential Function, Expressive Function, Phatic Function, Metalinguistic Function And Poetic Function. And based on the reasons of code switching, there were only seven which were found in the novel”Critical Eleven”; they are To Fill A Linguistic Need For Lexical Item, To Continue The Last Language Used (Triggering), To Quote Someone, Specify Addressee, To Specify Speaker Involvement, To Mark And Emphasize Group Identify (Solidarity) And To Convey Confidentially, Anger, And Annoyance.


Sign in / Sign up

Export Citation Format

Share Document