21 resultados para Hostile sexism

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study explored a minority oppositional religious culture, which continued practicing despite overt hostilities to their practices. The qualitative research project utilized interviews and observations of the Gardnerian Wiccans in Broward County, Florida. The narrative data were transcribed, coded, and categorized into three themes related to the following research questions: Why would individuals create a secretive religion? Given they had to practice in secret, what about this religion had people seeking out information and joining Covens? What would keep this group together despite opposition from dominant culture? As a microcosm for religious conflict in society, the study showed differences in the culture’s religious paradigm structure as a major factor for religious conflict.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aerospace turboengines present a demanding challenge to many heat transfer scientists and engineers. Designers in this field are seeking the best design to transform the chemical energy of the fuel into the useful work of propulsive thrust at maximum efficiency. To this aim, aerospace turboengines must operate at very high temperatures and pressures with very little heat losses. These requirements are often in conflict with the ability to protect the turboengine blades from this hostile thermal environment. Heat pipe technology provides a potential cooling means for the structure exposed to high heat fluxes. Therefore, the objective of this dissertation is to develop a new radially rotating miniature heat pipe, which would combine the traditional air-cooling technology with the heat pipe for more effective turboengine blade cooling. ^ In this dissertation, radially rotating miniature heat pipes are analyzed and studied by employing appropriate flow and heat transfer modeling as well as experimental tests. The analytical solutions for the flows of condensate film and vapor, film thickness, and vapor temperature distribution along the heat pipe length are derived. The diffuse effects of non-condensable gases on the temperature distribution along the heat pipe length are also studied, and the analytical solutions for the temperature distributions with the diffuse effects of non-condensable gases are obtained. Extensive experimental tests on radially rotating miniature heat pipes with different influential parameters are undertaken, and various effects of these parameters on the operation of the heat pipe performance are researched. These analytical solutions are in good agreement with the experimental data. ^ The theoretical and experimental studies have proven that the radially rotating miniature heat pipe has a very large heat transfer capability and a very high effective thermal conductance that is 60–100 times higher than the thermal conductivity of copper. At the same time, the heat pipe has a simple structure and low manufacturing cost, and can withstand strong vibrations and work in a high-temperature environment. Therefore, the combination of the traditional air-cooling technology with the radially rotating miniature heat pipe is a feasible and effective cooling means for high-temperature turbine blades. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monahan and Walker (1988) delineated three uses of social science evidence within the courts: social authority, social fact, and social framework. Social authority evidence is social science evidence used in making policy or law. Social fact evidence is social science evidence that describes research undertaken expressly for the case at hand. Social framework evidence involves providing conclusions from previously conducted social science research to assist jurors in evaluating the other evidence in the case. Although this type of evidence has traditionally been presented via expert testimony, Monahan and Walker (1988) have suggested that, because the social science research involved comes from the extant literature and is not the province of any particular expert, it would be more economical to have the judge present this information as part of the judicial instructions to the jury. This study tested the implicit assumption that the presentation of the social framework evidence by the judge will have the same impact on juror verdicts as presentation of this evidence by an expert. ^ Two hundred mock jurors watched a videotaped hostile work environment sexual harassment trial. The social framework evidence consisted of the discussion of factors that have been found to increase the likelihood of sex stereotyping of women by men. The trial included either no social framework evidence, social framework evidence presented by the expert, or social framework evidence presented in judicial instructions. ^ Results indicated that men who heard the social framework evidence from the judge were more likely to vote for the defendant than men who heard no social framework evidence. Men who heard the judicial instruction with the social framework evidence also rated the plaintiff as less credible than the other men and women in the study. Thus, it appears that, for men, social framework evidence presented by the judge harms the plaintiff's case by reducing ratings of her credibility, but the same evidence presented by an expert does not affect men's verdicts. For women, however, social framework evidence, irrespective of who presents it, enhances the plaintiff's case. