Search results

1 – 10 of over 4000
Book part
Publication date: 4 December 2023

Dewey Cornell

Behavioral threat assessment and intervention is a violence prevention strategy that has become widely used in US schools. Instead of relying on a zero tolerance disciplinary…

Abstract

Behavioral threat assessment and intervention is a violence prevention strategy that has become widely used in US schools. Instead of relying on a zero tolerance disciplinary approach that often leads to school exclusion of students with disabilities, schools can use a multidisciplinary threat assessment team to assess the seriousness and context of a student's behavior and identify appropriate interventions and supports. This process is especially valuable for students with disabilities who are identified as threatening violence. This chapter describes an evidence-based model of threat assessment, the Comprehensive School Threat Assessment Guidelines (CSTAG), 1 reviews some common misunderstandings of threat assessment, and presents a case example illustrating the value of threat assessment in preventing school exclusion, and provides services for a student with a disability.

Article
Publication date: 23 November 2023

Konstantinos Kalodanis, Panagiotis Rizomiliotis and Dimosthenis Anagnostopoulos

The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate…

Abstract

Purpose

The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate the applicability of the requirements that the AI Act mandates to high-risk AI systems from the perspective of AI security.

Design/methodology/approach

This paper presents the main points of the proposed AI Act, with emphasis on the compliance requirements of high-risk systems. It matches known AI security threats with the relevant technical requirements, it demonstrates the impact that these security threats can have to the AI Act technical requirements and evaluates the applicability of these requirements based on the effectiveness of the existing security protection measures. Finally, the paper highlights the necessity for an integrated framework for AI system evaluation.

Findings

The findings of the EU AI Act technical assessment highlight the gap between the proposed requirements and the available AI security countermeasures as well as the necessity for an AI security evaluation framework.

Originality/value

AI Act, high-risk AI systems, security threats, security countermeasures.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2024

Jayne M. Leh

Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.

Abstract

Purpose

Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.

Design/methodology/approach

A design project to comprehensively address school violence was launched at a university in eastern Pennsylvania.

Findings

This article updates the recent and most critical finding of the project by illuminating specific implications of the importance of teacher training and the development toward competence in recognition of children who are emotionally and psychologically injured through proactive measures such as screening for emotional and psychological well-being.

Research limitations/implications

Although the model has not been tested, screening to identify those in need of emotional support and training to support teachers is clear. Screening and training offer important opportunities to help learners build skills toward resilience to soften the effects of trauma.

Practical implications

A view of the “whole child” with regard to academic success could further foster social and emotional development.

Social implications

Early intervention can prevent the onset of symptoms associated with posttraumatic stress and related disorders. This effort alone may significantly reduce the uncomfortable incidences and perhaps ultimate prevention of the violence that is perpetuated among children.

Originality/value

Preliminary research supports a continued conversation regarding effective tools to find children emotionally and psychologically at-risk, which allows teachers an opportunity for timely emotional and psychological interventions.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 19 June 2023

Rebecca J. Evan, Stephanie Sisco, Crystal Saric Fashant, Neela Nandyal and Stacey Robbins

This research applies social identity theory (SIT) to examine how White diversity, equity, and inclusion (DEI) professionals perceive their role and contributions to advancing…

1058

Abstract

Purpose

This research applies social identity theory (SIT) to examine how White diversity, equity, and inclusion (DEI) professionals perceive their role and contributions to advancing workplace DEI.

Design/methodology/approach

Interpretative phenomenological analysis (IPA) was used to structure and guide the study, and data were collected from interviews with 16 White DEI professionals.

Findings

The SIT concept of social categorization was selected as a framework to discuss the findings, which were divided into two sections: in-group identity and out-group identity. The participants' in-group identities demonstrated how the participants leveraged the participants' Whiteness to grant the participants the influence and agency to perform DEI work. The participant's out-group identities revealed how the participants attempted to decenter the participants' Whiteness and unpack insecurities related to the participants' White identity and DEI contributions. Each of these findings has been associated with a specific role: leader, beneficiary, ally and pathfinder.

Practical implications

The practical implications of this study are critically examining White DEI employees' lived experience to develop an understanding of Whiteness while holding White people accountable for DEI efforts within workplaces.

Originality/value

Deeper and more honest conversations are needed to explore the phenomenon of how White DEI professionals enact and perceive the DEI contributions of the White DEI professionals. Therefore, this paper will provide further discussion on literature concerning White individuals engaged in organizational-level DEI work.

