{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:13:14Z","timestamp":1772806394199,"version":"3.50.1"},"reference-count":92,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T00:00:00Z","timestamp":1457308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3,7]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of this paper is to explore the process in which the software engineering students construct their professional identities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 The study followed the qualitative method using grounded theory methodology to examine the process of identity construction. Data were collected from final year software engineering students in an iterative manner.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 Based on the present study, the study argues that entry-level identities of students are modified and adjusted in response to their experience of identity violations over the course of their academic program. These violations were caused by their unmet expectations from the academic program. The magnitude of these violations is influenced by their perceived value derived from the training they were receiving.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>\u2013 This paper explains the process of \u201cidentity morphing\u201d as a mechanism by which students resolve the conflict\/violation of their identities. The emergence and adaptation of different types of identities were examined. This study can be extended to the employees of IT organizations to draw a holistic picture.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>\u2013 The understanding of identity morphing process might enable organizations to enrich their interaction with their employees and thus provide avenues to improve their work-related outcomes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 Previous studies have explored professional identity construction among individuals. However, how software professionals construct their professional identity, during their education years, is relatively unexplored. The present study asserts that professional identities are formed among the students even before they join the organization.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-10-2013-0181","type":"journal-article","created":{"date-parts":[[2016,2,19]],"date-time":"2016-02-19T09:20:11Z","timestamp":1455873611000},"page":"146-172","source":"Crossref","is-referenced-by-count":22,"title":["Professional identity construction among software engineering students"],"prefix":"10.1108","volume":"29","author":[{"given":"Gunjan","family":"Tomer","sequence":"first","affiliation":[]},{"given":"Sushanta Kumar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121703062985900_b3","doi-asserted-by":"crossref","unstructured":"Ashforth, B.E. (2001), Role Transitions in Organizational Life: An Identity-Based Perspective , Erlbaum, Mahwah, NJ.","DOI":"10.4324\/9781410600035"},{"key":"key2020121703062985900_b4","doi-asserted-by":"crossref","unstructured":"Ashforth, B.E. and Mael, F. (1989), \u201cSocial identity theory and the organization\u201d, Academy of Management Review , Vol. 14 No. 1, pp. 20-39.","DOI":"10.5465\/amr.1989.4278999"},{"key":"key2020121703062985900_b6","unstructured":"Baker, W. (2000), Achieving Success Through Social Capital , Jossey-Bass, San Francisco, CA."