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two studies investigated the influence of juror need for cognition on the systematic and heuristic processing of expert evidence. U.S. citizens reporting for jury duty in South Florida read a 15-page summary of a hostile work environment case containing expert testimony. The expert described a study she had conducted on the effects of viewing sexualized materials on men's behavior toward women. Certain methodological features of the expert's research varied across experimental conditions. In Study 1 (N = 252), the expert's study was valid, contained a confound, or included the potential for experimenter bias (internal validity) and relied on a small or large sample (sample size) of college undergraduates or trucking employees (ecological validity). When the expert's study included trucking employees, high need for cognition jurors in Study 1 rated the expert more credible and trustworthy than did low need for cognition jurors. Jurors were insensitive to variations in the study's internal validity or sample size. Juror ratings of plaintiff credibility, plaintiff trustworthiness, and study quality were positively correlated with verdict. In Study 2 (N = 162), the expert's published or unpublished study (general acceptance) was either valid or lacked an appropriate control group (internal validity) and included a sample of college undergraduates or trucking employees (ecological validity). High need for cognition jurors in Study 2 found the defendant liable more often and evaluated the expert evidence more favorably when the expert's study was internally valid than when an appropriate control group was missing. Low need for cognition jurors did not differentiate between the internally valid and invalid study. Variations in the study's general acceptance and ecological validity did not affect juror judgments. Juror ratings of expert and plaintiff credibility, plaintiff trustworthiness, and study quality were positively correlated with verdict. The present research demonstrated that the need for cognition moderates juror sensitivity to expert evidence quality and that certain message-related heuristics influence juror judgments when ability or motivation to process systematically is low. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To escape certain death during the Nazi regime, approximately eighty thousand terrorized and persecuted Eastern European Jews sought refuge in the forests surrounding their communities. Most often, their forest deaths were the result of Nazi-sponsored activities such as ghetto deportations and hunts for Jewish escapees. However, anti-Semitic partisans, partisan combat, hostile peasants, and environmental elements were also factors contributing to an estimated ninety percent fatality rate. This dissertation explored the role and meaning of forests to these Jewish fugitives. It investigated the bodily and social practices they developed to enhance their odds of survival in the forest landscape. I develop the concept of landscape agency as a response to my research question: What was it like to live and survive (or die) in the forest during the Holocaust? Moreover, it is an approach to theorizing about the humanity of space. Landscape agency builds upon a phenomenological approach to space and place that links landscape and action through bodily practices. This dissertation analyzed the fugitives' actions as functions of various forms of capital, namely economic, cultural and social. The sample included thirteen individuals who were themselves forest fugitives during the Holocaust. Face-face qualitative interviews were conducted from 2004 to 2006. Primary data from these interviews was used extensively to demonstrate the practices utilized in the fugitives' experiences with life and death in the forest. This study concluded that the odds of survival for forest fugitives were enhanced by use of landscape agency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research indicates that people engaged in legal decision-making use a host of biases and preconceptions to guide their decisions about whether the evidence presented to them is reasonable. However, few theories address how such expectations affect legal decision-makers. The present study attempted to determine if social judgment theory (SJT) can explain how and when legal decision-makers rely on expectations for the complainant's psychological injury in a hostile environment sexual harassment case. Two experiments provided undergraduate participants with a written summary of a hostile work environment allegation that first manipulated participants' expectations about reasonable psychological injuries (mild v. severe), and then presented them with actual severity levels of psychological injury (ranging from minimal to extreme). Experiment 1 (N = 295) hypothesized and found that participants who expected severe injuries perceived a greater range of psychological injuries to be reasonable than participants expecting mild injury. Experiment 2 ( N = 202) used similar methodology and investigated whether perceived reasonableness for the injury allegations affected legal decisions. Experiment 2 hypothesized