Jump to ContentJump to Main Navigation
Identity Theory$
Users without a subscription are not able to see the full content.

Peter J. Burke and Jan E. Stets

Print publication date: 2009

Print ISBN-13: 9780195388275

Published to Oxford Scholarship Online: May 2012

DOI: 10.1093/acprof:oso/9780195388275.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 08 April 2020

Identities and Their Operation

Identities and Their Operation

Chapter:
(p.61) 4 Identities and Their Operation
Source:
Identity Theory
Author(s):

Peter J. Burke

Jan E. Stets

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780195388275.003.0017

This chapter examines the identity control model and the identity-verification process. It pinpoints the component parts of identities and studies the present understandings on the way identities work. It shows the four types of interruptions that can occur in the identity process and explains how self-esteem can become an outcome of the verification process. Finally, it presents some studies on identity-verification.

Keywords:   identity control model, identity-verification, identities, types of interruptions, identity process, self-esteem

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .