Search results
1 – 10 of 136Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Rafael Araújo Sousa Farias and Valmir Emil Hoffmann
The present study seeks to answer the following research question: what is the profile of the academic production related to the interorganizational networks in the period between…
Abstract
Purpose
The present study seeks to answer the following research question: what is the profile of the academic production related to the interorganizational networks in the period between 2006 and 2016? Thus, this study aims to characterize the academic production about the subject interorganizational networks available in national journals with Concept “A” (Qualis Capes), in the period between 2006 and 2016.
Design/methodology/approach
This paper uses national journals with Concept “A” of the Qualis classification (2016) for journal selection. In total, 12 “A” concept journals were identified. However, it was decided to analyze ten of them. The procedures suggested by Crossan and Apaydin (2010) for conducting bibliometric studies were adopted. It has been identified that 77 articles were published in eight journals. The R 3.3.2 and R Studio 1.0.136 software were used. The IGRAPH 0.5.5-2 extension (package) was used to analyze graphs and co-authorship networks (Csárdi and Nepusz, 2006). This extension is able to manipulate networks with millions of vertices and edges and provides a series of functions to analyze the properties of social networks, such as subnetworks, intermediation, centrality, among other characteristics (Csárdi and Nepusz, 2006). Correspondence analysis (CA) was also performed. CA is a multivariate exploratory technique that converts a data matrix into a graphical representation, so that rows and columns are represented by points in a graph (Greenacre and Hastie, 1987). This extension is dedicated to the multivariate analysis of data and allows the manipulation of different types of variables (quantitative or categorical). In the present research, multiple CA (MCA) was applied – indicated when the elements are described as categorical variables (Lê et al., 2008). The characteristics considered for carrying out MCA were the “main term”, “research approach”, “type of research”, “constructs” and “research strategies”. By using the FactoMineR 1.34 extension, the hierarchical clustering on principal components (HCPC) function was used (Husson et al., 2007; Lê et al., 2008). This function allows creating clusters from the characteristics of the articles analyzed and highlights the justifications for the groupings created. The function allows forming as many clusters the researcher wishes, being of its attribution to analyze a division that best represents the characteristics of the data (Husson, Josse, and Pagès, 2010). Husson et al. (2010) suggest that an analysis should be performed from the hierarchical tree, thus the number of clusters can be defined considering the overall appearance (or shape) of the tree formed. At last, a word cloud was created using the Wordcloud 2.5 extension (Fellows, 2013). The noticed advantage of using this extension is that it does not separate the terms that form a keyword when generating the cloud. It has been used for the keywords of the 77 articles analyzed; however, it has been decided to keep those that presented frequency greater than or equal to two. By avoiding occasional terms, a more intelligible cloud was obtained.
Findings
The present study was not able to verify if the journals analyzed by Andrighi et al. (2011) have influenced others to publish on the subject, as suggested by the Bradford’s Law. The standard “success breeds success”, suggested by the Bradford’s Law, was not confirmed. The so-called nuclear zone (Brookes, 1969; Novaretti et al., 2015) is composed of the journals Brazilian Administration Review (BAR), Revista de Administração Contemporânea (RAC), Revista de Administração Pública (RAP) and Revista Brasileira de Gestão de Negócios (RBGN). The journal RAC stands out for having been the one that has increased its annual average of publication in relation to the theme, when compared with the findings of Andrighi et al. (2011). The journals BAR and RBGN stand out because they are in the nuclear zone, even though they were not considered in the work of Andrighi et al. (2011). It should be noted that all the analyzed journals have in common the fact of addressing the themes of management and administration and, more specifically, making room for the “competitiveness” and “cooperation” constructs. These constructs are related to the theme of networks and were the most recurrent in the articles analyzed. “Cooperation” (29), “competitiveness” (27), “knowledge” (12), “learning” (6) and “trust” (3) were the “constructs” used to compose the 77 articles analyzed. In turn, “network” (49), “alliance” (18) and “cluster” (9) were the “main term” most used in the articles. This implies that the topic of cooperation is more linked to a vision of strategy. As occurred in the research of Andrighi et al. (2011), the term “network” is the most recurrent; in addition, the