Search results

1 – 10 of 41
Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 15 June 2023

John Henry Hall

The purpose of this paper is to determine if there is a link between corporate shareholder value creation and economic growth. The first objective of this paper is to determine…

1391

Abstract

Purpose

The purpose of this paper is to determine if there is a link between corporate shareholder value creation and economic growth. The first objective of this paper is to determine which specific shareholder value measurement best explains shareholder value creation for a particular industry. The next objective of the study is to establish, for each of nine different categories of firms examined, a set of value drivers that are unique and significant in expressing shareholder value for that particular category of firms. Lastly, the relationship between shareholder value creation and economic growth is tested.

Design/methodology/approach

To quantify and measure value creation, the paper investigates the various value creation measurements that are being applied. The next step is to ascertain whether various industries have different value creation measures that best explain value creation for the respective industries. Then, the value drivers of these specific value creation measures can be determined and their relationship with economic growth tested.

Findings

The results of this study indicate that each industry does have a specific shareholder value creation measurement that best explains shareholder value creation for that industry; for example, for five of the nine categories (industries) that were analyzed, market value added was found to be the best shareholder value creation measurement, but for capital-intensive firms and manufacturing firms, the Qratio is the best measure, while for the food and beverage industry, the market to book ratio was found to be a better measure of shareholder value creation than other measures tested. It was further found that an increase in corporate shareholder value creation is to the detriment of economic growth.

Originality/value

The contribution of the present study is its determination of a unique shareholder value creation measurement for particular industries. In addition, a specific set of variables per industry that create shareholder value is identified. Lastly, the important link between shareholder value creation and economic growth is exposed.

Details

Studies in Economics and Finance, vol. 41 no. 1
Type: Research Article
ISSN: 1086-7376

Keywords

Open Access
Book part
Publication date: 4 June 2021

Samantha Keene

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways…

Abstract

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways, mainstream pornography has the potential to influence the further development of harmful sexual scripts that condone or endorse violence against women and girls. These concerns warrant the adoption of a harms-based perspective in critical examinations of pornography's influence on sexual experiences. This chapter reports on findings from interviews with 24 heterosexual emerging adults living in Aotearoa/New Zealand about how pornography has impacted their lives. Despite a shared awareness among participants of mainstream pornography's misogynistic tendencies, and the potential for harm from those displays, men's and women's experiences were profoundly gendered. Men's reported experiences were often associated with concerns about their own sexual behaviors, performances, and/or abilities. Conversely, women's experiences were often shaped by how pornography had affected the way that men related to them sexually. Their experiences included instances of sexual coercion and assault which were not reported by the men. These findings signal the need for a gendered lens, situated within a broader harms-based perspective, in examinations of pornography's influence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 4 July 2023

Henry Jarva and Teresa Zeitler

The purpose of this paper is to examine the implications of the COVID-19 pandemic on internal auditing as the pandemic forced individual internal auditors and audit teams to…

2523

Abstract

Purpose

The purpose of this paper is to examine the implications of the COVID-19 pandemic on internal auditing as the pandemic forced individual internal auditors and audit teams to conduct the work remotely.

Design/methodology/approach

Five in-depth semi-structured interviews of internal audit experts that work in German retail and manufacturing industry were conducted between February and April 2021.

Findings

The authors find that the importance of audit technologies did not change significantly due to the pandemic, as audit technologies were already an integral part of internal audits. Interestingly, the transition to remote audits occurred with remarkable speed and efficiency. The presence of well-functioning information and communication technologies emerges as a critical facilitator for effective remote communication, collaboration and data exchange. However, audit technologies can only partially replace physical on-site examinations and human interaction. The main challenges of remote audits are related to the auditing of non-digitalized processes and the inherent limitations of auditee interviews and interactions.

Research limitations/implications

The authors' interview approach does not allow to cover variations between industries and between countries. While internal audit experts provided notably consistent responses during the interviews, acknowledging that the sample size is very small is important.

Practical implications

The COVID-19 pandemic serves as a catalyst for increased digitalization and technology adoption within the realm of internal auditing. A hybrid approach combining the benefits of on-site and remote audits is expected to prevail in the future.

Originality/value

The paper is among the first to document the effects of the COVID-19 pandemic on the work of internal auditing using field-based research methods.

Details

Journal of Applied Accounting Research, vol. 25 no. 2
Type: Research Article
ISSN: 0967-5426

Keywords

Open Access
Book part
Publication date: 4 June 2021

Madeleine Novich and Alyssa Zduniak

Videos of police abuse are often spread through technology, raising questions around how perceptions of police are impacted by these images, especially for 18–24-year-olds who are…

Abstract

Videos of police abuse are often spread through technology, raising questions around how perceptions of police are impacted by these images, especially for 18–24-year-olds who are constantly “logged on.” Limited research investigates the impact of social media on attitudes toward police accounting for age and race. The present study utilizes 19 in-depth interviews with a diverse sample of urban college students who regularly use social media in order to understand how they have been impacted by this content. The findings suggest the necessity of using an intersectional framework to understand the impact of tech-witnessed violence. While no gender differences were uncovered, racial differences did surface. White participants described being minimally influenced by videos of police misconduct, rationalizing it as a “few bad apples.” In contrast, participants of color, except those with family members in law enforcement, described being negatively impacted. Viral content contributed to negative opinions of police, emotional distress, and fears of victimization. Ultimately, videos of police brutality do not impact young populations equally. Instead, they are comparatively more harmful to young people of color who spend more time on social media, can envision themselves as the victims, and experience feelings of fear, despair, and anger after watching these videos.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Ben Colliver

