Search results

1 – 10 of over 192000
Book part
Publication date: 14 September 2023

Jason Hung

In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both self…

Abstract

In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both self-control and social control), in order to understand under what circumstances youths are more and less likely to behave in a deviant manner. The author will, then, mention the general strain theory, to draw the relationships between the encounters of negative life events, the development of strain, and the disposition to perform delinquency. The author will also, address the cultural deviance and social learning theories that help justify the expression of juvenile delinquency from a sociocultural perspective, alongside pathing the way to explaining how social costs of youth delinquency can be raised by policy amendments in order to mitigate adolescents’ exercises of smoking, drinking and sexual misconduct behaviours. In this chapter, the author will highlight how poverty, the availability of delinquent opportunities, peer influence and pressure, a lack of parental and school socialisation, and deviant social and cultural norms are all risk factors for youth delinquency.

Details

The Socially Constructed and Reproduced Youth Delinquency in Southeast Asia: Advancing Positive Youth Involvement in Sustainable Futures
Type: Book
ISBN: 978-1-83753-886-7

Keywords

Book part
Publication date: 1 January 2014

Neil J. MacKinnon and Dawn T. Robinson

To provide a comprehensive review of theoretical and research advances in affect control theory from 1988 to 2013 for academic and student researchers in social psychology.

Abstract

Purpose

To provide a comprehensive review of theoretical and research advances in affect control theory from 1988 to 2013 for academic and student researchers in social psychology.

Design/Methodology/Approach

Against the background of a concise history of affect control theory from its beginnings in the 1960s to its maturation in the late 1980s, a comprehensive review of research and publications in the last 25 years is reported in five sections: Theoretical Advances (e.g., self and institutions, nonverbal behavior, neuroscience, artificial intelligence); Technological Advances (e.g., electronic data collection, computer simulations, cultural surveys, equation refinement, small groups analysis); Cross-Cultural Research (archived data and published analyses); Empirical Tests of the Theory; and Substantive Applications (e.g., emotions, social and cultural change, occupations/work, politics, gender/ideology/subcultures, deviance, criminology, stereotyping, physiological behavior).

Findings

Reveals an impressive number of publications in this area, including over 120 articles and chapters and four major books, and a great deal of cross-cultural research, including European, Asian, and Middle-Asian cultures.

Research Limitation/Implications (if applicable)

Because of limitations of space, the review does not cover the large number of theses, dissertations, and research reports.

Originality/Value

No other review of affect control theory with this scope and detail exists.

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-78441-078-0

Keywords

Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Article
Publication date: 1 December 2003

Kwo‐Shing Hong, Yen‐Ping Chi, Louis R. Chao and Jih‐Hsing Tang

With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of…

18258

Abstract

With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of attention from both academia and practitioners. However, there is lacking a theoretical framework for information security management. This paper attempts to integrate security policy theory, risk management theory, control and auditing theory, management system theory and contingency theory in order to build a comprehensive theory of information security management (ISM). This paper suggests that an integrated system theory is useful for understanding information security management, explaining information security management strategies, and predicting management outcomes. This theory may lay a solid theoretical foundation for further empirical research and application.

Details

Information Management & Computer Security, vol. 11 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 7 December 2020

V.G. Sridharan

This research paper seeks to advance the techniques of “within-paradigm” triangulation and theoretical generalization adopted in qualitative field studies for new theory

1221

Abstract

Purpose

This research paper seeks to advance the techniques of “within-paradigm” triangulation and theoretical generalization adopted in qualitative field studies for new theory development in management control.

Design/methodology/approach

Using the evidence gleaned from three positivist case studies along with some published interpretivist studies, this paper identifies three triangulation approaches and links them with three forms of theoretical generalization in qualitative field studies.

Findings

While the “literal” approach to triangulation has its place in the extant literature, this study finds that two other approaches, labeled “convergent” and “normative” triangulation, which are relevant in many circumstances to link multiple pieces of evidence in order to build credible explanations. In theory development, while the extant forms of theoretical generalization (constructive and contextual) are useful for identifying new solutions for both practical and theoretical concerns, this paper finds that a third form, namely “transposed” logic, is relevant in identifying new control problems that can benefit by adopting the observed unusual solutions.

Originality/value

Within triangulation, while the extant literature endorses the role of literal triangulation in obtaining consistent evidence, including how verifying inconsistent responses helps improve the validity of the obtained evidence, this paper advances two new triangulation approaches that can enrich the extant literature. Within theoretical generalization, while the extant literature deems constructive and contextual forms as “rhetoric”, this paper (1) expands their status to “logic” by clarifying their theoretical purpose and (2) introduces one new form, namely “transposed” logic that helps identify a generalizable range of management control problems that can adopt the observed unusual solution.

Details

Accounting, Auditing & Accountability Journal, vol. 34 no. 2
Type: Research Article
ISSN: 0951-3574

Keywords

Book part
Publication date: 13 July 2016

Christopher D. Moore and Christabel L. Rogalin

Identifies where status and identity processes converge in social interaction and when one process may become more consequential than the other.

Abstract

Purpose

Identifies where status and identity processes converge in social interaction and when one process may become more consequential than the other.

