1,070 research outputs found
Discrimination and social identity processes predict impairment and dysfunction among heavy drinkers
Background: Previous research has linked discrimination to poorer health. Yet health risk behaviours such as heavy alcohol consumption are often targeted with stigmatising public health campaigns. The current study sought to establish the link between experiencing discrimination and health outcomes among heavy drinkers, with a focus on exploring the multiple social identity processes that might underpin this relationship.
Method: A survey was conducted with 282 people who self-reported consuming alcohol above recommended guidelines. We measured discrimination experienced as a drinker, components of social identification as a drinker (centrality, satisfaction, solidarity, homogeneity, and self-stereotyping), and two health outcomes: psychological distress and severity of alcohol use disorder symptomatology.
Results: Discrimination was a moderate-large predictor of psychological distress and alcohol use disorder symptoms. Three social identity constructs were implicated in the link between discrimination and ill-health: identity centrality and homogeneity positively mediated this relationship, while identity satisfaction was a negative mediator. The model explained a large proportion of the variance (39-47%) in health outcomes.
Discussion: Results are interpreted with an emphasis on the need to avoid stigmatising messaging and to prioritise social identity processes to prevent and treat substance use disorders. We further highlight the need for social identity researchers to consider the multidimensional nature of social identities, especially in the context of stigmatised groups
Investigation on Willingness of Employees to Share Information Security Advice
As modern organizations rely more on their information systems, mitigating information security risks becomes essential. Weaknesses in the information security management chain have continued to be challenged by employees. Therefore, enhancing employee security awareness becomes critical. Considering the effectiveness of informal methods, this research examines security advice sharing as one of the operative ways. Accordingly, in this paper, by adapting the theory of planned behavior as our theoretical lens, we propose a conceptual model of factors that are anticipated to impact the willingness of employees to share security advice. Finally, conclusion and avenues for future research are discussed
Like a fish in water: Habitus adaptation mechanisms of informal tourism entrepreneurs in Thailand.
This article investigates possible pathways of habitus change by informal tourism entrepreneurs in Thailand. Bourdieu's concept of habitus is depicted as a person's understanding of the world. Do people adapt their worldview in response to only external stimuli? Through ethnographic fieldwork including participant observations and active semi-structured interviews with 53 participants, this paper identifies a classification of four modes of habitus adaptation: (1) Understanding and appreciating the field and its conditions, (2) Challenging core beliefs systems, (3) Applying a practical sense to āobjective possibilitiesā, and, (4) Challenging non-reflective dispositions. We argue that charting the modes of habitus adaptation could help policymakers understand the change processes of informal entrepreneurs in the tourism sector and their willingness to change.</p
Recommended from our members
The Impact of Information Technology Outsourcing on Firm Profitability Measures
Some researchers have concluded that outsourcing of information technology (IT) provides benefits to firms including cost advantages, economies of scale and allowing more of a focus on core competencies. This paper attempts to determine if these benefits actually exist by comparing three financial measures, return on equity (ROE), return on assets (ROA) and profit margin, affirms that have varying levels of outsourcing. To empirically test for the existence of a difference between firms that outsource differing amounts of IT spending, data from 104 companies was gathered. Analysis of variance was selected as the primary statistical tool to test the relationship between the level of outsourcing and the profitability measures. The results of this study lead to the conclusion that there is not a significant difference between the amounts of IT outsourcing companies perform and any of the profitability measures used during the sample period. Further discussion continues related to the implications of the results
Information Technology Usage In Accounting Firms: The Best Versus The Rest
The purpose of this paper is to analyze information technology expenditures in public accounting firms from a multi-year sample.Ā This study also focuses on identifying possible IT spending trends in public accounting firms and attempts to determine if additional spending on IT increased the profitability of these firms
The Impact Of Information Technology Investments On Managerial Decision Making: Evidence From Dividend Payout
Investments in Information Technology (IT) are an increasing part of organizational expenditures in spite of the fact that there is little evidence in the existing literature that suggests these investments are related to the organization’s performance. The uncertainty of IT investment payoff should be reflected in other managerial decisions. This research examines Rozeff's (1982) agency cost/transaction cost tradeoff model to determine if IT investments are related to dividend payout ratios for an organization. A dividend payout model including an IT investment variable is estimated. The estimation results suggest that a significant positive relationship exists between dividend payout and a firm’s IT investments
Global value chains and human development: a class-relational framework
Global Value Chain proponents argue that regional and human development can be achieved through āstrategic couplingā with transnational corporations. This argument is misleading for two reasons. First, GVC abstracts firm-firm and firm-state relations from their class-relational basis, obscuring fundamental developmental processes. Second, much GVC analysis promotes linear conceptions of development. This article provides a class-relational framework for GVC analysis. The formation and functioning of GVCs and the developmental effects associated with them are products of histories of evolving and often conflictive, class relations. A study of export horticulture in North East Brazil provides empirical support for these arguments
Markerless Escherichia coli rrn Deletion Strains for Genetic Determination of Ribosomal Binding Sites
Single-copy rrn strains facilitate genetic ribosomal studies in Escherichia coli. Consecutive markerless deletion of rrn operons resulted in slower growth upon inactivation of the fourth copy, which was reversed by supplying transfer RNA genes encoded in rrn operons in trans. Removal of the sixth, penultimate rrn copy led to a reduced growth rate due to limited rrn gene dosage. Whole-genome sequencing of variants of single-copy rrn strains revealed duplications of large stretches of genomic DNA. The combination of selective pressure, resulting from the decreased growth rate, and the six identical remaining scar sequences, facilitating homologous recombination events, presumably leads to elevated genomic instability
Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective
Many healthcare providers in the US are seeking increased efficiency and effectiveness by rapidly adopting information technology (IT) solutions such as electronic medical record (EMR) systems. Legislation such as the Health Information Technology for Economic and Clinical Health Act (HITECH), which codified the adoption and āmeaningful useā of electronic records in the US, has further spurred the industry-wide adoption of EMR. However, despite what are often large investments in EMR, studies indicate that the healthcare industry maintains a culture of system workarounds. Though perhaps not uncommon, the creation of informal workflows among healthcare workers is problematic for assuring information security and patient privacy, particularly when involving decisions of information management (e.g., information storage, retrieval, and/or transmission). Drawing on the framework of contextual integrity, we assert that one can often explain workarounds involving information transmissions in terms of trade-offs informed by context-specific informational norms. We surveyed healthcare workers and analyzed their willingness to engage in a series of EMR workaround scenarios. Our results indicate that contextual integrity provides a useful framework for understanding information transmission and workaround decisions in the health sector. Armed with these findings, managers and system designers should be better able to anticipate healthcare workersā information transmission principles (e.g., privacy norms) and workaround patterns (e.g., usage norms). We present our findings and discuss their significance for research and practice
- ā¦