Is Openness in Taste Directly Associated with Tolerance? Exploring a Relationship between Openness in Taste in Leisure Consumption and Attitudes toward Immigrants

2021 ◽  
pp. 016059762199340
Author(s):  
Cristian L. Paredes

Openness in taste—presented in this study as the “backbone” of cultural omnivorousness—represents a standard of sophistication typical of cosmopolitan societies in accordance with the inclusive standards of cultural omnivorousness. In this study, I explore whether a specific case of openness in taste corresponds to a greater tolerance toward immigrants in the metropolitan research setting of Houston, Texas. This case study focuses on two different types of leisure activities: attendance at museums and live theaters, and attendance at sport events as highbrow and lowbrow activities, respectively. Using regression analysis, I examine whether the expected direct association between attendance at museums and live theaters and attendance at sport events varies by different degrees of tolerance toward immigrants. I find that openness in taste is not associated with a greater tolerance toward immigrants. Consequently, this case exemplifies how the sophistication attributed to openness in taste founded on cosmopolitan standards could be banal. I propose an alternative conceptual approach for discussing cases of openness in taste founded on entertainment such as the presented in this study, which might be useful for studying culture consumption and omnivorousness.

2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


2020 ◽  
Vol 24 (2) ◽  
pp. 375-387
Author(s):  
Jenni Mikkonen ◽  
Ira Lahovuo

Prior studies have recognized the importance of events in destination branding, but the focus has been on the roles of mega-events or sport events, while smaller cultural and freetime events have received far less attention. The stakeholder involvement in destination branding has also been attracting interest lately by many researchers, but there is lack of knowledge on how to utilize events in the branding processes. This study aims to fill the research gap through a case study in the South Savo region, eastern Finland. The purpose of this study is to examine the roles events have in destination branding, and how events are involved in cocreating the destination brand. The empirical data were collected through 13 semistructured interviews of event organizers and local tourism developers. The study identified four different roles and several involvement methods. The findings revealed the importance and potential of organized events in the branding, but it also revealed that they are not yet effectively utilized at the destination. However, there is a consensus about the importance of stakeholder involvement and a common will towards involving events in the branding process. The findings of this study can be utilized by tourism developers and stakeholders to improve destination branding processes.


The effective altruism movement consists of a growing global community of people who organize significant parts of their lives around two key ideas, represented in its name. Altruism: If we use a significant portion of the resources in our possession—whether money, time, or talents—with a view to helping others, we can improve the world considerably. Effectiveness: When we do put such resources to altruistic use, it is crucial to focus on how much good this or that intervention is reasonably expected to do per unit of resource expended (for example, per dollar donated). While global poverty is a widely used case study in introducing and motivating effective altruism, if the ultimate aim is to do the most good one can with the resources expended, it is far from obvious that global poverty alleviation is highest priority cause area. In addition to ranking possible poverty-alleviation interventions against one another, we can also try to rank interventions aimed at very different types of outcome against one another. This includes, for example, interventions focusing on animal welfare or future generations. The scale and organization of the effective altruism movement encourage careful dialogue on questions that have perhaps long been there, throwing them into new and sharper relief, and giving rise to previously unnoticed questions. In the present volume, the first of its kind, a group of internationally recognized philosophers, economists, and political theorists contribute in-depth explorations of issues that arise once one takes seriously the twin ideas of altruistic commitment and effectiveness.


Author(s):  
Andrea B. Temkin ◽  
Mina Yadegar ◽  
Christine Cho ◽  
Brian C. Chu

In recent years, the field of clinical psychology has seen a growing movement toward the research and development of transdiagnostic treatments. Transdiagnostic approaches have the potential to address numerous issues related to the development and treatment of mental disorders. Among these are the high rates of comorbidity across disorders, the increasing need for efficient protocols, and the call for treatments that can be more easily disseminated. This chapter provides a review of the current transdiagnostic treatment approaches for the treatment of youth mental disorders. Three different types of transdiagnostic protocols are examined: mechanism-based protocols, common elements treatments, and general treatment models that originated from single-disorder approaches to have broader reach. A case study illuminates how a mechanism-based approach would inform case conceptualization for a client presenting with internalizing and externalizing symptoms and how a transdiagnostic framework translates into practice.


2019 ◽  
Vol 25 (3) ◽  
pp. 378-396 ◽  
Author(s):  
Arian Razmi-Farooji ◽  
Hanna Kropsu-Vehkaperä ◽  
Janne Härkönen ◽  
Harri Haapasalo

Purpose The purpose of this paper is twofold: first, to understand data management challenges in e-maintenance systems from a holistically viewpoint through summarizing the earlier scattered research in the field, and second, to present a conceptual approach for addressing these challenges in practice. Design/methodology/approach The study is realized as a combination of a literature review and by the means of analyzing the practices on an industry leader in manufacturing and maintenance services. Findings This research provides a general understanding over data management challenges in e-maintenance and summarizes their associated proposed solutions. In addition, this paper lists and exemplifies different types and sources of data which can be collected in e-maintenance, across different organizational levels. Analyzing the data management practices of an e-maintenance industry leader provides a conceptual approach to address identified challenges in practice. Research limitations/implications Since this paper is based on studying the practices of a single company, it might be limited to generalize the results. Future research topics can focus on each of mentioned data management challenges and also validate the applicability of presented model in other companies and industries. Practical implications Understanding the e-maintenance-related challenges helps maintenance managers and other involved stakeholders in e-maintenance systems to better solve the challenges. Originality/value The so-far literature on e-maintenance has been studied with narrow focus to data and data management in e-maintenance appears as one of the less studied topics in the literature. This research paper contributes to e-maintenance by highlighting the deficiencies of the discussion surrounding the perspectives of data management in e-maintenance by studying all common data management challenges and listing different types of data which need to be acquired in e-maintenance systems.


Geosciences ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 150
Author(s):  
Nilgün Güdük ◽  
Miguel de la Varga ◽  
Janne Kaukolinna ◽  
Florian Wellmann

Structural geological models are widely used to represent relevant geological interfaces and property distributions in the subsurface. Considering the inherent uncertainty of these models, the non-uniqueness of geophysical inverse problems, and the growing availability of data, there is a need for methods that integrate different types of data consistently and consider the uncertainties quantitatively. Probabilistic inference provides a suitable tool for this purpose. Using a Bayesian framework, geological modeling can be considered as an integral part of the inversion and thereby naturally constrain geophysical inversion procedures. This integration prevents geologically unrealistic results and provides the opportunity to include geological and geophysical information in the inversion. This information can be from different sources and is added to the framework through likelihood functions. We applied this methodology to the structurally complex Kevitsa deposit in Finland. We started with an interpretation-based 3D geological model and defined the uncertainties in our geological model through probability density functions. Airborne magnetic data and geological interpretations of borehole data were used to define geophysical and geological likelihoods, respectively. The geophysical data were linked to the uncertain structural parameters through the rock properties. The result of the inverse problem was an ensemble of realized models. These structural models and their uncertainties are visualized using information entropy, which allows for quantitative analysis. Our results show that with our methodology, we can use well-defined likelihood functions to add meaningful information to our initial model without requiring a computationally-heavy full grid inversion, discrepancies between model and data are spotted more easily, and the complementary strength of different types of data can be integrated into one framework.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document