Search results

1 – 8 of 8
Book part
Publication date: 30 April 2024

Shing-Ling S. Chen, Zhuojun Joyce Chen and Courtney Styron

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal…

Abstract

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal treatment of male and female athletes – while a muscular frame enhances masculinity for male athletes, a muscular physique invites body shaming for female athletes. In this study, symbolic interactionist theories regarding the generalized other are called into question. While George Mead's theorizing exhibits a nonproblematic role taking of the generalized other in a cooperative manner, this study reports the presence of paradoxical generalized others, and consequently, the incongruent role taking of a latent generalized other by individuals. This study investigates if the issue of body image exists among college female athletes, if college female athletes experience the dilemma of choosing between outstanding performance with a muscular frame or maintaining traditional female appearance. To provide answers to the question, female athletes in a midwest university were invited to fill out a survey. The survey results confirm the existence of a paradox between performance and appearance among some college female athletes.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Content available
Book part
Publication date: 30 April 2024

Abstract

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

74

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 February 2024

Arushi Bathla, Ginni Chawla and Ashish Gupta

Design-thinking (DT) in education has attracted significant interest from practitioners and academics, as it proffers new-age thinking to transform learning processes. This paper…

145

Abstract

Purpose

Design-thinking (DT) in education has attracted significant interest from practitioners and academics, as it proffers new-age thinking to transform learning processes. This paper synthesises extant literature and identifies the current intellectual frontiers.

Design/methodology/approach

First, a systematic-literature-review was undertaken employing a robust process of selecting papers (from 1986 to 2022) by reading titles, abstracts and keywords based on a required criterion, backward–forward chaining and strict quality evaluations. Next, a bibliometric analysis was undertaken using VOSviewer. Finally, text analysis using RStudio was done to trace the implications of past work and future directions.

Findings

At first, we identify and explain 12 clusters through bibliometric coupling that include “interdisciplinary-area”, “futuristic-learning”, “design-process” and “design-education”, amongst others. We explain each of these clusters later in the text. Science, Technology, Engineering, Arts and Mathematics (STEAM), management education, design and change, teacher training, entrepreneurship education and technology, digital learning, gifted education and course development) Secondly, through co-word-analysis, we identify and explain four additional clusters that include “business education and pedagogy”, “content and learning environment”, “participants and outcome” and finally, “thinking-processes”. Based on this finding, we believe that the future holds a very positive presence sentiment for design thinking and education (DT&E) in changing the 21st century learning.

Research limitations/implications

For investigating many contemporary challenges related to DT&E, like virtual reality experiential learning, sustainability education, organisational learning and management training, etc. have been outlined.

Practical implications

Academics may come up with new or improved courses for the implementation of DT in educational settings and policymakers may inculcate design labs in the curricula to fortify academic excellence. Managers who would employ DT in their training, development and policy design, amongst others, could end up gaining a competitive advantage in the marketplace.

Originality/value

This study conducted a comprehensive review of the field, which to our limited knowledge, no prior studies have been done so far. Besides, the study also outlines interesting research questions for future research.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Open Access
Article
Publication date: 29 September 2022

Sara Willermark and Anna Sigridur Islind

This study aims to explore virtual leadership work within educational settings in the light of social disruption. In 2020, a global pandemic changed the way we work. For school…

2078

Abstract

Purpose

This study aims to explore virtual leadership work within educational settings in the light of social disruption. In 2020, a global pandemic changed the way we work. For school leaders, that involved running a virtual school overnight. Although there is a stream of research that explores leadership in solely virtual communities, there is a gap in the literature regarding practices that transition from analog to virtual practices and the changes in leadership in those types of work practices.

Design/methodology/approach

The data gathering method constitutes a questionnaire to explore school leaders’ experiences of virtual work and virtual leadership in light of social disruption. One hundred and five Swedish school leaders answered the questionnaire covering both fixed and open questions.

