Search results

1 – 10 of 93
Article
Publication date: 16 February 2024

Ethan Barr and Andrew Newman

Stalking is considered a public health priority with a range of adverse outcomes. This paper aims to explore existing literature on children and adolescents as perpetrators of…

Abstract

Purpose

Stalking is considered a public health priority with a range of adverse outcomes. This paper aims to explore existing literature on children and adolescents as perpetrators of stalking, with a focus on rates of stalking and victim and perpetrator characteristics associated with stalking.

Design/methodology/approach

A review of research where stalking was engaged in by those 18 years old and younger was conducted, where 17 manuscripts met criteria for review.

Findings

This review found a prevalence of young people engaging in stalking of between 5.3% and 36%. Considerations including demographics, typologies, prior relationship characteristics, stalking and pursuit tactics, cyberstalking and a brief consideration of the impact are given.

Practical implications

Literature considering perpetration remains thin, and future research should seek to move towards a widely acceptable definition of stalking, as well as considering effective interventions for early intervention, and to consider the role of mental health services in supporting perpetrators and victims, who may not always be mutually exclusive groups.

Originality/value

This paper extends previous literature reviews; the authors understand this to be original work that contributes to a gap in the literature.

Details

The Journal of Forensic Practice, vol. 26 no. 1
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 7 July 2023

Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult…

Abstract

Purpose

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.

Design/methodology/approach

Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.

Findings

Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.

Originality/value

This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).

Details

Journal of Criminal Psychology, vol. 13 no. 4
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 17 January 2024

Raiswa Saha, Sakshi Ahlawat, Umair Akram, Uttara Jangbahadur, Amol S. Dhaigude, Pooja Sharma and Sarika Kumar

The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators…

Abstract

Purpose

The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators, outcomes and moderators of OA and future research opportunities. Two research questions are addressed. How have the past studies on OA progressed regarding theories, context, characteristics and methodology? What future research opportunities can be done in this area?

Design/methodology/approach

This study systematically reviews, synthesizes and integrates OA literature using the well-recommended preferred reporting items for systematic reviews and meta-analyses (PRISMA) rules. The literature on OA was synthesized based on the Theory–Context–Characteristics–Methodologies (TCCM) framework given by Paul and Rosado-Serrano.

Findings

Through an examination of TCCM used in OA research, the review presents an all-inclusive and up-to-date overview of the research in this arena and sets a future research agenda to spur scholarly research. This systematic literature review has analyzed top-quality sample papers, published in the past decade. As a result, it contributes to a better understanding of this relationship by analyzing the different types of use and the value added to the shopping experience.

Originality/value

This study provides groundwork for researchers and promotes a deeper understanding of OA.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 8 January 2024

Samwel Sanga Alananga

The purpose of this study is to examine households’ behavior towards dirty cooking energy utilisation in an environment where relatively higher accessibility to clean energy is…

Abstract

Purpose

The purpose of this study is to examine households’ behavior towards dirty cooking energy utilisation in an environment where relatively higher accessibility to clean energy is noted. Although the low utilisation rate of clean energy can partly be attributed to utility gains anticipated in dirty energy mixes (DEMs) arising out of accessibility constraints, affordances and enablers, it is still unclear on the extend at which each of these contributes towards DEMs manifestation among the seemingly well-to-do households with higher levels of clean energy mixes (CEM) access. This study, therefore, hinges on scrutinising on this lower utilisation patterns despite a seemingly higher accessibility of CEMs, specifically liquified petroleum gases (LPG).

Design/methodology/approach

The study is based on a household’s survey that was carried out in 2018, reaching a sample of 393 households using questionnaires in four wards of the Kigamboni district in Tanzania. Subsequent analyses were descriptive as well as inferential based on binary logistic regression analysis where utilisation of DEMs was predicted for both the high and low social economic status (SES) households by incorporating accessibility constraints, affordances and enablers.

Findings

The results show, first, if one assumes energy stacking is not an issue, as households become more constrained towards CEMs utilisation, they shift towards DEMs suggesting that the overall effect is a substitution, and second, the complementarity effect ultimately outweighs the substitution effect as households do not shift from DEMs to CEMs rather stack multiple energy. DEMs flourish in this case study area because those with high income are among those in the lowest SES, and some of those with the highest SES are from among the lowest income category, and all of them end up with more DEMs because shifting towards CEMs require income to complement SES.

