560 resultados para Hostile sexism


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two studies investigated the influence of juror need for cognition on the systematic and heuristic processing of expert evidence. U.S. citizens reporting for jury duty in South Florida read a 15-page summary of a hostile work environment case containing expert testimony. The expert described a study she had conducted on the effects of viewing sexualized materials on men's behavior toward women. Certain methodological features of the expert's research varied across experimental conditions. In Study 1 (N = 252), the expert's study was valid, contained a confound, or included the potential for experimenter bias (internal validity) and relied on a small or large sample (sample size) of college undergraduates or trucking employees (ecological validity). When the expert's study included trucking employees, high need for cognition jurors in Study 1 rated the expert more credible and trustworthy than did low need for cognition jurors. Jurors were insensitive to variations in the study's internal validity or sample size. Juror ratings of plaintiff credibility, plaintiff trustworthiness, and study quality were positively correlated with verdict. In Study 2 (N = 162), the expert's published or unpublished study (general acceptance) was either valid or lacked an appropriate control group (internal validity) and included a sample of college undergraduates or trucking employees (ecological validity). High need for cognition jurors in Study 2 found the defendant liable more often and evaluated the expert evidence more favorably when the expert's study was internally valid than when an appropriate control group was missing. Low need for cognition jurors did not differentiate between the internally valid and invalid study. Variations in the study's general acceptance and ecological validity did not affect juror judgments. Juror ratings of expert and plaintiff credibility, plaintiff trustworthiness, and study quality were positively correlated with verdict. The present research demonstrated that the need for cognition moderates juror sensitivity to expert evidence quality and that certain message-related heuristics influence juror judgments when ability or motivation to process systematically is low. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To escape certain death during the Nazi regime, approximately eighty thousand terrorized and persecuted Eastern European Jews sought refuge in the forests surrounding their communities. Most often, their forest deaths were the result of Nazi-sponsored activities such as ghetto deportations and hunts for Jewish escapees. However, anti-Semitic partisans, partisan combat, hostile peasants, and environmental elements were also factors contributing to an estimated ninety percent fatality rate. This dissertation explored the role and meaning of forests to these Jewish fugitives. It investigated the bodily and social practices they developed to enhance their odds of survival in the forest landscape. I develop the concept of landscape agency as a response to my research question: What was it like to live and survive (or die) in the forest during the Holocaust? Moreover, it is an approach to theorizing about the humanity of space. Landscape agency builds upon a phenomenological approach to space and place that links landscape and action through bodily practices. This dissertation analyzed the fugitives' actions as functions of various forms of capital, namely economic, cultural and social. The sample included thirteen individuals who were themselves forest fugitives during the Holocaust. Face-face qualitative interviews were conducted from 2004 to 2006. Primary data from these interviews was used extensively to demonstrate the practices utilized in the fugitives' experiences with life and death in the forest. This study concluded that the odds of survival for forest fugitives were enhanced by use of landscape agency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research indicates that people engaged in legal decision-making use a host of biases and preconceptions to guide their decisions about whether the evidence presented to them is reasonable. However, few theories address how such expectations affect legal decision-makers. The present study attempted to determine if social judgment theory (SJT) can explain how and when legal decision-makers rely on expectations for the complainant's psychological injury in a hostile environment sexual harassment case. Two experiments provided undergraduate participants with a written summary of a hostile work environment allegation that first manipulated participants' expectations about reasonable psychological injuries (mild v. severe), and then presented them with actual severity levels of psychological injury (ranging from minimal to extreme). Experiment 1 (N = 295) hypothesized and found that participants who expected severe injuries perceived a greater range of psychological injuries to be reasonable than participants expecting mild injury. Experiment 2 ( N = 202) used similar methodology and investigated whether perceived reasonableness for the injury allegations affected legal decisions. Experiment 2 hypothesized that participants expecting severe psychological injury should render more pro-complainant decisions than participants expecting mild psychological injury. This result should be most pronounced when participants receive a moderate injury allegation, since this allegation was perceived as reasonable by participants expecting severe injury, but unreasonable by participants expecting mild injury. Consistent with SJT, participants who received