Search results

1 – 10 of 23
Open Access
Book part
Publication date: 12 December 2023

Ulla Eriksson-Zetterquist and Kerstin Sahlin

Collegiality is often discussed and analyzed as a challenged form of governance, a form of working that used to function well in universities prior to the emergence of…

Abstract

Collegiality is often discussed and analyzed as a challenged form of governance, a form of working that used to function well in universities prior to the emergence of contemporary and modern forms of governance. This seems to suggest that collegiality used to dominate, while other forms of governance are now taking over. The papers in volume 86 of this special issue support the notion of challenged collegiality, but also show that for the most part, nostalgic notions of “the good old days” are neither true nor helpful if we are to revitalize academic collegiality. After examining whether a golden age of collegiality ever existed, we discuss why collegiality matters. Exploring what are often described as limitations or “dark sides” of collegiality, we address four such “dark sides” related to slow decision-making, conflicts, parochialism, and diversity. This is followed by a discussion of how these limitations may be handled and what measures must be taken to maintain and develop collegiality. With a brief summary of the remaining papers under two headings, “Maintaining collegiality” and “Revitalizing collegiality,” we preview the rest of this volume.

Details

Revitalizing Collegiality: Restoring Faculty Authority in Universities
Type: Book
ISBN: 978-1-80455-818-8

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Book part
Publication date: 14 November 2017

John E. Tyler, Evan Absher, Kathleen Garman and Anthony Luppino

This chapter demonstrates that social business models do not meaningfully prioritize or impose accountability to “social good” over other purposes in ways that (a) best protect…

Abstract

This chapter demonstrates that social business models do not meaningfully prioritize or impose accountability to “social good” over other purposes in ways that (a) best protect against owners changing their minds or entry of new owners with different priorities and (b) enable reliable accountability over time and across circumstances. This chapter further suggests a model – a “social primacy company” – that actually prioritizes “social good” and meaningful accountability to it. This chapter thus clarifies circumstances under which existing models might be most useful and are not particularly useful, especially as investors, entrepreneurs, employees, regulators, and others pursue shared, common understandings about purposes, priorities, and accountability.

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

“The unexamined life is not worth living” (Socrates). That is, without critically inquiring into the knowledge of life which is well-being and valuable, life is not worth living…

Abstract

Executive Summary

“The unexamined life is not worth living” (Socrates). That is, without critically inquiring into the knowledge of life which is well-being and valuable, life is not worth living. Critical thinking questions existing theories and their unexamined and obsessive assumptions and generalizations, constraints, and “best” practices of the prevailing system of management and tries to replace them with more valid assumptions and generalizations that uphold the dignity, uniqueness, and inalienable rights of the individual person and the community. Better outcomes result from asking the right questions than from having the right answers. In the diverse, pluralist cultural environment of today, the promise of a truly generative dialog among Occidental (Western) and Oriental (Eastern) cultures and civilizations holds great hope for the future. Critical thinking (CT) is an “inclusive” thinking system that can facilitate this dialog such that all of us have a meaningful space and place in this universe. After defining CT and arguing its importance for executives, this chapter introduces CT in two parts: Part 1: Various Approaches to Critical Thinking; Part 2: Major Theories of Critical Thinking. Several contemporary business cases will be invoked to illustrate the need, nature, and scope of corporate CT.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

In the wake of the extraordinary financial scandals that both preceded and followed the September–October Financial Crises of 2008, discussions about the executive virtues of…

Abstract

Executive Summary

In the wake of the extraordinary financial scandals that both preceded and followed the September–October Financial Crises of 2008, discussions about the executive virtues of honesty and integrity are no longer academic or esoteric, but critically urgent and challenging. As representatives of the corporation, its products and services, corporate executives in general, and production, accounting, finance, and marketing executives in particular, must be the frontline public relations and goodwill ambassadors for their firms, products, and services. As academicians of business education, we must also analyze these corporate wrongdoings as objectively and ethically as possible. What is wrong must be declared and condemned as wrong, what is right must be affirmed and acknowledged as right. We owe it to our students, our profession, our stakeholders, and to the business world. Contemporary American philosopher Alasdair MacIntyre (1981) proposes the issue of morality in a threefold question: Who am I? Who ought I to become? How ought I to get there? The answer to every question refers to the virtues, especially to corporate executive virtues. This chapter explores corporate executive virtues, especially the classical cardinal virtues of prudence, temperance, fortitude, and justice as defining and enhancing corporate executive life.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Book part
Publication date: 16 August 2023

