Search results

1 – 10 of 37
Open Access
Book part
Publication date: 1 October 2018

Colin McInnes

This chapter examines how established media – that is, print, TV and radio sources which pre-existed the popularisation of social media – use social media to disseminate content…

Abstract

This chapter examines how established media – that is, print, TV and radio sources which pre-existed the popularisation of social media – use social media to disseminate content. Specifically it examines the manner in which three UK media sources – BBC News, The Guardian and the Daily Mail – used Twitter during the 2014–2015 Ebola crisis. It asks five key questions concerning: the balance between factual reporting and opinion or comment; the degree to which it shifted attention to specific events within the context of the outbreak; whether the dialogical potential of social media was exploited; the degree to which social media acted as a signpost to more detailed information elsewhere, or existed as independent content; and the degree of media reflexivity. It concludes that established media used this new technology within their existing paradigms for reporting rather than exploiting some of its more innovative characteristics.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

This first chapter explores the basic foundation of corporate ethics: the human person in all its dignity and mystery, its corporeality and emotionality, and its cognitive and…

Abstract

Executive Summary

This first chapter explores the basic foundation of corporate ethics: the human person in all its dignity and mystery, its corporeality and emotionality, and its cognitive and volitive capacities of moral development. Four fundamental characteristics of the human person, namely individuality, sociality, immanence, and transcendence, will be examined for their potential to understand, live, experience, and witness corporate ethics and morals. We explore the profound meaning and mystery of human personhood invoking several philosophies of the good and human dignity as exposed by Aristotle and Thomas Aquinas in the West, by the doctrine of Dharma in the East as expounded by Gautama Buddha, Mahabharata, and Bhagavad Gita, and by Prophets Confucius and Tao, in the East. Several contemporary cases of great human personhood are analyzed: for example, Peace Nobel Laureate Nelson Mandela from South Africa (1993) and Peace Nobel Laureate Liu Xiaobo from China (2017) – cases of human abuse that turned into triumphs of human dignity.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Article
Publication date: 19 June 2017

Tracy Harwood and Tony Garry

The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems…

7353

Abstract

Purpose

The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems contexts may be inappropriate for use within an IoT context. The purpose of this paper is to offer empirically generated understandings of trust within potential IoT applications.

Design/methodology/approach

In an attempt to capture and communicate the complex and all-pervading but frequently inconspicuous nature of ubiquitous technologies within potential IoT techno-systems, propositions developed are investigated using a novel mixed methods research design combining a videographic projective technique with a quantitative survey, sampling 1,200 respondents.

Findings

Research findings suggest the dimensionality of trust may vary according to the IoT techno-service context being assessed.

Originality/value

The contribution of this paper is twofold. First, and from a theoretical perspective, it offers a conceptual foundation for trust dimensions within potential IoT applications based upon empirical evaluation. Second, and from a pragmatic perspective, the paper offers insights into how findings may guide practitioners in developing appropriate trust management systems dependent upon the characteristics of particular techno-service contexts.

Details

Journal of Service Management, vol. 28 no. 3
Type: Research Article
ISSN: 1757-5818

Keywords

Open Access
Article
Publication date: 21 November 2018

Varsha Jain, Meetu Chawla, B.E. Ganesh and Christopher Pich

This study aims to examine brand personality and its application to political branding. This study focuses on the brand personality of a political leader from the BJP Party brand…

5748

Abstract

Purpose

This study aims to examine brand personality and its application to political branding. This study focuses on the brand personality of a political leader from the BJP Party brand (Bharatiya Janta Party). The development of a strong political brand personality is crucial for success at the polls. Little research has been dedicated to this phenomenon particularly beyond Western political and post-election contexts.

Design/methodology/approach

The scope and development of the study required a qualitative approach. The theoretical frameworks of the study acted as the deductive base of the study. The insights of the respondents were the inductive base of the study. Semi-structured interviews were conducted with external stakeholders [voters]. In addition, semi-structured interviews were also adopted to capture the branding activities used by internal stakeholders [BJP].

Findings

The brand personality dimensions such as sincerity; agreeableness, competence, energy, openness, conscientiousness and emotional stability were clearly associated with a political leader. Negative qualities such as dictatorial attitudes and arrogance affected the political leader’s brand personality. Religious partisanship was another strong negative trait affecting the brand personality of the political leader.

Originality/value

The study has an actionable framework for political brand personality in the post-election context. It offers negative qualities to be avoided in the development of the political brand personality of the leader. It offers insights about the political brand personality of the leader in terms of young digitally savvy voters.

Propósito

Este trabajo examina la aplicación de la personalidad de marca al ámbito del marketing político y de la marca personal política. Concretamente se centra en la personalidad de marca de un líder político del partido Bharantiya Janta Party (BJP). El desarrollo de una fuerte marca personal política es crucial para el éxito en las elecciones. Pocos trabajos se han centrado hasta el momento en este fenómeno más allá del contexto político occidental.