Practical implications

Policy-wise, removing hurdles in accessing CEMs such as LPG subsidy programme, gas stove provision to the poor, and enhanced LPG awareness will most likely benefits only those who do not stack energy in cooking while strategies targeting those at the lowest SES such as higher education attainment, empower women as a family decision maker, encourage co-occupancy to enlarge the household size and contain urban growth within certain perimeter will have a significant impact only if they raise both incomes and SES.

Originality/value

Despite of the dominance of DEMs for cooking such as charcoal and firewood in Tanzania, CEMs such as LPG, have emerged as complements or alternatives in the household energy basket. The utilisation of such CEMs is, however, still very low despite the accessibility, cost, environmental and health advantages they offer. Accessibility is not the only factor fuelling CEMs; a complementarity must exist between SES and income for the positive transition towards CEMs to be realised.

Details

International Journal of Energy Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6220

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 8 January 2024

Fred Awaah, Andrew Tetteh and Dorcas Adomaa Addo

This study aims to examine the effects of cyberbullying on the academic lives of Ghanaian university students. It also establishes whether cyberbullying victims, perpetrators…

Abstract

Purpose

This study aims to examine the effects of cyberbullying on the academic lives of Ghanaian university students. It also establishes whether cyberbullying victims, perpetrators, victim-perpetrators and bystanders differed in their thoughts on the effects of cyberbullying on students’ academic lives.

Design/methodology/approach

This study is anchored on Bandura’s theory of triadic reciprocal determinism and Abraham Maslow’s theory of needs. This study uses a cross-sectional survey design and quantitative approach to collect the data from 1,374 students from three public universities. The authors use descriptive statistics and ANOVA techniques to analyse the data.

Findings

The results show that the effects of cyberbullying on academic life are difficulty concentrating on studies, difficulty studying in groups and difficulty assessing important academic information online. There is also a statistically significant difference among cyberbullying victims, perpetrators, victim-perpetrators and bystanders in their thoughts on the effects of cyberbullying on students’ academic lives.

Originality/value

This research contributes to the literature on cyberbullying in the Ghanaian tertiary education environment. Even though the impact of cyberbullying on academics in Ghanaian universities may seem minimal, it is still imperative that it be checked, as it is significant enough to disrupt effective academic work. Thus, this study adds to the existing literature on cyberbullying from a developing country perspective.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 19 October 2023

Monika Lewandowicz-Machnikowska, Tomasz Grzyb, Dariusz Dolinski and Wojciech Kulesza

The purpose of the paper is to investigate how judges and the general population formulate judgments on legal cases, considering both legal and extralegal factors, with a focus on…

Abstract

Purpose

The purpose of the paper is to investigate how judges and the general population formulate judgments on legal cases, considering both legal and extralegal factors, with a focus on the significance of the defendant’s sex.

Design/methodology/approach

The first experiment aimed to determine if non-lawyers’ judgments are affected by the defendant’s sex, using brief excerpts from indictments with the defendant’s sex interchanged. Study 2 aimed to verify if this effect applies to future lawyers, suggesting a peculiar approval granted by men to women displaying illegal sexual behaviour towards young men.

Findings

The findings showed that the sex of the offender only influenced judgments in sexual offences, with male participants being more lenient towards female offenders.

Originality/value

The originality/value of the paper lies in its examination of the influence of the defendant’s sex on judgments made by both judges and the general population, specifically focussing on non-lawyers’ judgments. While previous studies have shown that judges tend to be more lenient towards women in certain cases, this paper adds novelty by investigating whether a similar effect is observed among non-lawyers. Moreover, the research sheds light on the relevance of the defendant's sex in cases of sexual offences and identifies a gender-specific leniency towards female offenders, particularly among male participants. The study also explores how this effect might extend to future lawyers, providing insights into societal attitudes regarding illegal sexual behaviour involving women and young men. Overall, the paper contributes valuable information to the understanding of how sex-based biases can influence legal judgments and decision-making processes.

Details

Journal of Criminal Psychology, vol. 14 no. 2
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 13 November 2023

Tareq Na’el Al-Tawil and Salam Abdallah

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Abstract

Purpose

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Design/methodology/approach

The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.

Findings

Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.

Originality/value

The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Executive summary
Publication date: 3 April 2024

UNITED STATES: Military space policy is developing

Details

DOI: 10.1108/OXAN-ES286197

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

74

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 93