Search results

1 – 10 of over 1000
Article
Publication date: 2 October 2018

Annica Björkman and Martin Salzmann-Erikson

The purpose of this paper is to explore and describe online communication about the experiences and attitudes toward Swedish Healthcare Direct, a national telephone advice nursing

Abstract

Purpose

The purpose of this paper is to explore and describe online communication about the experiences and attitudes toward Swedish Healthcare Direct, a national telephone advice nursing (TAN) service.

Design/methodology/approach

A descriptive research design was adopted using a six-step netnographic method. Three Swedish forums were purposefully selected and data from the virtual discussions were collected.

Findings

Three themes emerged: expectancy and performativity of the nurses, absurdity in accessibility and the scrutinizing game. The most prominent finding was the scrutinizing game, which included aspects of bidirectional mistrust from both nurses and callers. Another salient finding was the attitudes that callers held toward nurses who used a technique interpreted as “passing the buck.”

Research limitations/implications

The use of a nethnographic method is novel in this area of research. Consequently, the body of knowledge has regarding telephone advise nursing service has significantly been broadened. A limitation in this study is that demographic data for the posters are not available.

Practical implications

Bidirectional distrust is an important issue that must be acknowledged by TAN services, since it might damage the service on a fundamental level. Healthcare providers, politicians, and researchers should account for the power and availability of virtual discussions when seeking consumers’ opinions and evaluating the quality of the care provided.

Originality/value

This analysis of the ongoing discussions that take place on the internet provides insight into callers’ perceptions of a national TAN service. The bidirectional mistrust found from both the nurses and the callers might be a threat to callers’ compliance with the advice given and their care-seeking behavior.

Details

Internet Research, vol. 28 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 18 January 2021

Shane Horgan, Ben Collier, Richard Jones and Lynsay Shepherd

The purpose of this study is to develop the theorisation of cybercrime in the context of the pandemic, and to sketch out a vision of how law enforcement might respond to a…

2804

Abstract

Purpose

The purpose of this study is to develop the theorisation of cybercrime in the context of the pandemic, and to sketch out a vision of how law enforcement might respond to a transformed landscape of online crime and offending.

Design/methodology/approach

This conceptual paper draws on empirical evidence from a range of sources (including official statistics) and the existing research literature, and revisits routine activities theory to illuminate the way that cybercrime patterns are being transformed by the pandemic.

Findings

The pandemic is reshaping the routine activities of societies en masse, leading to changes in the ecology of risk and opportunity for cybercrime. There is evidence of a large increase in the prevalence of cybercrime as a result, yet much of this has a paradoxically “local” character.

Practical implications

The authors identify specific practical implications for law enforcement, namely, that the role of local police in policing cybercrime should be re-envisioned, with a democratic, community-oriented approach at its heart.

Originality/value

The theoretical perspective outlined is a novel and critical development of a well-established framework, opening up new paths to the theorisation of cybercrime and cybercrime policing. The authors’ suggestions for practitioners have the potential for direct impact, both at the level of practice and in terms of broader imaginaries and organisation of police and policing.

Details

Journal of Criminal Psychology, vol. 11 no. 3
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 1 December 2004

Jane Mounteney

No one knows what the future holds. Not least for substance use and addictions. Few predicted the psychedelic movement in the 1960s, the crack ‘epidemic’ in the 1980s and the ‘E’…

Abstract

No one knows what the future holds. Not least for substance use and addictions. Few predicted the psychedelic movement in the 1960s, the crack ‘epidemic’ in the 1980s and the ‘E’ generation of the 1990s ‐ all of which had a profound influence on our culture, youth and our health. So what of the Naughties, Teenies and Twenties? With increased globalisation, new technologies, increasing spending power and the scope for increased pleasure‐seeking we are destined for more and new addictions. In this groundbreaking article, Jane Mounteney applies the technique of scenario planning to investigate a future dominated by technology, smart and nanodrugs and an ever‐increasing availability of drugs. With the emergence of the super nerd and groovy geek, who will be there to help the fallen?

