11,644 research outputs found
Seeing More than Orange: Organizational Respect and Positive Identity Transformation in a Prison Context
This paper develops grounded theory on how receiving respect at work enables individuals to engage in positive identity transformation and the resulting personal and work-related outcomes. A company that employs inmates at a state prison to perform professional business-to-business marketing services provided a unique context for data collection. Our data indicate that inmates experienced respect in two distinct ways, generalized and particularized, which initiated an identity decoupling process that allowed them to distinguish between their inmate identity and their desired future selves and to construct transitional identities that facilitated positive change. The social context of the organization provided opportunities for personal and social identities to be claimed, respected, and granted, producing social validation and enabling individuals to feel secure in their transitional identities. We find that security in personal identities produces primarily performance-related outcomes, whereas security in the company identity produces primarily well-being-related outcomes. Further, these two types of security together foster an integration of seemingly incompatible identitiesââidentity holismââas employees progress toward becoming their desired selves. Our work suggests that organizations can play a generative role in improving the lives of their members through respect-based processes
Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)
Distracted by your mind? Individual differences in distractibility predict mind wandering
Attention may be distracted from its intended focus both by stimuli in the external environment and by internally generated task-unrelated thoughts during mind wandering. However, previous attention research has focused almost exclusively on distraction by external stimuli, and the extent to which mind wandering relates to external distraction is as yet unclear. In the present study, the authors examined the relationship between individual differences in mind wandering and in the magnitude of distraction by either response-competing distractors or salient response-unrelated and task-irrelevant distractors. Self-reported susceptibility to mind wandering was found to positively correlate with task-irrelevant distraction but not with response-competition interference. These results reveal mind wandering as a manifestation of susceptibility to task-irrelevant distraction and establish a laboratory measure of general susceptibility to irrelevant distraction, including both internal and external sources
Why and How Your Traceability Should Evolve: Insights from an Automotive Supplier
Traceability is a key enabler of various activities in automotive software
and systems engineering and required by several standards. However, most
existing traceability management approaches do not consider that traceability
is situated in constantly changing development contexts involving multiple
stakeholders. Together with an automotive supplier, we analyzed how technology,
business, and organizational factors raise the need for flexible traceability.
We present how traceability can be evolved in the development lifecycle, from
early elicitation of traceability needs to the implementation of mature
traceability strategies. Moreover, we shed light on how traceability can be
managed flexibly within an agile team and more formally when crossing team
borders and organizational borders. Based on these insights, we present
requirements for flexible tool solutions, supporting varying levels of data
quality, change propagation, versioning, and organizational traceability.Comment: 9 pages, 3 figures, accepted in IEEE Softwar
Experimentation and innovation in police reform: Timor-Leste, Solomon Islands and Bougainville
The plural character of policing provision in most countries is now widely acknowledged, though rarely reflected in the practical police reform programming undertaken by donors. While much of the literature on international police assistance focuses on its modest results and innate limitations, less attention has been paid to those still relatively rare programmes that have sought to engage with the local realities of plural policing. This is particularly so in the conflict-affected and fragile settings where such assistance is typically provided. In this article, we present three case studies of policing innovation and experimentation from Timor-Leste, Solomon Islands and Bougainville, respectively, set in the context of the recent and very different post-conflict interventions in each place. While not wishing to overstate the impact of these modest programmes, we highlight their potential contribution to fostering productive relations across the multiple social orders and sources of authority found in many post-colonial, post-conflict and otherwise fragile contexts. We tentatively conclude that the most significant contribution of these kinds of initiative is likely to lie beyond the realm of institutionalised policing and, specifically, in relation to larger processes of social and political change, including state formation, under way in these places
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data
When a legacy systemâs software architecture cannot be redesigned, implementing
additional privacy requirements is often complex, unreliable and
costly to maintain. This paper presents a privacy-by-design approach to
reengineer web applications as linked data-enabled and implement access
control and privacy preservation properties. The method is based on the
knowledge of the application architecture, which for the Web of data is
commonly designed on the basis of a model-view-controller pattern. Whereas
wrapping techniques commonly used to link data of web applications duplicate
the security source code, the new approach allows for the controlled
disclosure of an applicationâs data, while preserving non-functional properties
such as privacy preservation. The solution has been implemented
and compared with existing linked data frameworks in terms of reliability,
maintainability and complexity
How Relevant? The EUâs âGeopoliticalâ Commission and the Response to the Covid-19 Pandemic. College of Europe Policy Brief #4.20 April 2020
The Covid-19 pandemic constitutes an unprecedented
challenge for the European Union (EU), posing
existential internal as well as external threats to
the European integration project.
> At the same time, the impact of this global crisis on
the international order opens unexpected windows
of opportunity for reinforced European integration
and a stronger EU presence in the world.
> To seize the momentum, the European Commission
needs to act consistently with the geopolitical approach
put forward by President Ursula von der
Leyen.
> Internally, it must promote cohesion and unity
among member states and coordinate a joint European
response to the sanitary, political, and socioeconomic
challenges.
> Externally, it must join efforts with like-minded
members of the international community to establish
a robust system of multilateral crisis management
tackling the multiple dimensions of the crisis
- âŠ