Search results
1 – 10 of 93Stalking is considered a public health priority with a range of adverse outcomes. This paper aims to explore existing literature on children and adolescents as perpetrators of…
Abstract
Purpose
Stalking is considered a public health priority with a range of adverse outcomes. This paper aims to explore existing literature on children and adolescents as perpetrators of stalking, with a focus on rates of stalking and victim and perpetrator characteristics associated with stalking.
Design/methodology/approach
A review of research where stalking was engaged in by those 18 years old and younger was conducted, where 17 manuscripts met criteria for review.
Findings
This review found a prevalence of young people engaging in stalking of between 5.3% and 36%. Considerations including demographics, typologies, prior relationship characteristics, stalking and pursuit tactics, cyberstalking and a brief consideration of the impact are given.
Practical implications
Literature considering perpetration remains thin, and future research should seek to move towards a widely acceptable definition of stalking, as well as considering effective interventions for early intervention, and to consider the role of mental health services in supporting perpetrators and victims, who may not always be mutually exclusive groups.
Originality/value
This paper extends previous literature reviews; the authors understand this to be original work that contributes to a gap in the literature.
Details
Keywords
Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer
This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult…
Abstract
Purpose
This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.
Design/methodology/approach
Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.
Findings
Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.
Originality/value
This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).
Details
Keywords
Raiswa Saha, Sakshi Ahlawat, Umair Akram, Uttara Jangbahadur, Amol S. Dhaigude, Pooja Sharma and Sarika Kumar
The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators…
Abstract
Purpose
The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators, outcomes and moderators of OA and future research opportunities. Two research questions are addressed. How have the past studies on OA progressed regarding theories, context, characteristics and methodology? What future research opportunities can be done in this area?
Design/methodology/approach
This study systematically reviews, synthesizes and integrates OA literature using the well-recommended preferred reporting items for systematic reviews and meta-analyses (PRISMA) rules. The literature on OA was synthesized based on the Theory–Context–Characteristics–Methodologies (TCCM) framework given by Paul and Rosado-Serrano.
Findings
Through an examination of TCCM used in OA research, the review presents an all-inclusive and up-to-date overview of the research in this arena and sets a future research agenda to spur scholarly research. This systematic literature review has analyzed top-quality sample papers, published in the past decade. As a result, it contributes to a better understanding of this relationship by analyzing the different types of use and the value added to the shopping experience.
Originality/value
This study provides groundwork for researchers and promotes a deeper understanding of OA.
Details
Keywords
The purpose of this study is to examine households’ behavior towards dirty cooking energy utilisation in an environment where relatively higher accessibility to clean energy is…
Abstract
Purpose
The purpose of this study is to examine households’ behavior towards dirty cooking energy utilisation in an environment where relatively higher accessibility to clean energy is noted. Although the low utilisation rate of clean energy can partly be attributed to utility gains anticipated in dirty energy mixes (DEMs) arising out of accessibility constraints, affordances and enablers, it is still unclear on the extend at which each of these contributes towards DEMs manifestation among the seemingly well-to-do households with higher levels of clean energy mixes (CEM) access. This study, therefore, hinges on scrutinising on this lower utilisation patterns despite a seemingly higher accessibility of CEMs, specifically liquified petroleum gases (LPG).
Design/methodology/approach
The study is based on a household’s survey that was carried out in 2018, reaching a sample of 393 households using questionnaires in four wards of the Kigamboni district in Tanzania. Subsequent analyses were descriptive as well as inferential based on binary logistic regression analysis where utilisation of DEMs was predicted for both the high and low social economic status (SES) households by incorporating accessibility constraints, affordances and enablers.
Findings
The results show, first, if one assumes energy stacking is not an issue, as households become more constrained towards CEMs utilisation, they shift towards DEMs suggesting that the overall effect is a substitution, and second, the complementarity effect ultimately outweighs the substitution effect as households do not shift from DEMs to CEMs rather stack multiple energy. DEMs flourish in this case study area because those with high income are among those in the lowest SES, and some of those with the highest SES are from among the lowest income category, and all of them end up with more DEMs because shifting towards CEMs require income to complement SES.
Practical implications
Policy-wise, removing hurdles in accessing CEMs such as LPG subsidy programme, gas stove provision to the poor, and enhanced LPG awareness will most likely benefits only those who do not stack energy in cooking while strategies targeting those at the lowest SES such as higher education attainment, empower women as a family decision maker, encourage co-occupancy to enlarge the household size and contain urban growth within certain perimeter will have a significant impact only if they raise both incomes and SES.