Details

Drugs and Alcohol Today, vol. 4 no. 4
Type: Research Article
ISSN: 1745-9265

Article
Publication date: 12 August 2022

Raed Ababneh and Walaa Abu Ahmadah

This study aims to explore the perception of physicians and nurses toward the prevalence of workplace bullying behaviors (verbal, physical, social, and cyber) in Jordanian public…

Abstract

Purpose

This study aims to explore the perception of physicians and nurses toward the prevalence of workplace bullying behaviors (verbal, physical, social, and cyber) in Jordanian public hospitals.

Design/methodology/approach

The study population consisted of 1,056 physicians and nurses working on the day and night shifts in four leading public hospitals in Jordan. A convenient nonprobability sample of 460 physicians and nurses was chosen randomly to answer the self-administrated questionnaire developed by the authors. Descriptive and inferential statistics were conducted using SPSS 26.0. Statistical significance was set at p < 0.05.

Findings

Participants reported that the prevalence of workplace bullying behaviors was 23% (M = 1.15). The practice of the bullying types was in descending order as follows: verbal (25%), social (24.8%), physical (21.4%), and cyber (21%). Abusers spread rumors about the victims (31%), verbally harass them for provocation (29%), physically damage their things without any reason (26%), and make fun of their posts on social media (21%). Cyberbullying was significantly and strongly associated with social bullying (0.88). Ph.D. and master's holders reported higher practice of workplace bullying behaviors than respondents who hold a diploma or a bachelor's degree. In addition, respondents who work the day shift reported higher verbal bullying than the night shift respondents.

Practical implications

There is a need to develop effective policies and procedures that tackle the practice of workplace bullying by educating employees about the nature of workplace bullying, its effects on individual and organizational outcomes, and how to prevent its adverse consequences.

Originality/value

This is one of the first comprehensive studies in the Arab context that explores workplace bullying against physicians and nurses.

Details

Employee Relations: The International Journal, vol. 45 no. 1
Type: Research Article
ISSN: 0142-5455

Keywords

Article
Publication date: 17 November 2020

Natalia D'Souza, Darryl Forsyth and Kate Blackwood

This paper offers a synopsis of workplace cyber abuse, identifying patterns of and responses to cyber abuse, as well as barriers to reporting and successful organisational…

Abstract

Purpose

This paper offers a synopsis of workplace cyber abuse, identifying patterns of and responses to cyber abuse, as well as barriers to reporting and successful organisational intervention.

Design/methodology/approach

Using a pragmatic research paradigm, quantitative and qualitative survey data were collected from 205 targets of cyber abuse in New Zealand.

Findings

Nearly half of all respondents experienced more than one form of cyber abuse, with gendered patterns emerging. Workplace cyber abuse also frequently went unreported for varying reasons. Based on the descriptive analyses, four key challenges for the management of cyber abuse are identified: (1) multiple and gendered patterns of cyber abuse, (2) cyber abuse across organisational boundaries, (3) non-reporting and underreporting and (4) ineffective (or lack of) organisational interventions.

Practical implications

Implications for human resource management (HRM) and line managers include adopting a preventative approach to workplace cyber abuse by implementing clear policies, guidelines and resources to deal with cyber abuse, clarifying the boundaries of “workplace” cyber abuse and considering organisational protection measures for non-standard and vulnerable workers.

Social implications

Unique challenges with workplace cyber abuse emphasise the need for a coordinated, multilevel intervention approach involving organisations, policymakers, online platforms and academics.

Originality/value

This study provides an important overview of existing approaches to the management of workplace cyber abuse as well as a foundation upon which to base further research exploring good practice in its prevention and intervention and much-needed theoretical development.

Content available
Book part
Publication date: 21 July 2022

Ian Ruthven

Abstract

Details

Dealing With Change Through Information Sculpting
Type: Book
ISBN: 978-1-80382-047-7

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1032

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 19 July 2021

Felicitas Hoppe, Nadine Gatzert and Petra Gruner

This article aims to gain insights on the current state of small- and medium-sized enterprises’ (SMEs’) cyber risk management process and to derive future research directions.

