Search results
1 – 10 of over 3000Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Roisin Donnelly and Anthony Ryan
This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if…
Abstract
Purpose
This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if background images evoking gendered stereotypes of leadership can cue stereotype threat in female technology workers undertaking a leadership activity, thus negatively effecting performance. This study aims to contribute to the body of research on stereotype threat by establishing whether virtual backgrounds used in video conferencing software are inherently identity safe or whether their use could have a negative performance impact on marginalised groups.
Design/methodology/approach
Using a mixed methods research design with 22 participants in two countries working in the one large organisation, using two quantitative methods (an experiment and a survey) and one qualitative method (semi-structured interviews), the study examined the relationship between performance on the leadership activity and exposure to gendered backgrounds on a video conference call.
Findings
It found that female leaders undertaking a leadership test experienced more anxiety and achieved lower scores on average when exposed to a male-gendered virtual background compared to male colleagues or female leaders exposed to a female gendered background. It was also found that these leaders were aware of the stereotype of leadership being White and male, and showed symptoms of prolonged exposure to stereotype threat in the workplace. While the authors still are working through a post-pandemic environment, it may be judicious for organisations to restrict the use of virtual backgrounds to identity-safe ones, specifically chosen by the company.
Research limitations/implications
The study makes several practical recommendations, indicating actions which can be taken at the individual, team and corporate levels. Re-running this experiment in a more controlled environment with a larger sample set could yield more definitive, statistically significant results and contribute more to the literature.
Practical implications
Some individual impacts were found via the interviews. Male leaders in the organisation need to do more to mentor and endorse their female colleagues. By doing this, they can counter the negative effects of solo status and the subsequent performance degradations of their female counterparts, while also setting an example for other leaders. Participation in the mentoring programme and initiatives such as Dare and value, inclusion, belonging, and equity should be encouraged and supported. Reverse mentoring should also be encouraged among the population of male leaders to aid in allyship and bias-awareness.
Social implications
Teams should note that a democratic vote is not always the best way to decide on the names of teams, projects or meeting rooms. These may skew towards niche interests that can serve to alienate members of the team who do not associate themselves with that interest. Rather, the teams should strive to be fully inclusive and educated on the need for identity-safety. Team events may also serve to alienate members if teams are not mindful of the need to be inclusive. Activities, such as “go-kart” racing and physical or competitive team events have been highlighted as unsuitable for some team members, and should be avoided in favour of inclusivity.
Originality/value
A significant body of research has documented the effect to which stereotype threat can be triggered by both the physical environment and by the use of various technology media. However, there is a dearth of research exploring the relationship between stereotype threat, defined as “the concrete, real-time threat of being judged and treated poorly in settings where a negative stereotype about one’s group applies” (Steele et al., 2002, p. 385), and video conferencing software features, such as virtual backgrounds.
Details
Keywords
Natile Nonhlanhla Cele and Sheila Kwenda
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…
Abstract
Purpose
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.
Design/methodology/approach
Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.
Findings
A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.
Originality/value
With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.
Details
Keywords
The purpose of this study was to assess the effects of the Ponzi schemes and revocation of licences of some financial institutions in Ghana on financial threat.
Abstract
Purpose
The purpose of this study was to assess the effects of the Ponzi schemes and revocation of licences of some financial institutions in Ghana on financial threat.
Design/methodology/approach
The study adopted a quantitative research approach. Convenient sampling method was used to select 435 individuals from three regions in Ghana. Standardize questionnaire developed by the researcher was used as the main data collection instrument. The binary logistic regression was used to test the relationship between the dependent variable and the independent variables.
Findings
The results of the study showed a positive relationship between financial threat and job loss, general health, information search and loss of investment. However, negative relationship was identified between financial threat and total debt, stress, economic hardship and anxiety. Findings from this study imply that job loss, general health, information search and loss of investment are major factors that determined financial threat in Ghana.
Practical implications
This indicates that individuals in Ghana have become uncertain regarding the use of current and future financial services in Ghana because most individuals have lost their jobs in the financial institutions, cannot get access to safe drinking water and education, need to gather more information before investing in financial institutions in Ghana and losing of funds invested.
Originality/value
This study is the first to test the effects of the Ponzi schemes and the revocation of licences of some financial institutions in Ghana on financial threat using binary logistic regression.