that participants expecting severe psychological injury should render more pro-complainant decisions than participants expecting mild psychological injury. This result should be most pronounced when participants receive a moderate injury allegation, since this allegation was perceived as reasonable by participants expecting severe injury, but unreasonable by participants expecting mild injury. Consistent with SJT, participants who received a moderate injury but expected a severe injury found more liability than participants who received a moderate injury but expected a mild injury. Inconsistent with SJT, participants' expectations did not affect their compensatory damage decisions. In fact, more severe injury allegations increased damage awards regardless of participants' expectations. Although the results provide mixed support for applying SJT to legal decisions in sexual harassment cases, they emphasize the continuing role of oft-unstudied extra-legal factors (juror's expectations and psychological injury severity) on legal decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines the educational persistence of women of African descent (WOAD) in pursuit of a doctorate degree at universities in the southeastern United States. WOAD are women of African ancestry born outside the African continent. These women are heirs to an inner dogged determination and spirit to survive despite all odds (Pulliam, 2003, p. 337).This study used Ellis’s (1997) Three Stages for Graduate Student Development as the conceptual framework to examine the persistent strategies used by these women to persist to the completion of their studies. Semi-structured interviews were conducted, transcribed, and analyzed for the 10 study participants. The study examined their beliefs, roles, and support systems utilized during their studies to help propel them to succeed. Interview data were analyzed using cross-case analysis to discover emerging themes and patterns. A comparative analysis was used to analyze the participants’ experiences and discover themes and patterns to review against the historical data. The findings showed that WOAD experienced feelings of isolation, neglect and racial prejudice as doctoral students. Their ability to formulate supportive relationships among each other and in their communities outside the university was key to their persistence to graduation. There still remains a need to create a more engaging and inclusive environment for nontraditional students, particularly those who are WOAD. The study concludes with six strategies of success used by these WOAD to persist to completion. Those six strategies include 1. Keeping the goal of earning a doctorate and graduating foremost on your mind. 2. Set a class and study schedule that allows you to balance family, work and study. 3. Take care of yourself, physically, mentally and emotionally. 4. Keep a goal chart to track your strides toward completion/graduation. 5. Establish a strong support system among your family, friends, colleagues and community; and 6. Do not let the “isms” (racism, sexism, and ageism) deter you.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an overview of literature on adult educators who are both queer and immigrant. Although very little scholarly writing exists, several scholars describe the experiences of queer immigrants as being anchored to systemic heteronormativity. Additionally, the experiences of immigrant adult educators suggest difficult encounters with racism and sexism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In his study -The IRS Collection Division: Contacts and Settlements - by John M. Tarras, Assistant Professor School of Hotel, Restaurant and Institutional Management, Michigan State University, Tarras initially states: “The collection division of the internal revenue service is often the point of contact for many hospitality businesses. The author describes how the division operates, what the hospitality firm can expect when contacted by it, and what types of strategies firms might find helpful when negotiating a settlement with the IRS.” The author will have you know that even though most chance meetings with the IRS Collection Division are due to unfortunate tax payment circumstances, there are actually more benign reasons for close encounters of the IRS kind. This does not mean, however, that brushes with the IRS Collection Division will end on an ever friendlier note. “…the Tax Reform Act of 1986 with its added complexity will cause some hospitality firms to inadvertently fail to make proper payments on a timely basis,” Tarras affords in illustrating a perhaps less pugnacious side of IRS relations. Should a hospitality business owner represent himself/herself before the IRS? Never, says Tarras. “Too many taxpayers ruin their chances of a fair settlement by making what to them seem innocent remarks, but ones that turn out to be far different,” warns Professor Tarras. Tarras makes the distinction between IRS the Collection Division, and IRS the Audit Division. “While the Audit Division is interested in how the tax liability arose, the Collection Division is generally only interested in collecting the liability,” he informs you. Either sounds firmly in hostile territory. They don’t bluff. Tarras does want you to know that when the IRS threatens to levy on the assets of a hospitality