growth of space obtained by the term “alliance” stands out. The terms “network” and “alliance” were the most used by the articles, being predominant in 87 per cent of the research. In the present research, the predominance of the term “network” may have occurred because its concept is broader and it is used in the literature in different ways, even in contradictory ways (Andrighi et al., 2011; Schommer, 2001). In turn, the term “alliance” may have been recurrent because it has a wide dispersion of published issues, such as governance structure, cooperation, knowledge transfer and trust (Lima and Campos Filho, 2009). By using the HCPC function of the FactoMineR extension, the articles were grouped according to their characteristics, and then three clusters were formed. By analyzing the generated results, it is assumed that the division into three clusters was the one that best represented the data. Cluster 1 is characterized by descriptive, quantitative, half documentary and half survey research studies, being “cluster” the main term. Cluster 2 is characterized by exploratory case studies with qualitative–quantitative analyzes. Cluster 3 is characterized by theoretical tests. The Zipf’s law points out that a small group of words occurs many times; however, when considering the most recurrent words Networks (9), Strategic Alliances (8), Cooperation (8), Interorganizational Networks (8) and Alliances (6) show that they were present in only about 10 per cent of the works. Lotka’s Law, which states that few authors publish much and many authors publish little, was not confirmed. The authors who presented the highest number of publications, T. Diana L. v. A. de Macedo-Soares (6); Jorge Renato Verschoore (6); Alsones Balestrin (5); Douglas Wegner (4); Humberto Elias Garcia Lopes (4), participated in less than 10 per cent of the works. Thus, the authorship was characterized by many researchers publishing few works, what can be an effect of the behavior of these authors, who prefer to publish in network. The centrality of the relations between the authors was analyzed and, in addition, the intermediation points of the network were identified. The present study also analyzed all the references used by the 77 articles that compose the study. The main author of each of the references used was identified. Among the 30 identified authors, Yin and Hair Jr. stand out for books related to fundamentals and research methodologies. Borgatti and Eisenhardt developed research on the topic of interorganizational networks and also created works for methodological foundations. Powell was the most frequently mentioned author (28) and had more different works referenced (9). Powell stands out for the production of articles published in periodicals, not books. Porter’s situation is the opposite. Most of the quotations made to the author come from his books, especially the work “Competitive strategy” (Porter, 1980). All authors identified are foreigners, with the exception of Balestrin. Marshall, Polanyi, Granovetter and Williamson are authors of works considered seminal, being them, respectively, “Principles of economics” (Marshall, 1890), “Personal knowledge: towards a post critical philosophy” (Polanyi, 1958) and “The strength of weak ties” (Granovetter, 1973) and “Markets and hierarchies, analysis and antitrust implications” (Williamson, 1975).
Research limitations/implications
Like all research, it has limitations. The first one derives from the selection criteria of the periodicals to be analyzed. The cut referring to the journals of greater impact excludes most of the national articles. These studies may contain important contributions to the knowledge of the national publication profile. In addition, the choice to analyze the journals disregards other types of work, such as books, scientific events, dissertations and thesis and reports. The choice of articles published in journals is based on the fact that these are a “certified knowledge”, as the studies are peer-reviewed, and in the case of the Qualis “A” stratum, a review of exogenous quality is supposed on this production. Despite its flaws, this system can be considered reliable to evaluate scientific knowledge (Bedeian, 2004; Shugan, 2007). The analysis of the most recent articles may have been hampered by a temporal issue. In addition, the choice of keywords, a necessary step, leaves out other studies. Another limitation refers to the fact that the articles have been analyzed and classified by the authors, which presupposes the use of their value judgments, at least to some extent. Other limitations refer to the bibliometric techniques employed. The main authors referenced in the studies were demonstrated, that is, those authors who have been used as a theoretical reference for studies of interorganizational networks. However, the circumstances under which these citations occurred were not analyzed. For example, an author may be quoted to use the contribution of his/her study, to be criticized or just to be another reference in the text. The lack of this analysis can be considered a fragility of the study.