James Martin

Cryptomarkets have expanded rapidly since the launch of Silk Road in 2011, offering a significant new mode for the sale and distribution of illicit drugs. One of the key questions…

Abstract

Cryptomarkets have expanded rapidly since the launch of Silk Road in 2011, offering a significant new mode for the sale and distribution of illicit drugs. One of the key questions accompanying the proliferation of cryptomarkets and online drug distribution concerns how these unique online fora alter relationships between drug suppliers and their customers. Existing research points to an increase in perceptions of safety and respect among people who use cryptomarkets to purchase drugs relative to other ‘offline’ modes of drug acquisition. There is a growing body of evidence that suggests that drug suppliers are also attracted to cryptomarkets by perceptions of increased safety, as well as by market norms and institutional processes that are characterised by respect and courteous engagement. These issues fall broadly under what has been termed market ‘gentrification’ – that is, the substitution of offline drug market norms, which are sometimes characterised by violence, intimidation, suspicion, and exploitation, with relative feelings of safety, respect, and courtesy. This chapter explores the ‘gentrification hypothesis’ and examines how the unique structural characteristics of cryptomarkets, which include user feedback and ratings, dispute resolution systems, and administrator and community ‘policing’ of cryptomarkets, as well as online discussion forums, assist in fostering the development of pro-social norms that appear to be prevalent on cryptomarkets.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Book part
Publication date: 1 May 2019

Gustav Gunnerud, Sondre Evjen, Rune Søfting, Ola Lædre, Nina Kjesbu and Jardar Lohne

The study aims to address the seemingly unexplored scope of action for project managers to conduct work-related crime in the Norwegian construction industry.

Abstract

Purpose

The study aims to address the seemingly unexplored scope of action for project managers to conduct work-related crime in the Norwegian construction industry.

Design/Methodology/Approach

Literature review: In-depth interview with 13 senior officials. Document study.

Findings

Broad scope of action to contract criminal subcontractors seems to be exploited intentionally and unintentionally.

Research Limitations/Implications

Limited number of interviewees. The scale of intentional exploitation unknown. Research could be used as basis to further research on incentives and countermeasures.

Practical Implications

Need for industry wide effort to improve barriers to avoid crime and contracting criminal subcontractors.

Originality/Value

Unexplored field globally and in Norway. Little to no documentation found in previous research.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 16 August 2023

Kim Moeller

The growth in cryptomarkets has reinvigorated the research on illicit drug distribution due to the availability of large-scale data. This data has enabled researchers to ask new…

Abstract

The growth in cryptomarkets has reinvigorated the research on illicit drug distribution due to the availability of large-scale data. This data has enabled researchers to ask new and detailed questions about how participants in these markets trust each other enough for the market not to collapse. This question deserves more attention because it has become a taken-for-granted notion that repeated transactions and social categories create trust. Whether online or on the street, economic exchanges under illegality are more uncertain than transactions in the legal economy. This puts higher demands on trust, as there is less information and the stakes are higher. In this chapter, the author presents definitions, typologies, and disciplinary contributions to the study of trust and examine how it has been operationalised in a sample of 13 peer-reviewed articles. These articles focus on three dimensions of trust: process-based trust that derives from repeated transactions with known partners; character-based trust measured by the networked reputation scores; and institutional-based trust in the platform and its administrators. In practice, the trust bases are intertwined. Drawing on the broader social science literature on trust, a mesolevel operationalisation that centres on networked reputation scores as embedded in processes and institutions can draw the research together in a multidisciplinary framework.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Access

Only Open Access

Year

Content type

Book part (23)
1 – 10 of 23