business, they will do so. Those assets may extend to personal and real property as well, he says. The levy action is generally the final resort in an IRS collection effort. Professor Tarras explains the lien process and the due process attached to that IRS collection tactic. “The IRS can also levy a hospitality firm owner's wages. In this case, it is important to realize that you are allowed to exempt from levy $75 per week, along with $25 per week for each of your dependents (unless your spouse works),” Professor Tarras says with the appropriate citation. What are the options available to the hospitality business owner who finds himself on the wrong side of the IRS Collection Division? Negotiate in good faith says Professor Tarras. “In many cases, a visit to the IRS office will greatly reduce the chances that a simple problem will turn into a major one,” Tarras advises. He dedicates the last pages of the discussion to negotiation strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In her dialogue entitled - Restructuring in the Hospitality Industry - Elisa S. Moncarz, Associate Professor, the School of Hospitality Management at Florida International University, intends for you to know the following: “Recent years have seen a proliferation of restructurings of major American corporations creating an extremely important issue that has affected U.S. business. This article discusses restructuring issues in the hospitality industry, focusing attention on its causes and motivations, as well as on its benefits and perils. The author considers the impact of restructuring on investors and management while examining recent restructurings involving hospitality firms.” In defining the concept of restructuring, Associate Professor Moncarz informs you, “Restructuring entails the implementation of fundamental and comprehensive modification of a company's operational and/or financial structure.” “It has, indeed, become fashionable to take a company apart and put it back together in a different form,” the author says. Additionally, Moncarz refers to a Wall Street Journal study, dated August 1985, which reveals that nearly half the large American corporations were, or were soon to be restructured in the 1984/85 time frame. There are several distinct types of restructurings and the author wants you to be aware of some of them. “…threats of takeover attempts, the larger part of all restructuring have been initiated willingly in order to expand or divest a company's line of business (i.e., operational restructurings) or redirect its finances (i.e., financial restructurings),” the author reveals. “Two principal types of operational restructurings are mergers and acquisitions [M&A], and divestitures [disposing of unwanted units or assets],” Moncarz further defines the concepts of expansion and divestiture. The author explains several types of financial restructuring sketches used in the hospitality industry, including stock re-purchasing, debt issuances and redemptions, swapping debt for equity, and effective theories of realigning debt through extending loans and/or revising terms. To expand their businesses, Moncarz makes anecdotal reference to several major food and beverage corporations that have successfully employed operational restructuring principles. The author wades into the shallow end of the hostile takeover pool by explaining some of the corporate restructuring concepts used to repel that aggressive technique. Walt Disney Company completely redesigned their entire upper level management structure in a successful effort to thwart a hostile takeover bid by corporate raider Saul P. Steinberg, Moncarz informs. To close, the author touches on leveraged buyouts [LBOs], and stock repurchases to divest unwanted divisions and immobilize hostile takeover attempts. A lengthy table of - Selected Restructurings in the Hospitality Industry [1982 to date of article] – is also included.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The presence of the conceptus in uterine cavity necessitates an elaborate network of interactions between the implanting embryo and a receptive endometrial tissue. We believe that embryo-derived signals play an important role in the remodeling and the extension of endometrial receptivity period. Our previous studies provided original evidence that human Chorionic Gonadotropin (hCG) modulates and potentiates endometrial epithelial as well as stromal cell responsiveness to interleukin 1 (IL1), one of the earliest embryonic signals, which may represent a novel pathway by which the embryo favors its own implantation and growth within the maternal endometrial host. The present study was designed to gain a broader understanding of hCG impact on the modulation of endometrial cell receptivity, and in particular, cell responsiveness to IL1 and the acquisition of growth-promoting phenotype capable of receiving, sustaining, and promoting early and crucial steps of embryonic development. Our results showed significant changes in the expression of genes involved in cell proliferation, immune modulation, tissue remodeling, apoptotic and angiogenic processes. This points to a relevant impact of these embryonic signals on the receptivity of the maternal endometrium, its adaptation to the implanting embryo and the creation of an environment that is favorable for the implantation and the growth of this latter within a new and likely hostile host tissue. Interestingly our data further identified a complex interaction between IL1 and hCG, which, despite a synergistic action on several significant endometrial target genes, may encompass a tight control of endogenous IL1 and extends to other IL1 family members.