Spelling suggestions: "subject:"focused"" "subject:"_focused""
151 |
Gruppenbezogene Menschenfeindlichkeit im Sport in BrandenburgDelto, Hannes, Tzschoppe, Petra 05 September 2016 (has links) (PDF)
Mit der Querschnittsstudie "Wir und die Anderen – Gruppenbezogene Menschenfeindlichkeit im organisierten Sport in Brandenburg" wurde das Syndrom Gruppenbezogener Menschenfeindlichkeit im organisierten Sport untersucht. Das Konzept der Gruppenbezogenen Menschenfeindlichkeit – ausgehend von einer Ideologie der Ungleichwertigkeit – wurde von Prof. Wilhelm Heitmeyer (Universität Bielefeld) entwickelt. Die Ergebnisse ermöglichen explizite Aussagen über Ausmaß und Ursachen Gruppenbezogener Menschenfeindlichkeit für den gesellschaftlichen Bereich des Sports.
Die Studie wurde im vereinsorgansierten Sport im Bundesland Brandenburg durchgeführt. Insgesamt wurden 1.760 Sportlerinnen und Sportler von Oktober 2014 bis Januar 2015 befragt. In der Stichprobe spiegeln 175 Sportvereine mit 44 Sportarten die Vielfalt der Sportpraxis wider.
Es wird der Frage nachgegangen, wie Menschen im Sport auf Grund ihres Geschlechts, ihrer sexuellen Identität, Religion oder ihrer kulturellen und ethnischen Herkunft wahrgenommen werden und ob diese Merkmale mit feindseligen Mentalitäten im Sport einhergehen können. Vorurteile gegenüber Menschen mit diesen bestimmten Gruppenzugehörigkeiten teilen einen gemeinsamen Kern, der sich auch im Gesellschaftsbereich Sport als Ideologie der Ungleichwertigkeit empirisch identifizieren lässt. Das Syndrom der Gruppenbezogenen Menschenfeindlichkeit setzt sich in dem vorliegenden Bericht aus den Elementen Fremdenfeindlichkeit, Islamfeindlichkeit, der Abwertung von Homosexuellen (Homophobie), Rassismus, Antisemitismus, Sexismus und der Abwertung von Menschen mit Behinderung zusammen.
Die untersuchten Vorurteile hängen empirisch eng miteinander zusammen. Im Ergebnis zeichnen sich zwar Fremdenfeindlichkeit, Rassismus, Islamfeindlichkeit und die Abwertung von Homosexuellen im organisierten Sport als vorrangig handlungsrelevante Dimensionen ab, gleichwohl lässt sich feststellen, dass Sporttreibende, die einer bestimmten Gruppe gegenüber feindselige Mentalitäten haben, auch häufiger dazu neigen, andere Gruppen wie Frauen, Juden/Jüdinnen oder Menschen mit Behinderung abzuwerten. Das Ausmaß Gruppenbezogener Menschenfeindlichkeit lässt sich teilweise durch soziodemografische und strukturelle Faktoren (Alter, Geschlecht, Bildung, Gemeindegröße) und (sport-) spezifische Faktoren wie Nationalismus, Demokratiekritik, Autoritarismus und Gewaltbilligung erklären. / The cross-sectional study "Us and Them – Group-Focused Enmity in Organized Sports in Brandenburg" is the study to investigate the syndrome of group-focused enmity in organized sports. The concept of group-focused enmity, at the heart of which is an ideology of inequality, was developed by Prof. Wilhelm Heitmeyer at the University of Bielefeld, Germany. The findings now put us in a position to make substantiated statements about the extent and causes of group-focused enmity in the social domain of sports.
The study was conducted in organized club sports in the German state of Brandenburg. A total of 1,760 athletes were surveyed during October 2014 until January 2015. The sample includes respondents from 175 sports clubs and covers 44 different sports so as to reflect the diversity of everyday sports.
The study pursues the question of how people are perceived in sports in terms of gender, sexual identity, religion, or cultural and ethnic background and whether these attributes are associated with hostile mentalities in sports. Prejudice towards people belonging to these groups shares as its common core an ideology of inequality, which can be identified empirically also in the social sphere of sports. The syndrome of group-focused enmity addressed in this report consists of the elements of xenophobia, islamophobia, homophobia, racism, anti-Semitism, sexism, and the devaluation of handicapped persons.