},{"key":"key2020121703062985900_b8","doi-asserted-by":"crossref","unstructured":"Beyer, J.M. and Hannah, D.R. (2002), \u201cBuilding on the past: enacting established personal identities in a new work setting\u201d, Organization Science , Vol. 13 No. 6, pp. 636-652.","DOI":"10.1287\/orsc.13.6.636.495"},{"key":"key2020121703062985900_b9","doi-asserted-by":"crossref","unstructured":"Brewer, M.B. and Gardner, W. (1996), \u201cWho is this \u2018we\u2019? Levels of collective identity and self representations\u201d, Journal of Personality and Social Psychology , Vol. 71 No. 1, pp. 83-93.","DOI":"10.1037\/0022-3514.71.1.83"},{"key":"key2020121703062985900_b10","doi-asserted-by":"crossref","unstructured":"Burt, R.S. (2000), \u201cThe network structure of social capital\u201d, Research in Organizational Behavior , Vol. 22, pp. 345-423.","DOI":"10.1016\/S0191-3085(00)22009-1"},{"key":"key2020121703062985900_b11","doi-asserted-by":"crossref","unstructured":"Carlsen, A. (2008), \u201cPositive dramas: enacting self-adventures in organizations\u201d, Journal of Positive Psychology , Vol. 3 No. 1, pp. 55-75.","DOI":"10.1080\/17439760701751061"},{"key":"key2020121703062985900_b12","doi-asserted-by":"crossref","unstructured":"Cheng, C. , Sanchez-Burks, J. and Lee, F. (2008), \u201cConnecting the dots within: creative performance and identity integration\u201d, Psychological Science , Vol. 19 No. 11, pp. 1178-1184.","DOI":"10.1111\/j.1467-9280.2008.02220.x"},{"key":"key2020121703062985900_b13","doi-asserted-by":"crossref","unstructured":"Chreim, S. , Williams, B.B. and Hinings, C.B. (2007), \u201cInterlevel influences on the reconstruction of professional role identity\u201d, Academy of Management Journal , Vol. 50 No. 6, pp. 1515-1539.","DOI":"10.5465\/amj.2007.28226248"},{"key":"key2020121703062985900_b79","doi-asserted-by":"crossref","unstructured":"Clarke, C.A. , Brown, A.D. and Hailey, V.H. (2009), \u201cWorking identities? Antagonistic discursive resources and managerial identity\u201d, Human Relations , Vol. 62 No. 3, pp. 323-352.","DOI":"10.1177\/0018726708101040"},{"key":"key2020121703062985900_b14","doi-asserted-by":"crossref","unstructured":"Cohen-Scali, V. (2003), \u201cThe influence of family, social, and work socialization on the construction of the professional identity of young adults\u201d, Journal of Career Development , Vol. 29 No. 4, pp. 237-249.","DOI":"10.1177\/089484530302900402"},{"key":"key2020121703062985900_b15","doi-asserted-by":"crossref","unstructured":"Cross, S.E. and Vick, N.V. (2001), \u201cThe interdependent self-construal and social support: the case of persistence in engineering\u201d, Personality and Social Psychology Bulletin , Vol. 27 No. 7, pp. 820-832.","DOI":"10.1177\/0146167201277005"},{"key":"key2020121703062985900_b16","doi-asserted-by":"crossref","unstructured":"Dahlgren, M.A. , Hult, H. , Dahlgren, L.O. , af Segerstad, H.H. and Johansson, K. (2006), \u201cFrom senior student to novice worker: learning trajectories in political science, psychology and mechanical engineering\u201d, Studies in Higher Education , Vol. 31 No. 5, pp. 569-586.","DOI":"10.1080\/03075070600923400"},{"key":"key2020121703062985900_b80","doi-asserted-by":"crossref","unstructured":"Day, J. (2007), \u201cStrangers on the train: the relationship of the IT department with the rest of the business\u201d, Information Technology & People , Vol. 20 No. 1, pp. 6-31.","DOI":"10.1108\/09593840710730536"},{"key":"key2020121703062985900_b17","unstructured":"Denzin, N.K. and Lincoln, Y.S. (Eds) (2000), Handbook of Qualitative Research , 2nd ed., Sage, Thousand Oaks, CA."},{"key":"key2020121703062985900_b18","doi-asserted-by":"crossref","unstructured":"Dickie, V.A. (2003), \u201cEstablishing worker identity: a study of people in craft work\u201d, American Journal of Occupational Therapy , Vol. 57 No. 3, pp. 250-261.","DOI":"10.5014\/ajot.57.3.250"},{"key":"key2020121703062985900_b19","doi-asserted-by":"crossref","unstructured":"Duliba, K.A. and Baroudi, J. (1991), \u201cIS personnel: do they form an occupational community?