304 research outputs found

    Contested Workplace: The Case of the Strike of the United Food and Commercial Workers Union versus Meijer

    Get PDF
    This paper examines the struggle between labor and management at four, newly-opened supermarket/discount stores, culminating in a strike. It considers workplace control as an issue in the strike and its resolution. Edwards\u27 typology of workplace control is reviewed, along with other indirect forms of control explored in recent literature. Workers complained most stridently about direct control mechanisms. Workers\u27 objections to technical and bureaucratic control played only a minor part in workers\u27 decision to strike and the work stoppage\u27s outcome. Indirect controls, including customer and gender-specific control mechanisms, were seldom questioned or acknowledged by workers. On the other hand, both the union and management recognized that customer support can influence the course and outcome of a strike. The settlement of this eight-and-onehalf week strike resulted in slightly improved wages and benefits and modification of some elements of direct contro

    Communication of IPCC visuals: IPCC authors’ views and assessments of visual complexity

    Get PDF
    Scientific figures, i.e. visuals such as graphs and diagrams, are an important component of Intergovernmental Panel on Climate Change (IPCC) reports that support communication and policy-making. It is therefore imperative that figures are robust representations of the science and are accessible to target audiences. We interviewed IPCC authors (n = 18) to understand the development of figures in the IPCC Fifth Assessment Report (AR5) Working Group 1 (WG1) Summary for Policy-Makers (SPM). Authors expressed the view that the need to maintain scientific accuracy constrained making figures more accessible, with the consequence that figures retained complexity and often required specialists to explain the figures to others. Using sort tasks with IPCC authors and with a group of non-specialists (undergraduate students; n = 38), we found that IPCC authors generally had good awareness of which figures non-specialists perceived as being most difficult to understand. Further, by evaluating the visual complexity of the AR5 WG1 SPM figures using a computational measure, we found that greater visual complexity (i.e. high quantity of information, use of multiple colours and densely packed visual elements) is associated with greater perceived comprehension difficulty. Developing and integrating computational approaches to assess figures alongside user testing could help inform how to overcome visual complexity while maintaining scientific rigour and so enhance communication of IPCC figures and scientific visuals

    Addressing consumerisation of IT risks with nudging

    Get PDF
    In this work we address the main issues of Information Technology (IT) consumerisation that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behaviour by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context

    Broadband direction of arrival estimation via spatial co-prime sampling and polynomial matrix methods

    Get PDF
    Direction of arrival estimation is a crucial aspect of many active and passive systems, including radar and electronic warfare applications. Spread spectrum modulation schemes are becoming ever more common in both Radar and Communications systems. Because such modulation spreads the signal energy in frequency and time, such sources prompt the need for new approaches for detection and location. Broadband antennas and their subsequent signal processing systems are expensive in terms of both cost and power consumption. This forces a limitation on the number of elements in a feasible real-world array. In this paper a novel co-prime broadband MUSIC based direction of arrival algorithm is presented. The main feature of the new method is that it aims to reduce the number of antenna elements for a given aperture by utilising a coprime sensing scheme applied to the problem of broadband direction finding via the polynomial MUSIC algorithm. Comparative results using simulated data show that the proposed co-prime polynomial MUSIC has comparable performance to those obtained using a uniform linear array method with an equivalent physical apertur

    Addressing consumerization of IT risks with nudging

    Get PDF
    In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context

    Addressing consumerisation of IT risks with nudging

    Get PDF
    In this work we address the main issues of Information Technology (IT) consumerisation that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behaviour by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context

    Addressing consumerization of IT risks with nudging

    Get PDF
    In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context

    Dendritic cell density and activation status in human breast cancer – CD1a, CMRF-44, CMRF-56 and CD-83 expression

    Get PDF
    Low CD1a-positive putative dendritic cell numbers in human breast cancer has recently been described and may explain the apparent ‘poor immunogenicity’ previously reported in breast cancer. Little attention has been given to dendritic cell activation within the tumour microenvironment, which is another reason why the in-situ immune response may be severely deficient. We have therefore examined CD1a expression as a marker for dendritic cells, together with CMRF-44 and -56 as markers of dendritic cell activation status, in 40 human breast cancers. The results demonstrate few or no CD1a-positive putative dendritic cells and minimal or no expression of the dendritic cell activation markers. Both dendritic cell number and dendritic cell activation appear substantially deficient in human breast cancers, regardless of tumour histological grade
    corecore