Search results

1 – 10 of over 1000
Article
Publication date: 6 December 2023

Lisa Maria Beethoven Steene, Lisa Gaylor and Jane L. Ireland

The current review aims to focus on how risk and protective factors for self-harm in secure mental health hospitals are captured in the literature.

Abstract

Purpose

The current review aims to focus on how risk and protective factors for self-harm in secure mental health hospitals are captured in the literature.

Design/methodology/approach

Fifty-seven articles were included in a systematic review, drawn from an initial 1,119 articles, post duplicate removal. Databases included Psycinfo, Psycarticles, Psycnet, Web of Science and EBSCO host. A thematic analysis was used, which included a meta-ethnographic approach for considering qualitative papers.

Findings

There was a clear focus on risk factors, with eight identified (in order of occurrence): raised emotional reactivity and poor emotion regulation; poor mental health; traumatic experiences; personality disorder diagnosis and associated traits; increased use of outward aggression – dual harm; constraints of a secure environment and lack of control; previous self-harm and suicide attempts; and hopelessness. Protective factors featured less, resulting in only three themes emerging (in order of occurrence): positive social support and communication; positive coping skills; and hope/positive outlook.

Research limitations/implications

This includes a proposal to move focus away from “risk” factors, to incorporate “needs”, in terms of individual and environmental factors. There is also a need for more attention to focus on developing high quality research in this area.

Originality/value

The research captures an area where a synthesis of research has not been comprehensively undertaken, particularly with regards to capturing protective as well as risk factors.

Details

Journal of Aggression, Conflict and Peace Research, vol. 16 no. 2
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 18 April 2024

Kristen L. Walker and George R. Milne

The authors argue that privacy is integral to the well-being of consumers and an essential component in not only corporate social responsibility (CSR) but what they term uniquely…

Abstract

Purpose

The authors argue that privacy is integral to the well-being of consumers and an essential component in not only corporate social responsibility (CSR) but what they term uniquely as social media responsibility (SMR). A conceptual framework is proposed that delineates the privacy issues companies should pay attention to in artificial intelligence (AI)-fueled social media environments.

Design/methodology/approach

The authors review literature on privacy issues in social media and AI in the academic and practitioner literatures. Based on the review, arguments focus on the need for an SMR framework, proposing responsible use of consumer data that is attentive to consumers' privacy concerns.

Findings

Implications from the framework are a path forward for social media companies to treat consumer data more fairly in this new environment. The framework has implications for companies to reduce potential harms to consumers and consider addressing their power and responsibility. With social media and AI transforming consumer behavior so profoundly, there are a variety of short- and long-term social implications.

Originality

Since AI tools are becoming integral to social media company activities, this research addresses the changing responsibilities social media companies have in securing consumers' data and enabling consumers the agency to protect their privacy effectively. The authors propose an SMR framework based on CSR research and AI tools employed by social media companies.

Details

Journal of Research in Interactive Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 18 July 2023

Trang Thi Uyen Nguyen, Phuong Van Nguyen, Hien Thi Ngoc Huynh, Demetris Vrontis and Zafar U. Ahmed

This study aims to investigate the determinants of public trust in e-government services (Te-GS) and participation in social media.

Abstract

Purpose

This study aims to investigate the determinants of public trust in e-government services (Te-GS) and participation in social media.

Design/methodology/approach

A quantitative cross-sectional field survey was used to collect primary data at the local government level in 11 cities, towns and districts in Tien Giang Province, Vietnam. The final data set of 529 respondents was analysed using SmartPLS4 to evaluate the measurement and structural models.

Findings

Perceived responsiveness, transparency and security have strong positive associations with Te-GS, whereas perceived accountability does not. Furthermore, perceived ease of use and perceived usefulness are positively associated with social media participation.

Originality/value

Although previous studies have examined citizen behaviour in the use of e-government services, the social media context has rarely been considered due to its novelty. This study adds to the knowledge of the antecedents of participation in e-government services in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding participation intention that considers four elements of good governance theory and two elements of the technology acceptance model (TAM), thereby extending previous research on the effects of these variables on the adoption of e-government services.