Practical implications
This text was started talking about the dispersion of the studies on networks in the country. Previous work has been used, theoretically and empirically demonstrating this fact. Zipf’s Law applied to bibliometrics, as described by Guedes and Borschiver (2005), Novaretti et al. (2015) and Pao (1978), was not confirmed in this study, which seems to be an indicative fact that the research on this theme in Brazil presents fragmentation as an intrinsic characteristic. That is, it must remain fragmented, as this would be its own way to evolve. This is evident especially when comparing the study of Andrighi et al. (2011) and its results. With several but continuous temporal cut-outs, and the same keywords, the maintenance of this dispersion is evident. This is also a contribution of this study.
Social implications
The study contributed to updating the research profile, mainly after the triennium 2013-2015 of Qualis Capes’ evaluations. It also added to the mapping of recent Brazilian academic production related to interorganizational networks, completing studies by Alves et al. (2013), Andrighi et al. (2011), Balestrin et al. (2010), Cunha and Carrieri (2003) and Mascena et al. (2013). Thus, it is believed that the research reached the proposed objectives, despite its limitations.
Originality/value
The present research is also justified by helping to understand the subject being useful for researchers, educators and students, in general, in the task of demonstrating gaps and opportunities of future researches and collaborating with the elaboration of a research agenda (Baumgartner and Pieters, 2003). The work has updated bibliometrics on the subject and allows comparisons with previous bibliometric studies (Alves et al., 2013; Andrighi et al., 2011; Balestrin et al., 2010; Cunha and Carrieri, 2003; Ferreira et al., 2014; Lima and Campos Filho, 2009; Mascena et al., 2013). It is believed that the present study differs from the others because of the analysis performed, the way the data were treated, with techniques that are rarely used simultaneously, going beyond the descriptive statistics.
Details
Keywords
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details
Keywords
Krystal Laryea and Christof Brandtner
Sociologists have long thought of the integration of people in communities – social integration – and hierarchical social systems – systemic integration – as contradictory goals…
Abstract
Sociologists have long thought of the integration of people in communities – social integration – and hierarchical social systems – systemic integration – as contradictory goals. What strategies allow organizations to reconcile social and systemic integration? We examine this question through 40 in-depth, longitudinal interviews with leaders of nonprofit organizations that engage in the dual pursuit of social and systemic integration. Two processes reveal how the internal structure of organizations often mirrors the ways in which organizations are embedded in their local environments. When organizations engage in loose demographic coupling, relegating those who “match” the community to the work of social integration, they produce internal inequalities and justify them by claiming community building as sacred work. When engaging in community anchoring, organizations challenge internal and external inequalities simultaneously, but this process comes with costs. Our findings contribute to a constructivist understanding of community, the mechanisms by which organizations produce inequalities, and a place-based conception of organizations as embedded in community.
Details
Keywords
When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…
Abstract
When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.
Details
Keywords
The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…
Abstract
The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.
Details
Keywords
Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…
Abstract
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.
Details
Keywords
Emilia Filippi, Loris Gaio and Marco Zamarian
This study aims to analyze how the interplay between hard and soft elements of total quality management (TQM) produces the conditions for sustaining success in the quest for…
Abstract
Purpose
This study aims to analyze how the interplay between hard and soft elements of total quality management (TQM) produces the conditions for sustaining success in the quest for quality.
Design/methodology/approach
A qualitative analysis (Gioia method) was carried out on an original dataset collected through both direct and indirect methods (i.e. archival sources, interviews and observations) to generate a new interpretive framework.
Findings
The interpretative framework identifies four categories of elements: trigger elements create the starting conditions for a quality virtuous cycle; benchmarking tools set the standards of performance; improvement tools enable exploration of the space of possible alternative practices and finally, catalytic forces allow the institutionalization of effective techniques discovered in this search process into new standards.
Research limitations/implications
The findings the authors present in this paper are derived by a single case study, limiting the generalizability of our results in other settings.
Practical implications
This study has three implications: first, the design of trigger elements is critical for the success of any TQM initiative; second, the interplay of improvement and benchmarking tools at several levels should be coherent and third, to exploit the potential of TQM, efforts should be devoted to the dissemination of new effective practices by means of catalyzing elements.
Originality/value
The model provides a more specific understanding of the nature and purpose of the hard and soft elements of TQM and the dynamic interaction between the two classes of elements over time.
Details
Keywords
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…
Abstract
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.
An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.
Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.
Details