Search results

1 – 10 of 70

Abstract

Details

A Meaningful Life at Work
Type: Book
ISBN: 978-1-78756-767-2

Content available

Abstract

Details

A Meaningful Life at Work
Type: Book
ISBN: 978-1-78756-767-2

Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

Book part
Publication date: 27 January 2012

Laura A. Wankel and Charles Wankel

Universities are increasing hubs of digital activity; much commendable, some reprehensible. It is dismaying that in some learners' minds the divide between them is murky rather…

Abstract

Universities are increasing hubs of digital activity; much commendable, some reprehensible. It is dismaying that in some learners' minds the divide between them is murky rather than clear. Today's students are largely digital natives born into computing and its venues. In many colleges, during orientation the preponderance of incoming students use their new college e-mail accounts to enable in Facebook, etc., easy online communication with others in the institution. Unlike past decades when a student might be handed flyers or read postings on poles and walls, today's students are in a maelstrom of social media, and other new technologies that students are socially pressed to use. In her book Ruling the Waves, Debora Spar suggested that cyberspace is like a frontier town, a place where there are “not a lot of rules or marshals in town” (Spar, 2001). People online often feel relatively unconstrained, creative, and innovative. At the same time, chaos, disorder, nefariousness, and just plain “bad behavior” are rife. New technologies foster the sense of a new normality. Yet just because it is now possible to act in new ways through new technologies does not make those ways acceptable.

Details

Misbehavior Online in Higher Education
Type: Book
ISBN: 978-1-78052-456-6

Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 27 January 2012

Joanne C. Jones and Sandra Scott

In this chapter, we explore an actual incident of cyberbullying that occurred at a large Canadian university. In our analysis, we frame cyberbullying as part of the more general…

Abstract

In this chapter, we explore an actual incident of cyberbullying that occurred at a large Canadian university. In our analysis, we frame cyberbullying as part of the more general phenomena of classroom incivility. We focus on the sociocultural context and demonstrate how the structures and processes within the classroom environment can enable incivility as well as cyberbullying.

Details

Misbehavior Online in Higher Education
Type: Book
ISBN: 978-1-78052-456-6

Book part
Publication date: 6 July 2016

Leah P. Hollis

The information superhighway has also been a vehicle for bullies to harass targets in K-12, college, corporate sectors, and higher education (Long, 2008; Tu, 2002). While…

Abstract

The information superhighway has also been a vehicle for bullies to harass targets in K-12, college, corporate sectors, and higher education (Long, 2008; Tu, 2002). While technology is useful, the public shaming component makes cyberbullying an indelible emotional assault that remains on the Internet years after the initial aggression. By reflecting on theoretical elements of public shaming discussed by Gilbert and Proctor (2006), and Dzurec et al. (2014), this conceptual essay will use descriptive statistics in a secondary analysis to document occurrences of cyberbullying in community colleges and reveal that people of color (56%) are more likely to be the target of cyberbullying than their white counterparts (41%). The contents of this chapter might be of interest to diversity officers and personnel considering acceptable use policies for technology on their respective campuses.

Details

The Coercive Community College: Bullying and its Costly Impact on the Mission to Serve Underrepresented Populations
Type: Book
ISBN: 978-1-78635-597-3

Keywords

Book part
Publication date: 27 January 2012

Kimberly L. Kulovitz and Edward A. Mabry

This study presents findings leading to the conclusion that cyberbullying in massively multiplayer online (MMO) games can be conceptualized, measured and at least partially…

Abstract

This study presents findings leading to the conclusion that cyberbullying in massively multiplayer online (MMO) games can be conceptualized, measured and at least partially explained as a normative phenomenon, similar to Latane & Darley's (1970) bystander inaction hypothesis. An overall sample of N=372 respondents to an online survey provided information on their daily amount of Internet use and daily amount of time engaged in playing in MMO games. Scales for the assessment of both cyberbullying victimization and bullying itself were developed. Victims of cyberbullying appear more sensitive to bullying incidents albeit no more likely than game players who have engaged in bullying to intervene in preventing it. Perpetrators of cyberbullying, however, also appear to be heavily invested in both Internet use and MMO game play and that could amplify an individual's aggressiveness as a player in turn making it more likely they will engage in cyberbullying. The study concludes with a qualitative examination of MMO game player narrative self-explanations for nonintervention in cyberbullying that parallels Latane and Darley's explanation of bystander nonintervention in face-to-face threatening or emergency contexts.

Details

Misbehavior Online in Higher Education
Type: Book
ISBN: 978-1-78052-456-6

Book part
Publication date: 27 November 2014

Linda M. Waldron

To analyze the emergence of cyberbullying in the news and to unveil the extent to which this new social problem is being constructed as a moral panic.

Abstract

Purpose

To analyze the emergence of cyberbullying in the news and to unveil the extent to which this new social problem is being constructed as a moral panic.

Design/methodology/approach

Ethnographic content analysis is conducted on a sample of 477 local and national newspaper articles published from 2004 to 2011. Goode and Ben-Yehuda’s five criteria of a moral panic – consensus, concern, hostility, disproportionality, and volatility – are used as a lens to analyze how this issue emerged in U.S. culture.

Findings

News coverage of this issue erupted within a very short time period, drawing important attention to a previously unknown social problem facing youth. Yet in the construction of cyberbullying as a new threat to social order, the news coverage sometimes inflates the magnitude and severity of the problem. In doing so, the media work to misrepresent, misinform, and oversimplify what is a more complicated and perhaps not yet fully understood issue among youth today.

Originality/value

Electronic aggression is something that is of growing concern to children, parents, educators, and policymakers. Evidence has begun to show that its effects may be as harmful as face-to-face bullying. Since the media play a vital role in the designation of certain issues as worthy of the public’s attention, it is pertinent that this information is presented in an accurate fashion, rather than simply promoting a moral panic around the topic.

Research limitations/implications

Future research should move beyond print media to examine how TV, popular culture, and social media sites construct this problem. This should include research on the public’s understanding and interpretation of these mediated forms of communication.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78350-629-3

Keywords

1 – 10 of 70