a moderate injury but expected a severe injury found more liability than participants who received a moderate injury but expected a mild injury. Inconsistent with SJT, participants' expectations did not affect their compensatory damage decisions. In fact, more severe injury allegations increased damage awards regardless of participants' expectations. Although the results provide mixed support for applying SJT to legal decisions in sexual harassment cases, they emphasize the continuing role of oft-unstudied extra-legal factors (juror's expectations and psychological injury severity) on legal decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines the educational persistence of women of African descent (WOAD) in pursuit of a doctorate degree at universities in the southeastern United States. WOAD are women of African ancestry born outside the African continent. These women are heirs to an inner dogged determination and spirit to survive despite all odds (Pulliam, 2003, p. 337).This study used Ellis’s (1997) Three Stages for Graduate Student Development as the conceptual framework to examine the persistent strategies used by these women to persist to the completion of their studies. Semi-structured interviews were conducted, transcribed, and analyzed for the 10 study participants. The study examined their beliefs, roles, and support systems utilized during their studies to help propel them to succeed. Interview data were analyzed using cross-case analysis to discover emerging themes and patterns. A comparative analysis was used to analyze the participants’ experiences and discover themes and patterns to review against the historical data. The findings showed that WOAD experienced feelings of isolation, neglect and racial prejudice as doctoral students. Their ability to formulate supportive relationships among each other and in their communities outside the university was key to their persistence to graduation. There still remains a need to create a more engaging and inclusive environment for nontraditional students, particularly those who are WOAD. The study concludes with six strategies of success used by these WOAD to persist to completion. Those six strategies include 1. Keeping the goal of earning a doctorate and graduating foremost on your mind. 2. Set a class and study schedule that allows you to balance family, work and study. 3. Take care of yourself, physically, mentally and emotionally. 4. Keep a goal chart to track your strides toward completion/graduation. 5. Establish a strong support system among your family, friends, colleagues and community; and 6. Do not let the “isms” (racism, sexism, and ageism) deter you.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an overview of literature on adult educators who are both queer and immigrant. Although very little scholarly writing exists, several scholars describe the experiences of queer immigrants as being anchored to systemic heteronormativity. Additionally, the experiences of immigrant adult educators suggest difficult encounters with racism and sexism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In his study -The IRS Collection Division: Contacts and Settlements - by John M. Tarras, Assistant Professor School of Hotel, Restaurant and Institutional Management, Michigan State University, Tarras initially states: “The collection division of the internal revenue service is often the point of contact for many hospitality businesses. The author describes how the division operates, what the hospitality firm can expect when contacted by it, and what types of strategies firms might find helpful when negotiating a settlement with the IRS.” The author will have you know that even though most chance meetings with the IRS Collection Division are due to unfortunate tax payment circumstances, there are actually more benign reasons for close encounters of the IRS kind. This does not mean, however, that brushes with the IRS Collection Division will end on an ever friendlier note. “…the Tax Reform Act of 1986 with its added complexity will cause some hospitality firms to inadvertently fail to make proper payments on a timely basis,” Tarras affords in illustrating a perhaps less pugnacious side of IRS relations. Should a hospitality business owner represent himself/herself before the IRS? Never, says Tarras. “Too many taxpayers ruin their chances of a fair settlement by making what to them seem innocent remarks, but ones that turn out to be far different,” warns Professor Tarras. Tarras makes the distinction between IRS the Collection Division, and IRS the Audit Division. “While the Audit Division is interested in how the tax liability arose, the Collection Division is generally only interested in collecting the liability,” he informs you. Either sounds firmly in hostile territory. They don’t bluff. Tarras does want you to know that when the IRS threatens to levy on the assets of a hospitality business, they will do so. Those assets may extend to personal and real property as well, he says. The levy action is generally the final resort in an IRS collection effort. Professor Tarras explains the lien process and the due process attached to that IRS collection tactic. “The IRS can also levy a hospitality firm owner's wages. In this case, it is important to realize that you are allowed to exempt from levy $75 per week, along with $25 per week for each of your dependents (unless your spouse works),” Professor Tarras says with the appropriate citation. What are the options available to the hospitality business owner who finds himself on the wrong side of the IRS Collection Division? Negotiate in good faith says Professor Tarras. “In many cases, a