Search results
1 – 10 of 239Carolina M. Vargas, Lenis Saweda O. Liverpool-Tasie and Thomas Reardon
We study five exogenous shocks: climate, violence, price hikes, spoilage and the COVID-19 lockdown. We analyze the association between these shocks and trader characteristics…
Abstract
Purpose
We study five exogenous shocks: climate, violence, price hikes, spoilage and the COVID-19 lockdown. We analyze the association between these shocks and trader characteristics, reflecting trader vulnerability.
Design/methodology/approach
Using primary survey data on 1,100 Nigerian maize traders for 2021 (controlling for shocks in 2017), we use probit models to estimate the probabilities of experiencing climate, violence, disease and cost shocks associated with trader characteristics (gender, size and region) and to estimate the probability of vulnerability (experiencing severe impacts).
Findings
Traders are prone to experiencing more than one shock, which increases the intensity of the shocks. Price shocks are often accompanied by violence, climate and COVID-19 shocks. The poorer northern region is disproportionately affected by shocks. Northern traders experience more price shocks while Southern traders are more affected by violence shocks given their dependence on long supply chains from the north for their maize. Female traders are more likely to experience violent events than men who tend to be more exposed to climate shocks.
Research limitations/implications
The data only permit analysis of the general degree of impact of a shock rather than quantifying lost income.
Originality/value
This paper is the first to analyze the incidence of multiple shocks on grain traders and the unequal distribution of negative impacts. It is the first such in Africa based on a large sample of grain traders from a primary survey.
Details
Keywords
This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.
Abstract
Purpose
This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.
Design/methodology/approach
Using a general review approach, this paper provides a historical examination of measures proposed by the South African Government and civil society since 1994, to prevent, monitor and combat hate crime, hate speech and intentional unfair discrimination.
Findings
Regardless of a constitutional commitment to social inclusion, diversity and minority rights, significant progress remains lacking after almost three decades of related advocacy, lobbying and limited government intervention. Findings of the South African Hate Crimes Working Group (HCWG) longitudinal Monitoring Project emphasise the need for decisive legal responses to hate victimisation.
Social implications
A Bill, recognising hate crime and hate speech as distinct criminal offences, has been in development for almost 15 years and will soon serve before Parliament. Enactment of this legislation will be ground-breaking in Africa.
Originality/value
This paper contributes to the field of hate studies by providing an overview of the journey towards current conceptual understandings of hate in (South) Africa. It sets the stage for evaluating the potential of the redesigned HCWG monitoring tool, which holds promise for early identification and intervention in hate hotspots and targeted sectors. This instrument can establish trends not only in South Africa but also across the African continent.
Details
Keywords
Arathi Krishna, Devi Soumyaja and Joshy Joseph
A workplace bullying dynamic involving multiple individuals targeting victims can lead to the victim losing emotional bonds or affect-based trust with their colleagues, resulting…
Abstract
Purpose
A workplace bullying dynamic involving multiple individuals targeting victims can lead to the victim losing emotional bonds or affect-based trust with their colleagues, resulting in employee silence. The literature has largely ignored this negative aspect of social dynamics. This study aims to examine the relationship between workplace bullying and employee silence behaviors and determine whether affect-based trust mediates this relationship and whether climate for conflict management moderates the mediated relationship.
Design/methodology/approach
Hypotheses are tested using surveys and scenario-based experiments among faculty members in Indian Universities. There were 597 participants in the survey and 166 in the scenario-based experiment.
Findings
Results revealed that workplace bullying correlated positively with silence behaviors, and affect-based trust mediated the bullying-silence relationship. The hypothesized moderated mediation condition was partially supported as moderated the mediating pathway, i.e. indirect effects of workplace bullying on defensive silence and ineffectual silence via affect-based trust were weaker for employees with high climate for conflict management. However, the study failed to support the moderation of climate for conflict management in the relationship between workplace bullying and affect-based trust and workplace bullying and relational silence. The results of this moderated effect of climate for conflict management were similar in both studies.
Originality/value
This study is one of the few attempts to examine employee silence in response to workplace bullying in academia. Additionally, the study revealed a critical area of trust depletion associated with bullying and the importance of employee perceptions of fairness toward their institutions’ dispute resolution processes.
Details
Keywords
Sharon Wilson, Nor Azlili Hassan, Kheng Kia Khor, Santhidran Sinnappan, Afi Roshezry Abu Bakar and Soon Aun Tan
Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools…
Abstract
Purpose
Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools at their disposal to create convincing and sophisticated communications that appear to come from legitimate sources, such as emails, text messages or social media posts. These scams can be designed to trick individuals into clicking on malicious links, downloading malware or ransomware or providing sensitive information such as login information, financial information or personal details. Scammers often use social engineering techniques to persuade their targets to take specific actions, such as creating a sense of urgency, offering a reward or prize or posing as a trusted authority. These tactics can be highly effective, particularly if the target is unaware of the warning signs of a scam or is unfamiliar with how to protect themselves from online fraud. This paper aims to explore the extent and nature of this problem and evokes the concern that the general public is vulnerable and susceptible to scams if they are not resilient and aware. This paper also explores why victims fall for online scams and uncovers preventive measures to enable a direction in tacitly strategizing ways to create more impactful and effective awareness campaigns.
