48 resultados para Hostile Sexism


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A wireless sensor network collected real-time water-quality measurements to investigate how current irrigation practices—in particular, underground water salination—affect the environment. New protocols provided high end-to-end packet delivery rates in the hostile deployment environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Decade after decade, violence against women has gained more attention from scholars, policy makers, and the general public. Social scientists in particular have contributed significant empirical and theoretical understandings to this issue. Strikingly, scant attention has focused on the victimization of women who want to leave their hostile partners. This groundbreaking work challenges the perception that rural communities are safe havens from the brutality of urban living. Identifying hidden crimes of economic blackmail and psychological mistreatment, and the complex relationship between patriarchy and abuse, Walter S. DeKeseredy and Martin D. Schwartz propose concrete and effective solutions, giving voice to women who have often suffered in silence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article is based on an analysis of narratives of 26 offenders with mental health problems living in the United Kingdom. It explores the impact of an ascribed dangerous status and the construction of the self as moral and responsible in response to this label with reference to the literature on denial, deviance disavowal and other “techniques of neutralization” and Goffman's presentation of self. Two dominant strands are identified in relation to the construction of moral self-hood: “Not my fault” and “Good at heart” narratives. “Techniques of neutralization” are widely drawn on, particularly denial of responsibility in the “Not my fault” narratives that seek to explain anti-social behavior with reference to external forces such as a hostile environment inhibiting their ability to control their lives. In contrast, “Good at heart” narratives draw on the essentially good and moral nature of the inner-self. Both are used as evidence of sharing and adhering to moral norms in order to present an acceptable and credible self.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Relocated people habitually seek the familiar within their new social milieus as a means of easing their transition into ways strange and alien. However, from networks and food to everyday customs, efforts to hold on to such home comforts are often viewed with a measure of hostile disdain and regarded as preludes to the formation of ethnic enclaves. Through a pilot study on the access of satellite television by mainland Chinese migrants in Perth, Western Australia, this chapter seeks to shed some light on how migrants understand and employ these comforting strategies and how Chinese-Australians are using technology to achieve a sense of sanctuary from the views and habits of Australians while (re)constructing and articulating multiple belongings in their new homes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aggressive driving is considered an important road-safety concern for drivers in highly motorised countries. However, understanding of the causes and maintenance factors fundamental to aggressive driving is limited. In keeping with theoretical advances from general aggression research such as the General Aggression Model (GAM), research has begun to examine the emotional and cognitive antecedents of aggressive driving in order to better understand the underlying processes motivating aggressive driving. Early findings in the driving area have suggested that greater levels of aggression are elicited in response to an intentionally aggressive on-road event. In contrast, general aggression research suggests that greater levels of aggression are elicited in response to an ambiguous event. The current study examined emotional and cognitive responses to two hypothetical driving scenarios with differing levels of aggressive intent (intentional versus ambiguous). There was also an interest in whether factors influencing responses were different for hostile aggression (that is, where the action is intended to harm the other) versus instrumental aggression (that is, where the action is motivated by an intention to remove an impediment or attain a goal). Results were that significantly stronger negative emotion and negative attributions, as well as greater levels of threat were reported in response to the scenario which was designed to appear intentional in nature. In addition, participants were more likely to endorse an aggressive behavioural response to a situation that appeared deliberately aggressive than to one where the intention was ambiguous. Analyses to determine if greater levels of negative emotions and cognitions are able to predict aggressive responses provided different patterns of results for instrumental aggression from those for hostile aggression. Specifically, for instrumental aggression, negative emotions and negative attributions were significant predictors for both the intentional and the ambiguous scenarios. In addition, perceived threat was also a significant predictor where the other driver’s intent was clearly aggressive. However, lower rather than higher, levels of perceived threat were associated with greater endorsement of an aggressive response. For hostile aggressive behavioural responses, trait aggression was the strongest predictor for both situations. Overall the results suggest that in the driving context, instrumental aggression is likely to be a much more common response than hostile aggression. Moreover, aggressive responses are more likely in situations where another driver’s behaviour is clearly intentional rather than ambiguous. The results also support the conclusion that there may be different underlying mechanisms motivating an instrumental aggressive response to those motivating a hostile one. In addition, understanding the emotions and cognitions underlying aggressive driving responses may be helpful in predicting and intervening to reduce driving aggression. The finding that drivers appear to regard tailgating as an instrumental response is of concern since this behaviour has the potential to result in crashes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research on homeless adolescents has largely ignored the distinction between those who have left home on their volition (runaways) and those who have been forced to