Search for dissertations about: "Identity"
Showing result 21 - 25 of 1419 swedish dissertations containing the word Identity.
-
21. D. L. Moody and Swedes : Shaping Evangelical Identity among Swedish Mission Friends 1867–1899
Abstract : The American Dwight L. Moody (1837–1899) was the most famous revivalist of the late 1800s and exercised a wide and lasting influence on the Protestant world, reaching Swedes in Sweden and America. READ MORE
-
22. To be whatever you want to be, you still need to know what that is: Identity development in emerging adulthood
Abstract : DEGREE OF LlCENTIATE IN PSYCHOLOGY abstract Wängqvist, M (2010). To be whatever you want to be, you still need to know what that is: Identity development in emerging adulthood. Department of Psychology, University of Gothenburg, Sweden. READ MORE
-
23. Teacher Identity as Discourse : A Case Study of Students in Swedish Teacher Education
Abstract : This thesis comprises three separate studies that together explore how Swedish student teachers construct or produce professional identity in interaction while navigating different institutional and professional instances of teacher education. As a discourse analytical contribution to research on teacher identity, the main theoretical framework is mediated discourse theory (e. READ MORE
-
24. Irish Scene and Sound : Identity, Authenticity and Transnationality among Young Musicians
Abstract : Ireland has long been famous for its rich traditional music. Yet the recent global success of Irish pop, rock and traditional music has transformed the Irish music scene into a world centre attracting musicians, tourists, fans and the music industry from both Ireland and abroad. READ MORE
-
25. Identity and Anonymity in Ad Hoc Networks
Abstract : In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. READ MORE