15,823 research outputs found

    'Men give in to chips and beer too easily': How working-class men make sense of gender differences in health

    Get PDF
    This article, based on qualitative research with working-class men, explores men's perceptions and experiences regarding gender differences in health. It demonstrates how men put forward a range of behavioural/cultural, materialist/structural and psychosocial factors, which were believed to differently impact men's health compared to women. A common theme underpinning their explanations was the ways in which men and women were located within two distinct gender categories. These characterisations were used to explain why health-damaging beliefs and behaviours were more prevalent among men and also why men were better suited for certain kinds of jobs, albeit with potential costs to their health. Men also believed that women were protected from the damaging physical and emotional impact of manual employment because of their primary role within the home and because they were less emotionally robust, which required men to shield women from the stresses they experienced. However, men's emotional withdrawal can also be viewed as another example of how men use whatever resources are available to achieve and maintain dominance over women. Finally, the article demonstrates how a gender- and class-based approach can capture the impact of men's health-related practices alongside the broader cultural and structural influences on men's health

    Beirut. The metropolis of darkness and the politics of urban electricity grid

    Get PDF
    International audienceDespite massive investments in infrastructure reconstruction, Beirut has never fully recovered 24/7 provision of electricity after the civil war (1975-90). Since 2006, the consequences of Israeli bombings and of infrastructure decaying in a context of political bickering preventing new investments plans have worsened the situation. On average, electricity is currently supplied only half of the day. Building on Timothy Mitchell's project to follow the tracks of energy in order to unravel the precarious agencies of power that allow its flows to circulate, I try to map the disruptions and reconfigurations of energy circuits and to show that it both reflect existing configurations of power in the city and create new ones. (Mitchell 2011) At a first glance, uneven access to electricity might well be understood as the way to reproduce social and political domination between central Beirut and its suburbs and between the wealthiest and the middle and lower class, for which the cost of making without public network is very heavy. But seen from Mitchell's perspective, the economic arrangements and the technological devices needed to run the system and for the electricity being generated and processed contain in themselves their fragilities that allow such domination to be constantly challenged by the clients-users-citizens or newcomers like informal vendors of alternative electricity devices (the famous generators). Thus, one might well read the rising protests against the current state of blackness in Beirut as new agencies of power that seek to undermine and derail the symbolical hierarchies of power (here I will analyse cartoons and the Minister of Energy bashing on the social networks), despite the constant struggle by the political class to reenact them through sectarian cleavages. Hooking and meter-pirating, as well as non-payment, display the power of the network's end-users. The development of private illegal-but-tolerated generators involves the building of new local configuration of power

    Gendering the Second Amendment

    Get PDF

    Modelling security properties in a grid-based operating system with anti-goals

    Get PDF

    Children's caring roles and responsibilities within the family in Africa

    Get PDF
    In many Sub-Saharan African countries, the care of chronically ill, disabled or elderly relatives is usually regarded as the responsibility of family members, within a broader landscape of often overburdened healthcare systems, the expense of medical fees, very limited access to social protection and policies that emphasise home-based care. Recent studies have demonstrated that children and youth, particularly girls and young women, take on considerable caring roles for chronically ill and elderly relatives in Africa. This article reviews the available research on young people’s caring roles and responsibilities within families affected by chronic illness and disability in Sub-Saharan Africa. I discuss how children’s caring roles challenge global and local constructions of childhood and suggest ways of conceptualising the socio-spatial and embodied dimensions of children’s everyday care work within diverse household forms. I analyse evidence on outcomes of care and children’s resilience in managing their caring responsibilities and examine the complex array of processes that influence whether children take on caring roles within the family. I argue that relational, intergenerational and lifecourse approaches to researching children’s caring responsibilities within the family have considerable potential for future geographical research and could provide further insights into the ways that care is embedded in social relations, cultural norms and structural inequalities operating in different configurations in particular places

    THE WEAKEST LINK HYPOTHESIS FOR ADAPTIVE CAPACITY: AN EMPIRICAL TEST

    Get PDF
    Yohe and Tol (2001) built an indexing method for vulnerability based on the hypothesis that the adaptive capacity for any system facing a vector of external stresses could be explained by the weakest of eight underlying determinants – the so-called “weakest link” hypothesis. Subsequent work supported the hypothesis by analogy from other contexts, but we now offer perhaps the first attempt to explore its validity through empirical means. We estimate a structural form designed to accommodate the full range of possible interactions across determinants. The perfect complement case of the pure “weakest-link” formulation lies on one extreme, and the perfect substitute case where each determinant can compensate for all others at constant rates is the other limiting case. For vulnerability to natural disasters, infant mortality and drinking water treatment, we find qualified support for a modified weakest link hypothesis: the weakest indicator plays an important role, but is not essential because other factors can compensate (with increasing difficulty). For life expectancy, sanitation and nutrition, we find a relationship that is close to linear – the perfect substitute case where the various determinants of adaptive capacity can compensate for each other. Moreover, we find another source of diversity in the assessment of vulnerability, since the factors from which systems draw to create adaptive capacity are different for different risks.Adaptive capacity, vulnerability, weakest-link hypothesis, substitution

    Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service

    Full text link
    Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on untrusted server. The access control mechanism can restrict users from unauthorized access, but in cloud environment access control policies are more flexible. However, an attacker can gather sensitive information for a malicious purpose by abusing the privileges as another user and so database security is compromised. The other problems associated with the DBaaS are to manage role hierarchy and secure session management for query transaction in the database. In this paper, a role-based access control for the multitenant database with role hierarchy is proposed. The query is granted with least access privileges, and a session key is used for session management. The proposed work protects data from privilege escalation and SQL injection. It uses the partial homomorphic encryption (Paillier Encryption) for the encrypting the sensitive data. If a query is to perform any operation on sensitive data, then extra permissions are required for accessing sensitive data. Data confidentiality and integrity are achieved using the role-based access control with partial homomorphic encryption.Comment: 11 Pages,4 figures, Proceedings of International Conference on ICT for Sustainable Developmen

    Gendered vulnerabilities to climate change: insights from the semi-arid regions of Africa and Asia

    Get PDF
    Emerging and on-going research indicates that vulnerabilities to impacts of climate change are gendered. Still, policy approaches aimed at strengthening local communities’ adaptive capacity largely fail to recognize the gendered nature of everyday realities and experiences. This paper interrogates some of the emerging evidence in selected semi-arid countries of Africa and Asia from a gender perspective, using water scarcity as an illustrative example. It emphasizes the importance of moving beyond the counting of numbers of men and women to unpacking relations of power, of inclusion and exclusion in decision-making, and challenging cultural beliefs that have denied equal opportunities and rights to differently positioned people, especially those at the bottom of economic and social hierarchies. Such an approach would make policy and practice more relevant to people’s differentiated needs and responses
    • 

    corecore