152 resultados para Popular contexts


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous and mobile computing has increased the level of social connectedness. In an era where technology has permeated into spaces of work, play and socializing, social influence has become an important consideration. The operationalization of the social influence construct in the technology adoption and use literature often assumes singular technology use contexts and purposes. We question whether social influence, as operationalized in IS, is reflective of the utilitarian, hedonic and social environment that many individuals operate in. We propose a framework to consider social influence more inclusively, drawing on differences in referent power and levels of expertise. We outline our research approach within the demographic segment of young working professionals. Research in this area is necessary to improve theoretical explanations of adoptive behavior of these technologies. We hope to contribute by suggesting a richer, more encompassing operationalization of the social influence construct for future IS research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Case studies of the organizational implementation of traditional business computing have often emphasized the importance of context in research design and data analysis. The emergence of computing phenomena that pervade different contexts within and even beyond the organizational boundary suggests the need to disaggregate the notion of context to allow for finer levels of contextual analysis. Indeed we demonstrate that a failure to consider interdependent levels of context in organizational case studies of computing technologies that even approach ubiquity runs the risk of partial and even incorrect conclusions being drawn. We illustrate this argument by means of two explanatory case studies of intranet and mobile technology implementation in organizations. Based on the extant literature on context in case study design and examples drawn from the cases, we propose a range of interconnected and interrelated contexts to consider in the research design of explanatory cases of ubiquitous technology implementation in organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile computing devices such as personal digital assistants, smart mobile phones, and other handheld computing devices hold much promise in terms of their organizational application. Many existing models of the individual acceptance and implementation of information technology in organizational contexts have been developed in the era of “at the office” computing such as MIS, office automation, groupware, and so forth. We conducted two in-depth case studies of the implementation of mobile technology in healthcare organizations. The studies highlight interrelated individual use contexts due to the mobility of the technology: the individual as employee, as professional, as private user, and as member of society. The cases show that influences emanating from these use contexts impacted on the individual adoption of the technology within the organization. While broad extra-organizational influences are incorporated in some existing individual technology adoption models, we show that it becomes relevant to accommodate these influences more specifically in research models of mobile computing in organizations. Based on the extant literature and the case study data we pave the way toward more comprehensive models of the adoption and implementation of mobile technologies in organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: Harm-minimization policies suggest that alcohol use is a part of normal adolescent development and that parents should supervise their children's use to encourage responsible drinking. Zero-tolerance policies suggest that all underage alcohol use should be discouraged. This article compared hypotheses derived from harm-minimization and zero-tolerance policies regarding the influence of family context and supervised drinking on adolescent alcohol use and related harms among adolescents in Washington State, USA, and Victoria, Australia. two states that have respectively adopted zero-tolerance and harm-minimization policies.

Method: Representative samples of seventh-grade students (N = 1,945:989 females) were recruited from schools in each state. Students completed comprehensive questionnaires on alcohol use, related problem behaviors, and risk and protective factors annually from 2002 to 2004 when they were in ninth grade.

Results: Relationships between family context and alcohol use and harmful use were very similar in both states. Adult-supervised settings for alcohol use were associated with higher levels of harmful alcohol consequences. Adult-supervised alcohol use mediated the links between favorable parental attitudes to alcohol use and ninth-grade alcohol use for students in both states.