Diseño/metodología/enfoque

El alcance y desarrollo del estudio requirió la adopción de un enfoque cualitativo. El marco teórico sirvió de base deductiva al tiempo que las entrevistas realizadas sirvieron de base inductiva. Estas entrevistas fueron semi-estructuradas y dirigidas a grupos de interés externos del BJP (los votantes). Además, se realizaron entrevistas también semi-estructuradas para capturar las actividades de marca desarrolladas por los grupos de interés internos (candidatos, políticos, trabajadores y gerentes del partido).

Resultados

Las dimensiones de personalidad de marca sinceridad, competencia, energía, estabilidad emocional, franqueza y escrupulosidad están claramente asociadas con un líder político. Por el contrario, rasgos negativos como las actitudes arrogantes y dictatoriales dañan la personalidad de marca de dicho líder, pero sobretodo el partidismo religioso.

Originalidad/valor

El trabajo proporciona un marco de acción para la marca personal política en un contexto post-electoral. Proporciona indicaciones de los rasgos y cualidades negativas que deben de evitarse en el desarrollo de una marca personal para un líder político. Ofrece también evidencias sobre la personalidad de marca que tiene que desarrollar un líder de cara a los votantes más dinámicos y digitales.

Open Access
Article
Publication date: 10 June 2022

Ada Kwan, Rachel Sklar, Drew B. Cameron, Robert C. Schell, Stefano M. Bertozzi, Sandra I. McCoy, Brie Williams and David A. Sears

This study aims to characterize the June 2020 COVID-19 outbreak at San Quentin California State Prison and to describe what made San Quentin so vulnerable to uncontrolled…

929

Abstract

Purpose

This study aims to characterize the June 2020 COVID-19 outbreak at San Quentin California State Prison and to describe what made San Quentin so vulnerable to uncontrolled transmission.

Design/methodology/approach

Since its onset, the COVID-19 pandemic has exposed and exacerbated the profound health harms of carceral settings, such that nearly half of state prisons reported COVID-19 infection rates that were four or more times (and up to 15 times) the rate found in the state’s general population. Thus, addressing the public health crises and inequities of carceral settings during a respiratory pandemic requires analyzing the myriad factors shaping them. In this study, we reported observations and findings from environmental risk assessments during visits to San Quentin California State Prison. We complemented our assessments with analyses of administrative data.

Findings

For future respiratory pathogens that cannot be prevented with effective vaccines, this study argues that outbreaks will no doubt occur again without robust implementation of additional levels of preparedness – improved ventilation, air filtration, decarceration with emergency evacuation planning – alongside addressing the vulnerabilities of carceral settings themselves.

Originality/value

This study addresses two critical aspects that are insufficiently covered in the literature: how to prepare processes to safely implement emergency epidemic measures when needed, such as potential evacuation, and how to address unique challenges throughout an evolving pandemic for each carceral setting.

Details

International Journal of Prisoner Health, vol. 19 no. 3
Type: Research Article
ISSN: 1744-9200

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 15 April 2022

Juan Carlos Muñoz-Mora, Sebastian Aparicio, Diego Martinez-Moya and David Urbano

Motivated by a lack of evidence regarding the effect of migration on entrepreneurship in a highly informal country, such as Colombia, this paper has a twofold purpose. First, it…

3505

Abstract

Purpose

Motivated by a lack of evidence regarding the effect of migration on entrepreneurship in a highly informal country, such as Colombia, this paper has a twofold purpose. First, it explores how Venezuelan immigration affects entrepreneurial activity in Colombian regions. Second, it intends to shed light on this relationship, by distinguishing between formal and informal sectors.

Design/methodology/approach

With a sample of 1,776,063 individuals, from the Labor Survey Gran Encuesta Integrada de Hogares (GEIH) from the Departamento Administrativo Nacional de Estadística (DANE), the authors employ an instrumental variable approach to account for the selection of immigrants into locations with more or less desirable conditions.

Findings

The results suggest Venezuelan immigration positively influences self-employment and own-account workers, but negatively affects employers. However, once these immigrants proliferate in the informal sector, the effects increase.

Originality/value

This paper brings new insights into the intersection between immigration, unofficial economies, and entrepreneurship. First, while the prior literature focuses on migration from developing to developed countries, migratory flows between developing economies and its effects on local entrepreneurial activity remain unexplored. Second, although informality is mostly common in developing countries, little (albeit growing) evidence of its role in the relationship between migration and entrepreneurship research exists. Finally, the authors bring together these two phenomena to enhance our understanding of different types of entrepreneurial activities when immigration and informality take place. Policy implications are derived from these insights.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 28 no. 9
Type: Research Article
ISSN: 1355-2554

Keywords

1 – 10 of 37