The irreducible epistemic atoms underlying the curriculum. 4,828 atoms across 8 types and 2 molecules
When identity and behavior diverge, consciously register each identity-consistent behavior as a vote for the updated narrative rather than waiting for the self-perception system to passively accumulate evidence.
Deliberately expose yourself to reference groups where the target behavior is normative to accelerate identity-behavior alignment.
Identify and evaluate the implicit behavioral prototypes broadcast by each of your groups, then increase engagement with aligned groups and create distance from misaligned ones.
Job crafting — actively reshaping your tasks, relationships, and cognitive framing — brings work into closer alignment with professional identity when you cannot change roles.
Construct professional identity through legitimate peripheral participation in communities of practice rather than through credentials or aspirational labeling.
Perform the target behavior before feeling the corresponding identity, because identity follows from accumulated behavioral evidence rather than preceding it.
Insert a single contradicting behavioral data point with conscious reinterpretation to create a competing loop that can gradually replace a vicious identity-behavior cycle.
Pre-commit to blameless investigation protocols that frame incidents as 'what happened?' rather than 'who failed?' to prevent defensive filtering during root cause analysis.
Construct a sense of coherence (comprehensibility, manageability, meaningfulness) as the identity infrastructure that metabolizes adversity into manageable challenges.
When facing ambiguous decisions, consult your identity rather than deliberating from first principles—ask 'What would a person with my declared identity do?' to convert complex decisions into consistency checks.
Treat identity as a compass providing direction rather than a rigid script dictating exact actions—the compass should narrow possible choices without collapsing them to a single prescribed behavior.
Externalize identity grief through deliberate mourning rather than cognitive bypass—shedding an outdated identity requires experiencing the loss of self-concept, social belonging, and narrative continuity, not optimizing it away.
Trace identity origins through archaeological excavation—identify when you first adopted each identity, what situational demand it met, and what it cost you then versus now to separate contextual adaptation from permanent truth.
Test values for authenticity by applying the anonymity filter—imagine no one would ever know your choice, and observe which values remain versus which require an audience to feel genuine.
Prune identity statements disconnected from authentic values even when they produce consistent behavior—identities serving anxiety management rather than genuine values consume resources without serving the authentic self.
Request AI analysis of the gap between espoused identity and theory-in-use—external systems can detect patterns of declining behavioral evidence that self-serving bias causes you to normalize incrementally.
Request AI reflection of the person behavioral evidence describes rather than the person you aspire to be—external mirrors ground integrity assessment in data rather than narrative or hope.
Design behavioral systems with explicit fallback modes for predictable categories of disruption rather than assuming stable conditions will persist.
Break interpretive narratives into observable facts and acknowledged inferences to separate what occurred from what you constructed around it.
Audit behavioral systems for contextual dependencies before disruption occurs, as the number and type of dependencies predict fragility under specific disruption categories.
Reduce activation energy of habits to near-zero for fallback versions, as disruption depletes the cognitive resources required to overcome high initiation costs.
Design modular routines where each component can execute independently, as monolithic chains create cascading failure when any single element is disrupted.
Identify the essential function each routine serves and design minimum viable versions that preserve that function with minimal infrastructure, rather than compressing the same activities into less time.
Pre-design and test minimum viable routines during periods of abundant cognitive resources, as depleted capacity during disruption prevents effective real-time adaptation.