987 resultados para inter-partner trust


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intimate partner violence (IPV) is not only a problem for heterosexual couples. Although research in the area is beset by methodological and definitional problems, studies generally demonstrate that IPV also affects those who identify as non-heterosexual; that is, those sexualities that are typically categorized as lesbian, gay, bisexual, transgender, or intersex (LGBTI). IPV appears to be at least as prevalent in LGBTI relationships as it is in heterosexual couples, and follows similar patterns (e.g. Australian Research Centre on Sex, Health and Society 2006; Donovan et al. 2006; Chan 2005; Craft and Serovich 2005; Burke et al. 2002; Jeffries and Ball 2008; Kelly and Warshafsky 1987; Letellier 1994; Turrell 2000; Ristock 2003; Vickers 1996). There is, however, little in the way of specific community or social services support available to either victims or perpetrators of violence in same-sex relationships (see Vickers 1996). In addition, there are important differences in the experience of IPV between LGBTI and non-LGBTI victims, and even among LGBTI individuals; for example, among transgender populations (Chan 2005), and those who are HIV sero-positive (Craft and Serovich 2005). These different experiences of IPV include the use of HIV and the threat of “outing” a partner as tools of control, as just two examples (Jeffries and Ball 2008; Salyer 1999; WA Government 2008b). Such differences impact on how LGBTI victims respond to the violence, including whether or not and how they seek help, what services they are able to avail themselves of, and how likely they are to remain with, or return to, their violent partners (Burke et al. 2002). This chapter explores the prevalent heteronormative discourses that surround IPV, both within the academic literature, and in general social and government discourses. It seeks to understand how same-sex IPV remains largely invisible, and suggests that these dominant discourses play a major role in maintaining this invisibility. In many respects, it builds on work by a number of scholars who have begun to interrogate the criminal justice and social discourses surrounding violent crime, primarily sexual violence, and who problematize these discourses (see for example Carmody 2003; Carmody and Carrington 2000; Marcus 1992). It will begin by outlining these dominant discourses, and then problematize these by identifying some of the important differences between LGBTI IPV and IPV in heterosexual relationships. In doing so, this chapter will suggest some possible reasons for the silence regarding IPV in LGBTI relationships, and the effects that this can have on victims. Although an equally important area of research, and another point at which the limitations of dominant social discourses surrounding IPV can be brought to light, this chapter will not examine violence experienced by heterosexual men at the hands of their intimate female partners. Instead, it will restrict itself to IPV perpetrated within same-sex relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract With the phenomenal growth of electronic data and information, there are many demands for the development of efficient and effective systems (tools) to perform the issue of data mining tasks on multidimensional databases. Association rules describe associations between items in the same transactions (intra) or in different transactions (inter). Association mining attempts to find interesting or useful association rules in databases: this is the crucial issue for the application of data mining in the real world. Association mining can be used in many application areas, such as the discovery of associations between customers’ locations and shopping behaviours in market basket analysis. Association mining includes two phases. The first phase, called pattern mining, is the discovery of frequent patterns. The second phase, called rule generation, is the discovery of interesting and useful association rules in the discovered patterns. The first phase, however, often takes a long time to find all frequent patterns; these also include much noise. The second phase is also a time consuming activity that can generate many redundant rules. To improve the quality of association mining in databases, this thesis provides an alternative technique, granule-based association mining, for knowledge discovery in databases, where a granule refers to a predicate that describes common features of a group of transactions. The new technique first transfers transaction databases into basic decision tables, then uses multi-tier structures to integrate pattern mining and rule generation in one phase for both intra and inter transaction association rule mining. To evaluate the proposed new technique, this research defines the concept of meaningless rules by considering the co-relations between data-dimensions for intratransaction-association rule mining. It also uses precision to evaluate the effectiveness of intertransaction association rules. The experimental results show that the proposed technique is promising.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the field of semantic grid, QoS-based Web service composition is an important problem. In semantic and service rich environment like semantic grid, the emergence of context constraints on Web services is very common making the composition consider not only QoS properties of Web services, but also inter service dependencies and conflicts which are formed due to the context constraints imposed on Web services. In this paper, we present a repair genetic algorithm, namely minimal-conflict hill-climbing repair genetic algorithm, to address the Web service composition optimization problem in the presence of domain constraints and inter service dependencies and conflicts. Experimental results demonstrate the scalability and effectiveness of the genetic algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is subsequently used to handle individual cases, for instance, to process customer orders. Process configuration is notoriously difficult as there may be all kinds of interdependencies between configuration decisions.