Search results
1 – 10 of over 192000In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both self…
Abstract
In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both self-control and social control), in order to understand under what circumstances youths are more and less likely to behave in a deviant manner. The author will, then, mention the general strain theory, to draw the relationships between the encounters of negative life events, the development of strain, and the disposition to perform delinquency. The author will also, address the cultural deviance and social learning theories that help justify the expression of juvenile delinquency from a sociocultural perspective, alongside pathing the way to explaining how social costs of youth delinquency can be raised by policy amendments in order to mitigate adolescents’ exercises of smoking, drinking and sexual misconduct behaviours. In this chapter, the author will highlight how poverty, the availability of delinquent opportunities, peer influence and pressure, a lack of parental and school socialisation, and deviant social and cultural norms are all risk factors for youth delinquency.
Details
Keywords
Neil J. MacKinnon and Dawn T. Robinson
To provide a comprehensive review of theoretical and research advances in affect control theory from 1988 to 2013 for academic and student researchers in social psychology.
Abstract
Purpose
To provide a comprehensive review of theoretical and research advances in affect control theory from 1988 to 2013 for academic and student researchers in social psychology.
Design/Methodology/Approach
Against the background of a concise history of affect control theory from its beginnings in the 1960s to its maturation in the late 1980s, a comprehensive review of research and publications in the last 25 years is reported in five sections: Theoretical Advances (e.g., self and institutions, nonverbal behavior, neuroscience, artificial intelligence); Technological Advances (e.g., electronic data collection, computer simulations, cultural surveys, equation refinement, small groups analysis); Cross-Cultural Research (archived data and published analyses); Empirical Tests of the Theory; and Substantive Applications (e.g., emotions, social and cultural change, occupations/work, politics, gender/ideology/subcultures, deviance, criminology, stereotyping, physiological behavior).
Findings
Reveals an impressive number of publications in this area, including over 120 articles and chapters and four major books, and a great deal of cross-cultural research, including European, Asian, and Middle-Asian cultures.
Research Limitation/Implications (if applicable)
Because of limitations of space, the review does not cover the large number of theses, dissertations, and research reports.
Originality/Value
No other review of affect control theory with this scope and detail exists.
Details
Keywords
Abdullah Oguz, Nikhil Mehta and Prashant Palvia
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…
Abstract
Purpose
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.
Design/methodology/approach
The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.
Findings
A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.
Originality/value
As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.
Details
Keywords
Kwo‐Shing Hong, Yen‐Ping Chi, Louis R. Chao and Jih‐Hsing Tang
With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of…
Abstract
With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of attention from both academia and practitioners. However, there is lacking a theoretical framework for information security management. This paper attempts to integrate security policy theory, risk management theory, control and auditing theory, management system theory and contingency theory in order to build a comprehensive theory of information security management (ISM). This paper suggests that an integrated system theory is useful for understanding information security management, explaining information security management strategies, and predicting management outcomes. This theory may lay a solid theoretical foundation for further empirical research and application.
Details
Keywords
This research paper seeks to advance the techniques of “within-paradigm” triangulation and theoretical generalization adopted in qualitative field studies for new theory…
Abstract
Purpose
This research paper seeks to advance the techniques of “within-paradigm” triangulation and theoretical generalization adopted in qualitative field studies for new theory development in management control.
Design/methodology/approach
Using the evidence gleaned from three positivist case studies along with some published interpretivist studies, this paper identifies three triangulation approaches and links them with three forms of theoretical generalization in qualitative field studies.
Findings
While the “literal” approach to triangulation has its place in the extant literature, this study finds that two other approaches, labeled “convergent” and “normative” triangulation, which are relevant in many circumstances to link multiple pieces of evidence in order to build credible explanations. In theory development, while the extant forms of theoretical generalization (constructive and contextual) are useful for identifying new solutions for both practical and theoretical concerns, this paper finds that a third form, namely “transposed” logic, is relevant in identifying new control problems that can benefit by adopting the observed unusual solutions.
Originality/value
Within triangulation, while the extant literature endorses the role of literal triangulation in obtaining consistent evidence, including how verifying inconsistent responses helps improve the validity of the obtained evidence, this paper advances two new triangulation approaches that can enrich the extant literature. Within theoretical generalization, while the extant literature deems constructive and contextual forms as “rhetoric”, this paper (1) expands their status to “logic” by clarifying their theoretical purpose and (2) introduces one new form, namely “transposed” logic that helps identify a generalizable range of management control problems that can adopt the observed unusual solution.
Details
Keywords
Christopher D. Moore and Christabel L. Rogalin
Identifies where status and identity processes converge in social interaction and when one process may become more consequential than the other.
Abstract
Purpose
Identifies where status and identity processes converge in social interaction and when one process may become more consequential than the other.
