Search results

1 – 10 of 99
Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables…

3319

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 March 2011

Darryl Plecas, Amanda V. McCormick, Jason Levine, Patrick Neal and Irwin M. Cohen

The aim of this study is to test a technological solution to two traditional limitations of information sharing between law enforcement agencies: data quality and privacy concerns.

2590

Abstract

Purpose

The aim of this study is to test a technological solution to two traditional limitations of information sharing between law enforcement agencies: data quality and privacy concerns.

Design/methodology/approach

Entity Analytics Software (EAS) was tested in two studies with North American law enforcement agencies. In the first test, duplicated cases held in a police record system were successfully identified (4.0 percent) to a greater extent than the traditionally used software program (1.5 percent). This resulted in a difference of 11,954 cases that otherwise would not have been identified as duplications. In the second test, entity information held separately by police and border officials was shared anonymously between these two organizations. This resulted in 1,827 alerts regarding entities that appeared in both systems; traditionally, this information could not have been shared, given privacy concerns, and neither agency would be aware of the relevant information held by the other. Data duplication resulted in an additional 1,041 alerts, which highlights the need to use technological solutions to improve data quality prior to and during information sharing.

Findings

The current study demonstrated that EAS has the potential to merge data from different technologically based systems, while identifying errors and reducing privacy concerns through anonymization of identifiers.

Originality/value

While only one potential technological solution (EAS) was tested and organizations must consider the potential expense associated with implementing such technology, the implications resulting from both studies for improved awareness and greater efficiency support and facilitate information sharing between law enforcement organizations.

Details

Policing: An International Journal of Police Strategies & Management, vol. 34 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Book part
Publication date: 6 September 2018

Melissa J. Tetzlaff-Bemiller

Purpose – This chapter aims to present an overview of what constitutes child murder, including definitions, history, prevalence, risk factors, offender motivations, and…

Abstract

Purpose – This chapter aims to present an overview of what constitutes child murder, including definitions, history, prevalence, risk factors, offender motivations, and theoretical understanding.

Design/methodology/approach – The author uses secondary data from the National Incident-Based Reporting System, Uniformed Crime Reports, and Vital Statistics to show comparisons with previously conducted research. This allows for an overview of child murder.

Findings – There are numerous inconsistencies due to methodological issues. It is hard to find studies where a large sample was used. Definitions of child vary between studies, as does the age categories used. In addition, child homicide is predicted to be grossly underrepresented due to lack of communication between agencies, lack of formalized training, lack of a formalized classification system, and lack of reporting.

Originality/value – Research on child homicide can be instrumental in many areas including policy creation, implementation, and evaluation. It can serve as a benefit for those attempting to provide preventative measures. It may also help law enforcement with investigation. It is only through continued analysis of these types of cases and vigilant research, policy, and practice that society can more effectively protect young children from exposure to potentially murderous outcomes.

Details

Homicide and Violent Crime
Type: Book
ISBN: 978-1-78714-876-5

Keywords

Article
Publication date: 15 January 2020

Jason D. DeBode, Dana L. Haggard and K. Stephen Haggard

The purpose of this paper is to investigate the influence of broad cultural dimensions, as well as those of religion and legal origin, on countries’ economic freedom, i.e., trade…

1000

Abstract

Purpose

The purpose of this paper is to investigate the influence of broad cultural dimensions, as well as those of religion and legal origin, on countries’ economic freedom, i.e., trade freedom, investment freedom, business freedom, labor freedom, monetary freedom, as well as a composite measure of economic freedom.

Design/methodology/approach

Linear regression of publicly available data regarding economic freedom (Miller et al., 2018) on cultural dimensions (Hofstede, 2009), legal origin and religion (LaPorta et al., 1999) for 52 countries was performed to determine the impact of these factors on economic freedom.

Findings

Results indicated femininity was the cultural dimension associated with the most measures of economic freedom. Short-term-oriented cultures were predictive of greater business freedom, while more restrained cultures were associated with greater business and monetary freedoms. Higher individualism was predictive of greater monetary freedom. Catholicism positively predicted investment freedom and negatively predicted business freedom. French civil law negatively predicted labor freedom, while socialist legal origins positively predicted trade freedom, but negatively predicted business freedom.

Originality/value

This is the first study to examine the impacts of culture, law and religion on economic freedom. One practical implication of this research is that countries would be wise to emphasize more feminine aspects in their cultures, as these are associated with greater economic freedom. Even minor adjustments that move in the direction of cooperation and fair processes might help increase economic freedoms and the many benefits that stem from such freedoms.

Details

International Journal of Organization Theory & Behavior, vol. 23 no. 1
Type: Research Article
ISSN: 1093-4537

Keywords

Book part
Publication date: 4 June 2019

Can Yalcinkaya and Safdar Ahmed

This chapter explores the theoretical foundations of Hazeen, a Muslim blackened death metal band formed in 2015 by the authors - Safdar Ahmed on guitar and vocals, and Can…

Abstract

This chapter explores the theoretical foundations of Hazeen, a Muslim blackened death metal band formed in 2015 by the authors - Safdar Ahmed on guitar and vocals, and Can Yalcinkaya on the drums and darbuka. It provides insights into the musical and performative practices of our band that are informed by traditions of black and death metal, but which also re-interpret them through an engagement with anti-fascist, anti-Islamophobic politics as well as Sufi/batini elements. Hazeen responds to a rising tide of Islamophobia in Australia, using our lyrics and performances to attack racist stereotyping and the dehumanisation of Muslims. In our performances, we dress in black, Islamic attire and apply ‘corpse paint’ to become the much feared ‘other’ of the post-9/11 world - the monstrous, rabid, zombie-like Muslim that has haunted the right wing/conservative imagination in the West. Our lyrics address such issues as the inhumane treatment of refugees and asylum seekers in Australia, halal food conspiracies, orientalism and the so-called ‘clash of civilisations’. This chapter presents a critical exegesis of Hazeen’s output in the form of live gigs, art performances and studio recordings. It seeks to identify Hazeen’s place within the broader Australian metal scene, posing questions of authenticity and how metal enables us to question hegemonic notions of identity. Hazeen’s use of art spaces as venues of performance and involvement in the indie/zine community highlights an unconventional position within the local metal scene.

