Search results

1 – 10 of 224
Open Access
Article
Publication date: 27 February 2023

Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…

5235

Abstract

Purpose

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.

Design/methodology/approach

Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.

Findings

The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.

Originality/value

This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Book part
Publication date: 4 June 2021

Samantha Keene

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways…

Abstract

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways, mainstream pornography has the potential to influence the further development of harmful sexual scripts that condone or endorse violence against women and girls. These concerns warrant the adoption of a harms-based perspective in critical examinations of pornography's influence on sexual experiences. This chapter reports on findings from interviews with 24 heterosexual emerging adults living in Aotearoa/New Zealand about how pornography has impacted their lives. Despite a shared awareness among participants of mainstream pornography's misogynistic tendencies, and the potential for harm from those displays, men's and women's experiences were profoundly gendered. Men's reported experiences were often associated with concerns about their own sexual behaviors, performances, and/or abilities. Conversely, women's experiences were often shaped by how pornography had affected the way that men related to them sexually. Their experiences included instances of sexual coercion and assault which were not reported by the men. These findings signal the need for a gendered lens, situated within a broader harms-based perspective, in examinations of pornography's influence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 7 November 2023

Rodrigo Mena

The notion that disasters are not natural is longstanding, leading to a growing number of campaigns aimed at countering the use of the term “natural disaster.” Whilst these…

Abstract

Purpose

The notion that disasters are not natural is longstanding, leading to a growing number of campaigns aimed at countering the use of the term “natural disaster.” Whilst these efforts are crucial, critical perspectives regarding the potential risks associated with this process are lacking, particularly in places affected by violent conflict. This paper aims to present a critical analysis of these efforts, highlighting the need to approach them with care.

Design/methodology/approach

The author draws upon insights and discussions accumulated over a decade of research into the relationship between disasters and conflict. The article includes a critical literature review on the disaster–conflict relationship and literature specifically addressing the idea that disasters are not natural. The analysis of field notes led to a second literature review covering topics such as (de) politicisation, instrumentalisation, disaster diplomacy, ethics, humanitarian principles, disaster risk reduction, peacebuilding and conflict sensitivity.

Findings

This analysis underscores the importance of advocating that disasters are not natural, especially in conflict-affected areas. However, an uncritical approach could lead to unintended consequences, such as exacerbating social conflicts or obstructing disaster-related actions. The article also presents alternatives to advance the understanding that disasters are not natural whilst mitigating risks, such as embracing a “do-no-harm” approach or conflict-sensitive analyses.

Originality/value

The author offers an innovative critical approach to advancing the understanding that disasters are not natural but socio-political. This perspective is advocated, especially in conflict-affected contexts, to address the root causes of both disasters and conflicts. The author also invites their peers and practitioners to prioritise reflective scholarship and practices, aiming to prevent the unintentional exacerbation of suffering whilst working towards its reduction.

Details

Disaster Prevention and Management: An International Journal, vol. 32 no. 6
Type: Research Article
ISSN: 0965-3562

Keywords

Open Access
Article
Publication date: 28 April 2020

Svenja Diegelmann, Katharina Ninaus and Ralf Terlutter

The purpose of this paper is to analyze message features of fear appeals in current British road safety campaigns directed against mobile phone use while driving and to discuss…

5615

Abstract

Purpose

The purpose of this paper is to analyze message features of fear appeals in current British road safety campaigns directed against mobile phone use while driving and to discuss barriers to explicit theory use in campaign message design.

Design/methodology/approach

This message-centred research takes a qualitative content analytical approach to analyze nine British web-based road safety campaigns directed against mobile phone use while driving based on the extended parallel process model. Message content and message structure are analyzed.

Findings

There still exists a gap between theory and road safety campaign practice. The study reveals that campaigns with fear appeals primarily use threatening messages but neglect efficacy-based contents. Severity messages emerge as the dominant content type while self-efficacy and response efficacy are hardly represented. Fear appeal content in the threat component was mainly communicated through the mention of legal, financial and physical harm, whereas efficacy messages communicated success stories and encouragement. As regards message structure, the threat component always preceded the efficacy component. Within each component, different patterns emerged.

Practical implications

To enhance efficacy in campaigns directed against distracted driving and to reduce the gap between theory and practice, social marketers should include messages that empower recipients to abstain from mobile phone use while driving. Campaigns should show recommended behaviours and highlight their usefulness and effectiveness.

Originality/value

This paper adds to limited research conducted on effect-independent message properties of fear appeals. It enhances understanding of fear appeal message features across the structure and content dimension. By discussing barriers to explicit theory use in social marketing practice and offering practical implications for social marketers, it contributes towards reducing the barriers to explicit theory use in campaign message design.

Open Access
Book part
Publication date: 16 August 2023

Abstract

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Moira Aikenhead

Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to…

Abstract

Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to “revenge pornography,” which entails individuals (typically men) sharing intimate images of their ex-partners (typically women) online in an attempt to seek revenge or cause them harm. Feminist writers and activists categorize revenge pornography as a symptom and consequence of “rape culture,” in which sexual violence is routinely trivialized and viewed as acceptable or entertaining, and women are blamed for their sexual victimization. In this chapter, I analyze Canada's burgeoning revenge pornography case law and find that these cases support an understanding of revenge pornography as a serious form of communal, gendered, intimate partner violence, which is extremely effective at harming victims because of broader rape culture. While Canadian judges are taking revenge pornography seriously, there is some indication from the case law that they are at risk of relying on gendered reasoning and assumptions previously observed by feminists in sexual assault jurisprudence, which may have the result of bolstering rape culture, rather than contesting it.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 224