\u201d, ACM SIGCPR Computer Personnel , Vol. 13 No. 2, pp. 24-35.","DOI":"10.1145\/122393.122396"},{"key":"key2020121703062985900_b20","unstructured":"Dutton, J.E. , Roberts, L.M. and Bednar, J. (2010), \u201cPathways for positive identity construction at work: four types of positive identity and the building of social resource\u201d, Academy of Management Review , Vol. 35 No. 2, pp. 265-293."},{"key":"key2020121703062985900_b81","doi-asserted-by":"crossref","unstructured":"Dutton, J.E. , Worline, M.C. , Frost, P.J. and Lilius, J. (2006), \u201cExplaining compassion organizing\u201d, Administrative Science Quarterly , Vol. 51 No. 1, pp. 59-96.","DOI":"10.2189\/asqu.51.1.59"},{"key":"key2020121703062985900_b21","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. (1989), \u201cBuilding theories from case study research\u201d, Academy of Management Review , Vol. 14 No. 4, pp. 532-550.","DOI":"10.5465\/amr.1989.4308385"},{"key":"key2020121703062985900_b22","doi-asserted-by":"crossref","unstructured":"Ely, R. and Thomas, D.A. (2001), \u201cCultural diversity at work: the effects of diversity perspectives on work group processes and outcomes\u201d, Administrative Science Quarterly , Vol. 46 No. 2, pp. 229-273.","DOI":"10.2307\/2667087"},{"key":"key2020121703062985900_b82","doi-asserted-by":"crossref","unstructured":"Fendt, J. and Sachs, W. (2008), \u201cGrounded theory method in management research users\u2019 perspectives\u201d, Organizational Research Methods , Vol. 11 No. 3, pp. 430-455.","DOI":"10.1177\/1094428106297812"},{"key":"key2020121703062985900_b23","doi-asserted-by":"crossref","unstructured":"Gecas, V. (1982), \u201cThe self-concept\u201d, Annual Review of Sociology , Vol. 8, pp. 1-33.","DOI":"10.1146\/annurev.so.08.080182.000245"},{"key":"key2020121703062985900_b24","doi-asserted-by":"crossref","unstructured":"Gioia, D.A. and Thomas, J.B. (1996), \u201cInstitutional identity, image, and issue interpretation: sensemaking during strategic change in academia\u201d, Administrative Science Quarterly , Vol. 41 No. 3, pp. 370-403.","DOI":"10.2307\/2393936"},{"key":"key2020121703062985900_b83","doi-asserted-by":"crossref","unstructured":"Gioia, D.A. , Price, K.N. , Hamilton, A.L. and Thomas, J.B. (2010), \u201cForging an identity: an insider-outsider study of processes involved in the formation of organizational identity\u201d, Administrative Science Quarterly , Vol. 55 No. 1, pp. 1-46.","DOI":"10.2189\/asqu.2010.55.1.1"},{"key":"key2020121703062985900_b25","doi-asserted-by":"crossref","unstructured":"Glaser, B. and Strauss, A.L. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research , Aldine, Chicago, IL.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"key2020121703062985900_b84","doi-asserted-by":"crossref","unstructured":"Gupta, P. (2001), \u201cGrowth scenario of IT industries in India\u201d, Communications of the ACM , Vol. 44 No. 7, pp. 40-41.","DOI":"10.1145\/379300.379308"},{"key":"key2020121703062985900_b28","doi-asserted-by":"crossref","unstructured":"Guzman, I.R. and Stanton, J.M. (2009), \u201cIT occupational culture: the cultural fit and commitment of new information technologists\u201d, Information Technology & People , Vol. 22 No. 2, pp. 157-187.","DOI":"10.1108\/09593840910962212"},{"key":"key2020121703062985900_b29","doi-asserted-by":"crossref","unstructured":"Hall, D. (1968), \u201cIdentity changes during an academic role transition\u201d, School Review , Vol. 76 No. 4, pp. 445-469.","DOI":"10.1086\/442856"},{"key":"key2020121703062985900_b301","doi-asserted-by":"crossref","unstructured":"Hall, D. (1995), \u201cUnplanned executive transitions and the dance of the sub identities\u201d, Human Resource Management , Vol. 34 No. 1, pp. 71-92.","DOI":"10.1002\/hrm.3930340106"},{"key":"key2020121703062985900_b30","doi-asserted-by":"crossref","unstructured":"Hall, D.T. , Zhu, G. and