Search results
1 – 10 of 99Jon D. Elhai, Jason C. Levine and Brian J. Hall
Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables…
Abstract
Purpose
Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.
Design/methodology/approach
In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.
Findings
Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.
Research limitations/implications
Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.
Practical implications
Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.
Originality/value
This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.
Details
Keywords
Darryl Plecas, Amanda V. McCormick, Jason Levine, Patrick Neal and Irwin M. Cohen
The aim of this study is to test a technological solution to two traditional limitations of information sharing between law enforcement agencies: data quality and privacy concerns.
Abstract
Purpose
The aim of this study is to test a technological solution to two traditional limitations of information sharing between law enforcement agencies: data quality and privacy concerns.
Design/methodology/approach
Entity Analytics Software (EAS) was tested in two studies with North American law enforcement agencies. In the first test, duplicated cases held in a police record system were successfully identified (4.0 percent) to a greater extent than the traditionally used software program (1.5 percent). This resulted in a difference of 11,954 cases that otherwise would not have been identified as duplications. In the second test, entity information held separately by police and border officials was shared anonymously between these two organizations. This resulted in 1,827 alerts regarding entities that appeared in both systems; traditionally, this information could not have been shared, given privacy concerns, and neither agency would be aware of the relevant information held by the other. Data duplication resulted in an additional 1,041 alerts, which highlights the need to use technological solutions to improve data quality prior to and during information sharing.
Findings
The current study demonstrated that EAS has the potential to merge data from different technologically based systems, while identifying errors and reducing privacy concerns through anonymization of identifiers.
Originality/value
While only one potential technological solution (EAS) was tested and organizations must consider the potential expense associated with implementing such technology, the implications resulting from both studies for improved awareness and greater efficiency support and facilitate information sharing between law enforcement organizations.
Details
Keywords
Purpose – This chapter aims to present an overview of what constitutes child murder, including definitions, history, prevalence, risk factors, offender motivations, and…
Abstract
Purpose – This chapter aims to present an overview of what constitutes child murder, including definitions, history, prevalence, risk factors, offender motivations, and theoretical understanding.
Design/methodology/approach – The author uses secondary data from the National Incident-Based Reporting System, Uniformed Crime Reports, and Vital Statistics to show comparisons with previously conducted research. This allows for an overview of child murder.
Findings – There are numerous inconsistencies due to methodological issues. It is hard to find studies where a large sample was used. Definitions of child vary between studies, as does the age categories used. In addition, child homicide is predicted to be grossly underrepresented due to lack of communication between agencies, lack of formalized training, lack of a formalized classification system, and lack of reporting.
Originality/value – Research on child homicide can be instrumental in many areas including policy creation, implementation, and evaluation. It can serve as a benefit for those attempting to provide preventative measures. It may also help law enforcement with investigation. It is only through continued analysis of these types of cases and vigilant research, policy, and practice that society can more effectively protect young children from exposure to potentially murderous outcomes.
Details
Keywords
Jason D. DeBode, Dana L. Haggard and K. Stephen Haggard
The purpose of this paper is to investigate the influence of broad cultural dimensions, as well as those of religion and legal origin, on countries’ economic freedom, i.e., trade…
Abstract
Purpose
The purpose of this paper is to investigate the influence of broad cultural dimensions, as well as those of religion and legal origin, on countries’ economic freedom, i.e., trade freedom, investment freedom, business freedom, labor freedom, monetary freedom, as well as a composite measure of economic freedom.
Design/methodology/approach
Linear regression of publicly available data regarding economic freedom (Miller et al., 2018) on cultural dimensions (Hofstede, 2009), legal origin and religion (LaPorta et al., 1999) for 52 countries was performed to determine the impact of these factors on economic freedom.
Findings
Results indicated femininity was the cultural dimension associated with the most measures of economic freedom. Short-term-oriented cultures were predictive of greater business freedom, while more restrained cultures were associated with greater business and monetary freedoms. Higher individualism was predictive of greater monetary freedom. Catholicism positively predicted investment freedom and negatively predicted business freedom. French civil law negatively predicted labor freedom, while socialist legal origins positively predicted trade freedom, but negatively predicted business freedom.
Originality/value
This is the first study to examine the impacts of culture, law and religion on economic freedom. One practical implication of this research is that countries would be wise to emphasize more feminine aspects in their cultures, as these are associated with greater economic freedom. Even minor adjustments that move in the direction of cooperation and fair processes might help increase economic freedoms and the many benefits that stem from such freedoms.
