Search results

1 – 10 of 17
Open Access
Book part
Publication date: 4 June 2021

Jane Bailey and Sara Shayan

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…

Abstract

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Yee Man Louie

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…

Abstract

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 5 March 2024

Thanduxolo Elford Fana and Jane Goudge

In this paper, the authors examine the strategies used to reduce labour costs in three public hospitals in South Africa, which were effective and why. In the democratic era, after…

Abstract

Purpose

In this paper, the authors examine the strategies used to reduce labour costs in three public hospitals in South Africa, which were effective and why. In the democratic era, after the revelations of large-scale corruption, the authors ask whether their case studies provide lessons for how public service institutions might re-make themselves, under circumstances of austerity.

Design/methodology/approach

A comparative qualitative case study approach, collecting data using a combination of interviews with managers, focus group discussions and interviews with shop stewards and staff was used.

Findings

Management in two hospitals relied on their financial power, divisions between unions and employees' loyalty. They lacked the insight to manage different actors, and their efforts to outsource services and draw on the Extended Public Works Program failed. They failed to support staff when working beyond their scope of practice, reducing employees' willingness to take on extra responsibilities. In the remaining hospital, while previous management had been removed due to protests by the unions, the new CEO provided stability and union–management relations were collaborative. Her legitimate power enabled unions and management to agree on appropriate cost cutting strategies.

Originality/value

Finding an appropriate balance between the new reality of reduced financial resources and the needs of staff and patients, requires competent unions and management, transparency and trust to develop legitimate power; managing in an authoritarian manner, without legitimate power, reduces organisational capacity. Ensuring a fair and orderly process to replace ineffective management is key, while South Africa grows cohorts of competent managers and builds managerial experience.

Details

Journal of Health Organization and Management, vol. 38 no. 9
Type: Research Article
ISSN: 1477-7266

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kim Barker and Olga Jurasz

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress…

Abstract

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress has been made at supranational and national levels in addressing this issue, and where steps have been taken to combat online violence against women (OVAW), they are typically limited to legislative developments addressing image-based sexual abuse. As such, harms associated with image-based abuse have gained recognition in law while harms caused by text-based abuse (TBA) have not been conceptualized in an equivalent manner.

This chapter critically outlines the lack of judicial consideration given to online harms in British courts, identifying a range of harms arising from TBAs which currently are not recognized by the criminal justice system. We refer to non-traditional harms recognized in cases heard before the British courts, assessing these in light of traditionally recognized harms in established legal authorities. This chapter emphasizes the connection between the harms suffered and the recognition of impact on the victims, demonstrated through specific case studies. Through this assessment, this chapter advocates for greater recognition of online harms within the legal system – especially those which take the forms of misogynistic and/or gendered TBA.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 17 August 2018

Daniela Wolf and Martin Ebner

The purpose of this paper is to share the lessons learned in teaching programming skills to refugees during a time when circumstances were changing quickly and constantly and the…

1349

Abstract

Purpose

The purpose of this paper is to share the lessons learned in teaching programming skills to refugees during a time when circumstances were changing quickly and constantly and the needs of the target group were not well known.

Design/methodology/approach

The integration of refugees poses serious challenges for the hosting society’s education system. A large number of refugees can put a strain on all kinds of public resources, and difficulties with differences in languages, previous curricula, falling behind due to having to spend time outside of education, and psychological traumas have to be expected. In response to the refugee crisis and in order to manage mass migration, the adaptive nature and rapid development of civic approaches can contribute to overcoming some of these challenges. To evaluate the impact of civic approaches, the authors have paid attention to refugees{code} an Austrian coding school for refugees which was developed by the civic community and which shows great potential in terms of providing rapid, innovative and adaptive kinds of educational support for refugees, as well as helping to combat the lack of programmers in the Austrian job market.

Findings

As the great potential that initiatives like refugees{code} have for education, there are also substantial challenges. As we learned from the first course, course completion rates were very low. Therefore, it is important to build an infrastructure and a learning environment around the course. This learning environment includes providing mentoring and support, creating spaces where participants can learn. It was also found that having a pedagogically trained staff who is sufficient in the English language, too, is necessary to cater to a heterogeneous group. Also varying teaching strategies according to the needs and skills of the learner is necessary. One of the issues that confronts projects like refugees{code} is also receiving legal status. The collaboration with universities and colleges can be greatly helpful because they are already familiar with the structure of public authorities as well as with heterogeneous groups. Initiatives like refugees{code} are agile and flexible and know how to take advantage of that. The authors conclude that bringing successful education to heterogeneous and culturally different groups is multi-faceted. It is not something any individual organization or project can do; it can only be the result of a system of different actors working together with traditional educational institutions.

Originality/value

This research study reports on two courses of programming for refugees and seeks to offer practical advice for further research and for the implementation of such courses into the educational system. Therefore a framework is proposed which should be taken into account in case of doing similar work.