Yan, A. (2002), \u201cCareer creativity as protean identity transformation\u201d, in Peiperl, M.A. , Arthur, M.B. and Anand, N. (Eds), Career Creativity , Oxford University Press, Oxford, pp. 159-179.","DOI":"10.1093\/oso\/9780199248711.003.0009"},{"key":"key2020121703062985900_b31","doi-asserted-by":"crossref","unstructured":"Hallier, J. and Summers, J. (2011), \u201cDilemmas and outcomes of professional identity construction among students of human resource management\u201d, Human Resource Management Journal , Vol. 21 No. 2, pp. 204-219.","DOI":"10.1111\/j.1748-8583.2010.00132.x"},{"key":"key2020121703062985900_b33","doi-asserted-by":"crossref","unstructured":"Higgins, M. and Kram, K. (2001), \u201cReconceptualizing mentoring at work: a developmental network perspective\u201d, Academy of Management Review , Vol. 26 No. 2, pp. 264-288.","DOI":"10.5465\/amr.2001.4378023"},{"key":"key2020121703062985900_b34","doi-asserted-by":"crossref","unstructured":"Hobfoll, S.E. (1989), \u201cConservation of resources: a new attempt at conceptualizing stress\u201d, American Psychologist , Vol. 44 No. 3, pp. 513-524.","DOI":"10.1037\/0003-066X.44.3.513"},{"key":"key2020121703062985900_b37","doi-asserted-by":"crossref","unstructured":"Ibarra, H. (1999), \u201cProvisional selves: experimenting with image and identity in professional adaptation\u201d, Administrative Science Quarterly , Vol. 44 No. 4, pp. 764-791.","DOI":"10.2307\/2667055"},{"key":"key2020121703062985900_b85","doi-asserted-by":"crossref","unstructured":"Igbaria, M. , Greenhaus, J.H. and Parasuraman, S. (1991), \u201cCareer orientations of MIS employees: an empirical analysis\u201d, MIS quarterly , Vol. 15 No. 2, pp. 151-169.","DOI":"10.2307\/249376"},{"key":"key2020121703062985900_b39","unstructured":"Iivari, J. , Hirschheim, R. and Klein, H.K. (2001), \u201cTowards more professional information systems development: ISD as knowledge work\u201d, Proceedings of European Conference on Information Systems, Bled, June , pp. 1025-1036."},{"key":"key2020121703062985900_b40","doi-asserted-by":"crossref","unstructured":"Joseph, D. , Kok-Yee, N. , Koh, C. and Ang, S. (2007), \u201cTurnover of information technology professionals: a narrative review, meta-analytic structural equation modelling, and model development\u201d, MIS Quarterly , Vol. 31 No. 3, pp. 547-577.","DOI":"10.2307\/25148807"},{"key":"key2020121703062985900_b41","doi-asserted-by":"crossref","unstructured":"Judge, T.A. , Erez, A. and Bono, J.E. (1998), \u201cThe power of being positive: the relationship between positive self-concept and job performance\u201d, Human Performance , Vol. 11 Nos 2-3, pp. 167-187.","DOI":"10.1207\/s15327043hup1102&3_4"},{"key":"key2020121703062985900_b43","doi-asserted-by":"crossref","unstructured":"Kling, R. (2003), \u201cCritical professional education about information and communications technologies and social life\u201d, Information Technology & People , Vol. 16 No. 4, pp. 394-418.","DOI":"10.1108\/09593840310509635"},{"key":"key2020121703062985900_b42","unstructured":"Kroger, J. (2007), Identity Development: Adolescence Through Adulthood , Sage Publication, Thousand Oaks, CA."},{"key":"key2020121703062985900_b44","unstructured":"Kullasepp, K. (2006), \u201cIdentity construction of psychology students: professional role in the making\u201d, European Journal of School Psychology , Vol. 4 No. 2, pp. 251-282."