This article proposes that identity formation and reformation are important dynamics that influence and are influenced by the course of a sustainability transition. We study identity (re-)formation in the transition of the dairy sector in a rural area in the Netherlands: the Green Heart. Soil subsidence, high emissions, and economic pressures require substantial changes in practices in the dairy sector and most importantly, the landscape that it is intertwined with. We use narrative analysis to study identity (re-)formation in two new stakeholder collectives that aim to address sustainability in the area. We identify discrepancies between the narratives in these collectives and the transition challenge. These discrepancies can be explained by the role that the landscape of the Green Heart plays in the identity (re-)formation within these collectives. The attachment to the current landscape forms a lock-in for the sustainability transition in this area.
MULTIFILE
From the article: This paper describes the external IT security analysis of an international corporate organization, containing a technical and a social perspective, resulting in a proposed repeatable approach and lessons learned for applying this approach. Part of the security analysis was the utilization of a social engineering experiment, as this could be used to discover employee related risks. This approach was based on multiple signals that indicated a low IT security awareness level among employees as well as the results of a preliminary technical analysis. To carry out the social engineering experiment, two techniques were used. The first technique was to send phishing emails to both the system administrators and other employees of the company. The second technique comprised the infiltration of the office itself to test the physical security, after which two probes were left behind. The social engineering experiment proved that general IT security awareness among employees was very low. The results allowed the research team to infiltrate the network and have the possibility to disable or hamper crucial processes. Social engineering experiments can play an important role in conducting security analyses, by showing security vulnerabilities and raising awareness within a company. Therefore, further research should focus on the standardization of social engineering experiments to be used in security analyses and further development of the approach itself. This paper provides a detailed description of the used methods and the reasoning behind them as a stepping stone for future research on this subject. van Liempd, D., Sjouw, A., Smakman, M., & Smit, K. (2019). Social Engineering As An Approach For Probing Organizations To Improve It Security: A Case Study At A Large International Firm In The Transport Industry. 119-126. https://doi.org/10.33965/es2019_201904l015
MULTIFILE
In this article, we elaborate on the role of dialogical learning in identity formation in the context of environmental education. First, we distinguish this kind of learning from conditioning and reproductive learning. We also show that identity learning is not self-evident and we point out the role of emotions. Using Dialogical Self Theory, we then suggest that individuals do not have an “identity hierarchy” but a dialogical self that attaches meaning to experiences in both conscious and unconscious ways. We describe the learning process that enables the dialogical self to develop itself, and we elaborate on the characteristics of a good dialogue. We conclude with some remarks expanding room for a dialogue that would foster identity learning. https://doi.org/10.3390/resources5010011 https://www.linkedin.com/in/helenkopnina/
MULTIFILE