Regina R. Umpstead, Nicole L. Hacker and Emmanuel E. Akanwa
The authors of this study examined how four leadership teams participating in a year-long deeper learning leadership academy understood and adapted key practices for change…
Abstract
Purpose
The authors of this study examined how four leadership teams participating in a year-long deeper learning leadership academy understood and adapted key practices for change leadership, deeper learning and equity in their PK-12 schools.
Design/methodology/approach
This multiple-site case study used interviews, observations and documents to investigate how four school leadership teams developed deeper learning initiatives in their schools.
Findings
This study highlights how participants recast the leadership academy’s three pillars (change leadership, deeper learning and equity) as they engaged in educational reform for ambitious teaching and learning in their own contexts. Three themes emerged: transforming the culture, teaching the whole child and restructuring for collaboration. Overall, the authors found that district leaders must be fully committed to deeper learning for the culture to truly be transformed in schools under their purview.
Originality/value
This article contributes to the literature on supporting school leaders to enact equity-centered deeper learning initiatives using robust professional development. It is useful for understanding key deeper learning strategies and designing future training.
Details
Keywords
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details
Keywords
Anita Lifen Zhao, Nicole Koenig‐Lewis, Stuart Hanmer‐Lloyd and Philippa Ward
Numerous empirical studies on internet banking services (IBS) adoption have focused either on perceived risk or trust; but rarely have they combined these concepts and used…
Abstract
Purpose
Numerous empirical studies on internet banking services (IBS) adoption have focused either on perceived risk or trust; but rarely have they combined these concepts and used empirical evidence to investigate the relationship. This study aims to contribute to this field by looking simultaneously at the roles of trust and perceived risk on consumers' IBS usage intention.
Design/methodology/approach
An integrated model explaining the interrelationships between trust, perceived risk and usage intention is developed. The research was conducted on a sample of 432 young Chinese consumers who can be classified as IBS early adopters. The quantitative findings are enhanced by the analysis of extensive qualitative data providing unique insights into this market.
Findings
Results indicate that there is a significant relationship between trust and perceived risk and that both are crucial in explaining the internet banking usage intention. Furthermore, trust in the bank is fundamental not only to reducing risk perceptions of IBS in general but also to building trust in the banks' competence in terms of IBS activity.
Originality/value
This research adds value to existing studies of online banking, which largely focus on trust and risk separately. In addition, it enables us to contribute to the current literature on the emerging Chinese IBS market, which is largely under‐researched.
Uma Thevi Munikrishnan, Abdullah Al Mamun, Nicole Kok Sue Xin, Ham Siu Chian and Farzana Naznen
Cashless payment is gradually replacing physical currency in almost every financial transaction across the world. Even though cashless payment methods have been available in…
Abstract
Purpose
Cashless payment is gradually replacing physical currency in almost every financial transaction across the world. Even though cashless payment methods have been available in Malaysia since a decade ago, their usage has remained relatively low in comparison to other countries. This study aims to analyse the elements that affect the Malaysian youth’s adoption intention and actual use of cashless payment by extending the unified theory of acceptance and use of technology (UTAUT) model with two key factors (perceived security [PS] and lifestyle compatibility [LC]).
Design/methodology/approach
Data were gathered online from 364 Malaysian youths and processed using partial least squares structural equation modelling.
Findings
The findings revealed that performance expectancy (PE), LC and PS had a positive and substantial effect on the intention to use cashless payment (ICP). In contrast, effort expectancy (EE) and social influence did not have any considerable influence on ICP. Furthermore, ICP had substantial mediating effects between the adoption of cashless payment (ACP) and PE, LC and PS. In the analysis of the moderating effect of age, gender, experience and voluntariness, only experience had moderating effects on the associations between PE and ICP and between FC and ACP.
Research limitations/implications
This study’s findings will be highly useful for marketers and the management as they plan their promotional and marketing tactics, with a focus on the factors that inspire customers to adopt cashless payments. Besides, architects and designers can benefit from the study results while designing and updating their services by consolidating consumers’ lifestyle standards as well as enhancing security features. Finally, governments may support service providers with security building through legislative measures and policy campaigns to strengthen the trustworthiness and mass adoption of contactless payment.
Originality/value
This study extended the UTAUT model with two new variables, i.e. PS and LC.
Details
Keywords
Priska Daphi, Anja Lê and Peter Ullrich
This chapter provides an analysis of images produced and employed in protests against surveillance in Germany in 2008 and 2009. For this purpose, a method of visual analysis is…
Abstract
This chapter provides an analysis of images produced and employed in protests against surveillance in Germany in 2008 and 2009. For this purpose, a method of visual analysis is developed that draws mainly on semiotics and art history. Following this method, the contribution examines a selection of images (pictures and graphic design) from the anti-surveillance protests in three steps: description of components, detection of conventional signs, and contextual analysis. Furthermore, the analysis compares the images of the two major currents of the protest (liberal and radical left) in order to elucidate the context in which images are created and used. The analysis shows that images do not merely illustrate existing political messages but contribute to movements’ systems of meaning creation and transportation. The two currents in the protests communicate their point of view through the images both strategically and expressively. The images play a crucial role in formulating groups’ different strategies as well as worldviews and identities. In addition, the analysis shows that the meaning of images is contested and contextual. Images are produced and received in specific national as well as issue contexts. Future research should address the issue of context and reception in greater depth in order to further explore the effects of visual language on mobilization. Overall, the contribution demonstrates that systematic visual analysis allows our understanding of social movements’ aims, strategy, and collective identity to be deepened. In addition, visual analysis may provide activists with a tool to critically assess their visual communication.
