Eavesdropping on Communication Patterns in Two Token Teams

نویسندگان

  • Sabine C. KOCH
  • Stephanie M. MÜLLER
  • Joerg ZUMBACH
چکیده

In a national research project we assessed gender-related communicative patterns in 20 teams from diverse organizations. The sub-sample for this study consisted of two teams with one gender token each: a female token in an industrial team of eleven persons and a male token in a kindergarten team of eight persons. We focused on dominance and support-related behaviour in verbal and nonverbal communication. More specifically, we assessed patterns of talking times, back channelling, gaze behaviour, affect display, and movement qualities. Results suggest patterns within and between verbal and nonverbal codes. In the selected sequences, where tasks are negotiated with some underlying conflict potential, we observed that independent of status and token position, women used more nonverbal communication, regarding dominance, support and defensive behaviour. Defensive behaviour is used when the self image of a person is threatened. This seems to apply not only to the female gender-token in the male-dominated team situation, but to a certain degree also to the female leader when interacting with the male gender-token. Selfand other ratings of gender-tokens were biased toward stereotypic perception. Our case studies support and exemplify research findings that gender-token status frequently has negative consequences for women only.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm

Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually exclusive manner. This paper presents fully distributed improved token based mutual exclusion algorithm for distributed system. In this algorithm, a process which...

متن کامل

O6: Road Traffic Accidents Lead to Different Patterns of Injuries Depending on Impact, Age and Premedical Condition - Specific Attention Must be Provided by Multi-Disciplinary Trauma-Teams

The approximate number of road traffic accidents that occur in Germany every year is 4.8 million. In 15-25% of these accidents patients die on scene, while about 35,000 severely injured patients are admitted to the resuscitation units of trauma centers in Germany, out of which about 10% do not survive. To continuously observe and improve their treatment and management, polytraumatized patients ...

متن کامل

Effectiveness of Couple Therapy by Hendrix Imago Therapy Method on Improving communication patterns and Reducing Emotional Divorce

Introduction: The family is meeting the needs of its members and divorce applicant couples have many problems especially in communication patterns and emotional divorce. The aimed this research was determine the effectiveness of couple therapy by Hendrix imago therapy method on improving communication patterns and reducing emotional divorce. Methods: Present research was a semi-experimental wit...

متن کامل

The effectiveness of film therapy on communication patterns and expressing positive feelings towards the spouse among couples with marital conflict

The aim of this study was to determine the effectiveness of film therapy on communication patterns and expressing positive feelings to spouses among couples with marital conflicts. This research utilized a pre-test and post-test experimental design with a control group and in this study, the study population was all couples referred to Valiasr Neighborhood in Tehran in the year 2019 who were se...

متن کامل

Confidence in smart token proximity: Relay attacks revisited

Contactless and contact smart card systems use the physical constraints of the communication channel to implicitly prove the proximity of a token. These systems, however, are potentially vulnerable to an attack where the attacker relays communication between the reader and a token. Relay attacks are not new but are often not considered a major threat, like eavesdropping or skimming attacks, eve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005