Details
Keywords
Hjördís Sigursteinsdóttir, Guðbjörg Linda Rafnsdóttir and Thorgerður Einarsdóttir
The recent global economic crisis affected workplaces in many countries, raising questions about the employees' situation. While most work-related studies in times of crises focus…
Abstract
Purpose
The recent global economic crisis affected workplaces in many countries, raising questions about the employees' situation. While most work-related studies in times of crises focus on job loss and unemployment, this study analyzes workplace violence in the wake of the 2008 economic crisis among municipal employees within care and education.
Design/methodology/approach
Mixed method approach was used for data collection; longitudinal online surveys and focus group interviews were used.
Findings
The prevalence of workplace violence increased between the three time points of the study, in particular in downsized workplaces. A higher proportion of employees working in care were exposed to threats and physical violence than employees in education as clients of employees in care services were more likely to lash out against employees due to cutbacks in services. Focus groups interviews indicated that the causes of increased workplace violence may be due to a spreading effect both from within and outside the workplace.
Practical implications
As workplace violence can have serious consequences for the health and well-being of employees, it is important for those who have responsibility for the work environment and occupational health in the workplace to design policies that take these findings into account.
Originality/value
Based on the mixed methods, longitudinal survey and focus group interviews, this study contributes to knowledge on workplace violence in times of economic crises. It shows that the prevalence of workplace violence increased not only directly after the economic collapse but also continued up to five years later.
Details
Keywords
This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of…
Abstract
Purpose
This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of health-related ascribes on continuance intention to use mHealth apps and how these influences are contingent on gender in the mHealth app using context.
Design/methodology/approach
This study takes the protection motivation theory as a theoretical framework to examine the ordered relationship between threat and coping appraisals and their impacts on continuance intention to use mHealth apps. In addition, this study further extends the literature on gender differences into the mHealth app's context to investigate the moderating role of gender. The suggested hypotheses are confirmed by a structural equation modeling approach and multigroup investigation employing survey data of 345 users of Spring Rain Doctor in China, a typical mHealth app.
Findings
The findings suggest that the impact of perceived disease threat on user's continuance intention is mediated entirely by coping appraisals. Furthermore, the three coping appraisals' impacts are contingent upon gender. Specifically, response efficacy is more crucial for male users in forecasting continuance intention, whereas self-efficacy and response cost have a more salient influence on continuance intention for female users.
Originality/value
This study examines the ordered influences of threat and coping appraisal, moderated by gender, on continuance intention on use mHealth apps. These findings could contribute to relevant theoretical and practical implications.
Details
Keywords
The purpose of this study is to extend theoretical understanding on social enterprises’ growth orientation. Inspiration is drawn from the fundamentals of prospect theory and threat…
Abstract
Purpose
The purpose of this study is to extend theoretical understanding on social enterprises’ growth orientation. Inspiration is drawn from the fundamentals of prospect theory and threat-rigidity theory, as the role of external threats as a source of growth orientation is largely absent from the social enterprise growth literature. According to previous studies, social enterprises grow mainly because of their social mission and social opportunities.
Design/methodology/approach
The qualitative research is conducted by analysing thematic interviews from seven, growth-oriented social enterprises operating in Finland.
Findings
The study provides novel insights on social enterprises’ growth orientation by drawing attention to the plurality of growth motivations and showing the importance of perceived threats as the origin of their growth pursuits. Goals of growth are defined mainly in terms of organisational and financial performance of the firm.
Practical implications
Social enterprise managers and boards are encouraged to cooperate in analysing the significance of external threats and opportunities for their business and to concentrate on defining measurable social goals to ensure balanced growth.
Originality/value
The study demonstrates that the behavioural theories offer a beneficial departure point for studying social venture growth. By clarifying the role of the perceptions of the firm’s internal actors and showing that growth is sometimes seen as a response to external threats, the study increases theoretical understanding on social enterprises’ growth orientation.
Details
Keywords
This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring…
Abstract
Purpose
This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring Revolutions to the national security of the Gulf Cooperation Council (GCC) countries after the breakout of demonstrations and protests in some of the member states. In addition to its analysis of threat of the Regional Security of the Gulf as a result of Yemeni Revolution and Civil War and Iranian intervention to support Houthis within light of regional anarchy and security competition according to the Neorealism and how the GCC Countries face such threats.
Design/methodology/approach
The study depended on the historical methodology to track the developments of some events related to the Gulf Security and crisis in Yemen. Moreover, it used the analytical approach to analyze the impact of Arab Revolutions and Yemeni Civil War on the Arab Gulf Security. In addition, it depended on the realistic approach to explain the security state at the national and regional level of the Arab Gulf countries within light of regional anarchy, security competition and Iranian support to Houthis “Non-State Actors” (Kenneth Waltz), as well as the offensive realism (John Mearsheimer).