Details
Keywords
Shermon Ortega Cruz and Nicole Anne Kahn-Parreño
This paper aims to introduce, unpack, explore, make sense and share Hiraya Foresight via the Engaged Foresight approach as a futures concept, framework and methodology to…
Abstract
Purpose
This paper aims to introduce, unpack, explore, make sense and share Hiraya Foresight via the Engaged Foresight approach as a futures concept, framework and methodology to reconceptualize foresight and reframe anticipatory processes to enable the self and communities to reimagine visions of the future. This indigenous foresight process offers to strip the husk and break the shell of conscious, colonial anticipation and reveal and liberate unconscious imagination that enables ethical aspirations to emerge.
Design/methodology/approach
This paper introduces and examines the context, purpose and process of the four waves of the Hiraya Foresight Framework via the Engaged Foresight approach. These were constructed through the use of the Engaged Foresight approach, through workshops, a literature review and an action–learning approach. The first wave, lawak, looks into the breadth of foresight. The second wave, lalim, looks into the depth of foresight. Tayog, the third wave, looks into the peak of foresight. Finally, the fourth wave of foresight kababaang-loob contemplates the nature, values and wisdom of foresight.
Findings
This paper shares the processes, experiences and impacts through five case studies where the Hiraya Foresight Framework via the Engaged Foresight approach was applied. This paper shares the impacts of Hiraya Foresight in democratizing and indigenizing futures literacy.
Originality/value
This paper describes and offers Hiraya Foresight via the Engaged Foresight approach as an indigenous approach to decolonize futures studies and foresight practice.
Details
Keywords
Nicole K. Dalmer and Isto Huvila
The purpose of this paper is to suggest that a closer consideration of the notion of work and, more specifically, information work as a sensitizing concept in Library and…
Abstract
Purpose
The purpose of this paper is to suggest that a closer consideration of the notion of work and, more specifically, information work as a sensitizing concept in Library and Information Science (LIS) can offer a helpful way to differently consider how people interact and engage with information and can complement a parallel focus on practices, behaviours and activities.
Design/methodology/approach
Starting with the advent of the concept of information work in Corbin and Strauss’ work, the paper then summarizes how information work has evolved and taken shape in LIS research and discourse, both within and outside of health-related information contexts.
Findings
The paper argues that information work affords a lens that can acknowledge the multiple levels of effort and multiple processes (cognitive, physical or social-behavioural) related to information activities. This paper outlines six affordances that the use of information work within LIS scholarship imparts: acknowledges the conceptual, mental and affective; brings attention to the invisibility of particular information activities and their constituents; opens up and distinguishes the many different lines of work; destabilizes hierarchies between professionals and non-professionals; emphasizes goals relating to information activities and their underlying pursuits; and questions work/non-work dichotomies established in existing LIS models.
Originality/value
This paper is a first in bringing together the many iterations of information work research in LIS. In doing so, this paper serves as a prompt for other LIS scholars to take up, challenge the existing borders of, and thus advance the concept of information work.
Details
Keywords
Ronan de Kervenoael, Didier Soopramanien, Alan Hallsworth and Jonathan Elms
This paper aims to demonstrate the need for an improved understanding of the opportunities offered by privacy online. This is contextualized in the case of supermarket purchases…
Abstract
Purpose
This paper aims to demonstrate the need for an improved understanding of the opportunities offered by privacy online. This is contextualized in the case of supermarket purchases of food in particular, often described as an intimate and personal choice. In the case of grocery shopping, the “intimacy” may be at the household level between members or/and between e‐grocers' food offerings, and their other “non‐food” related services
Design/methodology/approach
This paper draws upon social practice theory research, retailing and consumer behaviour in order to develop a conceptual framework for understanding the value of positive privacy. The research uses 39 in‐depth interviews of e‐grocery shoppers in the area of Portsmouth (UK).
Findings
This paper suggests a framework for embedded elements of positive privacy into retailing strategy as a driver for growth in the e‐grocery sector. Three meta‐themes requiring different approaches to privacy are uncovered. Positive privacy is dynamic and contextual at the consumer/household levels as well as for product/e‐grocery brands.
Research limitations/implications
This paper advocates the building of long‐term sustainable relationship through sharing, offering, and exchange of information rather than pure technological chasing of data.
Originality/value
A consumer centred bottom‐up approach is employed demonstrating the value of two‐way dialogues with consumers on sensitive issues. E‐grocery is used as an illustration that involves regular re‐purchase of a basket of staple goods over a long period of time where privacy becomes a latent long‐term concern.
Details
Keywords
Modern societies are built around the expansion of science and universities and the exposure of large numbers of the public to the curricula of higher education. In this sense…
Abstract
Modern societies are built around the expansion of science and universities and the exposure of large numbers of the public to the curricula of higher education. In this sense they are relatively recent phenomena. Higher educational expansion itself has been a very recent phenomenon. Conventional wisdom held that higher education enrollments in the United States doubled every 20 years in a smooth progression (Price, 1963). New research has altered this picture dramatically. The 1960s ushered in a sea change in the expansion of higher educational enrollments in the United States – and in virtually every other society (Schofer & Meyer, 2005). The transition to mass higher education was abrupt. At the beginning of the 1960s about two million students were enrolled in U.S. higher education. Four decades later in the year 2000, this figure has risen to 14 million – a sevenfold increase (Schofer & Meyer, 2005, Fig. 5). Earlier developments, such as the G.I. Bill, show no comparable effects on enrollments to the massive changes that the 1960s brought in their wake.