Search results

1 – 10 of 228
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Book part
Publication date: 27 November 2014

Linda M. Waldron

To analyze the emergence of cyberbullying in the news and to unveil the extent to which this new social problem is being constructed as a moral panic.

Abstract

Purpose

To analyze the emergence of cyberbullying in the news and to unveil the extent to which this new social problem is being constructed as a moral panic.

Design/methodology/approach

Ethnographic content analysis is conducted on a sample of 477 local and national newspaper articles published from 2004 to 2011. Goode and Ben-Yehuda’s five criteria of a moral panic – consensus, concern, hostility, disproportionality, and volatility – are used as a lens to analyze how this issue emerged in U.S. culture.

Findings

News coverage of this issue erupted within a very short time period, drawing important attention to a previously unknown social problem facing youth. Yet in the construction of cyberbullying as a new threat to social order, the news coverage sometimes inflates the magnitude and severity of the problem. In doing so, the media work to misrepresent, misinform, and oversimplify what is a more complicated and perhaps not yet fully understood issue among youth today.

Originality/value

Electronic aggression is something that is of growing concern to children, parents, educators, and policymakers. Evidence has begun to show that its effects may be as harmful as face-to-face bullying. Since the media play a vital role in the designation of certain issues as worthy of the public’s attention, it is pertinent that this information is presented in an accurate fashion, rather than simply promoting a moral panic around the topic.

Research limitations/implications

Future research should move beyond print media to examine how TV, popular culture, and social media sites construct this problem. This should include research on the public’s understanding and interpretation of these mediated forms of communication.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78350-629-3

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1986

Michael D. Everett

What's the best way to evaluate and select projects with uncertain returns? Do you simply rely on the best estimate of profits or expected values to guide you to the projects with…

89

Abstract

What's the best way to evaluate and select projects with uncertain returns? Do you simply rely on the best estimate of profits or expected values to guide you to the projects with the highest returns? If so, what do you do when you're faced with a choice between project A, which has an expected value of $100,000 but which also has a 25 percent risk of bankrupting the firm, and project B, which has a negligible .003 percent risk but only offers a return of $50,000?

Details

Planning Review, vol. 14 no. 4
Type: Research Article
ISSN: 0094-064X

Access Restricted. View access options
Book part
Publication date: 29 August 2012

Jeffrey Sprague and Vicki Nishioka

Of the many serious challenges confronting schools today, bullying and harassment perhaps pose the most deleterious and persistent long-term outcomes for students. The effects of…

Abstract

Of the many serious challenges confronting schools today, bullying and harassment perhaps pose the most deleterious and persistent long-term outcomes for students. The effects of bullying are not limited to the students targeted by these behaviors, but also negatively affect the bullies and bystanders who witness the events. An array of factors influence, or even perpetuate, school bullying. The factors are related to individual characteristics of the students, social relationships in school, family support, neighborhood influences, and community systems. In this chapter, we describe the effects of bullying and harassment and, provide a current perspective of the magnitude of the problem. We also discuss effective responses to bullying and harassment in schools and approaches for prevention. School-wide implementation of programs is highlighted.

Details

Classroom Behavior, Contexts, and Interventions
Type: Book
ISBN: 978-1-78052-972-1

Access Restricted. View access options
Book part
Publication date: 24 September 2015

Jessica Niblack and Jodie L. Hertzog

Despite growing attention to the prevalence and consequences of cyberbullying within the social sciences, research on cyber-bystander reactions has been largely overlooked…

Abstract

Purpose

Despite growing attention to the prevalence and consequences of cyberbullying within the social sciences, research on cyber-bystander reactions has been largely overlooked. Drawing from Latane and Darley’s (1970) bystander engagement model, the current study sought to fill this gap by exploring how common it is for adolescents to encounter cyberbullying on social networking sites (SNS), how youth react to the cyberbullying witnessed on SNS, and most importantly to uncover factors that may be related to two potential bystander trajectories on SNS, namely traditional bystanding and prosocial bystander engagement.

Methodology/approach

Data was drawn from the 2011 Pew Research Center’s Internet and American Life Project (Princeton Survey Research Associates International, 2011). The secondary analysis was restricted to only adolescents who ranged in age from 12 to 17. Grounded in existing research on face-to-face bystander behaviors, two Ordinary Least Squares regression models were run testing which independent variables (age, gender, frequency of SNS use, perceived peer norms, and prior cyberbully victimization) were related to traditional and to prosocial bystander behavior online.

