Search results

1 – 10 of 134
Article
Publication date: 22 March 2023

Fayaz Ali, Muhammd Zubair Tauni, Muhammad Ashfaq, Qingyu Zhang and Tanveer Ahsan

Given the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in…

Abstract

Purpose

Given the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in developing compulsive social media use behavior. The authors also identify and hypothesize channels such as contingent self-esteem (CSE), social interaction anxiety (SIA) and fear of negative evaluation (FNE), which may explain how PDM affects compulsive social media use.

Design/methodology/approach

The research model was empirically tested with a survey of 367 Chinese university students using structural equation modeling by drawing on the escape and self-presentation lenses.

Findings

The findings indicate that PDM contributes to compulsive social media use behavior both directly and indirectly through CSE. Furthermore, the impact of CSE on compulsive social media use is mediated by the FNE, whereas SIA fails to mediate this effect.

Practical implications

The results can advance the authors’ knowledge of the role and process by which depressive mood impacts compulsive social media use. These findings may add insights into psychological treatment and help in, for example, developing counseling programs or coping strategies for depressed people to protect them from using social media excessively.

Originality/value

This research identifies the pathway mechanism between PDM and compulsive use of social media. It also increases the understanding of how CSE and social interaction deficiencies contribute to compulsive social media usage (CSMU).

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 April 2024

Mahmooda Khaliq, Dove Wimbish and Angela Makris

This study aims to understand the utility of personas and illustrate, through a case study, how a persona-building exercise in a Community Based Prevention Marketing (CBPM…

Abstract

Purpose

This study aims to understand the utility of personas and illustrate, through a case study, how a persona-building exercise in a Community Based Prevention Marketing (CBPM) training of community leaders elicited important insights that complemented findings from ongoing formative research on vaccine hesitancy in the Hispanic/Latino population in the USA during COVID-19 pandemic.

Design/methodology/approach

An exploratory concurrent parallel qualitative study design compared three personas created by community-based organization members (n = 37) to transcripts from five formative research focus groups (n = 30) from the same project. All participants in this study were recruited by the National COVID-19 Resiliency Network as part of their capacity-building and formative research activities. Grounded theory guided the content analysis.

Findings

This study found personas and focus groups to be complementary. A high degree of co-occurrence was observed when investigating the uptake of the COVID-19 vaccine under the categories of barriers, culture and communication. Between the two methods, the authors found strong associations between fear, disruption to the value system, work-related barriers, inaccessibility to health care and information sources and misinformation. Areas of divergence were negligible.

Research limitations/implications

While personas provided background information about the population and sharing “how” to reach the priority population, focus groups provided the “why” behind the behavior, followed by “how”.

Practical implications

A community-driven persona-building process built on cultural community knowledge and existing data can build community capacity, provide rich information to assist in the creation of tailored messages, strategies and overall interventions during a public health crisis and provide user-centered, evidence-based information about a priority population while researchers and practitioners wait on the results from formative research.

Originality/value

This case study provided a unique opportunity to analyze the complementary effectiveness of two methods acting in tandem to understand the priority population: stakeholder-informed persona-building and participant-informed focus group interviews. Understanding their complementary nature addresses a time gap that often exists between researchers and practitioners during times of crises and builds on recommendations associated with bringing rigor into practice, promoting academic contribution to real-world issues and building collaborative partnerships. Finally, it supports the utility of a nimble tool that improves social marketers’ ability to know more about their audience for intervention design when time is of the essence and formative research is ongoing.

Details

Journal of Social Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6763

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 19 April 2024

Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…

Abstract

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Article
Publication date: 18 April 2024

Kalpana Chandrasekar and Varisha Rehman

Global brands have become increasingly vulnerable to external disruptions that have negative spillover effects on consumers, business and brands. This research area has recently…

Abstract

Purpose

Global brands have become increasingly vulnerable to external disruptions that have negative spillover effects on consumers, business and brands. This research area has recently garnered interest post-pandemic yet remains fragmented. The purpose of this paper is to recognize the most impactful exogenous brand crisis (EBC) and its affective and behavioural impact on consumers.

Design/methodology/approach

In Study 1, we applied repertory grid technique (RGT), photo elicitation method and ANOVA comparisons, to identify the most significant EBC, in terms of repercussions on consumer purchases. In Study 2, we performed collage construction and content analysis to ascertain the impact of the identified significant crisis (from Study 1) on consumer behaviour in terms of affective and behavioural changes.

