440 resultados para gender identity
Resumo:
Socio-economic gradients in cardiovascular disease (CVD) and diabetes have been found throughout the developed world and there is some evidence to suggest that these gradients may be steeper for women. Research on social gradients in biological risk factors for CVD and diabetes has received less attention and we do not know the extent to which gradients in biomarkers vary for men and women. We examined the associations between two indicators of socio-economic position (education and household income) and biomarkers of diabetes and cardiovascular disease (CVD) for men and women in a national, population-based study of 11,247 Australian adults. Multi-level linear regression was used to assess associations between education and income and glucose tolerance, dyslipidaemia, blood pressure (BP) and waist circumference before and after adjustment for behaviours (diet, smoking, physical activity, TV viewing time, and alcohol use). Measures of glucose tolerance included fasting plasma glucose and insulin and the results of a glucose tolerance test (2 h glucose) with higher levels of each indicating poorer glucose tolerance. Triglycerides and High Density Lipoprotein (HDL) Cholesterol were used as measures of dyslipidaemia with higher levels of the former and lower levels of the later being associated with CVD risk. Lower education and low income were associated with higher levels of fasting insulin, triglycerides and waist circumference in women. Women with low education had higher systolic and diastolic BP and low income women had higher 2 h glucose and lower HDL cholesterol. With only one exception (low income and systolic BP), all of these estimates were reduced by more than 20% when behavioural risk factors were included. Men with lower education had higher fasting plasma glucose, 2 h glucose, waist circumference and systolic BP and, with the exception of waist circumference, all of these estimates were reduced when health behaviours were included in the models. While low income was associated with higher levels of 2-h glucose and triglycerides it was also associated with better biomarker profiles including lower insulin, waist circumference and diastolic BP. We conclude that low socio-economic position is more consistently associated with a worse profile of biomarkers for CVD and diabetes for women.
Resumo:
The topics of corruption and tax evasion have attracted significant attention in the literature in recent years. We build on that literature by investigating empirically: (1) whether attitudes toward corruption and tax evasion vary systematically with gender and (2) whether gender differences decline as men and women face similar opportunities for illicit behavior. We use data on eight Western European countries from the World Values Survey and the European Values Survey. The results reveal significantly greater aversion to corruption and tax evasion among women. This holds across countries and time, and across numerous empirical specifications. (JEL H260, D730, J160, Z130)
Resumo:
Demography theory suggests that high gender diversity leads to high turnover. As turnover is costly for organizations, we examined whether HR policies and practices influence the expected gender diversity-turnover relationship. Survey data were collected from 198 HR decision makers at publicly listed organizations. We found that HR policies and practices that are supportive of diversity moderate the gender diversity-turnover relationship, such that high gender diversity leads to low turnover in organizations with many diversity supportive policies and practices. Results suggest that organizations can avoid the negative consequences of high gender diversity by implementing diversity supportive HR polices and practices.
Resumo:
Purpose The purpose of the paper is to analyze the low status of women as being a major contributor for the observed gender inequality in the spread of HIV/AIDS in India. Design/methodology/approach The paper uses data from National Aids Control Organization (NACO), National Family Health Survey (NFHS 3), and the Directorate of Economics and Statistics. Findings This study highlights the problems facing women in deterring the spread of HIV/AIDS in India. The status and empowerment of women are important variables in combating the disease among both men and women in India. Literacy, education, exposure to the media, labor market participation, awareness of HIV/AIDS, and economic independence are important considerations in improving the status of women in India. Policymakers need to focus on gender inequality in order to combat the spread of HIV/AIDS in India. Originality/value While absolute figures indicate men are more likely to be infected with HIV/AIDS, the rate of decline is higher for men compared to women in India. We explore several plausible explanations for such observed inequality in the spread of HIV/AIDS across gender. In particular, a potentially important factor - the low status of women in society is attributable as an impediment to the spread of the disease. A case study of the relationship between gender empowerment and the spread of HIV/AIDS in the state with the highest concentration, Manipur, provides more insight to the difficulties faced by women in combating HIV/AIDS in India.
Resumo:
The purpose of this study was to compare the amount of exercise prescribed with the amount completed between two different modes of training intervention and between the sexes. Thirty-two men (mean age = 39.1 years, body mass index = 32.9 kg · m-2) and women (mean age = 39.6 years, body mass index = 32.1 kg · m-2) were prescribed traditional resistance training or light-resistance circuit training for 16 weeks. Lean mass and fat mass were determined by dual-energy X-ray absorptiometry at weeks 1 and 16. A completion index was calculated to provide a measure of the extent to which participants completed exercise training relative to the amount of exercise prescribed. The absolute amount of exercise completed by the circuit training group was significantly greater than the amount prescribed (P < 0.0001). The resistance training group consistently under-completed relative to the amount prescribed, but the difference was not significant. The completion index for the circuit training group (26 ± 21.7%) was significantly different from that of the resistance training group (-7.4 ± 3.0%). The completion index was not significantly different between men and women in either group. These data suggest that overweight and obese individuals participating in light-resistance circuit training complete more exercise than is prescribed. Men and women do not differ in the extent to which they over- or under-complete prescribed exercise.