Methodology/approach

Drawing upon existing experimental data, we illustrate how affect control theory and status characteristics theory make seemingly contradictory predictions in certain limited interactions and propose a theoretical framework to potentially reconcile these differences.

Findings

Three pivot points are identified at which status and identity processes meet and then one of the processes more strongly predicts interaction outcomes.

Research limitations/implications

The chapter represents a starting point for future research examining situations where status and identity processes converge.

Originality/value

We suggest ways to empirically test related claims made by both theories in an array of circumstances.

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-78635-041-1

Keywords

Book part
Publication date: 14 November 2003

Noah E. Friedkin and Eugene C. Johnsen

This paper works at the intersections of affect control theory, expectation states theory, and social influence network theory. First, we introduce social influence network theory

Abstract

This paper works at the intersections of affect control theory, expectation states theory, and social influence network theory. First, we introduce social influence network theory into affect control theory. We show how an influence network may emerge from the pattern of interpersonal sentiments in a group and how the fundamental sentiments that are at the core of affect control theory (dealing with the evaluation, potency, and activity of self and others) may be modified by interpersonal influences. Second, we bring affect control theory and social influence network theory to bear on expectation states theory. In a task-oriented group, where persons’ performance expectations may be a major basis of their interpersonal influence, we argue that persons’ fundamental sentiments may mediate effects of status characteristics on group members’ performance expectations. Based on the linkage of fundamental sentiments and interpersonal influence, we develop an account of the formation of influence networks in groups that is applicable to both status homogeneous and status heterogeneous groups of any size, whether or not they are completely connected, and that is not restricted in scope to task-oriented groups.

Details

Power and Status
Type: Book
ISBN: 978-0-76231-030-2

Article
Publication date: 1 December 2001

Matthew J. Hickman, Alex R. Piquero, Brian A. Lawton and Jack R. Greene

The work of scholars who study police deviance has yet to result in the development of a substantive theory with which to frame their collective efforts. Recently, Tittle advanced…

3268

Abstract

The work of scholars who study police deviance has yet to result in the development of a substantive theory with which to frame their collective efforts. Recently, Tittle advanced a general theory of deviance that may help to fill this gap. The central premise of Tittle’s control balance theory is that the amount of control to which one is subject relative to the amount of control one can exercise (the control ratio) affects both the probability of deviance as well as the specific form of deviance. Examines the utility of control balance as a new theoretical orientation in police deviance research. Presents a framework for conceptualizing control balance within the special context of police deviance and, using data collected specifically for the purpose of operationalizing the control ratio, provides an empirical test. The data are drawn from a survey administered to 499 Philadelphia police officers. Scenario methodology was used to investigate the effects of officer control ratios on the probability of reporting a fellow officer who covers up an incident in which another officer was discovered driving while intoxicated (off duty), and second physically abuses a suspect in custody. Consistent with predictions derived from Tittle’s theory, results indicated that officers with control deficits are more likely to report fellow officers who engage in the behaviors portrayed in the scenarios. Future research directions are discussed.

Details

Policing: An International Journal of Police Strategies & Management, vol. 24 no. 4
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 February 2004

Hejin Xiong and Mian‐Yun Chen

Classical control theory and modern control theory satisfy the Galilean principle of relativity. If the velocity v of controlled systems is high that is to say, v approaches the…

275

Abstract

Classical control theory and modern control theory satisfy the Galilean principle of relativity. If the velocity v of controlled systems is high that is to say, v approaches the velocity of light in vacuo, then the existing control theories must be transformed into relativistic form, i.e. based on relativistic physics, we must reform relativistic control theory, making it satisfy Einstein’s principle of relativity. Based on this, some properties of relativistic control theory are discussed in this paper.

Details

Kybernetes, vol. 33 no. 2
Type: Research Article
ISSN: 0368-492X

Keywords

Book part
Publication date: 1 January 2014

Jan E. Stets and Peter J. Burke

The purpose of this chapter is to review the historical development of identity theory from 1988 to the present, and then outline some thoughts about future directions for the…

Abstract

Purpose

The purpose of this chapter is to review the historical development of identity theory from 1988 to the present, and then outline some thoughts about future directions for the theory.

Methodology/Approach

The chapter discusses major advances in identity theory over the past 25 years such as the incorporation of the perceptual control system into the theory, the introduction of “resources” in which symbolic and sign meanings are important, new views of the social structure, the relevance of the situation in influencing the identity process, the idea of different bases of identities, broadening our understanding of multiple identities, studying identity change, and bringing in emotions into the theory.

Findings

Throughout the review, empirical work is identified and briefly discussed that supports the major advances of the theory.

Research limitations

The chapter suggests a number of ways that identity theory may be developed in the future such as examining negative or stigmatized identities. Additionally, there is a discussion as to ways in which the theory may be tied to other theoretical traditions such as affect control theory, exchange theory, and social identity theory.

Social Implications

Identity theory has had a number of applications to various areas in society, including understanding crime, education, race/ethnicity, gender, the family, and the environment.

Originality/Value of Chapter

This is the most recent overview of identity theory over the past 25 years. It becomes clear to the reader that the theory offers a way of understanding the person as a cognitive, emotional, and behavioral agent who influences the structure of society but who is also influenced by the social structure.

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-78441-078-0

Keywords

1 – 10 of over 192000