814 resultados para Sexual identity management strategies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

La recherche portant sur les expériences reliées aux services sociaux et de santé chez les aînés gais reçoit une attention croissante; cependant, les expériences dans le contexte des services à domicile demeurent peu documentées. Les deux principaux objectifs de cette étude sont d’explorer le vécu des aînés gais recevant des services à domicile relativement à leurs stratégies identitaires et de décrire leurs besoins spécifiques en vue de l’adaptation des pratiques sociales à domicile. Les propos de six aînés gais ont été recueillis dans la région de Montréal par entrevues semi-dirigées. Les résultats montrent que les expériences des aînés recevant des services à domicile sont généralement satisfaisantes; parmi eux, certains se sont sentis stigmatisés, mais seulement dans de rares moments et nous ont rapporté avoir plutôt vécu des situations les rendant mal à l’aise. Les résultats présentent aussi une utilisation variée des quatre stratégies identitaires (divulgation active, divulgation passive, dissimulation passive, dissimulation active) d’après une adaptation du modèle d’Eliason et Schope (2001). Si des facteurs individuels et interactionnels ont influencé les stratégies des aînés, ce sont cependant des facteurs contextuels (le type de service d’aide à domicile, le temps, le contexte social immédiat) qui ont pris une importance significative. Enfin, diverses pistes d’action sont à explorer pour l’adaptation des pratiques sociales auprès de cette population, notamment à l’égard de la formation des intervenants sociaux et de la santé, de l’amélioration de l’organisation des services à domicile, du développement de ressources spécifiques et de la contribution du travailleur social auprès des minorités sexuelles âgées.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It has often been argued that young woman’s magazine’s, like Cosmopolitan, Cleo Dolly and Seventeen, constitute a significant instrument in the patriarchal repression of young women - their hegemonic success lying in the fact that they appear to be sites wherein young women are ‘free’ from the elements of coercion so obviously in evidence within other terrains, such as the school and the family. This paper will suggest an alternative approach to these magazines. Rather than locating such texts within an overall model of repression and patriarchal domination, it will be argued here that they can be regarded as practical manuals which enrol young women to do specific kinds of work on themselves. In doing so, they form an effective link between the governmental imperatives aimed at constructing particular personas (such as, for example, ‘the sexually responsible young woman’), and the actual practices whereby these imperatives are operationalised. These manuals do not prevent young women from learning to ‘project a unique self’, they constitute a significant source of practices and techniques through which particular types of self are shaped.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Construction sites around the world employ large numbers of people from diverse cultural backgrounds. The effective management of this cultural diversity has important implications for the productivity, safety, health and welfare of construction workers and for the performance and reputation of firms which employ them. The findings of a three year, multi-staged study of cultural diversity management practices on construction sites are critiqued using social identity theory. This reveals that so called "best-practice" diversity management strategies may have an opposite effect to that intended. It is concluded that the management of diversity on construction projects would benefit from being informed by social identity research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

All Australian businesses are governed by legislation aiming to prevent workplace discrimination based on sexual orientation and sexual identity and serious penalties apply to companies found contravening legislation. While other Australian studies have examined these issues, Queensland has either not been included or relevant data is not easily identified. This paper presents the results of an exploratory study using a quantitative survey to determine the consequences of disclosure of a person’s sexual orientation or gender identity to colleagues in workplaces in Queensland. Results suggest GLBTI workers are disclosing their sexuality more and are experiencing more discrimination in the workplace, despite anti-discrimination policies. This suggests the need to further investigate companies’ compliance with workplace legislation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study extends previous research into social networking sites (SNSs) as environments that often reduce spatial, temporal, and social boundaries, which can result in collapsed contexts for social situations. Context collapse was investigated through interviews and Facebook walkthroughs with 27 LGBTQ young people in the United Kingdom. Since diverse sexualities are often stigmatized, participants’ sexual identity disclosure decisions were shaped by both the social conditions of their online networks and the technological architecture of SNSs. Context collapse was experienced as an event through which individuals intentionally redefined their sexual identity across audiences or managed unintentional disclosure. To prevent unintentional context collapse, participants frequently reinstated contexts through tailored performances and audience separation. These findings provide insight into stigmatized identity performances in networked publics while situating context collapse within a broader understanding of impression management, which paves the way for future research exploring the identity implications of everyday SNS use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper outlines the methods and outcomes of a study into equity management strategies in Australian private sector organisations reporting to the Equal Opportunity for Women in the Workplace Agency. Reports from 1976 organisations indicate eleven key factors characterising equity management in Australia. The study highlights differences within previously identified social structural policies, temperamental and opportunity policies and identifies a further policy type, categorised as “support policies”. Differences have also been identified in relation to distribution structures, suggesting that gender is not the sole consideration in determining equity management strategies. The principle of distribution also figures strongly in equity management implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the increasing complexity of modern day threats and the growing sophistication of interlinked and interdependent operating environments, Business Continuity Management (BCM) has emerged as a new discipline, offering a strategic approach to safeguarding organisational functions. Of significant interest is the application of BCM frameworks and strategies within critical infrastructure, and in particular the aviation industry. Given the increased focus on security and safety for critical infrastructures, research into the adoption of BCM principles within an airport environment provides valuable management outcomes and research into a previously neglected area of inquisition. This research has used a single case study methodology to identify possible impediments to BCM adoption and implementation by the Brisbane Airport Corporation (BAC). It has identified a number of misalignments between the required breadth of focus for a BCM program, identified differing views on specific roles and responsibilities required during a major disruptive event and illustrated the complexities of the Brisbane Airport which impede the understanding and implementation of effective Business Continuity Management Strategies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.