Originality/value
Despite of the dominance of DEMs for cooking such as charcoal and firewood in Tanzania, CEMs such as LPG, have emerged as complements or alternatives in the household energy basket. The utilisation of such CEMs is, however, still very low despite the accessibility, cost, environmental and health advantages they offer. Accessibility is not the only factor fuelling CEMs; a complementarity must exist between SES and income for the positive transition towards CEMs to be realised.
Details
Keywords
Meenakshi Handa, Ronika Bhalla and Parul Ahuja
Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…
Abstract
Purpose
Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.
Design/methodology/approach
Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.
Findings
The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.
Research limitations/implications
This study is limited to a population of young adults in the age group of 18–25 years.
Practical implications
The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.
Originality/value
This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.
Details
Keywords
Fred Awaah, Andrew Tetteh and Dorcas Adomaa Addo
This study aims to examine the effects of cyberbullying on the academic lives of Ghanaian university students. It also establishes whether cyberbullying victims, perpetrators…
Abstract
Purpose
This study aims to examine the effects of cyberbullying on the academic lives of Ghanaian university students. It also establishes whether cyberbullying victims, perpetrators, victim-perpetrators and bystanders differed in their thoughts on the effects of cyberbullying on students’ academic lives.
Design/methodology/approach
This study is anchored on Bandura’s theory of triadic reciprocal determinism and Abraham Maslow’s theory of needs. This study uses a cross-sectional survey design and quantitative approach to collect the data from 1,374 students from three public universities. The authors use descriptive statistics and ANOVA techniques to analyse the data.
Findings
The results show that the effects of cyberbullying on academic life are difficulty concentrating on studies, difficulty studying in groups and difficulty assessing important academic information online. There is also a statistically significant difference among cyberbullying victims, perpetrators, victim-perpetrators and bystanders in their thoughts on the effects of cyberbullying on students’ academic lives.
Originality/value
This research contributes to the literature on cyberbullying in the Ghanaian tertiary education environment. Even though the impact of cyberbullying on academics in Ghanaian universities may seem minimal, it is still imperative that it be checked, as it is significant enough to disrupt effective academic work. Thus, this study adds to the existing literature on cyberbullying from a developing country perspective.
Details
Keywords
Monika Lewandowicz-Machnikowska, Tomasz Grzyb, Dariusz Dolinski and Wojciech Kulesza
The purpose of the paper is to investigate how judges and the general population formulate judgments on legal cases, considering both legal and extralegal factors, with a focus on…
Abstract
Purpose
The purpose of the paper is to investigate how judges and the general population formulate judgments on legal cases, considering both legal and extralegal factors, with a focus on the significance of the defendant’s sex.
Design/methodology/approach
The first experiment aimed to determine if non-lawyers’ judgments are affected by the defendant’s sex, using brief excerpts from indictments with the defendant’s sex interchanged. Study 2 aimed to verify if this effect applies to future lawyers, suggesting a peculiar approval granted by men to women displaying illegal sexual behaviour towards young men.
Findings
The findings showed that the sex of the offender only influenced judgments in sexual offences, with male participants being more lenient towards female offenders.
Originality/value
The originality/value of the paper lies in its examination of the influence of the defendant’s sex on judgments made by both judges and the general population, specifically focussing on non-lawyers’ judgments. While previous studies have shown that judges tend to be more lenient towards women in certain cases, this paper adds novelty by investigating whether a similar effect is observed among non-lawyers. Moreover, the research sheds light on the relevance of the defendant's sex in cases of sexual offences and identifies a gender-specific leniency towards female offenders, particularly among male participants. The study also explores how this effect might extend to future lawyers, providing insights into societal attitudes regarding illegal sexual behaviour involving women and young men. Overall, the paper contributes valuable information to the understanding of how sex-based biases can influence legal judgments and decision-making processes.
Details
Keywords
Tareq Na’el Al-Tawil and Salam Abdallah
The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.
Abstract
Purpose
The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.
Design/methodology/approach
The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.
Findings
Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.
Originality/value
The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.
Details
Keywords
UNITED STATES: Military space policy is developing
Details
DOI: 10.1108/OXAN-ES286197
ISSN: 2633-304X
Keywords
Geographic
Topical
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details