Details

Australian Metal Music: Identities, Scenes, and Cultures
Type: Book
ISBN: 978-1-78769-167-4

Keywords

Book part
Publication date: 1 July 2014

Samantha A. Conroy, Nina Gupta, Jason D. Shaw and Tae-Youn Park

In this paper, we review the literature on pay variation (e.g., pay dispersion, pay compression, pay range) in organizations. Pay variation research has increased markedly in the…

Abstract

In this paper, we review the literature on pay variation (e.g., pay dispersion, pay compression, pay range) in organizations. Pay variation research has increased markedly in the past two decades and much progress has been made in terms of understanding its consequences for individual, team, and organizational outcomes. Our review of this research exposes several levels-related assumptions that have limited theoretical and empirical progress. We isolate the issues that deserve attention, develop an illustrative multilevel model, and offer a number of testable propositions to guide future research on pay structures.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-78350-824-2

Keywords

Content available
Book part
Publication date: 13 November 2023

Jelena Balabanić Mavrović

Abstract

Details

Eating Disorders in a Capitalist World
Type: Book
ISBN: 978-1-80455-787-7

Book part
Publication date: 29 July 2010

Shauna A. Morimoto

This chapter aims to provide insight into conceptualizing and understanding the experience of civic engagement through voluntary service for high school students in the United…

Abstract

This chapter aims to provide insight into conceptualizing and understanding the experience of civic engagement through voluntary service for high school students in the United States today. Unlike prior studies of youth civic life that are predominately quantitative and rely on correlates of youth civic engagement, this qualitative research explores the meanings and rationale youth attribute to being members of their communities. Youth service work emerges in two general forms. Some young people have an altruistic orientation: they are dedicated to help the less fortunate in their communities, but at the same time, they lack strong ideological investment. Other students have an activist orientation: they are committed to activist politics, but cannot connect their political concerns to school-based service. These two orientations to service develop in the context of school programs that encourage – or require – episodic single acts of volunteerism as a form of civic education. Diffuse associational forms and loose, individually based networks thus shape the context and content of youth volunteerism. These associational forms imply the practice of “networked democracy” by young Americans. Although networked associational ties offer young people weaker forms of collective organization, they also allow students to connect to and experiment with many different ideas, issues, and forms of expression.

Details

Democratic Paths and Trends
Type: Book
ISBN: 978-0-85724-092-7

Book part
Publication date: 14 September 2023

Jason Hung

In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both…

Abstract

In Chapter 2, the author will develop the theoretical framework of the sociological analysis of youth delinquency in SEA. The author will introduce the control theory (both self-control and social control), in order to understand under what circumstances youths are more and less likely to behave in a deviant manner. The author will, then, mention the general strain theory, to draw the relationships between the encounters of negative life events, the development of strain, and the disposition to perform delinquency. The author will also, address the cultural deviance and social learning theories that help justify the expression of juvenile delinquency from a sociocultural perspective, alongside pathing the way to explaining how social costs of youth delinquency can be raised by policy amendments in order to mitigate adolescents’ exercises of smoking, drinking and sexual misconduct behaviours. In this chapter, the author will highlight how poverty, the availability of delinquent opportunities, peer influence and pressure, a lack of parental and school socialisation, and deviant social and cultural norms are all risk factors for youth delinquency.

Details

The Socially Constructed and Reproduced Youth Delinquency in Southeast Asia: Advancing Positive Youth Involvement in Sustainable Futures
Type: Book
ISBN: 978-1-83753-886-7

Keywords

Open Access
Article
Publication date: 27 July 2021

Ida Gremyr, Jan Lenning, Mattias Elg and Jason Martin

Over one million organisations have a quality management system (QMS) certified to the ISO 9001 standard; however, the system requires a lot of resources and its value has been…

10776

Abstract

Purpose

Over one million organisations have a quality management system (QMS) certified to the ISO 9001 standard; however, the system requires a lot of resources and its value has been questioned. This critique also leads to a questioning of the strategic relevance of quality management. The purpose of this paper is to explore how different types of uses of QMS correlate with management perceptions of quality management in terms of respect, cost and strategic importance.

Design/methodology/approach

The paper is based on a mixed method data collection strategy, quantitative data being collected from a survey in 8 organisations (n = 108) and qualitative data being collected from 12 interviews with quality managers in 12 different organisations.

Findings

The paper shows that a compliance-oriented QMS usage will more likely lead to a view of quality management as costly and of little respect, than a business or improvement-oriented QMS usage. Moreover, it nuances the view on compliance-oriented usage, showing that it is mainly documentation that negatively influences how management views quality management, whereas standardisation that is part of the compliance-oriented use is perceived as more value-adding.

Originality/value

This paper suggests three types of QMS use, namely, business management, improvement, and compliance-oriented use, and that a wise selection of how to use the QMS will affect the respect, strategic importance and cost that management associates with quality management.

Details

International Journal of Quality and Service Sciences, vol. 13 no. 3
Type: Research Article
ISSN: 1756-669X

Keywords

1 – 10 of 99