Search results

1 – 5 of 5
Book part
Publication date: 30 April 2024

Shing-Ling S. Chen, Zhuojun Joyce Chen and Courtney Styron

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal…

Abstract

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal treatment of male and female athletes – while a muscular frame enhances masculinity for male athletes, a muscular physique invites body shaming for female athletes. In this study, symbolic interactionist theories regarding the generalized other are called into question. While George Mead's theorizing exhibits a nonproblematic role taking of the generalized other in a cooperative manner, this study reports the presence of paradoxical generalized others, and consequently, the incongruent role taking of a latent generalized other by individuals. This study investigates if the issue of body image exists among college female athletes, if college female athletes experience the dilemma of choosing between outstanding performance with a muscular frame or maintaining traditional female appearance. To provide answers to the question, female athletes in a midwest university were invited to fill out a survey. The survey results confirm the existence of a paradox between performance and appearance among some college female athletes.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Content available
Book part
Publication date: 30 April 2024

Abstract

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

72

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 February 2024

Arushi Bathla, Ginni Chawla and Ashish Gupta

Design-thinking (DT) in education has attracted significant interest from practitioners and academics, as it proffers new-age thinking to transform learning processes. This paper…

139

Abstract

Purpose

Design-thinking (DT) in education has attracted significant interest from practitioners and academics, as it proffers new-age thinking to transform learning processes. This paper synthesises extant literature and identifies the current intellectual frontiers.

Design/methodology/approach

First, a systematic-literature-review was undertaken employing a robust process of selecting papers (from 1986 to 2022) by reading titles, abstracts and keywords based on a required criterion, backward–forward chaining and strict quality evaluations. Next, a bibliometric analysis was undertaken using VOSviewer. Finally, text analysis using RStudio was done to trace the implications of past work and future directions.

Findings

At first, we identify and explain 12 clusters through bibliometric coupling that include “interdisciplinary-area”, “futuristic-learning”, “design-process” and “design-education”, amongst others. We explain each of these clusters later in the text. Science, Technology, Engineering, Arts and Mathematics (STEAM), management education, design and change, teacher training, entrepreneurship education and technology, digital learning, gifted education and course development) Secondly, through co-word-analysis, we identify and explain four additional clusters that include “business education and pedagogy”, “content and learning environment”, “participants and outcome” and finally, “thinking-processes”. Based on this finding, we believe that the future holds a very positive presence sentiment for design thinking and education (DT&E) in changing the 21st century learning.

Research limitations/implications

For investigating many contemporary challenges related to DT&E, like virtual reality experiential learning, sustainability education, organisational learning and management training, etc. have been outlined.

Practical implications

Academics may come up with new or improved courses for the implementation of DT in educational settings and policymakers may inculcate design labs in the curricula to fortify academic excellence. Managers who would employ DT in their training, development and policy design, amongst others, could end up gaining a competitive advantage in the marketplace.

Originality/value

This study conducted a comprehensive review of the field, which to our limited knowledge, no prior studies have been done so far. Besides, the study also outlines interesting research questions for future research.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 5 of 5