visit to the IRS office will greatly reduce the chances that a simple problem will turn into a major one,” Tarras advises. He dedicates the last pages of the discussion to negotiation strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In her dialogue entitled - Restructuring in the Hospitality Industry - Elisa S. Moncarz, Associate Professor, the School of Hospitality Management at Florida International University, intends for you to know the following: “Recent years have seen a proliferation of restructurings of major American corporations creating an extremely important issue that has affected U.S. business. This article discusses restructuring issues in the hospitality industry, focusing attention on its causes and motivations, as well as on its benefits and perils. The author considers the impact of restructuring on investors and management while examining recent restructurings involving hospitality firms.” In defining the concept of restructuring, Associate Professor Moncarz informs you, “Restructuring entails the implementation of fundamental and comprehensive modification of a company's operational and/or financial structure.” “It has, indeed, become fashionable to take a company apart and put it back together in a different form,” the author says. Additionally, Moncarz refers to a Wall Street Journal study, dated August 1985, which reveals that nearly half the large American corporations were, or were soon to be restructured in the 1984/85 time frame. There are several distinct types of restructurings and the author wants you to be aware of some of them. “…threats of takeover attempts, the larger part of all restructuring have been initiated willingly in order to expand or divest a company's line of business (i.e., operational restructurings) or redirect its finances (i.e., financial restructurings),” the author reveals. “Two principal types of operational restructurings are mergers and acquisitions [M&A], and divestitures [disposing of unwanted units or assets],” Moncarz further defines the concepts of expansion and divestiture. The author explains several types of financial restructuring sketches used in the hospitality industry, including stock re-purchasing, debt issuances and redemptions, swapping debt for equity, and effective theories of realigning debt through extending loans and/or revising terms. To expand their businesses, Moncarz makes anecdotal reference to several major food and beverage corporations that have successfully employed operational restructuring principles. The author wades into the shallow end of the hostile takeover pool by explaining some of the corporate restructuring concepts used to repel that aggressive technique. Walt Disney Company completely redesigned their entire upper level management structure in a successful effort to thwart a hostile takeover bid by corporate raider Saul P. Steinberg, Moncarz informs. To close, the author touches on leveraged buyouts [LBOs], and stock repurchases to divest unwanted divisions and immobilize hostile takeover attempts. A lengthy table of - Selected Restructurings in the Hospitality Industry [1982 to date of article] – is also included.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The presence of the conceptus in uterine cavity necessitates an elaborate network of interactions between the implanting embryo and a receptive endometrial tissue. We believe that embryo-derived signals play an important role in the remodeling and the extension of endometrial receptivity period. Our previous studies provided original evidence that human Chorionic Gonadotropin (hCG) modulates and potentiates endometrial epithelial as well as stromal cell responsiveness to interleukin 1 (IL1), one of the earliest embryonic signals, which may represent a novel pathway by which the embryo favors its own implantation and growth within the maternal endometrial host. The present study was designed to gain a broader understanding of hCG impact on the modulation of endometrial cell receptivity, and in particular, cell responsiveness to IL1 and the acquisition of growth-promoting phenotype capable of receiving, sustaining, and promoting early and crucial steps of embryonic development. Our results showed significant changes in the expression of genes involved in cell proliferation, immune modulation, tissue remodeling, apoptotic and angiogenic processes. This points to a relevant impact of these embryonic signals on the receptivity of the maternal endometrium, its adaptation to the implanting embryo and the creation of an environment that is favorable for the implantation and the growth of this latter within a new and likely hostile host tissue. Interestingly our data further identified a complex interaction between IL1 and hCG, which, despite a synergistic action on several significant endometrial target genes, may encompass a tight control of endogenous IL1 and extends to other IL1 family members.