Search results
1 – 10 of 71Jon D. Elhai, Jason C. Levine and Brian J. Hall
Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine…
Abstract
Purpose
Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.
Design/methodology/approach
In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.
Findings
Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.
Research limitations/implications
Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.
Practical implications
Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.
Originality/value
This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.
Details
Keywords
Darryl Plecas, Amanda V. McCormick, Jason Levine, Patrick Neal and Irwin M. Cohen
The aim of this study is to test a technological solution to two traditional limitations of information sharing between law enforcement agencies: data quality and privacy concerns.
Abstract
Purpose
The aim of this study is to test a technological solution to two traditional limitations of information sharing between law enforcement agencies: data quality and privacy concerns.
Design/methodology/approach
Entity Analytics Software (EAS) was tested in two studies with North American law enforcement agencies. In the first test, duplicated cases held in a police record system were successfully identified (4.0 percent) to a greater extent than the traditionally used software program (1.5 percent). This resulted in a difference of 11,954 cases that otherwise would not have been identified as duplications. In the second test, entity information held separately by police and border officials was shared anonymously between these two organizations. This resulted in 1,827 alerts regarding entities that appeared in both systems; traditionally, this information could not have been shared, given privacy concerns, and neither agency would be aware of the relevant information held by the other. Data duplication resulted in an additional 1,041 alerts, which highlights the need to use technological solutions to improve data quality prior to and during information sharing.
Findings
The current study demonstrated that EAS has the potential to merge data from different technologically based systems, while identifying errors and reducing privacy concerns through anonymization of identifiers.
Originality/value
While only one potential technological solution (EAS) was tested and organizations must consider the potential expense associated with implementing such technology, the implications resulting from both studies for improved awareness and greater efficiency support and facilitate information sharing between law enforcement organizations.
Details
Keywords
Purpose – This chapter aims to present an overview of what constitutes child murder, including definitions, history, prevalence, risk factors, offender motivations, and…
Abstract
Purpose – This chapter aims to present an overview of what constitutes child murder, including definitions, history, prevalence, risk factors, offender motivations, and theoretical understanding.
Design/methodology/approach – The author uses secondary data from the National Incident-Based Reporting System, Uniformed Crime Reports, and Vital Statistics to show comparisons with previously conducted research. This allows for an overview of child murder.
Findings – There are numerous inconsistencies due to methodological issues. It is hard to find studies where a large sample was used. Definitions of child vary between studies, as does the age categories used. In addition, child homicide is predicted to be grossly underrepresented due to lack of communication between agencies, lack of formalized training, lack of a formalized classification system, and lack of reporting.
Originality/value – Research on child homicide can be instrumental in many areas including policy creation, implementation, and evaluation. It can serve as a benefit for those attempting to provide preventative measures. It may also help law enforcement with investigation. It is only through continued analysis of these types of cases and vigilant research, policy, and practice that society can more effectively protect young children from exposure to potentially murderous outcomes.
Details
Keywords
Jason D. DeBode, Dana L. Haggard and K. Stephen Haggard
The purpose of this paper is to investigate the influence of broad cultural dimensions, as well as those of religion and legal origin, on countries’ economic freedom…
Abstract
Purpose
The purpose of this paper is to investigate the influence of broad cultural dimensions, as well as those of religion and legal origin, on countries’ economic freedom, i.e., trade freedom, investment freedom, business freedom, labor freedom, monetary freedom, as well as a composite measure of economic freedom.
Design/methodology/approach
Linear regression of publicly available data regarding economic freedom (Miller et al., 2018) on cultural dimensions (Hofstede, 2009), legal origin and religion (LaPorta et al., 1999) for 52 countries was performed to determine the impact of these factors on economic freedom.
Findings
Results indicated femininity was the cultural dimension associated with the most measures of economic freedom. Short-term-oriented cultures were predictive of greater business freedom, while more restrained cultures were associated with greater business and monetary freedoms. Higher individualism was predictive of greater monetary freedom. Catholicism positively predicted investment freedom and negatively predicted business freedom. French civil law negatively predicted labor freedom, while socialist legal origins positively predicted trade freedom, but negatively predicted business freedom.
Originality/value
This is the first study to examine the impacts of culture, law and religion on economic freedom. One practical implication of this research is that countries would be wise to emphasize more feminine aspects in their cultures, as these are associated with greater economic freedom. Even minor adjustments that move in the direction of cooperation and fair processes might help increase economic freedoms and the many benefits that stem from such freedoms.
Details
Keywords
Can Yalcinkaya and Safdar Ahmed
This chapter explores the theoretical foundations of Hazeen, a Muslim blackened death metal band formed in 2015 by the authors - Safdar Ahmed on guitar and vocals, and Can…
Abstract
This chapter explores the theoretical foundations of Hazeen, a Muslim blackened death metal band formed in 2015 by the authors - Safdar Ahmed on guitar and vocals, and Can Yalcinkaya on the drums and darbuka. It provides insights into the musical and performative practices of our band that are informed by traditions of black and death metal, but which also re-interpret them through an engagement with anti-fascist, anti-Islamophobic politics as well as Sufi/batini elements. Hazeen responds to a rising tide of Islamophobia in Australia, using our lyrics and performances to attack racist stereotyping and the dehumanisation of Muslims. In our performances, we dress in black, Islamic attire and apply ‘corpse paint’ to become the much feared ‘other’ of the post-9/11 world - the monstrous, rabid, zombie-like Muslim that has haunted the right wing/conservative imagination in the West. Our lyrics address such issues as the inhumane treatment of refugees and asylum seekers in Australia, halal food conspiracies, orientalism and the so-called ‘clash of civilisations’. This chapter presents a critical exegesis of Hazeen’s output in the form of live gigs, art performances and studio recordings. It seeks to identify Hazeen’s place within the broader Australian metal scene, posing questions of authenticity and how metal enables us to question hegemonic notions of identity. Hazeen’s use of art spaces as venues of performance and involvement in the indie/zine community highlights an unconventional position within the local metal scene.