These prejudices are closely interconnected. Although we do see that xenophobia, racism, islamophobia, and homophobia are the primary motives that are ultimately translated into action, athletes who harbor a hostile mentality toward a particular group frequently tend to express prejudice against other groups such as women, Jews, or people with handicaps as well. The extent of group-focused enmity can be explained, in part, by socio-demographic and structural factors (age, gender, education, size of the municipality) and (sports-)specific factors such as nationalism, criticism of democracy, authoritarianism, and acceptance of violence.
|
152 |
Wir und die Anderen / Us and them07 September 2016 (has links)
No description available.
|
153 |
Microstructural evolution of adiabatic shear bands in steel by impactBoakye-Yiadom, Solomon January 2014 (has links)
This research, is initiated to systematically study the microstructure of AISI 4340 steel prior to impact, after impact and after post-impact annealing to determine the effect of the pre-deformation microstructure on the nucleation and initiation of ASBs, and the mechanism of evolution of ASBs during impact. This study used state-of-the-art microstructural characterization techniques such as the FIB and STEM/HRTEM to reveal that initial microstructural inhomogeneity produces nucleation sites for the initiation of ASBs during impact. It was observed that double misfit interfaces and boundary layers, formed around precipitated carbides (interface between reinforcements and matrix), increased the volume fraction of dislocation sources within the pre-impact specimens. It is demonstrated that the intersection of an activated dislocation source with the direction of maximum shear (regions of stress concentrations) within the specimens during impact, is a necessary condition for the points of intersection to act as possible sites for the nucleation and initiation of ASB depending on the rate of dislocation generation, local strain and strain rate. In addition, the structure that evolves after strain localization starts out with elongation of the grains in the shear direction with the initiation of random and transverse dislocation boundaries along the elongated grains. The elongated grains break along the initiated dislocation boundaries as strain/strain rate increases resulting in the creation of smaller elongated-broken grains and nanograins. Boundary refinement of the broken grains occurring through grain rotation and adiabatic heating results in the evolution of refined grains, subgrains and nanograins. The presence of elongated grains, broken grains, refined grains, subgrains and nanograins within the evolved shear band structures demonstrate that the local deformation is dependent on the imposed local strain and strain rate and that these mechanisms occur concurrently during impact. The results obtained, which are specific to the behavior of BCC ferritic Pearlitic hardenable steels, lead to the conclusion that the evolution of ASBs is a simultaneous layering of microstructures initially driven by dislocations which produce the final structures observed in the shear bands at the end of passage of the stress wave. / February 2015
|
154 |
A Study of the Effects of Using Complete Hypertext Compared with the Effects of Using Focused Hypertext in the Delivery of Computer Based InstructionRussell, Enos L. (Enos Louis) 12 1900 (has links)
The purpose of the study was to examine the impact that hypertext and hypertext design on the cognitive process. The study used two identical computer based lessons. One set of lessons used a complete set of hypertext resources that supported all of the learning objectives throughout the lessons. The other set of lessons focused the hypertext resources by limiting them to the immediate learning objective.
|
155 |
Exploring the attentional processes of expert performers and the impact of priming on motor skill executionAdams, Danielle January 2010 (has links)
It is widely acknowledged that under situations of heightened pressure, many expert athletes suffer from performance decrements. This phenomenon has been termed ‘choking under pressure’ and has been the subject of extensive research in sport psychology. Despite this attention, gaps in the literature remain leaving opportunities for further advancements in knowledge about the phenomenon, particularly in relation to its underlying processes and the development of appropriate interventions that can be adopted in order to alleviate, or even prevent choking. The present programme of research, in general terms, aimed to develop and test the efficacy of an intervention tool, based on priming, to alleviate choking under pressure. It was acknowledged that such a tool should be matched to the mechanisms that underlie the choking process and although an abundance of research has provided valuable information about these mechanisms, it was identified that there still remains a lack of consensus regarding the most appropriate explanatory theory. Therefore the initial study in this thesis aimed to provide further insight into the processes that govern choking by examining accounts from elite international swimmers of their experiences of performing under high levels of pressure. The results provided further support for the postulation that choking under pressure occurs as a result of a combination of conscious processing hypothesis (Masters, 1992) and processing efficiency theory (Eysenck & Calvo, 1992) and that an optimum level of skill-focused attention is beneficial to performance. The following studies utilised this information as well as that of the existent theories of choking, to develop and examine an effective priming based intervention tool (a scrambled sentence task). Specifically, Studies 2, 3 and 4 examined the amount of residual working memory available after activation of the prime, the optimisation of the priming task and the efficacy of the tool in promoting performance under high pressure respectively. Results revealed support for the efficacy of the tool in reducing online skill-focused attention and promoting performance under both low- and high-pressure conditions. Finally, the general themes that emerged throughout the whole programme of study are discussed, as well as the limitations and recommendations for future research. Implications for coaches, athletes and practitioners are also presented.
