Search results
1 – 10 of 273Lisa H. Rosen, Linda J. Rubin, Savannah Dali, Daisie M. Llanes, Ahissa Lopez, Ashton E. Romines and Samantha A. Saunders
The COVID-19 pandemic dramatically altered daily life for Gen Z. The purpose of this study was to examine parental perceptions of the pandemic’s effects on their children’s peer…
Abstract
Purpose
The COVID-19 pandemic dramatically altered daily life for Gen Z. The purpose of this study was to examine parental perceptions of the pandemic’s effects on their children’s peer relationships. As children sought peer connection during the pandemic, technology usage soared. The second purpose of the current study was to assess how greater time on social media affected adjustment among Gen Z and whether this effect was mediated by experiences of cyber victimization.
Design/methodology/approach
In total, 250 U.S. parent-child dyads participated in the study. Parents reported on their children’s social media use and described how they believed the pandemic affected their children’s peer relationships. Child participants were transitioning to middle school and reported on cyber victimization and adjustment.
Findings
Thematic analysis of parental reflections revealed three themes: children spent more time online since the onset of the pandemic, there were negative implications of increased time online and there were positive and protective implications of being online. Analysis also indicated significant indirect effects of social media use on internalizing and externalizing problems through victimization.
Originality/value
Parents reported Gen Z continues to use electronic forms of communication and social media at high rates even after pandemic-related restrictions eased with some suggesting that their children prefer digital over face-to-face communication because they have become accustomed to this way of connecting and may find it easier than in-person interaction. Current findings highlight concerns about this increased time online as social media use negatively affected adjustment via cyber victimization.
Details
Keywords
Gina Myers and Christopher Kowal
Violence toward frontline health-care workers (HCWs) from patients and visitors is a pervasive issue that ranges from verbal and psychological abuse to physical assault. The…
Abstract
Purpose
Violence toward frontline health-care workers (HCWs) from patients and visitors is a pervasive issue that ranges from verbal and psychological abuse to physical assault. The emergence of the COVID-19 pandemic has led to increased reports of escalated verbal workplace aggressions (VWPAs); however, most studies have been conducted internationally. Studies based in the USA have focused on physical violence experienced by nurses and paramedics in emergency situations. The purpose of this study is to learn about the experiences of different levels of frontline HCWs with VWPA from patients and visitors and discover ways to address this issue.
Design/methodology/approach
This qualitative descriptive study asked registered nurses, licensed practical nurses and patient care technicians from one health-care system about their experiences with patient and visitor VWPA using an anonymous, voluntary open-ended survey and in-person interviews. In all, 31 participants completed the survey and 2 were interviewed. Data were analyzed using content analysis.
Findings
Three themes emerged from the data: the experience, moving through and moving forward. Frontline HCWs described experiences of VWPA, indicating its forms, frequency and conditions. They used coping, along with personal and professional measures, to manage and move through the situation. Moving forward was captured as suggestions for the future and conveyed hope for a perfect state.
Originality/value
The experiences of frontline HCWs offered insight into how they perceive and cope with difficult encounters. Recommendations relate to not only implementing interventions that support frontline HCWs but also creating a culture where aggression is not tolerated and addressing perpetrator behavior is a priority.
Details
Keywords
Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer
This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult…
Abstract
Purpose
This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.
Design/methodology/approach
Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.
Findings
Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.
Originality/value
This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).
Details
Keywords
Maryna Utkina, Oleg Reznik and Liudmyla Pavlenko
This paper aims to illustrate the main changes during martial law for conducting financial intelligence (monitoring), in particular, in the system of combating legalisation…
Abstract
Purpose
This paper aims to illustrate the main changes during martial law for conducting financial intelligence (monitoring), in particular, in the system of combating legalisation (laundering) of illegally gained income.
Design/methodology/approach
The research methodology includes general scientific methods of cognition. The authors used it to research the theoretical, organisational and legal aspects of financial intelligence (monitoring) in normal situations and during martial law. The authors also use the doctrinal legal research method to analyse and describe the legislation connected to the financial intelligence (monitoring) during martial laws.
Findings
This paper is an original work written by authors that discusses financial intelligence (monitoring) during martial law. The following changes in the conduction of financial intelligence (monitoring) were highlighted: suspension of scheduled and unscheduled on-site inspections; postponement of the entry into force of the provisions of some regulations on the submission of reports in electronic form; and the norms amending to remove administrative barriers in matters of financial intelligence (monitoring) in martial law. The authors also noted that certain rules for the functioning of the financial intelligence (monitoring) system were being clarified. Thus, the financial intelligence (monitoring) regime is being weakened to some extent.
Originality/value
In connection with the introduction of martial law in the territory of Ukraine on 24 February 2022, the most important changes that have taken place in the banking and financial sectors of the economy should be mentioned. In particular, this applies to the issues of the regulation on the statutory and regulatory levels. Certain vital points regarding the mechanism and procedures for conducting financial intelligence (monitoring) also needed to be changed, on a need-to-know basis to adapt to the needs of Ukrainian society during the military aggression of the Russian Federation. This paper is devoted to the study of financial intelligence (monitoring) during martial law. The authors identified the main changes in the procedure for conducting financial intelligence (monitoring) by both the National Bank of Ukraine (one of the main entities) and the legislator (by amending the current regulatory framework).