Transgender people have received substantial attention in recent years, with gender identity being a focal point of online debate. Transgender identities are central to…

Abstract

Transgender people have received substantial attention in recent years, with gender identity being a focal point of online debate. Transgender identities are central to discussions relating to sex-segregated spaces and activities, such as public toilets, prisons, and sports participation. The introduction of “gender-neutral” spaces has received criticism because some argue that there is an increased risk of sexual violence against women and children. However, little is known about the implications that these constructions have for whom is able to claim a “victim status.” In this chapter, I provide a critical analysis of the techniques used by individuals to align themselves with a “victim status.” These claims are presented and contextualized within varying notions of victimization, from being victims of political correctness to victims of a more aggressive minority community. This feeds into an inherently transphobic discourse that is difficult to challenge without facing accusations of perpetuating an individual's “victimhood.” Transphobic rhetoric is most commonly expressed through constructing transgender people as “unnatural,” “sinful,” or as experiencing a “mental health issue.” This chapter argues that the denial of transphobia and simultaneous claims of victimization made by the dominant, cisgender majority are intrinsically linked.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 16 March 2021

Giovanna Culot, Guido Nassimbeni, Matteo Podrecca and Marco Sartor

After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third…

16395

Abstract

Purpose

After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification. Emerging issues are reframed through the lenses of social systems thinking, deriving a theory-based research agenda to inspire interdisciplinary studies in the field.

Design/methodology/approach

The study is structured as a systematic literature review.

Findings

Research themes and sub-themes are identified on five broad research foci: relation with other standards, motivations, issues in the implementation, possible outcomes and contextual factors.

Originality/value

The study presents a structured overview of the academic body of knowledge on ISO/IEC 27001, providing solid foundations for future research on the topic. A set of research opportunities is outlined, with the aim to inspire future interdisciplinary studies at the crossroad between information security and quality management. Managers interested in the implementation of the standard and policymakers can find an overview of academic knowledge useful to inform their decisions related to implementation and regulatory activities.

Details

The TQM Journal, vol. 33 no. 7
Type: Research Article
ISSN: 1754-2731

Keywords

Open Access
Article
Publication date: 13 March 2024

Keanu Telles

The paper provides a detailed historical account of Douglass C. North's early intellectual contributions and analytical developments in pursuing a Grand Theory for why some…

Abstract

Purpose

The paper provides a detailed historical account of Douglass C. North's early intellectual contributions and analytical developments in pursuing a Grand Theory for why some countries are rich and others poor.

Design/methodology/approach

The author approaches the discussion using a theoretical and historical reconstruction based on published and unpublished materials.

Findings

The systematic, continuous and profound attempt to answer the Smithian social coordination problem shaped North's journey from being a young serious Marxist to becoming one of the founders of New Institutional Economics. In the process, he was converted in the early 1950s into a rigid neoclassical economist, being one of the leaders in promoting New Economic History. The success of the cliometric revolution exposed the frailties of the movement itself, namely, the limitations of neoclassical economic theory to explain economic growth and social change. Incorporating transaction costs, the institutional framework in which property rights and contracts are measured, defined and enforced assumes a prominent role in explaining economic performance.

Originality/value

In the early 1970s, North adopted a naive theory of institutions and property rights still grounded in neoclassical assumptions. Institutional and organizational analysis is modeled as a social maximizing efficient equilibrium outcome. However, the increasing tension between the neoclassical theoretical apparatus and its failure to account for contrasting political and institutional structures, diverging economic paths and social change propelled the modification of its assumptions and progressive conceptual innovation. In the later 1970s and early 1980s, North abandoned the efficiency view and gradually became more critical of the objective rationality postulate. In this intellectual movement, North's avant-garde research program contributed significantly to the creation of New Institutional Economics.

Details

EconomiA, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1517-7580

Keywords

Open Access
Article
Publication date: 8 October 2021

Matteo Mura, Pietro Micheli and Mariolina Longo

This study aims to investigate how dynamic tensions between performance measurement system (PMS) uses enable organizations to achieve both exploitation and exploration and enhance…

2847

Abstract

Purpose

This study aims to investigate how dynamic tensions between performance measurement system (PMS) uses enable organizations to achieve both exploitation and exploration and enhance firm performance.

Design/methodology/approach

The authors collected survey data on 153 Italian companies. Scales for each construct were validated through an exploratory factor analysis. Data on firm performance were cross-validated by using lagged accounting data. The authors tested our hypotheses using hierarchical ordinary least squares regressions, together with bootstrapping procedures for the test on mediation.

Findings

A diagnostic use of PMS has a positive association with both exploitation – e.g. reductions in total costs and lead times – and exploration, e.g. introduction of new products and extension of product ranges. The dynamic tension created by a joint diagnostic and interactive use has the strongest association with organizational ambidexterity, measured as the multiplicative interaction between exploration and exploitation.

Practical implications

If an organization or business unit is mainly pursuing exploitative goals, a mainly diagnostic use of PMS would be most suitable. If goals are both exploitative and explorative, a mix of diagnostic and interactive uses would be most effective.

Originality/value

This research helps reconcile conflicting views in the literature. The diagnostic use of PMS, far from acting as a “negative force,” appears to be necessary to guide opportunity search and to establish an appropriate scope for exploration-related activities. The authors’ focus on the uses of PMSs shows that ambidexterity is achieved through managerial capability, rather than just through the introduction of systems and structures.

Details

International Journal of Operations & Production Management, vol. 41 no. 13
Type: Research Article
ISSN: 0144-3577

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 41