|
156 |
Developing a Multi-Objective Decision Model for Maximizing IS Security within an OrganizationMay, Jeffrey Lee 01 January 2008 (has links)
Numerous IS researchers have argued that IS Security can be more effectively managed if the emphasis goes beyond the technical means of protecting information resources. In an effort to adopt a broader perspective that accounts for issues that transcend technical means alone, Dhillon and Torkzadeh (2006) present an array of 9 fundamental and 16 means objectives that are essential for maximizing IS security in an organization. These objectives were derived using a value-focused thinking approach and are organized into a conceptual framework. This conceptual framework provides a rigorous theoretical base for considering IS security in a manner that accounts for both technical and organizational issues; however, no direction is provided for using these objectives so that informed decisions can be made. As a result, the goal of this dissertation is to develop a decision model using Multiple Objective Decision Analysis (MODA) techniques that seek to provide informed alternatives to decision makers who desire to maximize IS security within an organization.
|
157 |
THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAININGHarris, Mark 25 June 2010 (has links)
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects of security, and the fourth was a control video unrelated to information security. Each group was shown the video, and after this viewing, each group’s values toward information security were ascertained and converted into security objectives following Keeney (1992)’s value-focused thinking approach. Each group’s list of security objectives were used as the input to Schmidt (1997)’s ranking Delphi methodology, which yielded a more concise and ranked list of security objectives. The results thus obtained, indicate that manager’s objectives towards information security are affected by the nature and scope of the information security training they receive. Information security policy based on each group’s value-based security objectives indicate that manager’s receiving socio-technical training would produce the strongest information security policy when analyzing the value-focused thinking list of security objectives. However, the quality of security policy decreases when analyzing the ranked Delphi list of security objectives, thus providing mixed results. The theoretical contribution of this research states that technically oriented information security training found in corporations today affects manager’s values and security objectives in a way that leads them to create and support technically oriented security policies, thus ignoring the social aspects of security. The practical contribution of this research states that managers should receive socio-technical information security training as a part of their regular job training, which would affect their values and lead to socio-technical information security policy based on the manager’s socio-technical security objectives. The methodological contribution of this research demonstrates the successful use of the value-focused thinking approach as the input to the ranking of the Delphi methodology.
|
158 |
Cloud Privacy Audit Framework: A Value-Based DesignCoss, David 01 January 2013 (has links)
The rapid expansion of cloud technology provides enormous capacity, which allows for the collection, dissemination and re-identification of personal information. It is the cloud’s resource capabilities such as these that fuel the concern for privacy. The impetus of these concerns are not too far removed from those expressed by Mason in 1986, when he identified privacy as one of the biggest ethical issues facing the information age. There seems to be continuous ebb and flow relationship with respect to privacy concerns and the development of new information communication technologies such as cloud computing. Privacy issues are a concern to all types of stakeholders in the cloud. Individuals using the cloud are exposed to privacy threats when they are persuaded to provide personal information unwantedly. An Organization using a cloud service is at risk of non-compliance to internal privacy policies or legislative privacy regulations. The cloud service provider has a privacy risk of legal liability and credibility concerns if sensitive information is exposed. The data subject is at risk of having personal information exposed. In essence everyone who is involved in cloud computing has some level of privacy risk that needs to be evaluated before, during and after they or an organization they interact with adopts a cloud technology solution. This resonates a need for organizations to develop privacy practices that are socially responsible towards the protection of their stakeholders’ information privacy. This research is about understanding the relationship between individual values and their privacy objectives. There is a lack of clarity in organizations as to what individuals consider privacy to be. Therefore, it is essential to understand an individual’s privacy values. Individuals seem to have divergent perspectives on the nature and scope of how their personal information is to be kept private in different modes of technologies. This study is concerned with identifying individual privacy objectives for cloud computing. We argue that privacy is an elusive concept due to the evolving relationship between technology and privacy. Understanding and identifying individuals’ privacy objectives are an influential step in the process of protecting the privacy in cloud computing environments. The aim of this study is to identify individual privacy values and develop cloud privacy objectives, which can be used to design a privacy audit for cloud computing environments. We used Keeney’s (1992) value focused thinking approach to identify individual privacy values with respect to emerging cloud technologies, and to develop an understanding of how cloud privacy objectives are shaped by the individual’s privacy values. We discuss each objective and how they relate to privacy concerns in cloud computing. We also use the cloud privacy objectives in a design science study to design a cloud privacy audit framework. We then discuss the how this research helps privacy managers develop a cloud privacy strategy, evaluate cloud privacy practices and develop a cloud privacy audit to ensure privacy. Lastly, future research directions are proposed.