Findings

Study 1 results reveal Spread-of-diseases and Natural disaster to be the most impactful EBC based on consumer’s purchase decisions. Study 2 findings uncover three distinct themes, namely, deviant demand, emotional upheaval and community bonding that throws light on the affective and behavioural changes in consumer behaviour during the two significant EBC events.

Research limitations/implications

The collated results of the two studies draw insights towards understanding the largely unexplored conceptualisation of EBC from a multi-level (micro-meso-macro) perspective. The integrated framework drawn, highlight the roles and influences of different players in exogenous brand crisis management and suggests future research agendas based on theoretical underpinnings.

Originality/value

To the best of our knowledge, this is the first study which identifies the most important EBC and explicates its profound impact on consumer purchase behaviour, providing critical insights to brand managers and practitioners to take an inclusive approach towards exogenous crises.

Details

Marketing Intelligence & Planning, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-4503

Keywords

Abstract

Details

Capitalism, Health and Wellbeing
Type: Book
ISBN: 978-1-83797-897-7

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Peter Ackers

This paper presents an historical reconstruction of the radicalisation of Alan Fox, the industrial sociologist and a detailed analysis of his early historical and sociological…

Abstract

Purpose

This paper presents an historical reconstruction of the radicalisation of Alan Fox, the industrial sociologist and a detailed analysis of his early historical and sociological writing in the classical pluralist phase.

Design/methodology/approach

An intellectual history, including detailed discussion of key Fox texts, supported by interviews with Fox and other Biographical sources.

Findings

Fox’s radicalisation was incomplete, as he carried over from his industrial relations (IR) pluralist mentors, Allan Flanders and Hugh Clegg, a suspicion of political Marxism, a sense of historical contingency and an awareness of the fragmented nature of industrial conflict.

Originality/value

Recent academic attention has centred on Fox’s later radical pluralism with its “structural” approach to the employment relationship. This paper revisits his early, neglected classical pluralist writing. It also illuminates his transition from institutional IR to a broader sociology of work, influenced by AH Halsey, John Goldthorpe and others and the complex nature of his radicalisation.

Details

Employee Relations: The International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0142-5455

Keywords

Book part
Publication date: 30 April 2024

Lilith Green and Carol Rambo

Gender-diverse people experience unique cultural and interpersonal stigma in mainstream society and sometimes within their own communities; they face allegations of inauthenticity…

Abstract

Gender-diverse people experience unique cultural and interpersonal stigma in mainstream society and sometimes within their own communities; they face allegations of inauthenticity based on their nonconformity to either cisnormative or transnormative gender regimes. Based on 21 in-depth life history interviews, we unveil the intricate interactional process of negotiating identity and authenticity in the biographical work of gender-diverse individuals. In this study, gender-diverse people engaged in a “gender audit” with their gender-diverse interviewer. Gender audits yield verbal performances of gender with oneself and others. Ambiguity was “accounted for” or “embraced and created” in their biographical work to organize their life stories and undermine binary essentialism – a discourse that was “discursively constraining.” Gender audits took place in participants' day-to-day lives, either through self-audits, questioning from others, or both. In the final analysis, we assert that we all engage in gender auditing. Gender audits are intersubjective sites of domination, subordination, resistance, and social change. Gender diversity, then, can be viewed as a product of gender in flux.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Book part
Publication date: 30 April 2024

John C. Pruit, Carol Rambo and Amanda G. Pruit

This performance autoethnography may or may not be interpreted as a continuation of a conversation regarding the experiences of those with devalued statuses in academic settings…

Abstract

This performance autoethnography may or may not be interpreted as a continuation of a conversation regarding the experiences of those with devalued statuses in academic settings. The authors rely on “strange accounting” to consider their experiences in the academy from various standpoints: before and after promotion, before and after leaving academia. While reflecting on our past experiences, we introduce the concept of “everyday precariousness” as a way of explaining the normalization of instability, insecurity, and negative affect that is part of everyday life for those with devalued statuses in academic settings and beyond. Everyday precariousness is an embodied experience for those in vulnerable positions. Normalized exposure to risks, such as discrimination, harassment, bullying, or structural instability, produces an undercurrent of threat that permeates academic culture. Our stories of everyday precariousness span race, ethnicity, class, academic roles, and gender boundaries (among many others). Analyzing these experiences furthers previous work on the uses of strange accounting as well as the dynamics of status silencing. In the final analysis, unresisted and unabated, everyday precariousness and status silencing can lead to institutional failure and resonance disasters.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

1 – 10 of 134