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the developments in computing and communication technologies, wireless sensor networks have become popular in wide range of application areas such as health, military, environment and habitant monitoring. Moreover, wireless acoustic sensor networks have been widely used for target tracking applications due to their passive nature, reliability and low cost. Traditionally, acoustic sensor arrays built in linear, circular or other regular shapes are used for tracking acoustic sources. The maintaining of relative geometry of the acoustic sensors in the array is vital for accurate target tracking, which greatly reduces the flexibility of the sensor network. To overcome this limitation, we propose using only a single acoustic sensor at each sensor node. This design greatly improves the flexibility of the sensor network and makes it possible to deploy the sensor network in remote or hostile regions through air-drop or other stealth approaches. Acoustic arrays are capable of performing the target localization or generating the bearing estimations on their own. However, with only a single acoustic sensor, the sensor nodes will not be able to generate such measurements. Thus, self-organization of sensor nodes into virtual arrays to perform the target localization is essential. We developed an energy-efficient and distributed self-organization algorithm for target tracking using wireless acoustic sensor networks. The major error sources of the localization process were studied, and an energy-aware node selection criterion was developed to minimize the target localization errors. Using this node selection criterion, the self-organization algorithm selects a near-optimal localization sensor group to minimize the target tracking errors. In addition, a message passing protocol was developed to implement the self-organization algorithm in a distributed manner. In order to achieve extended sensor network lifetime, energy conservation was incorporated into the self-organization algorithm by incorporating a sleep-wakeup management mechanism with a novel cross layer adaptive wakeup probability adjustment scheme. The simulation results confirm that the developed self-organization algorithm provides satisfactory target tracking performance. Moreover, the energy saving analysis confirms the effectiveness of the cross layer power management scheme in achieving extended sensor network lifetime without degrading the target tracking performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the long history of Muslims in Russia, most scholarly and political literatures on Russia’s Islam still narrowly interpret Muslim-Slavs relations in an ethnic-religious oppositional framework. In my work, I examine Russia’s discourse on Islam to argue that, in fact, the role of Islam in post-Soviet Russia is complex. Drawing from direct sources from academic, state, journalistic, and underground circles, often neglected by Western commentators, I identify ideational patterns in conceptualizations of Islam and reconstruct relational networks among authors. To explain complex intertextual relations within specific contexts, I utilize an analytically eclectic method that appropriately combines theories from different paradigms and/or disciplines. Thanks to my multi-dimensional approach, I show that, contrary to traditional views, Russia’s Muslims participate in processes of post-Soviet Russia’s identity formation. Starting from textual contents, avoiding pre-formed analytical frames, I argue that many Muslims in Russia perceive themselves as part of Russian civilization – even when they challenge the status-quo. Building on my initial findings, I state that a key element in Russia’s conceptualization of Islam is the definition, elaborated in the 1990s, of traditional Islam as part of Russian civilizational history, as opposed to extremist Islam as extraneous, hostile phenomenon. The differentiation creates an unprecedently safe, if confined, space for Islamic propositions, of which Muslims are taking advantage. Embedded in debates on Russian civilization, conceptualizations of Islam, then, influence Russia’s (geo)political self-perceptions and, consequently, its domestic and international policies. In particular, Russian so-far neglected Islamic doctrine supports views of Islamic terrorism as a political and not religious phenomenon. Hence, Russia interprets both terrorism and counterterrorism within its own historical tradition, causing its strategy to be at odds with Western views. Less apparently, these divergences affect Russian-U.S. broader relations. Finally, in revealing the civilizational value of Russia’s Islam, I expose intellectual relations among influential subjects who share the aim to devise a new civilizational model that should combine Slavic and non-Slavic, Orthodox and Islamic, Western, and Asian components. In this old Russian dilemma, the novelty is Muslims’ participation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1996, the authors of the Canadian Royal Commission on Aboriginal Peoples concluded Canadian educational policy had been based on the false assumption of the superiority of European worldviews. The report authors recommended the transformation of curriculum and schools to recognize that European knowledge was not universal. Aboriginal researcher Battiste believes the current system of Canadian education causes Aboriginal children to face cognitive imperialism and cognitive assimilation and that this current practice of cultural racism in Canada makes educational institutions a hostile environment for Aboriginal learners. In order to counter this cultural racism, Battiste calls for the decolonization of education. ^ In 2005, the president of Northwest Community College (NWCC), publicly committed to decolonizing the college in order to address the continuing disparity in educational attainment between Aboriginal and non-Aboriginal learners. Upon the president’s departure in 2010, the employees of NWCC were left to define for themselves the meaning of decolonization. ^ This qualitative study was designed to build a NWCC definition of colonization and decolonization by collecting researcher observations, nine weeks of participant blog postings, and pre and post blog Word survey responses drawn from a purposeful sample of six Aboriginal and six non-Aboriginal NWCC employees selected from staff, instructor and