Search results
1 – 10 of over 3000David Carless and Kitrina Douglas
In this chapter we share some lessons we have learnt through doing research with – rather than on – people experiencing a range of mental health problems.
Abstract
Purpose
In this chapter we share some lessons we have learnt through doing research with – rather than on – people experiencing a range of mental health problems.
Approach
Our work has taken place within social, cultural, economic, and political contexts which create several problems or challenges. Through an extended dialogue, we explore how we have critically responded to each of these challenges across three phases of our projects: accessing and witnessing experiences of mental illness; understanding experiences of mental illness; and communicating mental health research.
Conclusion
Our aim is to stimulate creative responses to the question of how to do and disseminate research that is most likely to be helpful to people experiencing mental health problems.
Details
Keywords
David Douglas, José Jair Santanna, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville and Aiko Pras
This paper aims to examine whether there are morally defensible reasons for using or operating websites (called ‘booters’) that offer distributed denial-of-service (DDoS) attacks…
Abstract
Purpose
This paper aims to examine whether there are morally defensible reasons for using or operating websites (called ‘booters’) that offer distributed denial-of-service (DDoS) attacks on a specified target to users for a price. Booters have been linked to some of the most powerful DDoS attacks in recent years.
Design/methodology/approach
The authors identify the various parties associated with booter websites and the means through which booters operate. Then, the authors present and evaluate the two arguments that they claim may be used to justify operating and using booters: that they are a useful tool for testing the ability of networks and servers to handle heavy traffic, and that they may be used to perform DDoS attacks as a form of civil disobedience on the internet.
Findings
The authors argue that the characteristics of existing booters disqualify them from being morally justified as network stress testing tools or as a means of performing civil disobedience. The use of botnets that include systems without the permission of their owners undermines the legitimacy of both justifications. While a booter that does not use any third-party systems without permission might in principle be justified under certain conditions, the authors argue that it is unlikely that any existing booters meet these requirements.
Practical/implications
Law enforcement agencies may use the arguments presented here to justify shutting down the operation of booters, and so reduce the number of DDoS attacks on the internet.
Originality/value
The value of this work is in critically examining the potential justifications for using and operating booter websites and in further exploring the ethical aspects of using DDoS attacks as a form of civil disobedience.
Details
Keywords
Huayao Zhang, Junjie Wu, Jing Wen and David Douglas
Determining the role of ethical leadership in the multinational companies’ (MNCs) control practices, the purpose of this paper is to extend Eisenbeiss’ (2012) four central ethical…
Abstract
Purpose
Determining the role of ethical leadership in the multinational companies’ (MNCs) control practices, the purpose of this paper is to extend Eisenbeiss’ (2012) four central ethical leadership orientations into multinational companies’ control contexts – the culturally diversified environment.
Design/methodology/approach
Adopting a multiple-case research design, the authors gather qualitative data from four MNC subsidiaries located in China, that connects three potentially diverse cultural contexts: German, Japanese and Chinese.
Findings
The findings of this paper confirm that ethical leadership compliance (or violation) positively (or negatively) contributes to the internalization of organizational practice transfer, moderated by cultural distance between foreign managers and subsidiaries’ employees. The results reveal that informal control and trust act as lubricants in the internalization process.
Originality/value
This paper evidences the connections between ethical leadership, organizational practice transfer and subsequent performance, along with inclusive cultural moderating factors.
Details
Keywords
Betty Santangelo, Gary Stein and Margaret Jacobs
The purpose of this article is to explain recent enforcement trends under the Foreign Corrupt Practices Act (FCPA), providing examples of recent cases.
Abstract
Purpose
The purpose of this article is to explain recent enforcement trends under the Foreign Corrupt Practices Act (FCPA), providing examples of recent cases.
Design/methodology/approach
The paper describes recent trends in FCPA enforcement, including increased enforcement by US authorities, greater vigilance by private industry, and global anti‐corruption efforts. It provides an overview of the FCPA, including the original reason why the Act was passed, its anti‐bribery provisions, the need to show corrupt intent, the interstate commerce requirement, exceptions and affirmative defenses, record‐keeping and control provisions, and penalties. It describes recent FCPA prosecutions and enforcement actions and draws conclusions on how to reduce FCPA risk.