Details

Equality, Diversity and Inclusion: An International Journal, vol. 42 no. 8
Type: Research Article
ISSN: 2040-7149

Keywords

Article
Publication date: 25 December 2023

Changlong Ma, Yuhui Ge and Heng Zhao

Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they…

Abstract

Purpose

Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they have adopted seemingly conflicting theoretical perspectives to explain how it works. Drawing on ideas from the threat rigidity theory, the authors integrated these perspectives by proposing a contingency model in which the relationships between TMT diversity and adaptive firm performance depend on the matching between the internal context (i.e. overlapping team tenure) and external context (i.e. severity of threat).

Design/methodology/approach

This study sampled 579 Chinese A-share listed companies that have been severely affected by the COVID-19 pandemic, and multilevel linear regression analysis was used to test the hypothesis.

Findings

Results provided support for this hypothesis. Specifically, the interaction between TMT age/tenure diversity and overlapping team tenure is significant only when the severity of threat is high, while the interaction between TMT functional diversity and overlapping team tenure is significant only when the severity of threat is low.

Originality/value

The results of this study provide a comprehensive perspective to predict the performance impact of team diversity and contribute to diversity research and practice.

Details

Journal of Organizational Change Management, vol. 37 no. 1
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 5 April 2024

Manoj Krishnan and Satish Krishnan

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Abstract

Purpose

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Design/methodology/approach

The study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.

Findings

Through meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.

Research limitations/implications

This study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.

Practical implications

Many ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.

Originality/value

There have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 2 April 2024

Mahmoud Mawed

The UAE is among the fastest-growing facilities management (FM) markets globally. Nevertheless, conclusive evidence on this market is scarce in the literature. Therefore, this…

Abstract

Purpose

The UAE is among the fastest-growing facilities management (FM) markets globally. Nevertheless, conclusive evidence on this market is scarce in the literature. Therefore, this paper aims to provide an in-depth insight into the FM market in the UAE.

Design/methodology/approach

Fourteen interviewees were purposively selected to provide insight into FM status through their field experiences. A SWOT analysis of their answers held place.

Findings

Interviewees revealed that the main trends of FM in the UAE include interests in sustainability, integration of technology, health and safety, outsourcing FM, switching to total facilities management (TFM), and performance management systems use. Besides, the quality of the service in the FM market is driven by the real-estate boom, services sophistication, the increasing awareness of FM and focus on the quality of services. Furthermore, the interviews found that the recruitment of poorly skilled labors can threaten the FM market to meet the allocated budget, misperception of FM, the value of money, the lack of continuous follow-up with recent advancements in technologies and the lack of performance measurement models.

Originality/value

This paper highlights the major trends, drivers and threats of the FM market in the UAE, and the implications of its findings can direct FM organizations and researchers in their practices.

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 January 2024

Rona Elizabeth Kurian

The developmental relation of informal mentoring within the organization could aid in tiding over the challenges that arise with change. The purpose is to explore the…

Abstract

Purpose

The developmental relation of informal mentoring within the organization could aid in tiding over the challenges that arise with change. The purpose is to explore the relationship between informal mentoring within the organization and change supportive behaviour to put forth a framework describing the catalytic and a priori role of informal mentoring within the organization in augmenting change readiness and facilitating change supportive behaviour for a successful organizational change.

Design/methodology/approach

Drawing on the appraisal theory of stress coping, the paper put forward a conceptual framework describing the mechanisms through which informal mentoring within the organization leads to change supportive behaviour among the individuals.

Findings

The conceptual model explains how informal mentoring within the organization develops optimism, resilience, self-efficacy and trust and facilitates change readiness among the individuals, which leads to change supportive behaviours in them. The paper also describes the influence of poor change management history and organizational identity threat on the relations.

Research limitations/implications

The paper explains the underexplored relationship between mentoring and change readiness. It also sheds light on the importance of exploring the micro-foundations of a macro-level phenomenon. Further research should focus on the differential effect of different forms of mentoring on change readiness.

Originality/value

The paper is developed based on the review of extant literature and applying the theoretical lens of appraisal theory of stress coping to the phenomenon. The paper explains the micro-foundation of the phenomenon and describes how informal mentoring would lead to a change supportive behaviour among the individuals.

Details

Journal of Organizational Change Management, vol. 37 no. 1
Type: Research Article
ISSN: 0953-4814

Keywords

1 – 10 of over 4000