Social Identity Theory Sample Clauses

Social Identity Theory. With their introduction of social identity theory, Tajfel and Xxxxxx (1979) began to explore the psychological basis of intergroup discrimination. According to their theory, a person does not have a unique “personal self” but several selves that correspond to overlapping contexts of group membership. For example, a person may simultaneously define herself as a member of a particular race, sex, family, and organization. Social psychologists claim that once she categorizes herself with others based on perceived similarities, she will gradually stop thinking of herself as an individual and instead begin to act like a representative of that particular group (Tajfel and Xxxxxx, 1986). Interestingly, an individual can simultaneously identify with multiple groups and may behave differently depending on which “identity” is most salient at a given time. In a study of Asian-American female undergraduates, Shih et al. (1999) found that subjects’ performance on a math test varied depending on which of their multidimensional social identities was made salient through a pre-test questionnaire. Participants earned the highest test scores when the questionnaire emphasized subjects’ Asian identity and lowest when it emphasized their female identity. Similarly, Xxxxxxxx et al. (2007) found that risk and time preferences conformed to common stereotypes when ethnic, gender, or racial identity was made prominent. Since its introduction, the concept of social identity has proven influential in understanding behavior in fields such as social psychology (Xxxxxxxx and Xxxxx, 1985; Xxxxx and Xxxx, 0000), sociology (Stets and Xxxxx, 2000), anthropology (Sokefeld, 1999), political science (XxXxxxxxx, 2009), and accounting (Xxxxx, 2003); and economists have recently joined the discussion. While standard economic theory has historically focused on individual-level incentives in decision-making, economists now apply social identity theory to analyses of the economics of poverty, household discrimination, and gender discrimination (Xxxxxxx and Kranton, 2000); education (Xxxxxxx and Kranton, 2002); and contract theory (Xxxxxxx and Kranton, 2005). An increasing number of experimental studies also explore the effects of social identity on individuals’ decisions. Within this field studies fall into two broad categories: those inducing group identity in the lab and those using natural and pre-existing identities. The former category, experiments that induce group identity, includes studies ex...
AutoNDA by SimpleDocs
Social Identity Theory. In Social Identity Theory identity is conceptualised as being a product of our affiliation with other individuals who are perceived to have similar characteristics and social status as ourselves (XxXxxxxx and XxXxxxxx 2008). Social identity theory (SIT) can be a useful way of analysing organisations and social groups, particularly with regards to the categorisation of groups and the resulting group behaviours (Xxxxxxxx and Mael 1989). The formation of groups from individuals who share similar attitudes and beliefs create a set of behaviours and norms which are used to define and create cohesion within the group, and to provide a reference for which others can be excluded (Xxxxxxxx and Xxxx 1989, Xxxxxxxx and Xxxxxx 2014b). Xxxxxx and Xxxxxx (1986) describe how Xxxxxxx and outgroup behaviour develops from social group membership; a feeling of solidarity and unity with those within the group (ingroup) and rejection and marginalisation of those outside of the group (outgroup). Social group membership provides a stable social identity that allows individuals to identify with those others with whom they feel that they belong. This behaviour is considered to be essential to provide the individual with a sense of self- worth and to create a connection between the individual’s identity and the identity of the social group (Xxxx 2006). The group membership of an individual as a framework for understanding the formation of professional identity in nursing is an appealing one as it is based upon a shared understanding about the role and function of the professional group. However, nursing care is, by nature, diverse, subjective and encompasses a wide range of activities. Therefore, any arbitrary definition of such a group role and function becomes problematic. Whilst it can be assumed that student nurses intend to become a member of the professional group (by virtue of their entry to the undergraduate programme), there is a tacit assumption that the student, and the profession as a whole, share a common sense of what this group identity is and how nursing is defined, which might not be the case.