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the developments in computing and communication technologies, wireless sensor networks have become popular in wide range of application areas such as health, military, environment and habitant monitoring. Moreover, wireless acoustic sensor networks have been widely used for target tracking applications due to their passive nature, reliability and low cost. Traditionally, acoustic sensor arrays built in linear, circular or other regular shapes are used for tracking acoustic sources. The maintaining of relative geometry of the acoustic sensors in the array is vital for accurate target tracking, which greatly reduces the flexibility of the sensor network. To overcome this limitation, we propose using only a single acoustic sensor at each sensor node. This design greatly improves the flexibility of the sensor network and makes it possible to deploy the sensor network in remote or hostile regions through air-drop or other stealth approaches. Acoustic arrays are capable of performing the target localization or generating the bearing estimations on their own. However, with only a single acoustic sensor, the sensor nodes will not be able to generate such measurements. Thus, self-organization of sensor nodes into virtual arrays to perform the target localization is essential. We developed an energy-efficient and distributed self-organization algorithm for target tracking using wireless acoustic sensor networks. The major error sources of the localization process were studied, and an energy-aware node selection criterion was developed to minimize the target localization errors. Using this node selection criterion, the self-organization algorithm selects a near-optimal localization sensor group to minimize the target tracking errors. In addition, a message passing protocol was developed to implement the self-organization algorithm in a distributed manner. In order to achieve extended sensor network lifetime, energy conservation was incorporated into the self-organization algorithm by incorporating a sleep-wakeup management mechanism with a novel cross layer adaptive wakeup probability adjustment scheme. The simulation results confirm that the developed self-organization algorithm provides satisfactory target tracking performance. Moreover, the energy saving analysis confirms the effectiveness of the cross layer power management scheme in achieving extended sensor network lifetime without degrading the target tracking performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the long history of Muslims in Russia, most scholarly and political literatures on Russia’s Islam still narrowly interpret Muslim-Slavs relations in an ethnic-religious oppositional framework. In my work, I examine Russia’s discourse on Islam to argue that, in fact, the role of Islam in post-Soviet Russia is complex. Drawing from direct sources from academic, state, journalistic, and underground circles, often neglected by Western commentators, I identify ideational patterns in conceptualizations of Islam and reconstruct relational networks among authors. To explain complex intertextual relations within specific contexts, I utilize an analytically eclectic method that appropriately combines theories from different paradigms and/or disciplines. Thanks to my multi-dimensional approach, I show that, contrary to traditional views, Russia’s Muslims participate in processes of post-Soviet Russia’s identity formation. Starting from textual contents, avoiding pre-formed analytical frames, I argue that many Muslims in Russia perceive themselves as part of Russian civilization – even when they challenge the status-quo. Building on my initial findings, I state that a key element in Russia’s conceptualization of Islam is the definition, elaborated in the 1990s, of traditional Islam as part of Russian civilizational history, as opposed to extremist Islam as extraneous, hostile phenomenon. The differentiation creates an unprecedently safe, if confined, space for Islamic propositions, of which Muslims are taking advantage. Embedded in debates on Russian civilization, conceptualizations of Islam, then, influence Russia’s (geo)political self-perceptions and, consequently, its domestic and international policies. In particular, Russian so-far neglected Islamic doctrine supports views of Islamic terrorism as a political and not religious phenomenon. Hence, Russia interprets both terrorism and counterterrorism within its own historical tradition, causing its strategy to be at odds with Western views. Less apparently, these divergences affect Russian-U.S. broader relations. Finally, in revealing the civilizational value of Russia’s Islam, I expose intellectual relations among influential subjects who share the aim to devise a new civilizational model that should combine Slavic and non-Slavic, Orthodox and Islamic, Western, and Asian components. In this old Russian dilemma, the novelty is Muslims’ participation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.