|
159 |
Maternal and Temperamental Influences on Children's Emotion RegulationMirabile, Scott 22 May 2006 (has links)
Toddler-aged children are expected to shift from being solely dependent on parents to regulate their emotion (e.g., Fox & Calkins, 2003) to being able to independently regulate their emotions (Calkins & Johnson, 1998). Mothers' responses to children's negative emotions are expected to influence this development. Children's temperamental negative reactivity was found to moderate the effect of mothers' socialization attempts on children's regulatory behaviors, as suggested by previous theoretical and empirical work (e.g., Putnam, Sanson, & Rothbart, 2002; Rothbart & Bates, 1998). Specifically, highly negatively reactive children showed no correspondence between their mothers' attention-shifting strategies and their own attentionshifting regulation behaviors. This finding is consistent with the proposed process by which temperamentally reactive children become overaroused and unreceptive to mothers' socialization efforts (Hoffman, 1983; Scaramella & Leve, 2004). Lastly, children's reactivity did not moderate the effects of mothers' emotion-intensifying socialization on children's emotion-intensifying regulation behaviors, a finding which deserves further study.
|
160 |
Monitoramento de temperatura tecidual por meio de imagens fotoacústicas durante tratamento de hipetermia / Tecidual temperature monitoring using photoacoustic images during hyperthermia treatments.Uliana, João Henrique 29 September 2016 (has links)
Sabe-se que o aumento na temperatura do tecido tumoral pode aumentar a eficiência de técnicas convencionais de combate ao câncer (radioterapia e quimioterapia). Além disso, a variação de temperatura em tumores pode ser uma forma de tratamento alternativo à cirurgia, feito por meio do fornecimento de calor direcionado às células cancerosas e preservando o tecido sadio. Para maior eficácia e segurança no emprego de técnicas que utilizam fornecimento de calor ao tecido biológico, é necessário o monitoramento da temperatura tecidual para garantir que a morte celular por ablação térmica seja limitada ao tecido alvo, minimizando os danos aos tecidos adjacentes. A imagem fotoacústica é uma técnica baseada no efeito fotoacústico, o qual consiste na absorção de radiação eletromagnética pelo tecido e, devido à expansão termoelástica, na geração de ondas acústicas. A amplitude da onda de pressão gerada pelo efeito fotoacústico possui dependência com a temperatura do meio pelo parâmetro de Grueneisen, que depende das propriedades mecânicas do material. Portanto, mudanças na amplitude do sinal fotoacústico carregam informações a respeito da variação na temperatura do material. Neste trabalho, a dependência da amplitude do sinal fotoacústico com a temperatura foi estudada em um material simulador de tecido biológico (phantom) em condições similares a de tratamentos por hipertermia Nesse caso, imagens fotoacústicas foram adquiridas para cada grau de temperatura em uma faixa de 36 até 41 ºC durante o procedimento de aquecimento por banho térmico. Mudanças na amplitude e fase do sinal fotoacústico foram avaliadas através da aplicação de algoritmos de speckle tracking. Para estimar a variação na amplitude do sinal também foram utilizados e avaliados diferentes métodos de comparação. Os resultados são apresentados por imagens fotoacústicas termais produzidas pela aplicação de um fator de calibração aos mapas de variação relativa da amplitude do sinal em função da temperatura do meio. Finalmente, avaliamos um experimento de hipertemia por ultrassom focalizado de alta intensidade (High Intensity Therapeutic Ultrasound - HITU) em uma amostra de músculo suíno. Nesse caso foram geradas imagens termais fotoacústicas e imagens termais produzidas pela mudança de fase do sinal pulso-eco de ultrassom. Os resultados sugerem uma maneira não invasiva de calcular a distribuição da variação de temperatura do meio que pode ser aplicada para monitoramento durante tratamentos que utilizam o fornecimento de calor ao tecido biológico. / Several studies have shown that elevating the temperature of tumoral tissue improves standard cancer treatments success rate (radiotherapy and chemotherapy). This procedure can also be a therapy to cancer by delivering heat and killing cancer cells while healthy tissues are preserved. For improved efficiency and security in heat applications, it is important to monitor tissue temperature during treatments. Photoacoustic (PA) pressure wave amplitude has a temperature dependence given by the sample mechanical properties (Gruenesein parameter). These changes in photoacoustic signal amplitude carry information about temperature variation in tissue. Therefore, PA has been proposed as an imaging technique to monitor temperature during hyperthermia. In this study, PA images were acquired for temperatures ranging from 36ºC to 41ºC using a tissue-mimicking phantom immersed in a temperature controlled thermal bath. Relative amplitude variation was calculated using speckle tracking algorithms using four different methods to estimate these variations in PA signal amplitude. The results are presented as PA-based thermal images, generated using a calibration factor to the percentage variations in the amplitude maps. Finally, PA-based and ultrasound-based thermal images were acquired during heating by high intensity focused ultrasound (High Intensity Therapeutic Ultrasound - HITU) in a porcine muscle. The results suggest a non-invasive way to monitor temperature during hyperthermia procedures.
|
Page generated in 0.0394 seconds