Open Access
Article
Publication date: 6 March 2024

Annie Williams, Hannah Bayfield, Martin Elliott, Jennifer Lyttleton-Smith, Honor Young, Rhiannon Evans and Sara Long

Using a mixed methodology comprising interviews, case file analysis and descriptive statistics, this study aims to examine the experiences of all 43 young people in Wales subject…

Abstract

Purpose

Using a mixed methodology comprising interviews, case file analysis and descriptive statistics, this study aims to examine the experiences of all 43 young people in Wales subject to secure accommodation orders between 1st April 2016 and 31st March 2018.

Design/methodology/approach

Children in the UK aged 10–17 years who are deemed to be at a significant level of risk to themselves or others may be subject to a secure accommodation order, leading to time spent in a secure children’s home (SCH) on welfare grounds. Following a rise in the number of children in Wales referred to SCHs for welfare reasons, this paper describes these young people’s journeys into, through and out of SCHs, giving insight into their experiences and highlighting areas for policy and practice improvements.

Findings

Findings indicate that improvements in mental health support and placement availability are key in improving the experiences of this particularly vulnerable group of young people throughout their childhood.

Practical implications

Other practical implications of the study’s findings, such as improvements in secure transport arrangements, are also discussed.

Originality/value

While the findings are limited by the reliance on self-report methods and the size of the study, namely, the small number of young people with experience of SCHs who were able to participate, the findings build on the existing knowledge base around children’s residential accommodation and provide new insights into how best to support these children.

Details

Journal of Children's Services, vol. 19 no. 1
Type: Research Article
ISSN: 1746-6660

Keywords

Article
Publication date: 19 September 2023

Ana Carolina Ferreira Costa, Fernando Capelo Neto, Maximilian Espuny, Aglaé Baptista Torres da Rocha and Otávio José de Oliveira

Small and medium-sized enterprises (SMEs) are fundamental to the socioeconomic development of a country or region. They directly contribute to increasing employment generation and…

Abstract

Purpose

Small and medium-sized enterprises (SMEs) are fundamental to the socioeconomic development of a country or region. They directly contribute to increasing employment generation and improving income distribution. Despite the importance of SMEs, there are still opportunities for developing works that support and guide SMEs to use digital technologies, especially to digitalize their customer service. Therefore, this work aims to propose drivers containing recommendations for developing and improving the digitalization of customer service in SMEs.

Design/methodology/approach

This work uses a qualitative approach to systematize the main SMEs' characteristics and identify the boosting elements of the digitalization of customer service in the scientific literature. To this end, the authors conducted a content analysis of the most influential empirical and theoretical articles on the theme published from 2016 to 2021 in the Scopus database.

Findings

This work identified 38 boosting elements of the digitalization of customer service based on the scientific literature. These elements were grouped into six drivers for developing and improving the digitalization of customer service. The drivers contain recommendations that were adapted for SMEs according to their characteristics and based on the experience of the authors of this work.

Originality/value

This work contributes to promoting socioeconomic development, providing important solutions for managers and owners of SMEs to improve their customer service. The proposed drivers support and encourage the use of digital technologies for developing and improving customer service, overcoming the challenges of digitalization in these companies. Thus, SMEs will be able to increase the satisfaction of their customers and improve their competitiveness.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 30 no. 2/3
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 9 April 2024

Ahmed Shafiqul Huque and Jannatul Ferdous

The paper aims to examine the state of electronic service delivery in Bangladesh. It reviews the structure and operation of the “e-service” centers at the district, sub-district…

Abstract

Purpose

The paper aims to examine the state of electronic service delivery in Bangladesh. It reviews the structure and operation of the “e-service” centers at the district, sub-district (upazila), and union levels by taking an inventory and assessing their contributions.

Design/methodology/approach

The paper is based on a review of the functions and operations of the service delivery agencies with reference to the claims made by the government. It is based on secondary materials obtained from academic studies, government documents, relevant websites, and media reports.

Findings

Electronic delivery of public services in Bangladesh has not been effective as planned. There are issues regarding channels of communication, the competence of public officials, human and financial resources, and political will to support the agencies delivering public services.

Originality/value

The paper examines the arrangements, practices, and problems of delivery of public services in Bangladesh through e-service centers at the local levels to determine the progress and potentials of employing digital technology for addressing problems. It proposes the strategy for public service delivery by using digital technology in the country.

Details

Public Administration and Policy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1727-2645

Keywords

Book part
Publication date: 19 April 2024

Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…

Abstract

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

1 – 10 of over 1000