...451728 cLaughlin et al.American Sociological Review 2012 ASRXXX10.1177/0003122412451728M Sexual Harassment, Workplace Authority, and the Paradox of Power American Sociological Review 77(4) 625–647 © American Sociological Association 2012 DOI: 10.1177/0003122412451728 http://asr.sagepub.com Heather McLaughlin,a Christopher Uggen,a and Amy Blackstoneb Abstract Power is at the core of feminist theories of sexual harassment, although it has rarely been measured directly in terms of workplace authority. Popular characterizations portray male supervisors harassing female subordinates, but power-threat theories suggest that women in authority may be more frequent targets. This article analyzes longitudinal survey data and qualitative interviews from the Youth Development Study to test this idea and to delineate why and how supervisory authority, gender nonconformity, and workplace sex ratios affect harassment. Relative to nonsupervisors, female supervisors are more likely to report harassing behaviors and to define their experiences as sexual harassment. Sexual harassment can serve as an equalizer against women in power, motivated more by control and domination than by sexual desire. Interviews point to social isolation as a mechanism linking harassment to gender nonconformity and women’s authority, particularly in male-dominated work settings. Keywords inequality, gender, power, sexual harassment The term sexual harassment was not coined until the 1970s (Farley 1978), but formal...
Words: 13434 - Pages: 54
...RADIMED Explaining and understanding the role of exposure to new social media on violent extremism. An integrative quantitative and qualitative approach Summary en kwantitatieve benadering/ Commissioners Promoter/coordinator Co-promoters Researchers Belspo FOD Binnenlandse zaken – Directe algemene veiligheid Lieven PAUWELS - UGent Fabienne BRION - UCL Brice DE RUYVER – Ugent Marleen EASTON - Ugent Nele SCHILS – Ugent Julianne LAFFINEUR - UCL 1 1. Introduction Research problem Worldwide, both policy and research pay a lot of attention to extremism, and radicalization as the process leading to extremism (Van de Linde & Rademaker, 2010). Scholars and policymakers increasingly focus on unravelling the processes of radicalisation, hoping to prevent the violent radicalisation of their own youth and eventually political violence (Van de Line & Rademaker, 2010). The Internet and its constant technological developments in particular are causes of concern (Conway, 2012). Recently, we have seen a boom in new social media (NSM) and other web 2.0 applications, bearing a large potential for communication and networking (Conway, 2012). These developments have transformed the world in an online village, with every offline actor being represented online. It is therefore no surprise that criminals, radicals, violent extremists and terrorists also use this medium to their advantage (Benschop, 2006; Stevens & Neuhmann, 2009; Weimann, 2004). By means...
Words: 15802 - Pages: 64
...Second career Self-employment and becoming an entrepreneur as a second career for dependent employees The responsibility for the contents of this report lies with EIM. Quoting numbers or text in papers, essays and books is permitted only when the source is clearly mentioned. No part of this publication may be copied and/or published in any form or by any means, or stored in a retrieval system, without the prior written permission of EIM. EIM does not accept responsibility for printing errors and/or other imperfections. Contents 1 Theoretical framework 7 1.1 Introduction 7 1.2 The transition process: Heuristical tool 8 1.3 Differences between start-ups: Dependent employee versus other types 10 1.4 Demarcation 11 1.5 Contents of the report 12 2 Entrepreneurship in the EU 15 2.1 Facts and figures 15 2.2 Entrepreneurs in the EU 20 2.3 Previous experience of starting entrepreneurs in the EU 24 3 Synthesis 31 3.1 Introduction 31 3.2 Legal definition of self-employed 31 3.3 General requirements related to start-ups 33 3.4 Financing the start-up of a business 34 3.5 Insolvency and seizure procedures 35 3.6 Social security systems in general 35 3.7 Social security: Unemployment 36 3.8 Social security: Sickness 39 3.9 Social security: Disability 40 3.10 Social security: Medical costs 40 3.11 Social security: Old age 41 3.12 Social...
Words: 106246 - Pages: 425
...Learning with Cases INTRODUCTION The case study method of teaching used in management education is quite different from most of the methods of teaching used at the school and undergraduate course levels. Unlike traditional lecture-based teaching where student participation in the classroom is minimal, the case method is an active learning method, which requires participation and involvement from the student in the classroom. For students who have been exposed only to the traditional teaching methods, this calls for a major change in their approach to learning. This introduction is intended to provide students with some basic information about the case method, and guidelines about what they must do to gain the maximum benefit from the method. We begin by taking a brief look at what case studies are, and how they are used in the classroom. Then we discuss what the student needs to do to prepare for a class, and what she can expect during the case discussion. We also explain how student performance is evaluated in a case study based course. Finally, we describe the benefits a student of management can expect to gain through the use of the case method. WHAT IS A CASE STUDY? There is no universally accepted definition for a case study, and the case method means different things to different people. Consequently, all case studies are not structured similarly, and variations abound in terms of style, structure and approach. Case material ranges from small caselets (a few paragraphs...
Words: 239776 - Pages: 960