Design/methodology/approach
This study explores these aspects through a holistic qualitative approach. Using in-depth interview techniques with six victims, six non-victims, four law enforcement officers, four scammers and seven stakeholders from various agencies such as banks, telecommunication agencies and the Malaysian Communications and Multimedia Commission involved in combating the issue of scams.
Findings
The findings generally revealed that participants who were victims of scams felt Malaysians were susceptible to scams, easily fooled and had a nonchalant attitude. Most participants also highlighted that public safety is important for ensuring a high quality of life for citizens that should work closely between the government and non-government agencies, including effective law enforcement and crime prevention strategies.
Originality/value
The uniqueness of this study is the feedback from scammers themselves and their input towards authority and victims. Overall, the respondents provide their views drawing strength from the ever-changing technological background as well as the susceptibility of security features and vulnerability of human engagement.
Details
Keywords
Stephan M. Wagner, M. Ramkumar, Gopal Kumar and Tobias Schoenherr
In the aftermath of disasters, humanitarian actors need to coordinate their activities based on accurate information about the disaster site, its surrounding environment, the…
Abstract
Purpose
In the aftermath of disasters, humanitarian actors need to coordinate their activities based on accurate information about the disaster site, its surrounding environment, the victims and survivors and the supply of and demand for relief supplies. In this study, the authors examine the characteristics of radio frequency identification (RFID) technology and those of disaster relief operations to achieve information visibility and actor coordination for effective and efficient humanitarian relief operations.
Design/methodology/approach
Building on the contingent resource-based view (CRBV), the authors present a model of task-technology fit (TTF) that explains how the use of RFID can improve visibility and coordination. Survey data were collected from humanitarian practitioners in India, and partial least squares (PLS) analysis was used to analyze the model.
Findings
The characteristics of both RFID technology and disaster relief operations significantly influence TTF, and TTF predicts RFID usage in disaster relief operations, providing visibility and coordination. TTF is also a mediator between the characteristics of RFID technology and disaster relief operations and between visibility and coordination.
Social implications
The many recent humanitarian disasters have demonstrated the critical importance of effective and efficient humanitarian supply chain and logistics strategies and operations in assisting disaster-affected populations. The active and appropriate use of technology, including RFID, can help make disaster response more effective and efficient.
Originality/value
Humanitarian actors value RFID technology because of its ability to improve the visibility and coordination of relief operations. This study brings a new perspective to the benefits of RFID technology and sheds light on its antecedents. The study thus expands the understanding of technology in humanitarian operations.
Details
Keywords
Hossein Shakibaei, Seyyed Amirmohammad Moosavi, Amir Aghsami and Masoud Rabbani
Throughout human history, the occurrence of disasters has been inevitable, leading to significant human, financial and emotional consequences. Therefore, it is crucial to…
Abstract
Purpose
Throughout human history, the occurrence of disasters has been inevitable, leading to significant human, financial and emotional consequences. Therefore, it is crucial to establish a well-designed plan to efficiently manage such situations when disaster strikes. The purpose of this study is to develop a comprehensive program that encompasses multiple aspects of postdisaster relief.
Design/methodology/approach
A multiobjective model has been developed for postdisaster relief, with the aim of minimizing social dissatisfaction, economic costs and environmental damage. The model has been solved using exact methods for different scenarios. The objective is to achieve the most optimal outcomes in the context of postdisaster relief operations.
Findings
A real case study of an earthquake in Haiti has been conducted. The acquired results and subsequent management analysis have effectively assessed the logic of the model. As a result, the model’s performance has been validated and deemed reliable based on the findings and insights obtained.
Originality/value
Ultimately, the model provides the optimal quantities of each product to be shipped and determines the appropriate mode of transportation. Additionally, the application of the epsilon constraint method results in a set of Pareto optimal solutions. Through a comprehensive examination of the presented solutions, valuable insights and analyses can be obtained, contributing to a better understanding of the model’s effectiveness.
Details
Keywords
Wesam Zarka and Salah Hajismail
This paper aims to illustrate some of the negative heritage created in Syria over the 11 bloody years following the start of the uprising in 2011 and how this heritage can be…
Abstract
Purpose
This paper aims to illustrate some of the negative heritage created in Syria over the 11 bloody years following the start of the uprising in 2011 and how this heritage can be managed to promote justice.
Design/methodology/approach
Different motives and methods for negative heritage management are exemplified and compared to find out the most appropriate one(s) that can be adapted and adopted in the Syrian context. Based mainly on Human Rights Watch (HRW) reports, suggestions are made for the management of three cases of negative heritage in Syria by planning measures and solutions to promote justice. The three cases are the targeting of schools and hospitals, chemical attacks and Aleppo’s River Massacre. The effectiveness of the proposals is discussed and piloted by conducting a one-on-one conversational interview in 2021, related to the first proposal, and soliciting feedback on a social media platform, related to the third proposal.