Resumo:
Studies of gender and politics have typically been studies of women and politics. In contrast, this paper places men at the centre of its inquiry by drawing on interviews with 15 current federal male politicians. Of concern is exploring the ways in which men conceptualise the question of gender equity in the Australian parliament. Three frameworks are identified in the men's narratives. These are that the parliament is a masculinised space but that this is unavoidable; that the parliament is now feminised and women are advantaged; and that the parliament is gender neutral and gender is irrelevant. It is argued that collectively these framing devices operate to mask the many constraints which exist to marginalise women from political participation and undermine attempts to address women's political disadvantage as political participants. The paper concludes by highlighting the significance of the paper beyond the Australian context and calling for further research which names and critiques political men and their discourses on gender and parliamentary practices and processes.
Resumo:
This paper examines Australian media representations of the male managers of two global mining corporations, Rio Tinto and BHP Billiton. These organizations are transnational (or multinational) corporations with assets and/or operations across national boundaries (Dunning and Lundan, 2008), and indeed their respective Chief Executive Officers, Tom Albanese and Marius Kloppers are two of the most economically (and arguably politically) powerful in the world overseeing 37 000 and 39 000 employees internationally. With a 2008 profit of US$15.962 billion and assets of US$ 75.889 Billion BHP Billiton is the world's largest mining company. In terms of its profits and assets Rio Tinto ranks fourth in the world, but with operations in six countries (mainly Canada and Australia) and a 2008 profit of US$10.3 billion it is also emblematic of the transnational in that its ‘budget is larger than that of all but a few nations’ (Giddens, 2003, p. 62).
Resumo:
Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.
Resumo:
Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.
Resumo:
This paper reads Ray Lawrence's film Jindabyne (2006) in order to consider how "Australian" connotes as "immigrant" or "Indigenous" in contemporary Australia. Although the film is an adaptation of an American short story, it exploits an existing grammar of place in Australian cultural production in order to interrogate this very culture. If questions of race, gender, and class have haunted post-settlement Australia, Lawrence's film simultaneously stages these spectres and gestures towards the necessary failure of any attempt to exorcise them in a place where indigeneity is invisible. Thus, the location of Jindabyne, the town drowned in the name of progress, offers an exemplary visual metaphor for the failed project of identity formation in a place where forgetting is a survival tool.
Resumo:
The purpose of this study is to contribute to the cross-disciplinary body of literature of identity and organisational culture. This study empirically investigated the Hatch and Schultz (2002) Organisational Identity Dynamics (OID) model to look at linkages between identity, image, and organisational culture. This study used processes defined in the OID model as a theoretical frame by which to understand the relationships between actual and espoused identity manifestations across visual identity, corporate identity, and organisational identity. The linking processes of impressing, mirroring, reflecting, and expressing were discussed at three unique levels in the organisation. The overarching research question of How does the organisational identity dynamics process manifest itself in practice at different levels within an organisation? was used as a means of providing empirical understanding to the previously theoretical OID model. Case study analysis was utilised to provide exploratory data across the organisational groups of: Level A - Senior Marketing and Corporate Communications Management, Level B - Marketing and Corporate Communications Staff, and Level C - Non-Marketing Managers and Employees. Data was collected via 15 in-depth interviews with documentary analysis used as a supporting mechanism to provide triangulation in analysis. Data was analysed against the impressing, mirroring, reflecting, and expressing constructs with specific criteria developed from literature to provide a detailed analysis of each process. Conclusions revealed marked differences in the ways in which OID processes occurred across different levels with implications for the ways in which VI, CI, and OI interact to develop holistic identity across organisational levels. Implications for theory detail the need to understand and utilise cultural understanding in identity programs as well as the value in developing identity communications which represent an actual rather than an espoused position.
Resumo:
Little is known about the psychological underpinnings of young people’s mobile phone behaviour. In the present research, 292 young Australians, aged 16–24 years, completed an online survey assessing the effects of self-identity, in-group norm, the need to belong, and self-esteem on their frequency of mobile phone use and mobile phone involvement, conceptualised as people’s degree of cognitive and behavioural association with their mobile phone. Structural equation modelling revealed that age (younger) and self-identity significantly predicted the frequency of mobile phone use. In contrast, age (younger), gender (female), self-identity and in-group norm predicted young people’s mobile phone involvement. Neither self-esteem nor the need to belong significantly predicted mobile phone behaviour. The present study contributes to our understanding of this phenomenon and provides an indication of the characteristics of young people who may become highly involved with their mobile phone.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Background: A number of studies have examined the relationship between high ambient temperature and mortality. Recently, concern has arisen about whether this relationship is modified by socio-demographic factors. However, data for this type of study is relatively scarce in subtropical/tropical regions where people are well accustomed to warm temperatures. Objective: To investigate whether the relationship between daily mean temperature and daily all-cause mortality is modified by age, gender and socio-economic status (SES) in Brisbane, Australia. Methods: We obtained daily mean temperature and all-cause mortality data for Brisbane, Australia during 1996–2004. A generalised additive model was fitted to assess the percentage increase in all deaths with every one degree increment above the threshold temperature. Different age, gender and SES groups were included in the model as categorical variables and their modification effects were estimated separately. Results: A total of 53,316 non-external deaths were included during the study period. There was a clear increasing trend in the harmful effect of high temperature on mortality with age. The effect estimate among women was more than 20 times that among men. We did not find an SES effect on the percent increase associated with temperature. Conclusions: The effects of high temperature on all deaths were modified by age and gender but not by SES in Brisbane, Australia.