Details
Keywords
Can Yalcinkaya and Safdar Ahmed
This chapter explores the theoretical foundations of Hazeen, a Muslim blackened death metal band formed in 2015 by the authors - Safdar Ahmed on guitar and vocals, and Can…
Abstract
This chapter explores the theoretical foundations of Hazeen, a Muslim blackened death metal band formed in 2015 by the authors - Safdar Ahmed on guitar and vocals, and Can Yalcinkaya on the drums and darbuka. It provides insights into the musical and performative practices of our band that are informed by traditions of black and death metal, but which also re-interpret them through an engagement with anti-fascist, anti-Islamophobic politics as well as Sufi/batini elements. Hazeen responds to a rising tide of Islamophobia in Australia, using our lyrics and performances to attack racist stereotyping and the dehumanisation of Muslims. In our performances, we dress in black, Islamic attire and apply ‘corpse paint’ to become the much feared ‘other’ of the post-9/11 world - the monstrous, rabid, zombie-like Muslim that has haunted the right wing/conservative imagination in the West. Our lyrics address such issues as the inhumane treatment of refugees and asylum seekers in Australia, halal food conspiracies, orientalism and the so-called ‘clash of civilisations’. This chapter presents a critical exegesis of Hazeen’s output in the form of live gigs, art performances and studio recordings. It seeks to identify Hazeen’s place within the broader Australian metal scene, posing questions of authenticity and how metal enables us to question hegemonic notions of identity. Hazeen’s use of art spaces as venues of performance and involvement in the indie/zine community highlights an unconventional position within the local metal scene.
Details
Keywords
Samantha A. Conroy, Nina Gupta, Jason D. Shaw and Tae-Youn Park
In this paper, we review the literature on pay variation (e.g., pay dispersion, pay compression, pay range) in organizations. Pay variation research has increased markedly in the…
Abstract
In this paper, we review the literature on pay variation (e.g., pay dispersion, pay compression, pay range) in organizations. Pay variation research has increased markedly in the past two decades and much progress has been made in terms of understanding its consequences for individual, team, and organizational outcomes. Our review of this research exposes several levels-related assumptions that have limited theoretical and empirical progress. We isolate the issues that deserve attention, develop an illustrative multilevel model, and offer a number of testable propositions to guide future research on pay structures.
Details
Keywords
This chapter aims to provide insight into conceptualizing and understanding the experience of civic engagement through voluntary service for high school students in the United…
Abstract
This chapter aims to provide insight into conceptualizing and understanding the experience of civic engagement through voluntary service for high school students in the United States today. Unlike prior studies of youth civic life that are predominately quantitative and rely on correlates of youth civic engagement, this qualitative research explores the meanings and rationale youth attribute to being members of their communities. Youth service work emerges in two general forms. Some young people have an altruistic orientation: they are dedicated to help the less fortunate in their communities, but at the same time, they lack strong ideological investment. Other students have an activist orientation: they are committed to activist politics, but cannot connect their political concerns to school-based service. These two orientations to service develop in the context of school programs that encourage – or require – episodic single acts of volunteerism as a form of civic education. Diffuse associational forms and loose, individually based networks thus shape the context and content of youth volunteerism. These associational forms imply the practice of “networked democracy” by young Americans. Although networked associational ties offer young people weaker forms of collective organization, they also allow students to connect to and experiment with many different ideas, issues, and forms of expression.
In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both…
Abstract
In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both self-control and social control), in order to understand under what circumstances youths are more and less likely to behave in a deviant manner. The author will, then, mention the general strain theory, to draw the relationships between the encounters of negative life events, the development of strain, and the disposition to perform delinquency. The author will also, address the cultural deviance and social learning theories that help justify the expression of juvenile delinquency from a sociocultural perspective, alongside pathing the way to explaining how social costs of youth delinquency can be raised by policy amendments in order to mitigate adolescents’ exercises of smoking, drinking and sexual misconduct behaviours. In this chapter, the author will highlight how poverty, the availability of delinquent opportunities, peer influence and pressure, a lack of parental and school socialisation, and deviant social and cultural norms are all risk factors for youth delinquency.
Details
Keywords
Ida Gremyr, Jan Lenning, Mattias Elg and Jason Martin
Over one million organisations have a quality management system (QMS) certified to the ISO 9001 standard; however, the system requires a lot of resources and its value has been…
Abstract
Purpose
Over one million organisations have a quality management system (QMS) certified to the ISO 9001 standard; however, the system requires a lot of resources and its value has been questioned. This critique also leads to a questioning of the strategic relevance of quality management. The purpose of this paper is to explore how different types of uses of QMS correlate with management perceptions of quality management in terms of respect, cost and strategic importance.
Design/methodology/approach
The paper is based on a mixed method data collection strategy, quantitative data being collected from a survey in 8 organisations (n = 108) and qualitative data being collected from 12 interviews with quality managers in 12 different organisations.
Findings
The paper shows that a compliance-oriented QMS usage will more likely lead to a view of quality management as costly and of little respect, than a business or improvement-oriented QMS usage. Moreover, it nuances the view on compliance-oriented usage, showing that it is mainly documentation that negatively influences how management views quality management, whereas standardisation that is part of the compliance-oriented use is perceived as more value-adding.
Originality/value
This paper suggests three types of QMS use, namely, business management, improvement, and compliance-oriented use, and that a wise selection of how to use the QMS will affect the respect, strategic importance and cost that management associates with quality management.
Details