Related to Social Identity Theory

  • Taxpayer Identification Number; Other Identifying Information The true and correct U.S. taxpayer identification number of the Company and each Designated Borrower that is a Domestic Subsidiary and a party hereto on the Closing Date is set forth on Schedule 10.02. The true and correct unique identification number of each Designated Borrower that is a Foreign Subsidiary and a party hereto on the Closing Date that has been issued by its jurisdiction of organization and the name of such jurisdiction are set forth on Schedule 5.17.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 0-000-000-0000 or submit Form 14039. For more information, see Pub. 5027, Identity Theft Information for Taxpayers. Victims of identity theft who are experiencing economic harm or a systemic problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 0-000-000-0000 or TTY/TDD 0-000-000-0000. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 0-000-000-0000. You can forward suspicious emails to the Federal Trade Commission at xxxx@xxx.xxx or report them at xxx.xxx.xxx/xxxxxxxxx. You can contact the FTC at xxx.xxx.xxx/xxxxxxx or 877-IDTHEFT (877-438-4338). If you have been the victim of identity theft, see xxx.XxxxxxxxXxxxx.xxx and Pub. 5027. Visit xxx.xxx.xxx/XxxxxxxxXxxxx to learn more about identity theft and how to reduce your risk.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Personal Identification Number We will issue you a Personal Identification Number (PIN) for use with your Card at VISA NET automatic teller machines (ATM’s). These numbers are issued to you for your security purposes. These numbers are confidential and should not e disclosed to third parties. You are responsible for safekeeping your PIN. You agree not to disclose or otherwise make available your PIN to anyone not authorized to sign on your Accounts. To keep your Account secure, please do not write your PIN on your Card or keep it in the same place as your Card.

  • Separate Identity The Seller acknowledges that the Administrative Agent, the Lenders and the other Secured Parties are entering into the transactions contemplated by the Credit Agreement in reliance upon the Buyer’s identity as a legal entity that is separate from the Seller and each other Affiliate of the Seller. Therefore, from and after the date hereof, the Seller will take all reasonable steps to maintain the Buyer’s identity as a legal entity that is separate from the Seller and each other Affiliate of the Seller and to make it manifest to third parties that the Buyer is an entity with assets and liabilities distinct from those of the Seller and each other Affiliate thereof and not just a division of the Seller or any such other Affiliate (except as otherwise required under GAAP or applicable tax law). Without limiting the generality of the foregoing and in addition to the other covenants set forth herein, the Seller agrees that: (i) the Seller will take all other actions necessary on its part to ensure that the Buyer is at all times in compliance with Section 5.18 of the Credit Agreement (provided, however, that the Seller does not hereby guaranty the solvency of the Buyer or agree to pay any of the Buyer’s obligations or liabilities); (ii) the Seller shall maintain corporate records and books of account separate from those of the Buyer; (iii) the annual financial statements of the Seller shall disclose the effects of the Seller’s transactions in accordance with GAAP and the annual financial statements of the Seller shall not reflect in any way that the assets of the Buyer, including, without limitation, the Collateral, could be available to pay creditors of the Seller or any other Affiliate of the Seller; (iv) the resolutions, agreements and other instruments underlying the transactions described in this Agreement shall be continuously maintained by the Seller as official records; (v) the Seller shall maintain an arm’s-length relationship with the Buyer and will not hold itself out as being liable for the debts of the Buyer; (vi) except as otherwise permitted under the Credit Agreement, the Seller shall keep its assets and its liabilities wholly separate from those of the Buyer or, other than by reason of owning equity interests of the Buyer, for any decisions or actions relating to the Buyer; (vii) the Seller will avoid the appearance, and promptly correct any known misperception of any of the Seller’s creditors, that the assets of the Buyer are available to pay the obligations and debts of the Seller; (viii) to the extent that the Seller services the Collateral and performs other services on the Buyer’s behalf, the Seller will clearly identify itself as an agent for the Buyer in the performance of such duties; provided, however, that the Seller will not be required to so identify itself when communicating with the Obligors not in its capacity as agent for the Buyer but rather in its capacity as agent for a group of lenders; and (ix) the Seller shall take or refrain from taking, as applicable, each of the activities specified or assumed in the true sale and non-consolidation opinions of Dechert LLP delivered on the Warehouse Closing Date, upon which the conclusions expressed therein are based.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Vendor Identity and Contact Information It is Vendor’s sole responsibility to ensure that all identifying vendor information (name, EIN, d/b/a’s, etc.) and contact information is updated and current at all times within the TIPS eBid System and the TIPS Vendor Portal. It is Vendor’s sole responsibility to confirm that all e-correspondence issued from xxxx-xxx.xxx, xxxxxxx.xxx, and xxxxxxxxxxxxxxxx.xxx to Vendor’s contacts are received and are not blocked by firewall or other technology security. Failure to permit receipt of correspondence from these domains and failure to keep vendor identity and contact information current at all times during the life of the contract may cause loss of TIPS Sales, accumulating TIPS fees, missed rebid opportunities, lapse of TIPS Contract(s), and unnecessary collection or legal actions against Vendor. It is no defense to any of the foregoing or any breach of this Agreement that Vendor was not receiving TIPS’ electronic communications issued by TIPS to Vendor’s listed contacts.

  • Social Security (check one)‌

  • Employer Identification Number The Administrator shall have and use its own Employer Identification Number for purposes of calculating payroll tax withholdings and providing reports state and federal tax authorities.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!