1,070 research outputs found

    Discrimination and social identity processes predict impairment and dysfunction among heavy drinkers

    Get PDF
    Background: Previous research has linked discrimination to poorer health. Yet health risk behaviours such as heavy alcohol consumption are often targeted with stigmatising public health campaigns. The current study sought to establish the link between experiencing discrimination and health outcomes among heavy drinkers, with a focus on exploring the multiple social identity processes that might underpin this relationship. Method: A survey was conducted with 282 people who self-reported consuming alcohol above recommended guidelines. We measured discrimination experienced as a drinker, components of social identification as a drinker (centrality, satisfaction, solidarity, homogeneity, and self-stereotyping), and two health outcomes: psychological distress and severity of alcohol use disorder symptomatology. Results: Discrimination was a moderate-large predictor of psychological distress and alcohol use disorder symptoms. Three social identity constructs were implicated in the link between discrimination and ill-health: identity centrality and homogeneity positively mediated this relationship, while identity satisfaction was a negative mediator. The model explained a large proportion of the variance (39-47%) in health outcomes. Discussion: Results are interpreted with an emphasis on the need to avoid stigmatising messaging and to prioritise social identity processes to prevent and treat substance use disorders. We further highlight the need for social identity researchers to consider the multidimensional nature of social identities, especially in the context of stigmatised groups

    Investigation on Willingness of Employees to Share Information Security Advice

    Get PDF
    As modern organizations rely more on their information systems, mitigating information security risks becomes essential. Weaknesses in the information security management chain have continued to be challenged by employees. Therefore, enhancing employee security awareness becomes critical. Considering the effectiveness of informal methods, this research examines security advice sharing as one of the operative ways. Accordingly, in this paper, by adapting the theory of planned behavior as our theoretical lens, we propose a conceptual model of factors that are anticipated to impact the willingness of employees to share security advice. Finally, conclusion and avenues for future research are discussed

    Like a fish in water: Habitus adaptation mechanisms of informal tourism entrepreneurs in Thailand.

    Get PDF
    This article investigates possible pathways of habitus change by informal tourism entrepreneurs in Thailand. Bourdieu's concept of habitus is depicted as a person's understanding of the world. Do people adapt their worldview in response to only external stimuli? Through ethnographic fieldwork including participant observations and active semi-structured interviews with 53 participants, this paper identifies a classification of four modes of habitus adaptation: (1) Understanding and appreciating the field and its conditions, (2) Challenging core beliefs systems, (3) Applying a practical sense to ā€˜objective possibilitiesā€™, and, (4) Challenging non-reflective dispositions. We argue that charting the modes of habitus adaptation could help policymakers understand the change processes of informal entrepreneurs in the tourism sector and their willingness to change.</p

    Information Technology Usage In Accounting Firms: The Best Versus The Rest

    Get PDF
    The purpose of this paper is to analyze information technology expenditures in public accounting firms from a multi-year sample.Ā  This study also focuses on identifying possible IT spending trends in public accounting firms and attempts to determine if additional spending on IT increased the profitability of these firms

    The Impact Of Information Technology Investments On Managerial Decision Making: Evidence From Dividend Payout

    Get PDF
    Investments in Information Technology (IT) are an increasing part of organizational expenditures in spite of the fact that there is little evidence in the existing literature that suggests these investments are related to the organization&rsquo;s performance. The uncertainty of IT investment payoff should be reflected in other managerial decisions. This research examines Rozeff's (1982) agency cost/transaction cost tradeoff model to determine if IT investments are related to dividend payout ratios for an organization. A dividend payout model including an IT investment variable is estimated. The estimation results suggest that a significant positive relationship exists between dividend payout and a firm&rsquo;s IT investments

    Global value chains and human development: a class-relational framework

    Get PDF
    Global Value Chain proponents argue that regional and human development can be achieved through ā€˜strategic couplingā€™ with transnational corporations. This argument is misleading for two reasons. First, GVC abstracts firm-firm and firm-state relations from their class-relational basis, obscuring fundamental developmental processes. Second, much GVC analysis promotes linear conceptions of development. This article provides a class-relational framework for GVC analysis. The formation and functioning of GVCs and the developmental effects associated with them are products of histories of evolving and often conflictive, class relations. A study of export horticulture in North East Brazil provides empirical support for these arguments

    Markerless Escherichia coli rrn Deletion Strains for Genetic Determination of Ribosomal Binding Sites

    Get PDF
    Single-copy rrn strains facilitate genetic ribosomal studies in Escherichia coli. Consecutive markerless deletion of rrn operons resulted in slower growth upon inactivation of the fourth copy, which was reversed by supplying transfer RNA genes encoded in rrn operons in trans. Removal of the sixth, penultimate rrn copy led to a reduced growth rate due to limited rrn gene dosage. Whole-genome sequencing of variants of single-copy rrn strains revealed duplications of large stretches of genomic DNA. The combination of selective pressure, resulting from the decreased growth rate, and the six identical remaining scar sequences, facilitating homologous recombination events, presumably leads to elevated genomic instability

    Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective

    Get PDF
    Many healthcare providers in the US are seeking increased efficiency and effectiveness by rapidly adopting information technology (IT) solutions such as electronic medical record (EMR) systems. Legislation such as the Health Information Technology for Economic and Clinical Health Act (HITECH), which codified the adoption and ā€œmeaningful useā€ of electronic records in the US, has further spurred the industry-wide adoption of EMR. However, despite what are often large investments in EMR, studies indicate that the healthcare industry maintains a culture of system workarounds. Though perhaps not uncommon, the creation of informal workflows among healthcare workers is problematic for assuring information security and patient privacy, particularly when involving decisions of information management (e.g., information storage, retrieval, and/or transmission). Drawing on the framework of contextual integrity, we assert that one can often explain workarounds involving information transmissions in terms of trade-offs informed by context-specific informational norms. We surveyed healthcare workers and analyzed their willingness to engage in a series of EMR workaround scenarios. Our results indicate that contextual integrity provides a useful framework for understanding information transmission and workaround decisions in the health sector. Armed with these findings, managers and system designers should be better able to anticipate healthcare workersā€™ information transmission principles (e.g., privacy norms) and workaround patterns (e.g., usage norms). We present our findings and discuss their significance for research and practice
    • ā€¦
    corecore