scholarly journals Social Identity and Manipulative Interhousehold Transfers Among East African Pastoralists

Author(s):  
Marieke E/Els Huysentruyt ◽  
Christopher B. Barrett ◽  
John G. McPeak
Author(s):  
P. Evers ◽  
C. Schutte ◽  
C. D. Dettman

S.rodhaini (Brumpt 1931) is a parasite of East African rodents which may possibly hybridize with the human schistosome S. mansoni. The adult male at maturity measures approximately 3mm long and possesses both oral and ventral suckers and a marked gynaecophoric canal. The oral sucker is surrounded by a ring of sensory receptors with a large number of inwardly-pointing spines set into deep sockets occupying the bulk of the ventral surface of the sucker. Numbers of scattered sensory receptors are found on both dorsal and ventral surfaces of the head (Fig. 1) together with two conspicuous rows of receptors situated symmetrically on each side of the midline. One row extends along the dorsal surface of the head midway between the dorsal midline and the lateral margin.


2017 ◽  
Vol 2 (11) ◽  
pp. 73-78
Author(s):  
David W. Rule ◽  
Lisa N. Kelchner

Telepractice technology allows greater access to speech-language pathology services around the world. These technologies extend beyond evaluation and treatment and are shown to be used effectively in clinical supervision including graduate students and clinical fellows. In fact, a clinical fellow from the United States completed the entire supervised clinical fellowship (CF) year internationally at a rural East African hospital, meeting all requirements for state and national certification by employing telesupervision technology. Thus, telesupervision has the potential to be successfully implemented to address a range of needs including supervisory shortages, health disparities worldwide, and access to services in rural areas where speech-language pathology services are not readily available. The telesupervision experience, potential advantages, implications, and possible limitations are discussed. A brief guide for clinical fellows pursuing telesupervision is also provided.


2000 ◽  
Vol 31 (4) ◽  
pp. 191-203 ◽  
Author(s):  
Kelly S. Fielding ◽  
Michael A. Hogg

Summary: A social identity model of effort exertion in groups is presented. In contrast to most traditional research on productivity and performance motivation, the model is assumed to apply to groups of all sizes and nature, and to all membership contingent norms that specify group behaviors and goals. It is proposed that group identification renders behavior group-normative and encourages people to behave in line with group norms. The effect should be strengthened among people who most need consensual identity validation from fellow members, and in intergroup contexts where there is inescapable identity threat from an outgroup. Together these processes should encourage people to exert substantial effort on behalf of their group.


2013 ◽  
Vol 44 (6) ◽  
pp. 361-372 ◽  
Author(s):  
Natascha de Hoog

The underlying process of reactions to social identity threat was examined from a defense motivation perspective. Two studies measured respondents’ social identification, after which they read threatening group information. Study 1 compared positive and negative group information, attributed to an ingroup or outgroup source. Study 2 compared negative and neutral group information to general negative information. It was expected that negative group information would induce defense motivation, which reveals itself in biased information processing and in turn affects the evaluation of the information. High identifiers should pay more attention to, have higher threat perceptions of, more defensive thoughts of, and more negative evaluations of negative group information than positive or neutral group information. Findings generally supported these predictions.


2012 ◽  
Vol 43 (1) ◽  
pp. 41-46 ◽  
Author(s):  
Stefano Pagliaro ◽  
Francesca Romana Alparone ◽  
Maria Giuseppina Pacilli ◽  
Angelica Mucchi-Faina

We examined how members of a low status group react to a social identity threat. We propose that expressing an ambivalent evaluation toward the ingroup may represent a way to manage such a threatening situation. For this study, 131 undergraduates’ identification with Italians was assessed. Participants were divided into groups, according to a situational identity threat (high vs. low). In line with hypotheses, low identifiers expressed more ambivalence toward the ingroup in the high (vs. low) threat condition. The reversed pattern emerged for high identifiers. This effect was mediated by the perception of intragroup variability, a well-known social creativity strategy. Results confirmed our interpretation of ambivalence as a form of social creativity, and are discussed in terms of social identity concerns.


2012 ◽  
Vol 43 (3) ◽  
pp. 115-126 ◽  
Author(s):  
Christina Matschke ◽  
Kai Sassenberg

Entering a new group provides the potential of forming a new social identity. Starting from self-regulation models, we propose that goals (e.g., internal motivation to enter the group), strategies (e.g., approach and avoidance strategies), and events (e.g., the group’s response) affect the development of the social self. In two studies we manipulated the group’s response (acceptance vs. rejection) and assessed internal motivation as well as approach and avoidance strategies. It was expected, and we found, that when newcomers are accepted, their use of approach strategies (but not avoidance strategies) facilitates social identification. In line with self-completion theory, for highly internally motivated individuals approach strategies facilitated social identification even upon rejection. The results underline the active role of newcomers in their social identity development.


2017 ◽  
Vol 16 (1) ◽  
pp. 12-24 ◽  
Author(s):  
Nicole Behringer ◽  
Kai Sassenberg ◽  
Annika Scholl

Abstract. Knowledge exchange via social media is crucial for organizational success. Yet, many employees only read others’ contributions without actively contributing their knowledge. We thus examined predictors of the willingness to contribute knowledge. Applying social identity theory and expectancy theory to knowledge exchange, we investigated the interplay of users’ identification with their organization and perceived usefulness of a social media tool. In two studies, identification facilitated users’ willingness to contribute knowledge – provided that the social media tool seemed useful (vs. not-useful). Interestingly, identification also raised the importance of acquiring knowledge collectively, which could in turn compensate for low usefulness of the tool. Hence, considering both social and media factors is crucial to enhance employees’ willingness to share knowledge via social media.


Sign in / Sign up

Export Citation Format

Share Document