},{"key":"key2020121703062985900_b86","doi-asserted-by":"crossref","unstructured":"Kunda, D. and Brooks, L. (2000), \u201cIdentifying and classifying processes (traditional and soft factors) that support COTS component selection: a case study\u201d, European Journal of Information Systems , Vol. 9 No. 4, pp. 226-234.","DOI":"10.1057\/palgrave.ejis.3000376"},{"key":"key2020121703062985900_b87","doi-asserted-by":"crossref","unstructured":"Kwon, K. , Bae, J. and Lawler, J.J. (2010), \u201cHigh commitment HR practices and top performers: impacts on organizational commitment\u201d, Management International Review , Vol. 50 No. 1, pp. 57-81.","DOI":"10.1007\/s11575-009-0023-6"},{"key":"key2020121703062985900_b46","doi-asserted-by":"crossref","unstructured":"Ladge, J.J. , Clair, J.A. and Greenberg, D. (2012), \u201cCross-domain identity transition during liminal periods: constructing multiple selves as professional and mother during pregnancy\u201d, Academy of Management Journal , Vol. 55 No. 6, pp. 1449-1471.","DOI":"10.5465\/amj.2010.0538"},{"key":"key2020121703062985900_b47","doi-asserted-by":"crossref","unstructured":"Lee, J.D. (2002), \u201cMore than ability: gender and personal relationships influence science and technology involvement\u201d, Sociology of Education , Vol. 75 No. 4, pp. 349-373.","DOI":"10.2307\/3090283"},{"key":"key2020121703062985900_b48","doi-asserted-by":"crossref","unstructured":"Lincoln, Y.S. and Guba, E.G. (2002), \u201cJudging the quality of case study reports\u201d, in Huberman, A.M. and Matthews, M.B. (Eds), The Qualitative Researcher\u2019s Companion , Sage, Thousand Oaks, CA, pp. 205-216.","DOI":"10.4135\/9781412986274.n9"},{"key":"key2020121703062985900_b88","doi-asserted-by":"crossref","unstructured":"Lings, B. and Lundell, B. (2005), \u201cOn the adaptation of grounded theory procedures: insights from the evolution of the 2G method\u201d, Information Technology & People , Vol. 18 No. 3, pp. 196-211.","DOI":"10.1108\/09593840510615842"},{"key":"key2020121703062985900_b49","doi-asserted-by":"crossref","unstructured":"Mael, F.A. and Tetrick, L.E. (1992), \u201cIdentifying organizational identification\u201d, Educational and Psychological Measurement , Vol. 52 No. 4, pp. 813-824.","DOI":"10.1177\/0013164492052004002"},{"key":"key2020121703062985900_b89","doi-asserted-by":"crossref","unstructured":"Morisio, M. , Romano, D. and Stamelos, I. (2002), \u201cQuality, productivity, and learning in framework-based development: an exploratory case study\u201d, Software Engineering, IEEE Transactions , Vol. 28 No. 9, pp. 876-888.","DOI":"10.1109\/TSE.2002.1033227"},{"key":"key2020121703062985900_b880","unstructured":"NASSCOM (2013), \u201cNational association of software and services companies\u201d, available at: www.nasscom.org\/indian-itbpo-industry (accessed March 8, 2013)."},{"key":"key2020121703062985900_b52","doi-asserted-by":"crossref","unstructured":"Nicholson, N. (1984), \u201cA theory of work role transitions\u201d, Administrative Science Quarterly , Vol. 29 No. 2, pp. 172-191.","DOI":"10.2307\/2393172"},{"key":"key2020121703062985900_b54","doi-asserted-by":"crossref","unstructured":"Orlikowski, W.J. and Baroudi, J.J. (1988), \u201cThe information systems profession: myth or reality?\u201d, Information Technology & People , Vol. 4 No. 1, pp. 13-30.","DOI":"10.1108\/eb022652"},{"key":"key2020121703062985900_b55","doi-asserted-by":"crossref","unstructured":"Pawlowski, S.D. , Kaganer, E.A. and Cater, J.J. (2007), \u201cFocusing the research agenda on burnout in IT: social representations of burnout in the profession\u201d, European Journal of Information Systems , Vol. 16 No. 5, pp. 612-627.","DOI":"10.1057\/palgrave.ejis.3000699"},{"key":"key2020121703062985900_b56","doi-asserted-by":"crossref","unstructured":"Piore, M.J. and Safford, S. (2006), \u201cChanging regimes of workplace governance, shifting axes of social mobilization, and the challenge to industrial relations theory\u201d, Industrial Relations , Vol. 45 No. 3, pp. 