Details
Keywords
Lesley Jones, Nicky Cullum, Ruth Watson and John Keady
This study aims to address this need. In the UK, people with dementia admitted to National Health Service mental health in-patient dementia assessment wards [dementia assessment…
Abstract
Purpose
This study aims to address this need. In the UK, people with dementia admitted to National Health Service mental health in-patient dementia assessment wards [dementia assessment wards] present as complex and experience a number of changed behaviours, such as excessive walking, agitation and aggression. The complexity of the presentation of dementia has been identified as underpinning pre-and post-admission to these care environments, but limited study has so far been conducted to explore the boundaries and meaning of complexity and its relationship to dementia assessment ward practice.
Design/methodology/approach
An online electronic survey of UK-based national dementia leaders was conducted in 2018. Nineteen completed questionnaires were returned, and mental health nurses comprised the largest sub-sample. Qualitative data of the free-text responses were analysed using manifest content analysis.
Findings
Four routes to admission to a dementia assessment ward were identified. Multiplicity of needs and interconnectedness were seen as important domains in uncovering the meaning of complexity. The importance of life story and formulation approaches were highlighted. Challenges uncovered included, better understanding changed behaviour and its relationship to complexity, the need for understanding the boundaries of complexity and making visible care practices on these specific wards.
Originality/value
Findings can be used to produce a heightened awareness about the meaning and function of complexity in dementia assessment wards. Policymakers and researchers need to increase the emphasis on this area of mental health and dementia care. Further training for the multidisciplinary team on formulation approaches could help to improve the evidence-base for practice.
Details
Keywords
Arindam Bhattacharjee and Anita Sarkar
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…
Abstract
Purpose
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.
Design/methodology/approach
Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.
Findings
Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.
Originality/value
This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.
Details
Keywords
Chad A. Rose, Madison H. Imler and Jessica Cowley
The duality of online socialization can be examined by looking at the dynamic contrast between cyberbullying and online friendships. From the beginning of instant messaging to…
Abstract
The duality of online socialization can be examined by looking at the dynamic contrast between cyberbullying and online friendships. From the beginning of instant messaging to what we know now as direct messaging, the impact of rapid and continuous interactions in online spaces can have a widespread impact on youth. As the landscape of technology and technological access continues to evolve, the virtual interactions that arise in daily life also evolve. Therefore, understanding the impact of these interactions becomes an increasing concern. This chapter evaluates the unique characteristics, and related reciprocity, of online friendships and cyberbullying by assessing the impact of online socialization on school-aged youth. Overall, by juxtaposing both cyberbullying and online friendships, this chapter aims to provide a comprehensive understanding of the complexities that increased online socialization can have on youth in a digital age.
Details
Keywords
Adamu Gayus Kasa, Matthew E. Egharevba and Ajibade E. Jegede
This study aims to investigate the clamour by the people of Plateau State, Nigeria, for more licences to bear firearms for self-defence because of the continuous failure of the…
Abstract
Purpose
This study aims to investigate the clamour by the people of Plateau State, Nigeria, for more licences to bear firearms for self-defence because of the continuous failure of the Nigerian State to defend them against the Fulani herders’ aggression. More guns less crime deterrence theory served as the framework of analysis, which posits that because criminals are rational beings, they will choose not to attack when they know many people have legitimate firearms.
Design/methodology/approach
Data were collected from four purposefully selected local government areas of the state. This study’s sample size was 400. Therefore, 400 copies of the Google Forms questionnaire were administered. In addition, seven key informant interviews and nine focus group discussions were also conducted.
Findings
This research results showed the following: while self-defence and issuance of more licenses were supported by 84.8% and 85.0% of respondents, respectively, they also argued that the insurgency would likely end if more people carried legally acquired firearms. Again, the study showed a positive correlation between the government’s failure in security and the demand for self-defence exercises against the Fulani herdsmen’s insurgency, this study recommends more licensed firearms for the people of Plateau State.
Originality/value
This study recommends more licenced firearms for the people of Plateau State.
Details
Keywords
Suhans Bansal, Naval Garg and Jagvinder Singh
Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage…
Abstract
Purpose
Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage bullies from further bullying the victims has risen. This problem has attracted the attention of all stakeholders across the globe. Various researchers have developed theories and interventions to detect and stop bullying behavior. Previously, researchers focused on helping victims, but as the times have changed, so has the focus of researchers. This study aims to analyze scientific research articles and review papers to understand the development of the knowledge base on the topic.
Design/methodology/approach
This study analyzes the performance of literature on cyberbullying perpetration (CBP) using the widely accepted bibliometric analysis techniques: performance analysis and science mapping. The study is based on a dataset extracted from the Web of Science database. Initially, 2,792 articles between 2007 and 2022 were retrieved, which were filtered down to 441. The filter was based on various criteria, but primarily on CBP. VOSViewer and MS Excel were used to analyze the data. In addition, VOSViewer was used to create “bibliometric citations, co-citations, and co-word maps.”
Findings
The findings include publication and citation quantum and trends, the top 20 active countries, the most significant research articles and leading journals in this domain. Major themes or clusters identified were “Cyberbullying and victim behavior,” bullying behavior, adolescents and intervention, “cyberbullying associations,” and “cyberbullying personality associations.”
Originality/value
The study is unique because it analyses research articles based on cyberbullies, whereas past studies explored only the victims' side. Further, the present study used the Web of Science database, whereas most studies use the Scopus database.
Details
Keywords
Abdullah Oguz, Nikhil Mehta and Prashant Palvia
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…
Abstract
Purpose
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.
Design/methodology/approach
The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.
Findings
A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.
Originality/value
As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.
Details