Findings

Approximately 88% of youth reported they’ve witnessed a cyberbullying exchange on an SNS. Among these witnesses, the majority reported engaging in both prosocial (62%) and traditional (74%) bystander practices. Based on the regression analyses, a key factor for bystander practice online appears to be observed peer behavior.

Originality/value

The findings from this research provide an initial exploration into cyber-bystander behavior, with potential implications for both future research directions and cyberbully prevention programming.

Details

Technology and Youth: Growing Up in a Digital World
Type: Book
ISBN: 978-1-78560-265-8

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access Restricted. View access options
Article
Publication date: 1 January 1983

David B. Hertz and Howard Thomas

Managers are often asked to consolidate and improve their organization's strengths without taking undue risks. The techniques and models of risk analysis can help managers chart a…

431

Abstract

Managers are often asked to consolidate and improve their organization's strengths without taking undue risks. The techniques and models of risk analysis can help managers chart a course through today's increasing uncertainty.

Details

Journal of Business Strategy, vol. 3 no. 3
Type: Research Article
ISSN: 0275-6668

Access Restricted. View access options
Article
Publication date: 1 March 1972

David Hertz

Most chief executives have heard the GIGO cliche about management information and computer systems: 'Garbage in—garbage out'. Recently a colleague of mine, who had been reviewing…

82

Abstract

Most chief executives have heard the GIGO cliche about management information and computer systems: 'Garbage in—garbage out'. Recently a colleague of mine, who had been reviewing some rather poor results in a large diversified company, called my attention to an interesting phenomenon: namely, although the information being fed into the corporate decision‐making apparatus usually was good, the quality of the decisions coming out usually was atrocious. In other words: good information in, garbage out. As my colleague remarked, “These executives need correct, timely, relevant information, and by and large they're getting it. What they haven't got are the right methods for dealing systematically with that information to help them choose better among their alternatives”.

Details

Management Decision, vol. 10 no. 3
Type: Research Article
ISSN: 0025-1747

Access Restricted. View access options
Article
Publication date: 1 March 1972

D.A. Longbottom

Decision analysis, an approach developed to lend support in applying the concepts of decision theory, is particularly relevant for structuring and analysing complex decisions in…

453

Abstract

Decision analysis, an approach developed to lend support in applying the concepts of decision theory, is particularly relevant for structuring and analysing complex decisions in which uncertainty plays a major part.

Details

Management Decision, vol. 10 no. 3
Type: Research Article
ISSN: 0025-1747

Access Restricted. View access options
Article
Publication date: 11 February 2021

Lalith Wickramanayake

This study aims to examine the impact of social media on adolescents’ social behavior, personal conduct, interactions, education, communication, attitudes, skills and abilities…

1675

Abstract

Purpose

This study aims to examine the impact of social media on adolescents’ social behavior, personal conduct, interactions, education, communication, attitudes, skills and abilities. In addition, the study seeks to determine the barriers to social media use by adolescents.

Design/methodology/approach

A convenience sampling technique was used to draw a sample of 300 adolescents from three educational zones in Sri Lanka. A questionnaire survey method was applied to collect raw data and descriptive and inferential statistics were used for the analysis.

Findings

Among the given different social media, YouTube was the most preferred social media for adolescents. Although the majority of adolescents used mobile phones to access social media, they were not high social media users. The impact of social media on adolescents’ education and communication was significantly positive although their intellectual involvement with social media communities was rather low. The use of social media had not decreased the time devoted to studies or seriously complicated adolescents’ social life or encouraged them toward violence and conflict. There was no indication that social media had led to them experiencing mental confusion, health problems, disorderly conduct, social imbalance or suicide.

Originality/value

This study helps to reduce the literature gap of pertinent literature because there is little research information available on social media use in Sri Lanka. Almost all studies based in Sri Lanka in relation to social media have been poorly designed or published in predatory journals. The findings of the present study should be a timely and important resource for policymakers in education, teachers in both government and private schools and many stakeholders not only in Sri Lanka but also in other similar nations.

Details

Global Knowledge, Memory and Communication, vol. 71 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1975

David H. McKee

The editor, Acting Head of the Business Library at Western Michigan University, would be interested to receive communications from persons knowledgeable in the business field, for…

95

Abstract

The editor, Acting Head of the Business Library at Western Michigan University, would be interested to receive communications from persons knowledgeable in the business field, for purposes of submitting reviews. Business Reference Review will attempt to review recent reference materials in the form of books and other media. The intent is to review the contents of business reference sources, enabling those engaged in the selection of these materials to make better judgements, thus utilizing their book budgets more efficiently.

Details

Reference Services Review, vol. 3 no. 3
Type: Research Article
ISSN: 0090-7324

1 – 10 of 228
Per page
102050