Search results
1 – 10 of 149Wing-hong Chui, Henry Kao and Aaron H.L. Wong
The paper aims to recommend legal and regulatory reforms to better prevent child abuse in childcare institutions in Hong Kong.
Abstract
Purpose
The paper aims to recommend legal and regulatory reforms to better prevent child abuse in childcare institutions in Hong Kong.
Design/methodology/approach
A summary of investigation report and news reports are referred to in describing the abuse incidents which occurred in a children’s residential home. Routine Activity Theory (RAT) is used as the framework for identifying the causes. Local and overseas legislation, regulations, case law, and policies are analysed to provide recommendations for reforms.
Findings
There are systematic failures such as workload issues, inadequate supervision, and the absence of continuing professional development (CPD) that contributed to the incidents. The regulations governing the operation of childcare centres and criminal laws against child abuse are long overdue for an update in Hong Kong. On the institutional side, this paper recommends enacting regulations that mandate CPD, lower the staff-to-child ratio, and strengthen the Social Welfare Department’s (SWD) supervisory powers over childcare centres. From the criminal law perspective, it is recommended that “reasonable chastisement” be abolished as a defence of corporal punishment, and that there be new offences for failure to report suspected child abuse incidents and causing or allowing the death/serious harm of a child.
Originality/value
The child abuse incidents, occurring in a childcare institution, have drawn wide public concern. Reform is required to protect vulnerable children and regain public confidence.
Details
Keywords
Shane W. Reid, Aaron F. McKenny and Jeremy C. Short
A growing body of research outlines how to best facilitate and ensure methodological rigor when using dictionary-based computerized text analyses (DBCTA) in organizational…
Abstract
A growing body of research outlines how to best facilitate and ensure methodological rigor when using dictionary-based computerized text analyses (DBCTA) in organizational research. However, these best practices are currently scattered across several methodological and empirical manuscripts, making it difficult for scholars new to the technique to implement DBCTA in their own research. To better equip researchers looking to leverage this technique, this methodological report consolidates current best practices for applying DBCTA into a single, practical guide. In doing so, we provide direction regarding how to make key design decisions and identify valuable resources to help researchers from the beginning of the research process through final publication. Consequently, we advance DBCTA methods research by providing a one-stop reference for novices and experts alike concerning current best practices and available resources.
Details
Keywords
Aaron D. Hill, Jane K. Lê, Aaron F. McKenny, Paula O'Kane, Sotirios Paroutis and Anne D. Smith
Abstract
Details
Keywords
John R. Busenbark, Kenneth A. Frank, Spiro J. Maroulis, Ran Xu and Qinyun Lin
In this chapter, we explicate two related techniques that help quantify the sensitivity of a given causal inference to potential omitted variables and/or other sources of…
Abstract
In this chapter, we explicate two related techniques that help quantify the sensitivity of a given causal inference to potential omitted variables and/or other sources of unexplained heterogeneity. In particular, we describe the Impact Threshold of a Confounding Variable (ITCV) and the Robustness of Inference to Replacement (RIR). The ITCV describes the minimum correlation necessary between an omitted variable and the focal parameters of a study to have created a spurious or invalid statistical inference. The RIR is a technique that quantifies the percentage of observations with nonzero effects in a sample that would need to be replaced with zero effects in order to overturn a given causal inference at any desired threshold. The RIR also measures the percentage of a given parameter estimate that would need to be biased in order to overturn an inference. Each of these procedures is critical to help establish causal inference, perhaps especially for research urgently studying the COVID-19 pandemic when scholars are not afforded the luxury of extended time periods to determine precise magnitudes of relationships between variables. Over the course of this chapter, we define each technique, illustrate how they are applied in the context of seminal strategic management research, offer guidelines for interpreting corresponding results, and delineate further considerations.
Details
Keywords
Ryan Scrivens, Tiana Gaudette, Garth Davies and Richard Frank
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.Methods/approach …
Abstract
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.
Methods/approach – The authors describe a customized web-crawler that was developed for the purpose of collecting, classifying, and interpreting extremist content online and on a large scale, followed by an overview of a relatively novel machine learning tool, sentiment analysis, which has sparked the interest of some researchers in the field of terrorism and extremism studies. The authors conclude with a discussion of what they believe is the future applicability of sentiment analysis within the online political violence research domain.
Findings – In order to gain a broader understanding of online extremism, or to improve the means by which researchers and practitioners “search for a needle in a haystack,” the authors recommend that social scientists continue to collaborate with computer scientists, combining sentiment analysis software with other classification tools and research methods, as well as validate sentiment analysis programs and adapt sentiment analysis software to new and evolving radical online spaces.
Originality/value – This chapter provides researchers and practitioners who are faced with new challenges in detecting extremist content online with insights regarding the applicability of a specific set of machine learning techniques and research methods to conduct large-scale data analyses in the field of terrorism and extremism studies.
Details