Search results
1 – 10 of 12Madeleine Novich and Alyssa Zduniak
Videos of police abuse are often spread through technology, raising questions around how perceptions of police are impacted by these images, especially for 18–24-year-olds who are…
Abstract
Videos of police abuse are often spread through technology, raising questions around how perceptions of police are impacted by these images, especially for 18–24-year-olds who are constantly “logged on.” Limited research investigates the impact of social media on attitudes toward police accounting for age and race. The present study utilizes 19 in-depth interviews with a diverse sample of urban college students who regularly use social media in order to understand how they have been impacted by this content. The findings suggest the necessity of using an intersectional framework to understand the impact of tech-witnessed violence. While no gender differences were uncovered, racial differences did surface. White participants described being minimally influenced by videos of police misconduct, rationalizing it as a “few bad apples.” In contrast, participants of color, except those with family members in law enforcement, described being negatively impacted. Viral content contributed to negative opinions of police, emotional distress, and fears of victimization. Ultimately, videos of police brutality do not impact young populations equally. Instead, they are comparatively more harmful to young people of color who spend more time on social media, can envision themselves as the victims, and experience feelings of fear, despair, and anger after watching these videos.
Details
Keywords
Mohammad Azizi, Hamid Hosseinloo, Jane F. Maley and Marina Dabić
Coaching is a widespread form of human development that has grown considerably in recent years. However, it is not well understood in entrepreneurship and small and medium-sized…
Abstract
Purpose
Coaching is a widespread form of human development that has grown considerably in recent years. However, it is not well understood in entrepreneurship and small and medium-sized enterprises (SMEs) and little is known about the success factors for coaching in SMEs. Thus, this article presents a theoretical framework for coaching SMEs. The paper reports on a study carried out to develop and validate a coaching model for entrepreneurship in SMEs.
Design/methodology/approach
A mixed methods approach was undertaken in SMEs in the Iranian pharmaceutical industry. Confirmatory factor analysis (CFA) was used to confirm the samples and the model's dimensions.
Findings
The results show five chief constructs of the entrepreneurial coaching model. In particular, the authors determine the importance of early goal setting and identify the essential characteristics of an effective entrepreneurial coach.
Research limitations/implications
Firstly, the data relied solely on the pharmacy industry in Iran, indicating a need for future studies to explore coaching programs across various industries and countries. Additionally, a quantitative aspect of the research involved participants answering questionnaires based on their perceptions. This subjective nature introduces a potential for inaccuracies in participants' perceptions and expectations. Furthermore, the inherent bias of program stakeholders may have led to exaggerated responses. To mitigate these issues, it would be beneficial to conduct experimental and longitudinal research, which could address these concerns more effectively.
Practical implications
By utilizing a theoretical framework, the authors goal is to define the essential features of coaching in SMEs and compare it to other developmental interventions to highlight both commonalities and distinctions. This approach addresses the recent suggestions in coaching literature to distinguish coaching practices tailored for particular groups, specifically entrepreneurs involved in SMEs.
Originality/value
This study contributes to understanding the essential features for successful entrepreneurial coaching in SMEs.
Details
Keywords
J. Ben Arbaugh, Alvin Hwang, Jeffrey J. McNally, Charles J. Fornaciari and Lisa A. Burke-Smalley
This paper aims to compare the nature of three different business and management education (BME) research streams (online/blended learning, entrepreneurship education and…
Abstract
Purpose
This paper aims to compare the nature of three different business and management education (BME) research streams (online/blended learning, entrepreneurship education and experiential learning), along with their citation sources to draw insights on their support and legitimacy bases, with lessons on improving such support and legitimacy for the streams and the wider BME research field.
Design/methodology/approach
The authors analyze the nature of three BME research streams and their citation sources through tests of differences across streams.
Findings
The three streams differ in research foci and approaches such as the use of managerial samples in experiential learning, quantitative studies in online/blended education and literature reviews in entrepreneurship education. They also differ in sources of legitimacy recognition and avenues for mobilization of support. The underlying literature development pattern of the experiential learning stream indicates a need for BME scholars to identify and build on each other’s work.
Research limitations/implications
Identification of different research bases and key supporting literature in the different streams shows important core articles that are useful to build research in each stream.
Practical implications
Readers will understand the different research bases supporting the three research streams, along with their targeted audience and practice implications.
Social implications
The discovery of different support bases for the three different streams helps identify the network of authors and relationships that have been built in each stream.
Originality/value
According to the authors’ knowledge, this paper is the first to uncover differences in nature and citation sources of the three continuously growing BME research streams with recommendations on ways to improve the support of the three streams.
Details
Keywords
Godwin Thomas and Mary-Jane Sule
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…
Abstract
Purpose
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.
Design/methodology/approach
Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.
Findings
Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.
Originality/value
This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.
Details
Keywords
Elyria Angela Kemp, Kim Williams, Dong-Jun Min and Han Chen
The purpose of this paper is to examine the psychological influence that the presence of music has on consumers’ evaluations of the service environment. Specifically, it…
Abstract
Purpose
The purpose of this paper is to examine the psychological influence that the presence of music has on consumers’ evaluations of the service environment. Specifically, it investigates how emotion regulation processes and the impact of emotions/mood are linked to consumers’ evaluation of service and product quality.
Design/methodology/approach
An exploratory study was conducted using industry professionals in order to garner insight about the value of music and its benefits in the service environment. A field experiment was then conducted to test hypotheses.
Findings
Industry professionals offer implicit theories about the value of music. Specifically, they propose that music can be used to help customers regulate emotions and improve mood, enhance the customer experience and help in attracting new consumer segments. Results from the field experiment found that those exposed to music were likely to improve mood, express more favorable evaluations of the service and product quality of the establishment, as well as exhibit stronger intentions to continue to patronize the establishment.
Practical implications
Using live music in the service environment can be beneficial to organizations by improving customers’ emotional/psychological status as well as their evaluation of the consumption experience.
Originality/value
This research contributes to the existing literature by demonstrating how emotion regulation processes and the impact of emotions/mood are linked to consumers’ evaluation of service and product quality. Also, support for mood congruency judgment is found. Participants in the field study who had been exposed to music indicated that they made efforts to improve their mood and subsequently had more favorable judgments of service and product quality.
Details
Keywords
Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…
Abstract
Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.
Details
Keywords
Walter S. DeKeseredy, Danielle M. Stoneberg and Gabrielle L. Lory
Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of…
Abstract
Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of childhood trauma and victimization on currently distressed children, and empirical and theoretical work on the intertwining of adult female offline and online abuse experiences is in short supply. Recently, however, some scholars are starting to fill these research gaps by generating data showing that technology-facilitated violence and abuse are part and parcel of women's polyvictimization experiences at institutions of higher education. This chapter provides an in-depth review of the extant social scientific literature on the role technology-facilitated violence and abuse plays in the polyvictimization of female college/university students. In addition to proposing new ways of knowing, we suggest progressive policies and practices aimed at preventing polyvictimization on the college campus.
Details
Keywords
Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…
Abstract
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.
Details
Keywords