administrator employee groups. The findings revealed NWCC employees held multiple definitions of colonization and decolonization which did not vary between employee groups, or based on participant gender; however, differences were found based on whether the participants were Aboriginal or non-Aboriginal. ^ Both Aboriginal and non-Aboriginal participants thought decolonization was a worthy goal for the college. Aboriginal participants felt hopeful that decolonization would happen in the future and thought decolonization had to do with moving forward to a time when they would be valued, respected, empowered, unashamed, safe, and viewed as equal to non-Aboriginals. Non-Aboriginal participants were unsure if decolonization was possible because it would require going back in time to restore the Aboriginal way of life. When non-Aboriginal participants felt their thoughts were not being valued or they were being associated with colonialism, they felt angry and guarded and were uncomfortable with Aboriginal participants expressing anger towards Colonizers.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study compared the effects of sexist labeling on the perceptions of visual artists by the community college and university students and determined their sex role orientation. The 370 students were shown five slides of an artist's works and were given six versions of an artist's biography. It contained embedded sexual labeling (woman, girl, person/ she, man, guy, person/he). The Artist Evaluation Questionnaire was administered to the female and male community college and university students that required the students to evaluate the female and male artists on several aspects of affective and cognitive measures. The questionnaire consisted of 9 items that had to be rated by the participants. In addition, the students filled out the Demographic Questionnaire and the BEM Sex Role Inventory, titled the Attitude Questionnaire. The Analysis of Variance testing procedures were administered to analyze the responses. The results disclosed gender differences in students' ratings. The female artist's work, when the artist was referred to by the neutral sexual label, "person", received significantly higher ratings from the female students. The male students gave the female artist her highest ratings when she was referred to by the low status sexual label, "girl". Both sexes did not express statistically significant preferences for any of the male sexual labels. Gender difference became apparent when it was found that female students rated both sexes equally, and their ratings were lower than those of the male students. The male students rated the female artist's work higher than the work of the male artist. The analysis of the sex role inventory questionnaire revealed the absence of the feminine (expressive) and masculine (instrumental) personalities among the students. The personalities of almost all the students were androgynous, with a few within the range of the near feminine, and a few within the range of the near masculine. The study reveals that there are differences in perception of sexual labels among the community college and university students.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the developments in computing and communication technologies, wireless sensor networks have become popular in wide range of application areas such as health, military, environment and habitant monitoring. Moreover, wireless acoustic sensor networks have been widely used for target tracking applications due to their passive nature, reliability and low cost. Traditionally, acoustic sensor arrays built in linear, circular or other regular shapes are used for tracking acoustic sources. The maintaining of relative geometry of the acoustic sensors in the array is vital for accurate target tracking, which greatly reduces the flexibility of the sensor network. To overcome this limitation, we propose using only a single acoustic sensor at each sensor node. This design greatly improves the flexibility of the sensor network and makes it possible to deploy the sensor network in remote or hostile regions through air-drop or other stealth approaches. Acoustic arrays are capable of performing the target localization or generating the bearing estimations on their own. However, with only a single acoustic sensor, the sensor nodes will not be able to generate such measurements. Thus, self-organization of sensor nodes into virtual arrays to perform the target localization is essential. We developed an energy-efficient and distributed self-organization algorithm for target tracking using wireless acoustic sensor networks. The major error sources of the localization process were studied, and an energy-aware node selection criterion was developed to minimize the target localization errors. Using this node selection criterion, the self-organization algorithm selects a near-optimal localization sensor group to minimize the target tracking errors. In addition, a message passing protocol was developed to implement the self-organization algorithm in a distributed manner. In order to achieve extended sensor network lifetime, energy conservation was incorporated into the self-organization algorithm by incorporating a sleep-wakeup management mechanism with a novel cross layer adaptive wakeup probability adjustment scheme. The simulation results confirm that the developed self-organization algorithm provides satisfactory target tracking performance. Moreover, the energy saving analysis confirms the effectiveness of the cross layer power management scheme in achieving extended sensor network lifetime without degrading the target tracking performance.