Findings
Values-centred preservation based on the efforts of the community concerned with negative heritage, rather than the four existing governments in Syria, can lead to good management of recent negative heritage. The proposed virtual application of the proposals is a step that may itself be useful and may facilitate future practical application, as most of the exemplified sites are no longer accessible on the ground.
Originality/value
Ethically productive management of the negative heritage is promoted to seek more value-oriented dimensions of the conflict. Considering a fruitful use of the conflict in Syria can encourage positive thinking and counter the passive attitude towards the prolonged conflict.
Details
Keywords
Zhihong Tan, Ling Yuan, Junli Wang and Qunchao Wan
This study aims to investigate the negative interpersonal antecedents, emotional mediators and boundary conditions of knowledge sabotage behavior.
Abstract
Purpose
This study aims to investigate the negative interpersonal antecedents, emotional mediators and boundary conditions of knowledge sabotage behavior.
Design/methodology/approach
The authors collected data from 275 Chinese employees using convenience sampling and snowball sampling across three stages. Subsequently, the authors used both hierarchical regression and bootstrap methods to test the proposed hypotheses.
Findings
The results confirmed that workplace ostracism has positive effects on employee knowledge sabotage behavior both directly and via employee anger. In addition, the authors found that employee bottom-line mentality (BLM) moderates not only the direct effect of workplace ostracism on employee anger but also the indirect effect of employee anger in this context. Employee conscientiousness moderates only the direct effect of workplace ostracism on employee anger and does not moderate the indirect effect.
Originality/value
To the best of the authors’ knowledge, this study not only explores the influence of workplace ostracism on employee knowledge sabotage behavior for the first time but also elucidates the underlying emotional mechanisms (anger) and boundary conditions (employee BLM and conscientiousness) by which workplace ostracism influences employee knowledge sabotage behavior, thus deepening the understanding of how knowledge sabotage emerges in organizations.
Details
Keywords
Tehreem Fatima, Muhammad Kashif Imran, Ambreen Sarwar, Sobia Shabeer and Muhammad Rizwan
The present research aims to empirically test the “Barriers to abusive supervision model” to find how employee-related (core self-evaluations) and situational factors (perceived…
Abstract
Purpose
The present research aims to empirically test the “Barriers to abusive supervision model” to find how employee-related (core self-evaluations) and situational factors (perceived job dependency) make an employee trapped in the spiral of supervisory abuse. In addition, the work–family spillover lens is used to explain how employees' retaliation is targeted at their families in response to abuse from their bosses.
Design/methodology/approach
The current study has employed a three-wave longitudinal moderated mediation design and analysed data from 265 employees working in the hospitality industry of Pakistan.
Findings
The results of this study have shown that low core-self evaluations put employees in a spiral of supervisory abuse and they instil aggression towards their families. This association is further strengthened when employees are dependent on their job.
Originality/value
This study is one of the first to use the “Barriers to Abusive supervision” model to answer who and in which conditions tend to trap in the spiral of abuse and integrate the work-to-family interface model for elaborating the outcomes to the family domain.
Details
Keywords
Rosie Kitson-Boyce and Palwinder Athwal-Kooner
The purpose of this study is to explore the experiences of those volunteering within a restorative justice service thus enabling an insight into their perceptions of the different…
Abstract
Purpose
The purpose of this study is to explore the experiences of those volunteering within a restorative justice service thus enabling an insight into their perceptions of the different methods used, their beliefs about restorative justice effectiveness, and its place within the criminal justice system. The study also sought to identify any challenges and positive experiences the participants encountered during their role as volunteers, with volunteering during the COVID-19 pandemic explored specifically.
Design/methodology/approach
Data was collected from the participants (n = 5) via semi-structured interviews and analysed using thematic analysis, thus enabling patterns within the experience of the volunteers to be identified.
Findings
A prior understanding and interest in restorative justice was evident within the data, with participants demonstrating a preference for direct, face-to-face mediation. The perceived lack of support from external agencies was discussed along with the role of education in their volunteering experience. Finally, it was acknowledged that although face-to-face practice was deemed the most effective overall, certain practices adopted during COVID-19 enabled aspects of the role to be carried out more efficiently and equally as effectively.
Practical implications
The findings from this study draw out real-world implications, producing tangible action points for restorative justice services. Some tentative suggestions for future practice are outlined.
Originality/value
The volunteers’ role within restorative justice is often overlooked within the literature (Paul and Borton, 2013) and time constraints can add additional barriers to a hard-to-reach population. However, volunteers play a vital role in restorative justice. By exploring and listening to the volunteers’ experience, this study expands an additional strand within the literature in terms of what makes restorative justice effective and the challenges that are faced from a volunteer perspective.
Details