} In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the ``operating guidelines'' used for partner synthesis. We view the configuration process as an external service, and compute a characterization of all such services which meet particular requirements using the notion of configuration guideline. As a result, we can characterize all feasible configurations (i.\,e., configurations without behavioral problems) at design time, instead of repeatedly checking each individual configuration while configuring a process model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intimate partner abuse and control is one of the most common forms of violence against women, and is considered an international problem of social, political, legal and human rights significance. Yet few studies have attempted to understand this problem from the perspective of male perpetrators. This gap is addressed by conducting in-depth interviews with 16 able-bodied men of white European ancestry born and educated in New Zealand or Australia, who have been physically violent and/or emotionally, intellectually, sexually or financially controlling of a live-in female partner. This thesis extends and deepens the dominant ways of thinking about men’s intimate partner abuse by utilising a new theoretical framework compatible with contemporary feminist scholarship. A synthesis of Connell’s theory of masculinities and Bourdieu’s field theory is utilised for the purpose of exploring more nuanced, complex understandings of manliness and men’s relationships with men, women and social structures. Through such an analysis, this thesis finds that men’s perpetration of power and control over women is driven by a need to avoid the stigma of appearing weak. As a consequence, their desire and ability to show love, care and empathy is suppressed in favour of a presumed honourable manliness, and their female partners are used as weapons in the pursuit of symbolic capital in the form of recognition, prestige and acceptance from real and/or imagined men. This research also uncovers the complex interplay between masculine practices and particular social contexts. For example, the norms of practice encountered from those in authority, such as teachers, sports coaches, police, court judges and workplace management, influences the decision making of the men in this study, to use, or not to use, physical violence, psychological abuse and structural control. The principal conclusion is that there is a repertoire of paradoxical masculinities and contradictory social messages available to the men in this study. But gender policing by other men, complicit women and those in authority provides little room for legitimate complexity in masculine practices. Perpetrators in this study reconcile these conflicts of interest by generally avoiding subordinated masculinity and possible ostracism, and instead practicing more heroic hegemonic masculinities by abusing and controlling women and particular other men. This thesis concludes that for intimate partner abuse and control to cease, changes in power structures have to occur at all levels of society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: Relationship trust and commitment are two key dimensions of international exchanges. Both have been extensively investigated from an exporter (as opposed to importer) perspective in developed country (as opposed to developing country) contexts. To address these gaps, this study aims to develop a model of antecedents and outcomes of importer trust and commitment in two developing countries.---------- Design/methodology: The authors test the proposed model using data from Chile and Bangladesh. Hypotheses were tested using structural equation modeling (SEM).---------- Findings: SEM analysis revealed that most of the hypotheses were supported in both the Bangladeshi and Chilean context. The findings of this study also suggest that the effects of importer transaction-specific investments on importer commitment are distinct in the Bangladeshi context. Practical implications: Practically, these results show that trust and commitment are essential for enhancing importer relationship performance in developing countries. Importer trust in a foreign supplier is effective when suppliers are competent and provide relatively superior facilities, as opposed to opportunistic proclivity. Importer commitment to a foreign supplier is stronger when importers perceive that the foreign supplier is not opportunistic, but is knowledgeable and experienced with the importer market, and they perceive that it is an advantage importing from that supplier. Cultural similarity between importers and foreign suppliers improves importer trust in both countries. However, importer commitment in Chile increases with importer transaction-specific investment, but this is not found to be the case in Bangladesh.---------- Originality/value: This study contributes to the importer-exporter exchange relationship literature by testing a model of antecedents and outcomes of importer trust and commitment. The tested model is one of few that considers developing country contexts and incorporates two novel antecedents of trust and commitment: importer knowledge and experience, and supplier resource competency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many studies in the area of project management and social networks have identified the significance of project knowledge transfer within and between projects. However, only few studies have examined the intra- and inter-projects knowledge transfer activities. Knowledge in projects can be transferred via face-to-face interactions on the one hand, and via IT-based tools on the other. Although companies have allocated many resources to the IT tools, it has been found that they are not always effectively utilised, and people prefer to look for knowledge using social face-to-face interactions. This paper explores how to effectively leverage two alternative knowledge transfer techniques, face-to-face and IT-based tools to facilitate knowledge transfer