Purpose - The purpose of this paper is to develop a research model to investigate corporate visual identity (CVI) management from an organisational perspective. It is assumed that characteristics of the organisation and of the way a CVI is managed will affect consistency of CVI. Design/methodology/approach - The model was tested in a survey carried out among employees in 20 Dutch organisations. Structural equation modelling with AMOS was conducted to get insight into the various influences and relationships. Findings - CVI management characteristics - socialisation processes related to CVI, knowledge of CVI strategy, and CVI tools and support - have a strong impact on the consistency of CVI, and organisational characteristics affect the way CVI is managed. With the exception of the openness and dynamics of an organisation, no supporting evidence was found for a direct relationship between organisational characteristics and CVI consistency. Research limitations/implications - CVI has been measured by the judgement of the respondents, all employees of the organisation concerned. Therefore the measure was the perceived consistency of CVI. Further research could include a visual audit and the perception of external stakeholders towards the visual identity. There was no distinction examined among the main corporate visual identity and sub- or product brands. The study was conducted in the Netherlands, where the Dutch term huisstijl is unambiguous and clearly related to the corporate brand or identity. Future research can take different brands into account or can broaden the concept of CVI (including cultural aspects, language, rituals, myths, etc.). Practical implications - The results indicate that CVI management matters, that CVI management is related to more general organisational characteristics, but that communication managers nevertheless have a considerable amount of freedom in determining the way they manage their CVI. Originality/value - Corporate visual identity has received little attention in research and hardly been studied at all from the perspective of this paper. This paper has value to both researchers in the fields of corporate identity and organisational identity, as well as professionals involved in managing the corporate identity. © Emerald Group Publishing Limited.
MULTIFILE
Background: Advanced media technologies have become an integral part of people's daily lives, providing them with new tools and environments for the formation and enactment of their identities. To date, the literature acknowledges that media technologies, such as social networking sites, are used to form and enact online identities, and that these platforms can simultaneously pose challenges to individuals' identity work. However, we know little about the precise online identity work strategies that individuals employ in response to the challenges they face over time. Objective: This paper examines the online identity work dynamics of Instagram micro-influencers, for whom social network sites enable and guide them in forming and enacting their online identities on a daily basis. The study was guided by the following research question: what are the challenges that Instagram micro-influencers perceive online and what are the online identity work strategies that they employ in response to these challenges over time? Methods: This study employs an extreme case approach to rigorously explore the lives of seven micro-influencers on Instagram. We combine in-depth data from narrative interviews, longitudinal data from online autobiographical narratives revealed through the participants' Instagram timelines, and follow-up interviews. Results: Our analysis revealed three main themes that highlight the challenges that Instagram micro-influencers face online: (1) amplified social expectations, (2) feelings of inauthenticity, and, as a result thereof, (3) psychological distress. We found that these challenges were viewed as catalysts for their online identity work processes. We identified three key online identity work strategies that the Instagram micro-influencers employed in response over time: (1) experimenting with their online identities, followed by either (2) segmenting between their online and offline identities, or (3) adding identities through online multiplicity. Conclusion: Our research provides new insights into how individuals may respond to the challenge of managing their online identities over time by engaging in different online identity work strategies. This study highlights the importance of designing online media technologies that enable individuals to cope with online challenges. We emphasize the need to design online spaces for (1) the expression of authentic identities, (2) community building, and (3) online multiplicity.
In this article, we elaborate on the role of dialogical learning in identity formation in the context of environmental education. First, we distinguish this kind of learning from conditioning and reproductive learning. We also show that identity learning is not self-evident and we point out the role of emotions. Using Dialogical Self Theory, we then suggest that individuals do not have an “identity hierarchy” but a dialogical self that attaches meaning to experiences in both conscious and unconscious ways. We describe the learning process that enables the dialogical self to develop itself, and we elaborate on the characteristics of a good dialogue. We conclude with some remarks expanding room for a dialogue that would foster identity learning. https://doi.org/10.3390/resources5010011 https://www.linkedin.com/in/helenkopnina/
MULTIFILE
Fashion has become inextricably linked with digital culture. Digital media have opened up new spaces of fashion consumption that are unprecedented in their levels of ubiquity, immersion, fluidity, and interactivity. The virtual realm continuously needs us to design and communicate our identity online. Unfortunately, the current landscape of digitised fashion practices seems to lack the type of self-governing attitude and urgency that is needed to move beyond commercially mandated platforms and systems that effectively diminish our digital agency. As transformative power seems to be the promise of the virtual, there is an inherent need to critically assess how digital representation of fashion manifests online, especially when these representations become key mediators within our collective and individual public construction of self. A number of collectives and practitioners that actively shape a counter movement, organized bottom up rather than through capital, are questioning this interdependence, applying inverted thinking and experimenting with alternative modes of engagement. Starting from the research question ‘How can critical fashion practitioners introduce and amplify digital agency within fashion’s virtual landscape through new strategies of aesthetic engagement?’, this project investigates the implications of fashion’s increasing shift towards the virtual realm and the ramifications created for digital agency. It centers on how identity is understood in the digital era, whether subjects have full agency while expected to construct multiple selves, and how online environments that enact as playgrounds for our identities might attribute to a distorted sense of self. By using the field of critical fashion as its site, and the rapidly expanding frontier of digital counter practices as a lens, the aim of this project is to contribute to larger changes within an increasingly global and digital society, such as new modes of consumerism, capital and cultural value.
A research theme examining diversity and inclusion in video games, using an intersectional perspective and typically addressing issues related to the representation of gender, race, and LGBTQ+ people, but also touching broader topics such as class, age, geographic privilege, physical and neurodiversity, the (unevenly distributed) impacts of the climate crisis, and other aspects of identity.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.