Findings
The Arab Revolutions had an effect on the national security of GCC countries according to the Neorealism due to the breakout of demonstrations and protests in Saudi Arabia, Kuwait and Sultanate of Oman which reached to the degree of threatening the existence of the state as in Bahrain. The Gulf Regional Security is influenced by Revolution and Civil War in Yemen as a result of that Iranian support to Houthis within light of security competition between Iran and Saudi Arabia, leading to the threat of the Arabian Gulf Security as Yemen is the southern gate to the GCC Countries and having joint borders with Saudi Arabia and Sultanate of Oman. Moreover, the GCC countries dealt with that threat individually, such as, performing internal reforms, or collectively through using military force, such as Bahrain and Yemen (Offensive Realism).
Originality/value
This study is an introduction to explain the Arab Spring Revolutions, conflict in Yemen and its threat to the Arab Gulf Security according to the Neorealism based on that the GCC countries sought to keep its existence and sovereignty in confrontation to the demonstrations and internal protests and to keep the regional security in confrontation to the threats of neighboring countries such as the Civil War in Yemen and the Iranian Support to Houthis in light of the regional anarchy.
Details
Keywords
Edward W. Miles, Jeff Schatten and Elizabeth Chapman
Face threat sensitivity (FTS) has been found to influence objective negotiated outcomes when the threat to face is activated. The purpose of this study is to extend that research…
Abstract
Purpose
Face threat sensitivity (FTS) has been found to influence objective negotiated outcomes when the threat to face is activated. The purpose of this study is to extend that research by testing whether FTS – which is defined as a propensity to act – is associated with the outcomes of negotiators when the threat has not been specifically activated. Face theory specifies that face threats can cause individuals to take proactive steps to avoid threats before they might occur.
Design/methodology/approach
Drawing on face theory and social role theory, the authors conduct a negotiation experiment and use hierarchical regression to test hypotheses concerning the relationship between FTS for sellers and buyers on negotiated outcomes in both distributive and integrative negotiations. The authors also use moderated regression to test if gender moderates the relationship between buyer and seller FTS and negotiation outcomes.
Findings
Results show that, when the threat is not activated, high FTS buyers pay more than low FTS buyers. Consistent with face theory and social role theory, this effect is moderated by gender, with the association being stronger for women buyers than for men buyers.
Originality/value
This paper exhibits that FTS can influence negotiator behavior even when FTS is not activated. This is valuable to negotiation scholars and practitioners who are interested in the role that individual characteristics play in negotiation behavior.
Details
Keywords
Michela Matarazzo, Adamantios Diamantopoulos and Andreas Raff
Reactance theory is applied to investigate consumer responses to “buy local” campaigns initiated by government to counteract the effects of an economic crisis, using the COVID-19…
Abstract
Purpose
Reactance theory is applied to investigate consumer responses to “buy local” campaigns initiated by government to counteract the effects of an economic crisis, using the COVID-19 pandemic as an illustrative context.
Design/methodology/approach
A conceptual model is developed, aimed at revealing the extent to which “buy local” campaigns – explicitly justified by the need to fight an economic crisis – are likely to lead to (a) compliance (i.e. support for local products/retailers) or (b) freedom restoration (i.e. support for foreign products/retailers). The model is subsequently tested on samples of German (N = 265) and Italian (N = 268) consumers.
Findings
“Buy local” campaigns are likely to generate reactance amongst consumers and such reactance can lead to both non-compliance and, albeit less so, freedom restoration outcomes. At the same time, consumer ethnocentrism acts as a countervailing influence by attenuating the effects of generated reactance and its undesirable outcomes.
Research limitations/implications
Psychological reactance theory offers a novel perspective for conceptually approaching the likely responses of consumers towards “buy local” campaigns and the empirical findings support the use of the theory in this context.
Practical implications
Policymakers seeking to encourage consumers to support the local economy during times of an economic crisis need to be aware that “buy local” campaigns may, against their intended communication goals, result in non-compliance as well as consumer responses in the opposite direction. Thus, the reactance-generating potential of such campaigns needs to be explicitly considered at the planning/implementation stage.
Originality/value
The findings confirm the relevance of reactance theory as a conceptual lens for studying the effects of “buy local” campaigns and have important implications for domestic/foreign firms as well as for policy makers seeking to encourage consumers to support the local economy during times of an economic crisis.
Details