Search results

1 – 10 of 151
Content available
Book part
Publication date: 21 July 2022

Ian Ruthven

Abstract

Details

Dealing With Change Through Information Sculpting
Type: Book
ISBN: 978-1-80382-047-7

Content available
Book part
Publication date: 26 November 2016

Karin Klenke

Abstract

Details

Qualitative Research in the Study of Leadership
Type: Book
ISBN: 978-1-78560-651-9

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 29 November 2019

Abstract

Details

Lesson Study in Initial Teacher Education: Principles and Practices
Type: Book
ISBN: 978-1-78756-797-9

Content available
Book part
Publication date: 21 July 2022

Ian Ruthven

Abstract

Details

Dealing With Change Through Information Sculpting
Type: Book
ISBN: 978-1-80382-047-7

Content available
Book part
Publication date: 30 June 2023

Lisa M. Given, Donald O. Case and Rebekah Willson

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Content available
Book part
Publication date: 11 November 2019

Abstract

Details

Methodological Issues in Management Research: Advances, Challenges, and the Way Ahead
Type: Book
ISBN: 978-1-78973-973-2

Content available
Book part
Publication date: 23 August 2022

Abstract

Details

Global Meaning Making
Type: Book
ISBN: 978-1-80117-933-1

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Content available
Book part
Publication date: 30 May 2024

John Dumay

Abstract

Details

Academic Research, Publishing and Writing: Critical Thinking and Strategies for Business Scholars
Type: Book
ISBN: 978-1-80071-288-1

Access

Only content I have access to

Year

All dates (151)

Content type

Book part (151)
1 – 10 of 151