Details
Keywords
Samantha A. Conroy, Nina Gupta, Jason D. Shaw and Tae-Youn Park
In this paper, we review the literature on pay variation (e.g., pay dispersion, pay compression, pay range) in organizations. Pay variation research has increased markedly…
Abstract
In this paper, we review the literature on pay variation (e.g., pay dispersion, pay compression, pay range) in organizations. Pay variation research has increased markedly in the past two decades and much progress has been made in terms of understanding its consequences for individual, team, and organizational outcomes. Our review of this research exposes several levels-related assumptions that have limited theoretical and empirical progress. We isolate the issues that deserve attention, develop an illustrative multilevel model, and offer a number of testable propositions to guide future research on pay structures.
Details
Keywords
This chapter aims to provide insight into conceptualizing and understanding the experience of civic engagement through voluntary service for high school students in the…
Abstract
This chapter aims to provide insight into conceptualizing and understanding the experience of civic engagement through voluntary service for high school students in the United States today. Unlike prior studies of youth civic life that are predominately quantitative and rely on correlates of youth civic engagement, this qualitative research explores the meanings and rationale youth attribute to being members of their communities. Youth service work emerges in two general forms. Some young people have an altruistic orientation: they are dedicated to help the less fortunate in their communities, but at the same time, they lack strong ideological investment. Other students have an activist orientation: they are committed to activist politics, but cannot connect their political concerns to school-based service. These two orientations to service develop in the context of school programs that encourage – or require – episodic single acts of volunteerism as a form of civic education. Diffuse associational forms and loose, individually based networks thus shape the context and content of youth volunteerism. These associational forms imply the practice of “networked democracy” by young Americans. Although networked associational ties offer young people weaker forms of collective organization, they also allow students to connect to and experiment with many different ideas, issues, and forms of expression.
Extreme metal originated in North America and Europe in the late-1980s, but Australia’s adoption of the form followed closely. One of the first Australian extreme metal…
Abstract
Extreme metal originated in North America and Europe in the late-1980s, but Australia’s adoption of the form followed closely. One of the first Australian extreme metal (AEM) acts was Sadistik Exekution from Sydney, formed in 1985. Sadistik Exekution are notable for combining musical intensity with irreverent humour and parody. They introduced global extreme metal to the trope of the Australian larrikin: a once pejorative characterisation that has become a term of endearment in contemporary Australian culture, describing a defiant and jocular personality. This trope is evident in Sadistik Exekution’s work, but it has since proliferated more broadly throughout AEM, exemplified by more recent bands like Blood Duster and King Parrot. Their music, too, is inarguably intense and provocative, but is simultaneously mocking of the solemnity of its scene and lineage. This chapter will examine how bands like Sadistik Exekution, Blood Duster and King Parrot, through their public personas and musical and paramusical texts, have subverted extreme metal coding, thereby uncovering a uniquely Australian trajectory in extreme metal style and history.
Details
Keywords
Cindy Pierard, Jason Shoup, Susanne K. Clement, Mark Emmons, Teresa Y. Neely and Frances C. Wilkinson
This chapter introduces Building Back Better Libraries (BBBL) as a critical concept for improved library planning both prior to and following a disaster or other…
Abstract
Purpose
This chapter introduces Building Back Better Libraries (BBBL) as a critical concept for improved library planning both prior to and following a disaster or other emergency. Building Back Better, an idea widely discussed in the disaster recovery literature, seeks to use the difficulty of a disaster as an opportunity to go beyond the status quo and to promote changes that result in stronger, more resilient communities. The authors will define BBB elements and frameworks, building upon those to create a model for library disaster planning and recovery, and applying it to cases involving space and facilities, collections, services, and people.
Methodology/approach
Literature on the Building Back Better concept and frameworks, as well as library emergency response, was reviewed. This source material was used to develop a modified framework for improved library disaster planning and recovery. The Building Back Better Libraries framework is discussed and applied to cases involving library facilities and spaces, collections, and services, and its implementation through a disaster planning team is reviewed.
Findings
Though all libraries hope to avoid disaster, few succeed. One survey found that as many as 75% of academic library respondents had experienced a disaster or emergency. Evidence also suggests that few libraries are prepared, with as many as 66–80% of libraries reporting that they have no emergency plan with staff trained to carry it out. Even when plans are in place, the rush to respond to immediate needs following a disaster can overwhelm the ability to pursue effective long-term planning. Building Back Better, when framed for libraries, provides a planning tool to balance short-term response with long-term recovery and resilience. The Building Back Better Libraries framework focuses on the areas of risk assessment for library collections and spaces; recovery and rejuvenation for facilities, collections, and services; and implementation and monitoring, with particular discussion of the human element and the role of a library disaster planning team.
Practical implications
The proposed framework, Building Back Better Libraries (BBBL), can be used to strengthen disaster planning in a manner that balances meeting immediate needs with implementing longer term plans to create stronger and more resilient libraries.
Originality/value
Although aspects of BBB ideas are present in existing library literature, the concept is not formally defined for the library context.
Details