and enhance knowledge creation for intra- and inter-project knowledge transfer. The paper extends the previous research on the relationships between and within teams by examining the project’s external and internal knowledge networks concurrently. Social network qualitative analysis, using a case study within a small-medium enterprise, was used to examine the knowledge transfer activities within and between projects, and to investigate knowledge transfer techniques. This paper demonstrates the significance of overlapping employees working simultaneously on two or more projects and their impact on facilitating knowledge transfer between projects within a small/medium organisation. This research is also crucial to gaining better understanding of different knowledge transfer techniques used for intra- and inter-project knowledge exchange. The research provides recommendations on how to achieve better knowledge transfer within and between projects in order to fully utilise a project’s knowledge and achieve better project performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aims to stimulate thought, debate and action for change on this question of more vigorous philanthropic funding of Australian health and medical research (HMR). It sharpens the argument with some facts and ideas about HMR funding from overseas sources. It also reports informed opinions from those working, giving and innovating in this area. It pinpoints the range of attitudes to HMR giving, both positive and negative. The study includes some aspects of Government funding as part of the equation, viewing Government as major HMR givers, with particular ability to partner, leverage and create incentives. Stimulating new philanthropy takes active outreach. The opportunity to build more dialogue between the HMR industry and the wider community is timely given the ‘licence to practice’ issues and questioned trust that applies currently somewhat both to science and to the charitable sector. This interest in improving HMR philanthropy also coincides with the launch last year by the Federal Government of Nonprofit Australia Limited (NAL), a group currently assessing infrastructure improvements to the charitable sector. History suggests no one will create this change if Research Australia does not. However, interest in change exists in various quarters. For Research Australia to successfully change the culture of Australian HMR giving, the process will drive the outcomes. Obviously stakeholder buy-in and partners will be needed and the ultimate blueprint for greater philanthropic HMR funding here will not be this document. Instead it will be the one that wears the handprint and ‘mindprint’ of the many architects and implementers interested in promoting HMR philanthropy, from philanthropists to nonprofit peaks to government policy arms. As the African proverb says, ‘If you want to go fast, go alone; but if you want to go far, go with others’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 2005 QUT through a number of large Teaching and Learning Grants has sponsored a range of teamwork learning initiatives to assist students to develop the teamwork skills demanded by industry. After a suite of six online team learning modules was developed, first year unit coordinators requested an additional module to address the challenges of working with the diverse range of social, cultural and personal values that students from different backgrounds bring to student teams. The Intercultural Teams module asks students to map themselves against a Cultural Orientations Framework so they can understand their own cultural beliefs. By learning about other cultural orientations and comparing and analysing their effects, team members can develop communication and team process management strategies to leverage their differences to realise effective and creative outcomes. The interactive session will demonstrate the elements of the Intercultural Teams module and ask participants to consider ways the module can be integrated into classroom learning to support the development of students’ intercultural competencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several lines of evidence implicate the p38 mitogen-activated protein kinase (p38 MAPK) in the proinflammatory response to bacterial agents and cytokines. Equally, the transcription factor, nuclear factor (NF)-kappaB, is recognized to be a critical determinant of the inflammatory response in intestinal epithelial cells (IECs). However, the precise inter-relationship between the activation of p38 MAPK and activation of the transcription factor NF-kappaB in the intestinal epithelial cell (IEC) system, remains unknown. Here we show that interleukin (IL)-1beta activates all three MAPKs in Caco-2 cells. The production of IL-8 and monocyte chemotactic protein 1 (MCP-1) was attenuated by 50% when these cells were preincubated with the p38 MAPK inhibitor, SB 203580. Further investigation of the NF-kappaB signalling system revealed that the inhibitory effect was independent of the phosphorylation and degradation of IkappaBalpha, the binding partner of NF-kappaB. This effect was also independent of the DNA binding of the p65 Rel A subunit, as well as transactivation, determined by an NF-kappaB luciferase construct, using both SB 203580 and dominant-negative p38 MAPK. Evaluation of IL-8 and MCP-1 RNA messages by reverse transcription-polymerase chain reaction (RT-PCR) revealed that the inhibitory effect of SB 203580 was associated with a reduction in this parameter. Using an IL-8-luciferase promoter construct, an effect of p38 upon its activation by both pharmacological and dominant-negative p38 construct co-transfection was demonstrated. It is concluded that p38 MAPK influences the expression of chemokines in intestinal epithelial cells, through an effect upon the activation of the chemokine promoter, and does not directly involve the activation of the transcription factor NF-kappaB

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-­resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper­-resistance state of the receiver is also included in this cryptographic proof.