Findings
The FCPA is a Watergate‐era law that was passed in response to disclosures by a number of large US corporations that they had made illicit payments to foreign government officials. The FCPA applies to bribes by any US issuer or domestic concern, paid to any foreign official, foreign political party, official or candidate, or official of a public international organization in order to assist in obtaining, retaining, or directing business. To prosecute, the government must show corrupt intent. The FCPA also contains provisions that require accurate record‐keeping and internal controls of US issuers. Violations of the FCPA are subject to both criminal and civil penalties.
Originality/value
The paper presents a thorough explanation, practical advice, and examples of recent violations and penalties by experienced lawyers specializing in FCPA compliance as well as white‐collar defense, securities regulatory matters, internal investigations, and anti‐money laundering.
Details
Keywords
Susan Newberry and Kerry Jacobs
New Zealand is widely recognised as extreme in its New Public Financial Management reforms. Scrutiny of the reformed financial management system reveals its consistency with a…
Abstract
New Zealand is widely recognised as extreme in its New Public Financial Management reforms. Scrutiny of the reformed financial management system reveals its consistency with a controversial political agenda: trade liberalisation of even core social services such as social welfare, health and education. Further, the detailed requirements are systematically biased towards withdrawing from government services (by running them down) and/or privatising them (by artificially inflating reported costs, thus projecting an appearance of inefficiency). The legislation underpinning the New Zealand model was shepherded through parliament by a Minister of Finance who publicly opposed exposing social services to market forces. Drawing on archival records, this article provides a historical account of how this legislation came into being. The legislation handed key levers of power to extend the reforms to the Treasury. Particular attention is paid to the friction within the government of the time over extending the reforms to social policy, and the role of the Treasury. Possibly, some ministers who drove the reforms through did not appreciate their nature. Alternatively, the handover of the levers of power could be perceived as an attempt to avoid blame.
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details
Keywords
Andrew Alexander, David Cryer and Steve Wood
This paper seeks to evaluate the particular conditions informing locational decision making and related network planning in the charity retail sector. Its purpose is to identify…
Abstract
Purpose
This paper seeks to evaluate the particular conditions informing locational decision making and related network planning in the charity retail sector. Its purpose is to identify both differences and commonalities with related debates that have been focussed very largely on the grocery sector and the superstore format. Its wider purpose is to contribute to the growing literature on charity retailing which has not considered this aspect of retail management in detail.
Design/methodology/approach
Details the particularities of charity retailing locational decision making and network planning through a detailed case‐study consideration of a hospice charity's emerging retail store network.
Findings
Finds that existing conceptual and practical considerations pertaining to locational decision making in retailing require a nuanced re‐revaluation in relation to the locational and network planning of charity retailers. Identifies the importance of supply chain (stock donators) and workforce factors together with the customer demand in informing locational decision making.
Originality/value
Detailed academic consideration of location planning in the charity shop sector is absent in the literature. The paper addresses this.
Details
Keywords
Zhenreenah Muhxinga, Corrine Douglas, David Francis, Mark Laville, Sidney Millin, Juliana Pamfield, Peter Smith and Raymond Smith
A group of African and Caribbean people decided to tell mental health workers and others in east London about their struggles to achieve mental health. They wanted to show that…
Abstract
A group of African and Caribbean people decided to tell mental health workers and others in east London about their struggles to achieve mental health. They wanted to show that black people with mental health problems are individuals, with different histories and different talents. They wanted to show that it is possible for African and Caribbean service users to rebuild their lives after a mental health crisis and even after years in and out of hospital. In this article, Zhenreenah Muhxinga describes how they produced a book of stories to challenge the familiar assumption that recovery is not an option for black people.
Details
Keywords
This article sets forth the argument that management research should take into account the complex processes of enterprise activity and the inherent contextual issues that effect…
Abstract
This article sets forth the argument that management research should take into account the complex processes of enterprise activity and the inherent contextual issues that effect managerial behaviour. Research accounts from other areas of social inquiry have conveyed the worthiness of the grounded theory approach to qualitatively focused studies. This article reviews the central literature, along with author’s experiential reflections, thus highlighting an on‐going debate as to the faithfulness of grounded theory to generate explanations to socially constructed phenomena. It is concluded that grounded theory can be a significant approach to developing management understanding.
Details