Search results
1 – 10 of 14
Abdullah Oguz, Nikhil Mehta and Prashant Palvia
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…
Abstract
Purpose
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.
Design/methodology/approach
The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.
Findings
A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.
Originality/value
As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.
Details
Keywords
Rebecca Phythian, Stuart Kirby and Lauren Swan-Keig
The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can…
Abstract
Purpose
The importance of multi-agency information sharing is recognised as central to tackling crime and disorder in an intelligence-driven environment. However, whilst technology can facilitate and enhance this process, barriers to effective agency information exchange are consistently reported. This paper aims to categorise how information sharing takes place in a law enforcement operational setting and whether there is scope to improve the process.
Design/methodology/approach
There were two stages to the method; firstly, a select group of practitioners with intelligence-related experience (n = 28) were interviewed to identify the most common approaches to operational information sharing. This generated a categorisation model, which was tested with a larger group of practitioners (n = 73). A mixed-methods approach was adopted.
Findings
The research found consensus surrounding four different approaches to information sharing, labelled as: (1) inform and request, (2) meet and share, (3) customised database and (4) integrated systems. These are used at various levels of frequency, dependent on the operational context.
Originality/value
This research provides original evidence-based research to show law enforcement practitioners vary in the way they share information. By demystifying and categorising the process, it provides understanding for practitioners, policymakers and researchers, allowing barriers to be more readily tackled in a much more cost-effective manner.
Details
Keywords
Mohammed Al Shamsi, Deborah Smith and Kimberly Gleason
The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes…
Abstract
Purpose
The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes, using the framework of the Space Transition Theory.
Design/methodology/approach
A literature review relating the Space Transition Theory to crime vulnerabilities related to NFTs is conducted and practical examples illustrating NFT schemes are provided.
Findings
The authors find that the Space Transition Theory explains the evolution of financial crimes into the NFT space. The transformation of the art industry from the physical to the virtual space through NFTs underlies the criminal activity surrounding them. NFTs enable crime because of the flexibility, dissociative anonymity, lack of deterrence and anonymity.
Research limitations/implications
Criminals can easily take advantage of the users’ limited knowledge of blockchain to defraud them of their money or tokens. These risks accentuate the need to adopt appropriate measures to augment the accountability of NFT transactions. Until such interventions are implemented, the NFT market remains a highly viable space for the perpetration of financial crimes.
Practical implications
The dynamic nature of the cyberspace and fast-past underlying technology provide a greater chance to escape than crimes committed in the physical space. The state of security on NFT platforms has elicited concerns from diverse quotas. NFTs pose significant money laundering risks because of the lack of appropriate regulatory mechanisms, generating a need for enhanced oversight and enforcement of sectors of the economy in physical space vulnerable to abuse in the NFT space, including entities such as art galleries, museums, sports teams and luxury brands.
Social implications
The Space Transition Theory is also supported in that norms and values regarding ethics and criminal actions in the physical space do not transfer to cyber space.
Originality/value
The novelty aspect of this research is in applying the Space Transition Theory to financial crime schemes based on NFTs.
Details
Keywords
Özge Topsakal and Hatice Irmak
The use of information and communication technologies has become widespread in the field of health as well as in all fields. While the intensive use of these technologies…
Abstract
The use of information and communication technologies has become widespread in the field of health as well as in all fields. While the intensive use of these technologies increases the productivity of the employees, on the other hand, it may cause negative effects on the employee such as stress, anxiety, anger, burnout, and addiction. In scientific studies, the use of technology is commonly related with saving time, labor, financial resources, effective, efficient, and quality service; however, there are limited studies focusing on the technostress factors in the health field brought by technological transfer and digital transition. These technostress factors are techno-overload, techno-invasion, techno-confusion, techno-insecurity, and techno-uncertainty. In this study, it is emphasized that technostress causes important mental problems such as productivity and burnout, especially for female health employees. This chapter aims to discuss the role of technostress and its factor, theoretically, in the healthcare field in perspective of digital transition.
Details
Keywords
Muneeb Afzal, Johnny Kwok Wai Wong and Alireza Ahmadian Fard Fini
Request for information (RFI) documents play a pivotal role in seeking clarifications in construction projects. However, perceived as inevitable “non-value adding” tasks, they…
Abstract
Purpose
Request for information (RFI) documents play a pivotal role in seeking clarifications in construction projects. However, perceived as inevitable “non-value adding” tasks, they harbour risks like schedule delays and increased project costs, underlining the importance of strategic RFI management in construction projects. Despite this, a lack of literature dissecting RFI processes impedes a full understanding of their intricacies and impacts. This study aims to bridge the gap through a comprehensive literature review, delving into RFI intricacies and implications, while emphasising the necessity for strategic RFI management to prevent project risks.
Design/methodology/approach
This research study systematically reviews RFI-related papers published between 2000 and 2023. Accordingly, the review discusses key themes related to RFI management, yielding best practices for industry stakeholders and highlighting research directions and gaps in the body of knowledge.
Findings
Present RFI management platforms exhibit deficiencies and lack analytics essential for streamlined RFI processing. Complications arise in building information modelling (BIM)-enabled projects due to software disparities and interoperability hurdles. The existing body of knowledge heavily relies on manual content analysis, an impractical approach for the construction industry. The proposed research direction involves automated comprehension of unstructured RFI content using advanced text mining and natural language processing techniques, with the potential to greatly elevate the efficiency of RFI processing.
Originality/value
The study extends the RFI literature by providing novel insights into the problemetisation with the RFI process, offering a holistic understanding and best practices to minimise adverse effects. Additionally, the paper synthesises RFI processes in traditional and BIM-enabled project settings, maps a causal-loop diagram to identify associated issues and summarises approaches for extracting knowledge from the unstructured content of RFIs. The outcomes of this review stand to offer invaluable insights to both industry practitioners and researchers, enabling and promoting the refinement of RFI processes within the construction domain.
Details
Keywords
Witness Roya and Sandiso Ngcobo
Several studies have been conducted on social inequalities. Despite highlighting inequalities between the rich and poor, researchers often overlook the fact that disabled people…
Abstract
Several studies have been conducted on social inequalities. Despite highlighting inequalities between the rich and poor, researchers often overlook the fact that disabled people in Africa are marginalised more than their counterparts elsewhere. Using critical discourse analysis (CDA) as a theory and data analysis method, this study sought to answer two questions: (1) What is reported about the inclusion of disabled people in using digital media? (2) How is it reported? Twenty-two articles were purposively sampled: 15 from Newsday and 7 from The Herald published between 20 November 2017 and 24 September 2022. Findings indicate that the two papers exposed marginalisation of disabled people in an educative and informative way and had erudite analysis from disabled columnists. This was successful because the papers relied on the disabled community as sources of information and contributors of published material. The papers also engaged stakeholders such as corporates, government and civil society organisations. It is recommended that other newspapers and many forms of mass communication provide a representation of people with different forms of disabilities. Future studies could seek the views of disabled communities about their presentation in the digital media through disabled writers and providers of information.
Details