299-325.","DOI":"10.1111\/j.1468-232X.2006.00439.x"},{"key":"key2020121703062985900_b57","doi-asserted-by":"crossref","unstructured":"Pratt, M.G. (2000), \u201cThe good, the bad, and the ambivalent: managing identification among Amway distributors\u201d, Administrative Science Quarterly , Vol. 45 No. 3, pp. 456-493.","DOI":"10.2307\/2667106"},{"key":"key2020121703062985900_b58","doi-asserted-by":"crossref","unstructured":"Pratt, M.G. , Rockmann, K.W. and Kaufmann, J.B. (2006), \u201cConstructing professional identity: the role of work and identity learning cycles in the customization of identity among medical resident\u201d, Academy of Management Journal , Vol. 49 No. 2, pp. 235-262.","DOI":"10.5465\/amj.2006.20786060"},{"key":"key2020121703062985900_b59","doi-asserted-by":"crossref","unstructured":"Ragins, B. and Kram, K. (2007), The Handbook of Mentoring at Work: Theory, Research and Practice , Sage, Thousand Oaks, CA.","DOI":"10.4135\/9781412976619"},{"key":"key2020121703062985900_b90","doi-asserted-by":"crossref","unstructured":"Ramesh, B. , Pries-Heje, J. and Baskerville, R. (2002), \u201cInternet software engineering: a different class of process\u201d, Annals of Software Engineering , Vol. 14 Nos 1-4, pp. 169-195.","DOI":"10.1023\/A:1020557725165"},{"key":"key2020121703062985900_b60","doi-asserted-by":"crossref","unstructured":"Reid, A. , Dahlgren, L.O. , Petocz, P. and Dahlgren, M.A. (2008), \u201cIdentity and engagement for professional formation\u201d, Studies in Higher Education , Vol. 33 No. 6, pp. 729-742.","DOI":"10.1080\/03075070802457108"},{"key":"key2020121703062985900_b61","doi-asserted-by":"crossref","unstructured":"Russo, T.C. (1998), \u201cOrganizational and professional identification: a case of newspaper journalists\u201d, Management Communication Quarterly , Vol. 12 No. 1, pp. 72-111.","DOI":"10.1177\/0893318998121003"},{"key":"key2020121703062985900_b62","unstructured":"Schein, E.H. (1978), Career Dynamics. Matching Individual and Organizational Needs , Addison-Wesley, Reading, MA."},{"key":"key2020121703062985900_b91","doi-asserted-by":"crossref","unstructured":"Scott, L. , Carvalho, L. , Jeffery, R. , Ambra, J.D. and Becker-Kornstaedt, U. (2002), \u201cUnderstanding the use of an electronic process guide\u201d, Information and Software Technology , Vol. 44 No. 10, pp. 601-616.","DOI":"10.1016\/S0950-5849(02)00080-0"},{"key":"key2020121703062985900_b63","doi-asserted-by":"crossref","unstructured":"Shapiro, S. (1994), \u201cBoundaries and quandaries: establishing a professional context for IT\u201d, Information Technology & People , Vol. 7 No. 1, pp. 48-68.","DOI":"10.1108\/09593849410074025"},{"key":"key2020121703062985900_b64","doi-asserted-by":"crossref","unstructured":"Slay, H.S. and Smith, D.A. (2011), \u201cProfessional identity construction: using narrative to understand the negotiation of professional and stigmatized cultural identities\u201d, Human Relations , Vol. 65 No. 1, pp. 85-107.","DOI":"10.1177\/0018726710384290"},{"key":"key2020121703062985900_b65","doi-asserted-by":"crossref","unstructured":"Smith, A.E. and Hatmaker, D.M. (2014), \u201cKnowing, doing, and becoming: professional identity construction among public affairs doctoral students\u201d, Journal of Public Affairs Education , Vol. 20 No. 4, pp. 545-564.","DOI":"10.1080\/15236803.2014.12001807"},{"key":"key2020121703062985900_b66","doi-asserted-by":"crossref","unstructured":"Sveningsson, S. and Alvesson, M. (2003), \u201cManaging managerial identities: organizational fragmentation, discourse and identity struggle\u201d, Human Relations , Vol. 56 No. 10, pp. 1163-1193.","DOI":"10.1177\/00187267035610001"},{"key":"key2020121703062985900_b92","doi-asserted-by":"crossref","unstructured":"Sweitzer, V.B. (2009), \u201cTowards a theory of doctoral student professional identity development: a developmental networks approach\u201d, The Journal of Higher Education , Vol. 80 No. 1, pp. 1-33.","DOI":"10.1080\/00221546.2009.11772128"},{"key":"key2020121703062985900_b69","unstructured":"Trice, S.M. and Bayer, J.M. (1993), The Cultures of Work Organizations , Prentice Hall, Englewood Cliff, NJ."