Conclusions:
Despite policy differences in the two states, relationships between family context variables and alcohol use and harmful use are remarkably similar. Adult-supervised settings for alcohol use resulted in higher levels of harmful alcohol consequences, contrary to predictions derived from harm-minimization policy. Findings challenge the harm-minimization position that supervised alcohol use or early-age alcohol use will reduce the development of adolescent alcohol problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article seeks to discuss specific examples of Adivasi representation in Indian cinema, particularly popular Hindi cinema (as opposed to ‘art’ or ‘parallel’ cinema), and the ways in which it has distilled and codified the representations of ‘other’ groups for a mass audience. Mainstream Hindi cinema, even in its postcolonial phase, has not provided images of Adivasis that reflect their reality. This ‘constructed reality’ of the cinema in which Adivasis exist remains the widespread (mis)understanding of their cultures. It is this cinematic marginalization and cultural stereotyping that will be explored further. This article is a preliminary exploration and will look at particular examples of representation in Hindi films, including Naagin [Female Cobra] (Nandlal Jaswantlal, 1954), Madhumati (Bimal Roy, 1958), Yeh Gulistan Hamara [This Flower Garden of Ours] (Atma Ram, 1972), Lal Salaam [Red Salute] (Gaganvihari Boratte, 2002) and Chak De! [Come On! India] (Shimit Amin, 2007). The aim is for this exploration to provide a foundation for further research into Adivasi representation and the wider discourses of power, politics and inequality in Indian society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I consider the utility of discourses of ‘girl power’ for understanding, and complicating, the way youthful femininities are produced in schooling. The paper is concerned with expanding the possibilities for how queer theoretical resources might be utilized within studies of girls and schooling. Existing studies have drawn upon Judith Butler’s notion of a ‘heterosexual matrix’ for understanding, and attending to, the way normative discourses of heterosexuality underpin the school-based production of youthful femininities. The term ‘heterofemininities’ has been used in order to label these school-produced intersections of sex/gender/sexuality. Drawing on discourses of ‘girl power’ that gather around ‘voice’ and responsibility, I propose that the production of ‘hetero-femininities’ within educational contexts might be further explored, and thus complicated, when the significance of discourses of ‘girl power’ is considered. I analyse young women’s discussions of key ‘girl power’ icons in popular culture, generated through fieldwork in an elite girls’ school in Australia. In this analysis I explore the intersections of gender/sexuality/girl power that are produced in the young women’s textual practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Significant changes have occurred over the last decade within the Australian Vocational Education and Training (VET) system. Not least amongst these has been a shift from a predominantly traditional face-to-face classroom model of programme delivery to more flexible models informed by the needs of clients. To lead this revolution, in 1991 the Australian Commonwealth and State Ministers for Training established the Flexible Delivery Working Party. A series of reports followed that sought to develop a policy framework, including a definition of flexible delivery, and its principles and characteristics. Despite these efforts, project funding and national staff development initiatives, several difficulties have been experienced in the ‘take-up’ of flexible delivery; problems that we argue are related to how the dissemination of innovative practice is conceived. Specifically, the literature and research on the diffusion of innovations points to the efficacy of informal social networks ‘in which individuals adopt the new idea as a result of talking with other individuals who have already adopted it’ (Valente, 1995, p. ix). Following a discussion of these issues, the article concludes by arguing the need for research of innovative practice transfer within VET in Australia, using qualitative case study in order to develop an in-depth and rich description of the process, and facilitate greater understanding of how it works in practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

 Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is usually assumed that US policymakers need to generate popular consent in order to undertake regime change against another state. This article explores the ways in which contextual factors such as the joint democracy effect, popular values and public moods influenced efforts by elites in the United States to generate popular consent for regime change in the Philippines and Chile. Against the backdrop of the Vietnam War, the United States undertook covert action in Chile due to public recognition of the target state's democratic credentials and a public mood opposed to further military ventures. In contrast, the absence of a strong joint democracy effect, a national mood infused with romantic nationalism qua militarism and social Darwinism facilitated efforts by US elites to generate consent for the invasion and occupation of the Philippines. Subsequently, this article contributes to understandings of the domestic-level factors that influence foreign policy decisions.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The sexualization of the female body in contemporary media has created considerable anxiety about its impact on girls. Much of the resulting research focuses on the influence of visual media on body image and the flow-on effects for girls' health. Rather less attention is paid to the pedagogical role of popular romance fiction in teaching girls about their sexuality. Given the pronounced increase in eroticized fiction for girls over the past decade, this is a significant oversight. This article applies Hakim's (2010) concept of erotic capital to two chick lit novels for girls. The elements of erotic capital—assets additional to economic, cultural and social capital—are used to explore the lessons these novels teach about girl sexual subjectivities and sociality in a sexualized culture.