Details

Journal of Research in Innovative Teaching & Learning, vol. 11 no. 2
Type: Research Article
ISSN: 2397-7604

Keywords

Open Access
Book part
Publication date: 4 June 2021

Christopher Dietzel

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014)…

Abstract

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014). Much of the research on rape culture focuses on the experiences of heterosexual women, and few studies have explored rape culture in the context of dating apps. This chapter explores how men who have sex with men (MSM) understand and experience rape culture through their use of Grindr and similar dating apps. A thematic analysis of interviews with 25 MSM dating app users revealed problematic user behavior as well as unwanted sexual messages and images as common manifestations of rape culture on dating apps. Participants explained that rape culture extends beyond in-app interactions to in-person encounters, as evident by incidents of sexual violence that several participants had experienced and one participant had committed. Participants were unsure about the extent to which MSM dating apps facilitate rape culture but asserted that some apps enable rape culture more than others. This chapter demonstrates the importance of investigating sexual violence against people of diverse gender and sexual identities to ensure their experiences are not minimized, ignored, or rendered invisible.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 17 May 2021

Dušan Gošnik and Igor Stubelj

This paper aims to examine the relationship between business process management (BPM) and company performance. The research focuses on the instrumental aspect of core business…

3490

Abstract

Purpose

This paper aims to examine the relationship between business process management (BPM) and company performance. The research focuses on the instrumental aspect of core business processes and its controlling activities in small and medium-sized companies (SMEs) to identify the relationship to company performance.

Design/methodology/approach

The results presented in this paper are based on a survey of Slovene SMEs. A questionnaire was distributed to 3007 SMEs via e-mail and a response rate of 5.42% was achieved. The financial data of companies over a six year period as derived from the publicly available financial reports of SMEs along with an industry-specific financial risk measure and other financial data were used for the company risk-adjusted performance measures of relative residual income (ROE-r) and risk-adjusted ROE (ROE-a) calculation.

Findings

The results show that instrumental aspects of core business process controlling activities are related to risk-adjusted company performance measures ROE-r and ROE-a. Companies with lower ROE-r and ROE-a have been perceived to be more focused on the instrumental aspect of BPM. Presumably due to the small sample, the results of a non-parametric Mann–Whitney U test did not statistically confirm the developed hypothesis: “the instrumental aspect of controlling as a core process management activity has a statistically significant impact on company risk-adjusted performance measures such as ROE-r and ROE-a.” Despite this, the results show a possible negative correlation between risk-adjusted performance measures and BPM, which opens possibilities for further research.

Research limitations/implications

The main limitation of the purposed study model is that the paper have studied only control activities of core business processes and relate it to company risk-adjusted performance measures. The study has been limited by the SME sample and the use of a survey as a research instrument. An additional limitation of the research is the degree of reliability implied by the assumptions of the models used to estimate the required return on equity and risk. Results concern investors, managers and practitioners to start BPM improvement initiatives, to set BPM priority measures and to set priority management decisions and further actions.

Originality/value

This paper presents the unique findings from an investigation of the instrumental aspects of BPM practices and their relationship to company risk-adjusted performance measures in SMEs. This paper developed a measurement instrument for measuring the instrumental aspects of BPM use. An additional original contribution is the use of company risk-adjusted performance measures such as ROE-r and ROE-a, which take into account the required profitability of companies in different industries according to the risk and allows comparable results of companies from different industries. The approach is innovative and interesting as regards researching the factors that affect the profitability of companies that operate in different industries.

Open Access
Article
Publication date: 14 September 2022

Chinedu Francis Egbunike, Ikponmwosa Michael Igbinovia, Kenebechukwu Jane Okafor and Lucy Cecilia Mmadubuobi

The study investigated the relationship between residual audit fee and real income smoothening, proxied as real operating cash flow and production expenditure smoothing of…

2035

Abstract

Purpose

The study investigated the relationship between residual audit fee and real income smoothening, proxied as real operating cash flow and production expenditure smoothing of non-financial firms in Nigeria.

Design/methodology/approach

The study relied on secondary data from annual financial statements of 75 firms in the non-financial sector from 2010 to 2019. The study estimated the residual audit fee using a modified model from several contexts to suit the Nigerian environment. The hypotheses were tested using the dynamic panel GMM estimation procedure.

Findings

The results showed a significant negative effect of residual audit fee on (real) operating cash flow smoothing and production expenditure smoothing of non-financial firms. The control variables showed mixed effects for the industry-related (firm size and profitability), auditor attribute (audit quality and audit report lag) and the board related (board size and board independence).

Research limitations/implications

The firms included in the analysis were selected based on data availability from MachameRatios® and the occurrence of missing values for some of the variables used in the various estimation models may bias results.

Practical implications

The study identifies the nexus between RAF and real earnings management practices of non-financial firms; and shows the implication of fee payment to the overall conduct of the audit. More so, the mixed findings from the CVs suggest that in the context of developing economies, shareholders and capital markets regulators should be watchful of residual audit fees and utilise it as a gauge for audit quality and also an indicator of opportunism and weak internal control in the firm in the future assessments.

Social implications

The implication of the study stems from its relevance to the capital market stability and the potential negative disastrous effect of corporate failure from earnings management practices.

Originality/value

The study develops a newly residual audit fee model to explore the effect of RAF on real income smoothing rather than the widely used models from prior literature; secondly, the focus on real activities manipulation may present additional evidence that applies to developing countries rather the widely used accrual measurement technique from an economic bonding perspective.

Details

Asian Journal of Accounting Research, vol. 8 no. 1
Type: Research Article
ISSN: 2443-4175

Keywords

1 – 10 of 17