نتایج جستجو برای: common identity

تعداد نتایج: 792664  

Fallahzadeh, Muhammad Hadi , Muhammadi, Mohsen ,

With his speeches and messages in hajj days, Imam Khomeini tried to introduce Islamic Awakening as the spirit of war against colonization and global arrogance and attract Muslims' attention to political and social functions of hajj to offer Muslims dignity and inspire them to start an Islamic movement. In his opinion, hajj is an atmosphere to gain knowledge about Islam and to enlighten people a...

آقازاده, هاشم, اسمعیلی, حسین, جعفری, عماد,

In today's rapidly changing and highly competitive market, organizations are always looking for new ways to gain and maintain competitive advantage. For this reason, the brand personality as a prominent issue is discussed and marketing activities with the aim of having customers who believe brand character and distinguish and prefer it from competitors and as well as strengthening communication...

2015

In this paper I examine Herodotus’s use of oppositional writing in the Histories as it relates to Hellenic identity in the 5th century BCE. As Greece was divided socially, politically, and linguistically, the presence of Hellenic identity at that time is questionable. Through literary analysis I determine the characteristics of antitheses and identify various cultural oppositions as either impl...

2004
Hanming Fang Glenn C. Loury

We advance a novel choice-theoretic model of “identity” based on the notions of categories and narratives. Identity is conceived as a matter of “reflexive perception” — how people understand themselves. Choosing an identity is equivalent to making a generalization about one’s past that highlights the most salient aspects of experience. When many individuals make a common choice in this regard, ...

2017
Daniel Träder Alexander Zeier Andreas Heinemann

With the ongoing digitalisation of our everyday tasks, more and more eGovernment services make it possible for citizens to take care of their administrative obligations online. This type of services requires a certain assurance level for user authentication. To meet these requirements, a digital identity issued to the citizen is essential. Nowadays, due to the widespread use of smartphones, mob...

2017
Yuanyuan Shi Jianning Dang Wenwen Zheng Li Liu

Past work suggested that dual identity was effective to reduce prejudice. This study extended research on dual identity and prejudice by identifying a boundary condition in this relationship, that is, group permeability. In Study 1, we replicated previous studies with Chinese individuals and found that inducing dual identity (emphasizing subgroup differences and a common nation identity), compa...

عبادی, عباس, وفادار, زهره , ونکی, زهره,

 Introduction: The necessity of closed and continuous relationships, team work and collaboration between various health professions in treatment and care have confronted health ethics with many challenges. Inter-professional education has been proposed as an effective strategy to address this gap internationally. This study has been done to determine process of ethical growth and achiev...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده حقوق 1391

abstract when in administrative law the matter of administrative offences are raised, these offences would have legal nature if they are force able, some of these offences are related to administrative law, where as some other pelts are common in civil or penal law. the current research intends not only to consider the concept and foundation of administrative execution rules but also compares...

Journal: : 2022

The paper’s aim is to analyze the most important concepts related identity (including ethnic identity), which are causes and factors leading ethno-political conflicts. author seeks give a deeper interpretation of concept identity, considering it in common features or peculiar properties, as well separately highlighting its manifestations political context. study analyzes constituent elements: r...

2007
Robert C. Miller Virgil Griffith Markus Jakobsson

We introduce the concept of “identity theft,” starting from an attempt to establish a definition, then reviewing common methods, both traditional and modern, used by identity theives. We review typical scams (including phishing) and other types of attacks, then conclude with some modest recommendations.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید