This paper has been written to highlight new ways to increase digital inclusion, specifically getting a greater number of older people to use the internet as part of their daily…
Abstract
Purpose
This paper has been written to highlight new ways to increase digital inclusion, specifically getting a greater number of older people to use the internet as part of their daily lives. It aims to profile a new engagement technique called “embedded outreach” and seeks to discuss the impact this technique has on tackling digital exclusion.
Design/methodology/approach
Data was gathered via a baseline survey at the beginning of the sessions to measure 895 attendees' existing web use and attitudes to the internet. A follow‐up survey of 295 older people two months later captured any change in use and attitude as a result of the sessions. A secondary follow‐up survey measured the legacy of the sessions.
Findings
The embedded outreach model was effective in breaking through many of the multiple barriers which prevent older people from using the web. Data showed that using existing voluntary sector infrastructure was key to reaching people.
Research limitations/implications
Owing to timescales, only one session was delivered to each group. If the project had been carried out over a longer duration then repeat sessions could have been delivered to the groups and results measured.
Originality/value
A wide range of schemes support older people to get online yet most rely on “pull” techniques – where participants have to seek out opportunities. There has been little research into techniques that use existing voluntary sector infrastructure to bring the web to older people.
Details
Keywords
Paula Dootson, Kim A. Johnston, Ian Lings and Amanda Beatson
Deviant consumer behavior (DCB) has serious negative effects on organizations, employees and other customers. While research to date has largely focused on understanding why…
Abstract
Purpose
Deviant consumer behavior (DCB) has serious negative effects on organizations, employees and other customers. While research to date has largely focused on understanding why consumers engage in deviant behaviors, less focus has been placed on exploring how to deter them. This paper aims to shift the conversation from research exploring why consumers engage in deviant behaviors to understanding how DCB could be deterred.
Design/methodology/approach
In this conceptual paper, a research agenda of deterrence tactics is provided with associated propositions to guide future research in the field of DCB.
Findings
A deterrence–neutralization–behavior (DNB) framework is proposed to underpin the seven deterrence tactics outlined in this research agenda. The DNB framework illustrates the positive relationship between neutralization techniques and engagement in DCB, because the techniques reduce the level of cognitive dissonance associated with performing a deviant act beyond an individual’s deviance threshold. The framework adds a new proposed moderating role of deterrence tactics. Deterrence tactics are mechanisms that will reintroduce cognitive dissonance, previously reduced through a neutralization technique, by presenting the consumer with a competing piece of information that challenges their attitudes, beliefs or behavior. Therefore, the authors propose that certain deterrence tactics could diminish the positive effect of different neutralization techniques on DCB if the tactics challenge the justifications consumers are using to excuse their actions – subsequently reintroducing cognitive dissonance.
Practical implications
Practically, this paper is the next step in an effort to provide evidence-based solutions for managers seeking to reduce the negative impact that deviance has on the organization.
Originality/value
To date, research has focused on understanding why DCB occurs with limited attention on how it can be deterred. The value in this paper is in proposing a series of deterrence tactics that are theoretically matched to established antecedents and neutralization techniques associated with DCB. Overall, this paper provides a future research agenda with propositions to build knowledge on effective deterrence tactics for curbing instances of DCB.
Details
Keywords
Many scholarly disciplines are currently engaged in a turn to affect, paying close attention to emotion, feeling and sensation. The purpose of this paper is to locate affect in…
Abstract
Purpose
Many scholarly disciplines are currently engaged in a turn to affect, paying close attention to emotion, feeling and sensation. The purpose of this paper is to locate affect in relation to masculinity, time and space.
Design/methodology/approach
It suggests that historically, in a range of settings, men have been connected to one another and to women, and these affective linkages tells much about the relational quality and texture of historically experienced masculinities.
Findings
Spatial settings, in turn, facilitate, hinder and modify expressions and experiences of affect and social connectedness. This paper will bring space and time into conversation with affect, using two examples from late nineteenth-century New Zealand.
Originality/value
If masculinities scholars often focus on what divides men from women and men from each other, the paper might think about how affect connects people.
Details
Keywords
Ian Phau, Aaron Lim, Johan Liang and Michael Lwin
The purpose of this paper is to identify the antecedents affecting digital piracy of movies, and evaluate them in the context of the theory of planned behaviour (TPB). It will…
Abstract
Purpose
The purpose of this paper is to identify the antecedents affecting digital piracy of movies, and evaluate them in the context of the theory of planned behaviour (TPB). It will also determine via a proxy measurement, if individuals’ intentions to engage in digital piracy will translate into actual engagement in digital piracy of movies.
Design/methodology/approach
In all, 404 students at a large Western Australian University were surveyed using self-administered surveys. The data were analysed via a path analysis using structural equation modelling in order to identify the influences of antecedent factors on individual attitudes and intentions to engage in digital piracy. Finally, through the proxy measurement, actual engagement in digital piracy of movies was evaluated against consumer intentions to perform that behaviour.
Findings
The results confirm the identified antecedents (affect, moral judgement, social habit and self-efficacy) as appropriate in evaluating an individual's intentions to engage in digital piracy of movies. The findings indicated that social habit, self-efficacy and attitude towards digital piracy had a positive effect on individual intentions to engage in digital piracy of movies. It also showed that affect is an antecedent factor to attitudes towards digital piracy but also directly influences individual intentions to engage in digital piracy. Moral judgement and social habits was also found to have negative and positive influences on an individual's engagement in digital piracy of movies.
Practical implications
This study reinforces previous studies in showing that the neutralisation theory and TPB are effective in explaining attitudes towards digital piracy of movies and intentions to engage in it. It has also sought to ascertain if intentions to engage in digital piracy of movies would significantly influence behaviour to engage in digital piracy of movies via a proxy measurement.
Originality/value
This study adds to the literature of piracy in software and music downloads. In terms of digital movies, this study uncovers other possible factors that may affect engagement in digital piracy of movies, which could serve as the basis for future research into the phenomenon of digital piracy.
Details
Keywords
Eric K. Stern, Edward Deverell, Fredrik Fors and Lindy Newlove-Eriksson
Taming the complexity of crisis and integrating diverse narratives and sources regarding crisis events is a serious challenge. The purpose of this paper is to present a…
Abstract
Purpose
Taming the complexity of crisis and integrating diverse narratives and sources regarding crisis events is a serious challenge. The purpose of this paper is to present a methodology for reconstructing, dissecting, and thematically comparing crisis experiences, using the 7/7 London bombings of 2005 as an illustrative empirical application.
Design/methodology/approach
A cognitive-institutional process-tracing methodology suitable compatible with structured focussed comparison of crisis cases (Stern and Sundelius, 2002; cf. George and Bennett, 2005) is used. This cognitive-institutional process tracing and analysis strategy consists of four steps: contextualization, development of a synthetic chronological narrative, identification and reconstruction of decision occasions, and (comparative) thematic analysis.
Findings
The paper demonstrates the feasibility of applying the methodology to real-world cases in the UK and concludes with reflections about the need for contextualized, systematic post mortem crisis analysis taking into account problem and process complexity, differential crisis performances of individuals and organizations under adverse conditions, and the increasing importance of social media and personal communications devices for crisis research and practice.
Practical implications
The methodology used in this paper has the potential to improve the effectiveness of organizational learning and reform efforts in the wake of crisis experiences.
Social implications
Insights associated with the application of this methodology can lead to improved post-crisis learning and fairer accountability processes, and thus contribute to enhancing societal resilience.
Originality/value
The study not only presents an original methodology developed by one of the authors, but also provides a systematic, relatively comprehensive and theoretically informed analysis of the July 7 London bombings based not only upon the documentary record, but also upon a substantial number of interviews.
Details
Keywords
Ricard W Jensen, Yam B Limbu and Yasha Spong
Until now, little research has been conducted to analyse Twitter conversations about the corporate sponsors of football clubs. The conventional and most widely used method has…
Abstract
Until now, little research has been conducted to analyse Twitter conversations about the corporate sponsors of football clubs. The conventional and most widely used method has been to use content analysis to assess the sentiment of the tweets that were sent. However, this approach may be inadequate because sports fans may be unlikely to mention a corporate sponsor in the text they tweet. This study demonstrates the use of visual analytics to assess conversations about corporate sponsors by examining the images people tweet.
Details
Keywords
Eddie W.L. Cheng, Karin Sanders and Ian Hampson
The purpose of this paper is to explicate and test an intention-based model to explain transfer of training behavior. The theory of planned behavior (TPB) is utilized to examine…
Abstract
Purpose
The purpose of this paper is to explicate and test an intention-based model to explain transfer of training behavior. The theory of planned behavior (TPB) is utilized to examine the role of transfer intention in the transfer of training process.
Design/methodology/approach
A sample of 132 construction practitioners in Hong Kong was adopted. All measurement and structural models were assessed with structural equation modeling.
Findings
Results showed that the three antecedents positively affected transfer intention, while perceived behavioral control and transfer intention affected transfer behavior positively. Moreover, a post hoc analysis supported the mediating role of transfer intention in the relationship between the antecedents and transfer behavior.
Practical implications
Confirmation of the mediating role of intention has ascertained that it should be the core of a transfer of training model. To strengthen the transfer behavior, one has to find ways to increase the intention to transfer.
Originality/value
This paper examined an intention-based model of transfer of training based on the TPB. The latter has rarely been applied to the prediction of transfer behavior.
Details
Keywords
To report the highlights of the annual LITA National Forum.
Abstract
Purpose
To report the highlights of the annual LITA National Forum.
Design/methodology/approach
Provides a brief review of the conference.
Findings
The forum offered a wide variety of timely presentations that were on new and emerging technologies and the application to the library environment.
Originality/value
This paper is a useful summary of a conference of interest to library and information management professionals.
Details
Keywords
Cooke, for several decades one of the Capitol's most influential lobbyists on behalf of ALA and library services, tells about the political appeal of libraries at the national…
Abstract
Cooke, for several decades one of the Capitol's most influential lobbyists on behalf of ALA and library services, tells about the political appeal of libraries at the national level. Cooke runs down the history of library‐related legislation, covering a span from the late '50s up until the present day. Following this historical rundown, Cooke puts into perspective the current Goals for American Education, how they relate to history, and how they will affect the future.
THE new President of the Library Association, a handsome portrait of whom appears in the December Library Association Record, brings to the office the influences of a career of…
Abstract
THE new President of the Library Association, a handsome portrait of whom appears in the December Library Association Record, brings to the office the influences of a career of fine public service. We, in common with every journal that speaks to and for librarians, assure him of loyalty and congratulate ourselves on this addition to the roll of distinguished men who have served librarianship. The Record is wise in reminding us that we are more than a librarians' association and the regular election of men of affairs as presidents is a policy that used to be followed and should now be continued. The policy need not exclude in normal circumstances an alternate librarian president.