},{"key":"key2020121703062985900_b70","unstructured":"Turner, J.C. (1982), \u201cToward a cognitive redefinition of the social group\u201d, in Tajfel, H. (Ed.), Social Identity and Intergroup Relations , Cambridge University Press, Cambridge, pp. 15-40."},{"key":"key2020121703062985900_b72","unstructured":"Van Maanen, J. (1997), \u201cIdentity work: notes on the personal identity of police officers\u201d, working paper, Massachusetts Institute of Technology, Cambridge, MA."},{"key":"key2020121703062985900_b74","unstructured":"Van Maanen, J. and Barley, S.R. (1984), \u201cOccupational communities: culture and control in organizations\u201d, in Staw, B.M. and Cummings, L.L. (Eds), Research in Organizational Behavior , Vol. 6, JAI Press, Greenwich, CT, pp. 287-365."},{"key":"key2020121703062985900_b73","unstructured":"Van Maanen, J. and Schein, E. (1979), \u201cTowards a theory of organizational socialization\u201d, in Staw, B.M. (Ed.), Research in Organizational Behavior , JAI Press, Greenwich, CT, pp. 209-264."},{"key":"key2020121703062985900_b76","doi-asserted-by":"crossref","unstructured":"Watson, C. (2006), \u201cNarratives of practice and the construction of identity in teaching\u201d, Teachers and Teaching: Theory and Practice , Vol. 12 No. 5, pp. 509-526.","DOI":"10.1080\/13540600600832213"},{"key":"key2020121703062985900_b77","unstructured":"Weick, K.E. (1995), Sense Making in Organizations , Sage, Thousand Oaks, CA."},{"key":"key2020121703062985900_b78","doi-asserted-by":"crossref","unstructured":"Wiles, F. (2013), \u201c\u2018Not easily put into a box\u2019: constructing professional identity\u201d, Social Work Education , Vol. 32 No. 7, pp. 854-866.","DOI":"10.1080\/02615479.2012.705273"},{"key":"key2020121703062985900_frd1","doi-asserted-by":"crossref","unstructured":"Agarwal, R. and Ferratt, T.W. (2002), \u201cEnduring practices for managing IT professionals\u201d, Communications of the ACM , Vol. 45 No. 9, pp. 73-79.","DOI":"10.1145\/567498.567502"},{"key":"key2020121703062985900_frd2","doi-asserted-by":"crossref","unstructured":"Arthur, M.B. , Inkson, K. and Pringle, J.K. (1999), The New Careers: Individual Action and Economic Change , Sage, London.","DOI":"10.4135\/9781446218327"},{"key":"key2020121703062985900_frd3","doi-asserted-by":"crossref","unstructured":"Bai, L. (1998), \u201cMonetary reward versus the national ideological agenda: career choice among Chinese university students\u201d, Journal of Moral Education , Vol. 27 No. 4, pp. 525-541.","DOI":"10.1080\/0305724980270406"},{"key":"key2020121703062985900_frd4","doi-asserted-by":"crossref","unstructured":"Beech, N. , MacIntosh, R. and McInnes, P. (2008), \u201cIdentity work: processes and dynamics of identity formations\u201d, International Journal of Public Administration , Vol. 31 No. 9, pp. 957-970.","DOI":"10.1080\/01900690801920411"},{"key":"key2020121703062985900_frd5","doi-asserted-by":"crossref","unstructured":"Gloria, A.M. and Hird, J.S. (1999), \u201cInfluences of ethnic and nonethnic variables on the career decision-making self-efficacy of college students\u201d, The Career Development Quarterly , Vol. 48 No. 2, pp. 157-174.","DOI":"10.1002\/j.2161-0045.1999.tb00282.x"},{"key":"key2020121703062985900_frd6","doi-asserted-by":"crossref","unstructured":"Greil, A.L. and Rudy, D.R. (1984), \u201cSocial cocoons: