 | László Garai Theoretical Psychology Vygotskian Writings Теоретическая психология Journal of Russian and East European Psychology, vol. 50, no. 1, January–February 2012, pp. 50–64 3.39 Mb. 19 | read |
 | Whatever follows is out of my hands”. Constructing and deconstructing the social identity of second generation immigrants by bestselling poetry Panel 1: Constructing and countering social identities: Contesting established narratives in organizational communication, education and political poetry 447.43 Kb. 12 | read |
![6 Social research in the context of feminist psychology [pp. 89-103] Ann Phoenix](/i/doc32.png) | 6 Social research in the context of feminist psychology [pp. 89-103] Ann Phoenix It is argued that method should not be seen as the defining feature of psychology and that research conducted by feminists has much to contribute to the discipline of psychology. The chapter makes particular reference to a study of motherhood in 16 56.12 Kb. 1 | read |
 | January 13 10 final Introduction: Conflicts and Social Psychology1 Daniel Bar-Tal School of Education Tel Aviv University Bar-Tal, D. (2011). Introduction: Conflicts and social psychology. In Bar-Tal, D. (Ed.), Intergroup conflicts and their resolution: Social psychological perspective (pp. 217-240). New York: Psychology Press 169.6 Kb. 5 | read |
 | Stephen Conway 6 December 1995 Thomas More. These two early examples of utopian fiction inform one another structurally, thematically, stylistically, and ideologically 51.82 Kb. 1 | read |
 | Connections 332 Witchcraft in Colonial New England In addition to evaluating these disciplinary approaches, students will analyze primary sources from selected witchcraft cases and use various methodologies to develop their own interpretations of those cases 64.83 Kb. 1 | read |
 | Abstract The existence, significance and scope of a personal digital identity is discussed. The performance and security of algorithms needed to implement a digital identity is analyzed. Two implementation examples of a digital personal identity are The existence, significance and scope of a personal digital identity is discussed. The performance and security of algorithms needed to implement a digital identity is analyzed. Two implementation examples of a digital personal identity 63.18 Kb. 13 | read |
 | Chapter 5: social interaction B. the study of large-scale groups, organizations or social systems 17.33 Kb. 1 | read |