leave (throwaways). Fifty-two homeless adolescents in Brisbane, Australia, were assessed to compare male and female runaways and throwaways for social adjustment and symptomatology. Differences for social adjustment (antisocial tendencies and aggression) and symptomatology (social isolation and depression) were predicted. Results indicated that male runaways were significantly more hostile than male throwaways (p < 0,001), and significantly more socially isolated than female runaways (p < 0,025). Female throwaways, however, were significantly more hostile than male throwaways (p < 0,025) and female runaways (p < 0,025). Yet homeless males overall had a significantly stronger urge to act out hostility than homeless females (p < 0,025). In addition, female throwaways were significantly more antisocial than male throwaways (p < 0,001). There were no significant differences for depression. A theory of inner social control (Hirschi, 1969), postulating absence of bonding in earlier socialization, was supported.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ Project, initiated in December 2010 by Seksualiti Merdeka (an annual sexuality rights festival) and who suffered an onslaught of hostile comments from fellow Malay Muslims. In this paper, I ask how a message aimed at discouraging suicidal tendencies among sexual minority teenagers can go so wrong. In discussing the contradictions between Azwan’s constructions of self and the expectations others have of him, I highlight the challenges for Azwan’s existential self. For storytellers who are vulnerable if visible, the inevitable sharing of a personal story with unintended and hostile audiences when placed online, can have significant repercussions. The purist Sunni Islam agenda in Malaysia not only rejects the human rights of the sexual minority in Malaysia but has influenced and is often a leading hostile voice in both regional and international blocs. This self-righteous and supremacist political Islam fosters a more disabling environment for vulnerable, minority communities and their human rights. It creates a harsher reality for the sexual minority that manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and their criminalisation. It places the right of the sexual minority to live within such a community in doubt. I draw on existing literature on how personal stories have historically been used to advance human rights. Included too, is the signifance and implications of the work by social psychologists in explaining this loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The monstrous landscape and the revenge of nature are recurring motifs in Australian cinema. In the horror genre, the idea of the monstrous landscape emerges from, and builds upon, an established tradition in Australian cinema in which landscape functions not just as a setting for action, but also as a character in its own right. Rather than a picturesque wilderness or countryside, or a serene natural world untainted by civilisation – representations common in landscape cinema celebrating positive aspects of the Australian ‘outback’ – the monstrous landscape is a dangerous, malevolent and threatening force. Drawing upon themes also common in Australian Gothic narratives such as entrapment in a hostile environment, isolation and fear of the unknown (Turcotte, 1988, see also Jonathan Rayner’s essay in this volume), the monstrous landscape acts according to its own logic indecipherable to non-Indigenous Australians and is represented in terms of its alien-ness and inhuman horror.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Family Attitude Scale (FAS) is a self-report measure of critical or hostile attitudes and behaviors towards another family member, and demonstrates an ability to predict relapse in psychoses. Data are not currently available on a French version of the scale. The present study developed a French version of the FAS, using a large general population sample to test its internal structure, criterion validity and relationships with the respondents' symptoms and psychiatric diagnoses, and examined the reciprocity of FAS ratings by respondents and their partners. A total of 2072 adults from an urban population undertook a diagnostic interview and completed self-report measures, including an FAS about their partner. A subset of participants had partners who also completed the FAS. Confirmatory factor analyses revealed an excellent fit by a single-factor model, and the FAS demonstrated a strong association with dyadic adjustment. FAS scores of respondents were affected by their anxiety levels and mood, alcohol and anxiety diagnoses, and moderate reciprocity of attitudes and behaviors between the partners was seen. The French version of the FAS has similarly strong psychometric properties to the original English version. Future research should assess the ability of the French FAS to predict relapse of psychiatric disorders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since Canada’s colonial beginnings, it has become increasingly riddled with classism, racism,sexism, and other damaging outcomes of structured social inequality. In 2006, however,many types of social injustice were turbo‐charged under the federal leadership of the Harper government. For example, a recent southern Ontario study shows that less than half of working people between the ages of 25 and 65 have full‐time jobs with benefits. The main objective of this paper is to critique the dominant Canadian political economic order and the pain and suffering it has caused for millions of people. Informed by left realism and other progressive ways of knowing, I also suggest some ways of turning the tide.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Small and medium firms (SMEs) that operate in global markets are vulnerable to external shocks in uncertain, hostile and volatile business environments given their limited resources and inexperience. In such environments entrepreneurial firms respond by making strategic choices to mitigate such vulnerabilities. This research examines one such important strategic choice – entrepreneurial posturing and its link to financial performance in Finnish SMEs during the global financial crisis. Findings suggest that the dimensions of entrepreneurial posturing have a differential effect on firm performance depending upon the severity of the business environment as well as the firm’s degree of internationalization. Implications for theory and practice are discussed and directions for future research provided.