encapsulation and identity transformation in organizations\u201d, Sociological Inquiry , Vol. 54 No. 3, pp. 260-278.","DOI":"10.1111\/j.1475-682X.1984.tb00060.x"},{"key":"key2020121703062985900_frd7","doi-asserted-by":"crossref","unstructured":"Heckman, D.R. , Bigley, G.A. , Steensma, H.K. and Hereford, J.F. (2009), \u201cCombined effects of organizational and professional identification on the reciprocity dynamic for professional employees\u201d, Academy of Management Journal , Vol. 52 No. 3, pp. 506-526.","DOI":"10.5465\/amj.2009.41330897"},{"key":"key2020121703062985900_frd8","unstructured":"Hofstede, G. (1980), Culture\u2019s Consequences: International Differences in Work-Related Values , Sage Publications, Beverly Hills, CA."},{"key":"key2020121703062985900_frd9","unstructured":"Holland, J.L. (1997), Making Vocational Choices: A Theory of Vocational Personalities and Work Environments , 3rd ed., Psychological Assessment Resources, Odessa, FL."},{"key":"key2020121703062985900_frd10","unstructured":"Ibarra, H. (2005), \u201cIdentity transitions: possible selves, liminality and the dynamics of career change\u201d, working paper, INSEAD: Faculty and Research Working Paper, Fontainebleau, pp. 1-57."},{"key":"key2020121703062985900_frd11","doi-asserted-by":"crossref","unstructured":"Kwan, V.S.Y. , Bond, M.H. and Singelis, T.M. (1997), \u201cPan-cultural explanations for life-satisfaction: adding relationship harmony to self-esteem\u201d, Journal of Personality and Social Psychology , Vol. 73 No. 5, pp. 1038-1051.","DOI":"10.1037\/0022-3514.73.5.1038"},{"key":"key2020121703062985900_frd12","doi-asserted-by":"crossref","unstructured":"Mau, W. and Bikos, L.H. (2000), \u201cEducational and vocational aspirations of minority and female students: a longitudinal study\u201d, Journal of Counseling & Development , Vol. 78 No. 2, pp. 186-194.","DOI":"10.1002\/j.1556-6676.2000.tb02577.x"},{"key":"key2020121703062985900_frd14","doi-asserted-by":"crossref","unstructured":"Niederman, F. , Sumner, M. and Maertz, C.P. (2007), \u201cTesting and extending the unfolding model of voluntary turnover to IT professionals\u201d, Human Resource Management , Vol. 46 No. 3, pp. 331-347.","DOI":"10.1002\/hrm.20167"},{"key":"key2020121703062985900_frd15","unstructured":"Swanson, J.L. and Gore, P.A. Jr (2000), \u201cAdvances in vocational psychology theory and research\u201d, in Brown, S.D. and Lent, R.W. (Eds), Handbook of Counseling Psychology , Wiley, New York, NY, pp. 233-269."},{"key":"key2020121703062985900_frd16","doi-asserted-by":"crossref","unstructured":"Tracey, T.J.G. and Hopkins, N. (2001), \u201cCorrespondence of interests and abilities with occupational choice\u201d, Journal of Counseling Psychology , Vol. 48 No. 2, pp. 178-189.","DOI":"10.1037\/0022-0167.48.2.178"},{"key":"key2020121703062985900_frd18","unstructured":"Von-Dran, R.F. (2004), \u201cPutting the \u2018I\u2019 in IT education\u201d, EDUCAUSE Review , Vol. 39 No. 2, pp. 8-9."}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ITP-10-2013-0181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-10-2013-0181\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-10-2013-0181\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:55:40Z","timestamp":1753394140000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/29\/1\/146-172\/182559"}},"subtitle":["A study in India"],"editor":[{"given":"Helen","family":"Hasan and Henry Linger","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2016,3,7]]},"references-count":92,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3,7]]}},"alternative-id":["10.1108\/ITP-10-2013-0181"],"URL":"https:\/\/doi.org\/10.1108\/itp-10-2013-0181","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2016,3,7]]}}}