Search results

1 – 10 of 12
Open Access
Book part
Publication date: 4 June 2021

Madeleine Novich and Alyssa Zduniak

Videos of police abuse are often spread through technology, raising questions around how perceptions of police are impacted by these images, especially for 18–24-year-olds who are…

Abstract

Videos of police abuse are often spread through technology, raising questions around how perceptions of police are impacted by these images, especially for 18–24-year-olds who are constantly “logged on.” Limited research investigates the impact of social media on attitudes toward police accounting for age and race. The present study utilizes 19 in-depth interviews with a diverse sample of urban college students who regularly use social media in order to understand how they have been impacted by this content. The findings suggest the necessity of using an intersectional framework to understand the impact of tech-witnessed violence. While no gender differences were uncovered, racial differences did surface. White participants described being minimally influenced by videos of police misconduct, rationalizing it as a “few bad apples.” In contrast, participants of color, except those with family members in law enforcement, described being negatively impacted. Viral content contributed to negative opinions of police, emotional distress, and fears of victimization. Ultimately, videos of police brutality do not impact young populations equally. Instead, they are comparatively more harmful to young people of color who spend more time on social media, can envision themselves as the victims, and experience feelings of fear, despair, and anger after watching these videos.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Nicola Henry

Abstract

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Open Access
Article
Publication date: 27 November 2023

Mohammad Azizi, Hamid Hosseinloo, Jane F. Maley and Marina Dabić

Coaching is a widespread form of human development that has grown considerably in recent years. However, it is not well understood in entrepreneurship and small and medium-sized…

Abstract

Purpose

Coaching is a widespread form of human development that has grown considerably in recent years. However, it is not well understood in entrepreneurship and small and medium-sized enterprises (SMEs) and little is known about the success factors for coaching in SMEs. Thus, this article presents a theoretical framework for coaching SMEs. The paper reports on a study carried out to develop and validate a coaching model for entrepreneurship in SMEs.

Design/methodology/approach

A mixed methods approach was undertaken in SMEs in the Iranian pharmaceutical industry. Confirmatory factor analysis (CFA) was used to confirm the samples and the model's dimensions.

Findings

The results show five chief constructs of the entrepreneurial coaching model. In particular, the authors determine the importance of early goal setting and identify the essential characteristics of an effective entrepreneurial coach.

Research limitations/implications

Firstly, the data relied solely on the pharmacy industry in Iran, indicating a need for future studies to explore coaching programs across various industries and countries. Additionally, a quantitative aspect of the research involved participants answering questionnaires based on their perceptions. This subjective nature introduces a potential for inaccuracies in participants' perceptions and expectations. Furthermore, the inherent bias of program stakeholders may have led to exaggerated responses. To mitigate these issues, it would be beneficial to conduct experimental and longitudinal research, which could address these concerns more effectively.

Practical implications

By utilizing a theoretical framework, the authors goal is to define the essential features of coaching in SMEs and compare it to other developmental interventions to highlight both commonalities and distinctions. This approach addresses the recent suggestions in coaching literature to distinguish coaching practices tailored for particular groups, specifically entrepreneurs involved in SMEs.

Originality/value

This study contributes to understanding the essential features for successful entrepreneurial coaching in SMEs.

Details

European Journal of Innovation Management, vol. 26 no. 7
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 6 April 2021

J. Ben Arbaugh, Alvin Hwang, Jeffrey J. McNally, Charles J. Fornaciari and Lisa A. Burke-Smalley

This paper aims to compare the nature of three different business and management education (BME) research streams (online/blended learning, entrepreneurship education and…

Abstract

Purpose

This paper aims to compare the nature of three different business and management education (BME) research streams (online/blended learning, entrepreneurship education and experiential learning), along with their citation sources to draw insights on their support and legitimacy bases, with lessons on improving such support and legitimacy for the streams and the wider BME research field.

Design/methodology/approach

The authors analyze the nature of three BME research streams and their citation sources through tests of differences across streams.

Findings

The three streams differ in research foci and approaches such as the use of managerial samples in experiential learning, quantitative studies in online/blended education and literature reviews in entrepreneurship education. They also differ in sources of legitimacy recognition and avenues for mobilization of support. The underlying literature development pattern of the experiential learning stream indicates a need for BME scholars to identify and build on each other’s work.

Research limitations/implications

Identification of different research bases and key supporting literature in the different streams shows important core articles that are useful to build research in each stream.

Practical implications

Readers will understand the different research bases supporting the three research streams, along with their targeted audience and practice implications.

Social implications

The discovery of different support bases for the three different streams helps identify the network of authors and relationships that have been built in each stream.

Originality/value

According to the authors’ knowledge, this paper is the first to uncover differences in nature and citation sources of the three continuously growing BME research streams with recommendations on ways to improve the support of the three streams.

Details

Organization Management Journal, vol. 18 no. 3/4
Type: Research Article
ISSN:

Keywords

Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1704

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 7 January 2019

Elyria Angela Kemp, Kim Williams, Dong-Jun Min and Han Chen

The purpose of this paper is to examine the psychological influence that the presence of music has on consumers’ evaluations of the service environment. Specifically, it…

5311

Abstract

Purpose

The purpose of this paper is to examine the psychological influence that the presence of music has on consumers’ evaluations of the service environment. Specifically, it investigates how emotion regulation processes and the impact of emotions/mood are linked to consumers’ evaluation of service and product quality.

Design/methodology/approach

An exploratory study was conducted using industry professionals in order to garner insight about the value of music and its benefits in the service environment. A field experiment was then conducted to test hypotheses.

Findings

Industry professionals offer implicit theories about the value of music. Specifically, they propose that music can be used to help customers regulate emotions and improve mood, enhance the customer experience and help in attracting new consumer segments. Results from the field experiment found that those exposed to music were likely to improve mood, express more favorable evaluations of the service and product quality of the establishment, as well as exhibit stronger intentions to continue to patronize the establishment.

Practical implications

Using live music in the service environment can be beneficial to organizations by improving customers’ emotional/psychological status as well as their evaluation of the consumption experience.

Originality/value

This research contributes to the existing literature by demonstrating how emotion regulation processes and the impact of emotions/mood are linked to consumers’ evaluation of service and product quality. Also, support for mood congruency judgment is found. Participants in the field study who had been exposed to music indicated that they made efforts to improve their mood and subsequently had more favorable judgments of service and product quality.

Details

International Hospitality Review, vol. 33 no. 1
Type: Research Article
ISSN: 2516-8142

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olga Marques

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…

Abstract

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Walter S. DeKeseredy, Danielle M. Stoneberg and Gabrielle L. Lory

Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of…

Abstract

Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of childhood trauma and victimization on currently distressed children, and empirical and theoretical work on the intertwining of adult female offline and online abuse experiences is in short supply. Recently, however, some scholars are starting to fill these research gaps by generating data showing that technology-facilitated violence and abuse are part and parcel of women's polyvictimization experiences at institutions of higher education. This chapter provides an in-depth review of the extant social scientific literature on the role technology-facilitated violence and abuse plays in the polyvictimization of female college/university students. In addition to proposing new ways of knowing, we suggest progressive policies and practices aimed at preventing polyvictimization on the college campus.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

1 – 10 of 12