Findings

The results show that school leaders’ general experiences of transition to virtual school have worked relatively well. We show how the work changes and shift the focus in the virtual workplace.

Originality/value

The author’s contributions include theorizing about leadership affordances in virtual schools and providing implications for practice. The authors summarize our main contribution in five affordances that characterize virtual leadership, including a focus on core activities, trust-based government, 1:1 communication with staff, structure and clarity and active outreach activities. The results could be interesting for understanding the radical digitalization of leadership in the digital workplace.

Details

Journal of Workplace Learning, vol. 35 no. 9
Type: Research Article
ISSN: 1366-5626

Keywords

Article
Publication date: 14 September 2023

Hana Georgoulis, Eric Beauregard and Julien Chopin

The purpose of this study is to investigate whether sexual homicide offenders (SHO) who dispose of the victim’s body naked present with particular crime scene characteristics.

Abstract

Purpose

The purpose of this study is to investigate whether sexual homicide offenders (SHO) who dispose of the victim’s body naked present with particular crime scene characteristics.

Design/methodology/approach

This study aims to answer this question through the use of a sequential logistic regression to test the individual effects of each set of crime scene variables against the manner of disposal using a sample of 662 solved cases of extrafamilial sexual homicide from an international database.

Findings

Results demonstrated that the modus operandi behaviors of sexual penetration, asphyxiation, dismemberment and overkill were significantly associated with the body being disposed of naked. In addition, removing or destroying evidence from the scene was also significantly associated with a naked victim. In contrast, the body was more likely to be dumped clothed if the contact scene was deserted and the victim was a stranger. These results suggest that SHOs who dispose of the body naked are more in line with the sadistic sexual murderer, while clothed victims are often disposed of by angry offenders.

Originality/value

To the best of the authors’ knowledge, this is the first study to examine the particular manner of disposing the victim’s body naked in cases of sexual homicide.

Details

Journal of Criminal Psychology, vol. 13 no. 4
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 9 October 2023

Mohammad Ali Shenasa, Maryam Soltani, Victor Tang, Cory R. Weissman, Lawrence Gregory Appelbaum, Zafiris J. Daskalakis and Dhakshin Ramanathan

Repetitive transcranial magnetic stimulation (rTMS) is a well-established treatment with efficacy for several psychiatric disorders and has yielded promising yet mixed data…

Abstract

Purpose

Repetitive transcranial magnetic stimulation (rTMS) is a well-established treatment with efficacy for several psychiatric disorders and has yielded promising yet mixed data showing reductions in craving for substance use. Patients with substance use disorders and comorbid depression may encounter obstacles to receiving rTMS in outpatient settings for treatment of depression. In turn, implementation of rTMS in residential substance use programs would greatly benefit those with comorbid treatment resistant depression. This paper aims to provide recommendations for implementing rTMS within residential substance use treatment centers.

Design/methodology/approach

Using PubMed, the authors conducted a narrative review of manuscripts using various combinations of the following search terms: rTMS, depression, substance use and substance use disorder. The authors read manuscripts for their methodology, outcomes and adverse events to synthesize their results, which correspond to their recommendations for patient selection, safely implementing rTMS in residential substance use facilities and optimal rTMS protocols to start with.

Findings

Advantages of this approach include increased compliance, monitoring and access to care. Recommendations to safely incorporate rTMS in residential substance use disorder treatment centers revolve around selection of patients eligible for rTMS, allowing for sufficient time to elapse prior to commencing rTMS, monitoring for signs of recent substance use or withdrawal and using rTMS protocols compatible with the therapeutic programming of a treatment center.

Originality/value

This paper details the challenges and benefits of implementing rTMS for patients with dual diagnosis and provides recommendations to safely do so. To the best of the authors’ knowledge, this is a novel and unpublished endeavor.

Details

Advances in Dual Diagnosis, vol. 16 no. 4
Type: Research Article
ISSN: 1757-0972

Keywords

1 – 8 of 8