2019

Abstract

Purpose

This article aims to gain insights on the current state of small- and medium-sized enterprises’ (SMEs’) cyber risk management process and to derive future research directions.

Design/methodology/approach

This is done by collecting market insights from 37 recent industry surveys and structuring them based on the steps of the risk management process. From this analysis, major challenges are derived and future fields of research identified.

Findings

The results indicate that deficiencies in risk culture as well as the strained market for IT experts are the major obstacles with respect to the implementation of cyber risk management in SMEs, and that these challenges are similar across countries. The findings suggest that especially the relationship between cyber security culture and cyber risk management should be investigated further, and that a stronger link between the research streams on enterprise risk management and cyber risk management would be desirable.

Originality/value

This paper contributes to the literature by providing a systematic overview on the current state of SMEs' cyber risk management from a market perspective. The findings provide support for the existing academic literature by emphasizing the central role of cyber security culture (perception, knowledge, attitude) for a successful cyber risk management, which however should be addressed in more depth in future (empirical) research.

Details

The Journal of Risk Finance, vol. 22 no. 3/4
Type: Research Article
ISSN: 1526-5943

Keywords

Book part
Publication date: 18 July 2022

Priti Rani Rajvanshi, Taranjeet Singh, Deepa Gupta and Mukul Gupta

Introduction: The frequency and complexity of cyber assaults have grown in recent years. Consequently, organisations have increased their expenditures in more robust…

Abstract

Introduction: The frequency and complexity of cyber assaults have grown in recent years. Consequently, organisations have increased their expenditures in more robust infrastructure to protect themselves from these cyber assaults. These organisations’ assets, data, and reputations are at risk due to rapidly increasing cybercrimes. However, complete protection from these many and ever-changing threats is very challenging as a result. To deal with them, companies are taking steps to reduce risks and limit company losses in their occurrence.

Purpose: Progressively, the insurance sector organisations are including digital protection as a component of the board’s general danger technique. Protection enterprises, then again, depend on accurately expecting risks, while a significant number of them depend on normalised approaches. Because of the exceptional attributes of the digital assaults, transporters now and again depend on subjective strategies dependent on master decisions. There is an unmistakeable absence of observational information on digital protection, specifically subjective examinations planning to comprehend and depict necessities, impediments, and cycles applicable for digital protection.

Methodology: There are various unanswered inquiries and worries about the oversight and legitimate and administrative assessment of network safety weaknesses in the protection business. In the wake-up of looking over all these worries and issues, steps to alleviate them are laid out after an extensive literature survey and secondary data sources. In this study, the authors have principally viewed the executive parts of the associations as the danger. While considering network protection, their insight of needs was taken as one among a few dangerous treatment systems, just as the necessities of the organisations’ protection in assessing the danger level of likely customers.

Findings: This section analyses past research in network safety and information security in the protection market. The danger of the executives’ strategies, the numerical models, and the forecasts of digital occassions are illustrated in this section. Lastly, the future headings are likewise expressed momentarily.

Practical implications: This review might be valuable for additional examination and logical discussion, yet additionally for down-to-earth applications. Moreover, it could be gainful to organisations as a supportive instrument for better agreement on what digital protection is and how to get ready to take on network safety and information security procedures in the association.

Significance: These associations’ resources, information, and notoriety are in danger because of quickly expanding cybercrimes. Cybercriminals are utilising more refined approaches to start digital assaults. Digital protection was anticipated to affect security conduct before any proof was gathered. Progressively, organisations are including digital protection as a feature of their general danger to the executive system. Because of the exceptional attributes of the digital assaults, transporters as often as possible depend on subjective methods dependent on master decisions. Thus, this space of network safety and information security is vital uniquely in the protection market.

Details

Big Data Analytics in the Insurance Market
Type: Book
ISBN: 978-1-80262-638-4

Keywords

Book part
Publication date: 15 September 2022

Ayşen Akbaş Tuna and Zafer Türkmendağ

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…

Abstract

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.

1 – 10 of over 1000