Methodology/approach
Drawing upon existing experimental data, we illustrate how affect control theory and status characteristics theory make seemingly contradictory predictions in certain limited interactions and propose a theoretical framework to potentially reconcile these differences.
Findings
Three pivot points are identified at which status and identity processes meet and then one of the processes more strongly predicts interaction outcomes.
Research limitations/implications
The chapter represents a starting point for future research examining situations where status and identity processes converge.
Originality/value
We suggest ways to empirically test related claims made by both theories in an array of circumstances.
Details
Keywords
Noah E. Friedkin and Eugene C. Johnsen
This paper works at the intersections of affect control theory, expectation states theory, and social influence network theory. First, we introduce social influence network theory…
Abstract
This paper works at the intersections of affect control theory, expectation states theory, and social influence network theory. First, we introduce social influence network theory into affect control theory. We show how an influence network may emerge from the pattern of interpersonal sentiments in a group and how the fundamental sentiments that are at the core of affect control theory (dealing with the evaluation, potency, and activity of self and others) may be modified by interpersonal influences. Second, we bring affect control theory and social influence network theory to bear on expectation states theory. In a task-oriented group, where persons’ performance expectations may be a major basis of their interpersonal influence, we argue that persons’ fundamental sentiments may mediate effects of status characteristics on group members’ performance expectations. Based on the linkage of fundamental sentiments and interpersonal influence, we develop an account of the formation of influence networks in groups that is applicable to both status homogeneous and status heterogeneous groups of any size, whether or not they are completely connected, and that is not restricted in scope to task-oriented groups.
Matthew J. Hickman, Alex R. Piquero, Brian A. Lawton and Jack R. Greene
The work of scholars who study police deviance has yet to result in the development of a substantive theory with which to frame their collective efforts. Recently, Tittle advanced…
Abstract
The work of scholars who study police deviance has yet to result in the development of a substantive theory with which to frame their collective efforts. Recently, Tittle advanced a general theory of deviance that may help to fill this gap. The central premise of Tittle’s control balance theory is that the amount of control to which one is subject relative to the amount of control one can exercise (the control ratio) affects both the probability of deviance as well as the specific form of deviance. Examines the utility of control balance as a new theoretical orientation in police deviance research. Presents a framework for conceptualizing control balance within the special context of police deviance and, using data collected specifically for the purpose of operationalizing the control ratio, provides an empirical test. The data are drawn from a survey administered to 499 Philadelphia police officers. Scenario methodology was used to investigate the effects of officer control ratios on the probability of reporting a fellow officer who covers up an incident in which another officer was discovered driving while intoxicated (off duty), and second physically abuses a suspect in custody. Consistent with predictions derived from Tittle’s theory, results indicated that officers with control deficits are more likely to report fellow officers who engage in the behaviors portrayed in the scenarios. Future research directions are discussed.
Details
Keywords
Classical control theory and modern control theory satisfy the Galilean principle of relativity. If the velocity v of controlled systems is high that is to say, v approaches the…
Abstract
Classical control theory and modern control theory satisfy the Galilean principle of relativity. If the velocity v of controlled systems is high that is to say, v approaches the velocity of light in vacuo, then the existing control theories must be transformed into relativistic form, i.e. based on relativistic physics, we must reform relativistic control theory, making it satisfy Einstein’s principle of relativity. Based on this, some properties of relativistic control theory are discussed in this paper.
Details
Keywords
Jan E. Stets and Peter J. Burke
The purpose of this chapter is to review the historical development of identity theory from 1988 to the present, and then outline some thoughts about future directions for the…
Abstract
Purpose
The purpose of this chapter is to review the historical development of identity theory from 1988 to the present, and then outline some thoughts about future directions for the theory.
Methodology/Approach
The chapter discusses major advances in identity theory over the past 25 years such as the incorporation of the perceptual control system into the theory, the introduction of “resources” in which symbolic and sign meanings are important, new views of the social structure, the relevance of the situation in influencing the identity process, the idea of different bases of identities, broadening our understanding of multiple identities, studying identity change, and bringing in emotions into the theory.
Findings
Throughout the review, empirical work is identified and briefly discussed that supports the major advances of the theory.
Research limitations
The chapter suggests a number of ways that identity theory may be developed in the future such as examining negative or stigmatized identities. Additionally, there is a discussion as to ways in which the theory may be tied to other theoretical traditions such as affect control theory, exchange theory, and social identity theory.
Social Implications
Identity theory has had a number of applications to various areas in society, including understanding crime, education, race/ethnicity, gender, the family, and the environment.
Originality/Value of Chapter
This is the most recent overview of identity theory over the past 25 years. It becomes clear to the reader that the theory offers a way of understanding the person as a cognitive, emotional, and behavioral agent who influences the structure of society but who is also influenced by the social structure.
Details