Jessica Martinez and Meredith Forrey
New librarians rarely feel fully prepared for academic library instruction. This could be attributed to many factors in both Master of Library and Information Science programs and…
Abstract
Purpose
New librarians rarely feel fully prepared for academic library instruction. This could be attributed to many factors in both Master of Library and Information Science programs and work environments. Imposter syndrome or imposter phenomenon is a common way this insecurity manifests. Imposter phenomenon, first defined in 1978, is an individual’s feeling that they will be exposed as a fraud, regardless of how qualified or knowledgeable they actually are. Throughout the first year as new instruction librarians, the authors tracked their experiences with instruction and the imposter phenomenon. This paper aims to illuminate how imposter phenomenon impacts library instruction, provide suggestions for individual librarians and identify what academic libraries can do institutionally to mitigate feelings of fraudulence among their employees.
Design/methodology/approach
This paper outlines the history and symptoms of imposter phenomenon, focusing on its presence in libraries. The authors draw on existing literature in psychology and library science, their own experience and a survey of 172 librarians. Suggestions for best practices for easing imposter phenomenon are then discussed based on the experiences of the authors and survey respondents.
Findings
This paper suggests several ways to ease the feelings of imposter phenomenon among those employed in academic libraries.
Research limitations/implications
This paper is based on the authors’ experiences, as well as a survey of 172 librarians. The survey was self-selecting, so the results may be skewed, but the themes apparent throughout the responses indicate that imposter phenomenon in libraries is pervasive and warrants further research.
Practical implications
The recommendations presented in this paper will provide new librarians and library administrators with concrete ways to identify and ameliorate imposter phenomenon among new instruction librarians.
Originality/value
Though imposter phenomenon has gained popular attention in wider society, extant research has not sufficiently addressed its role in the realm of academic library instruction. Given that most MLIS programs focus on theory rather than practice, finding ways to give new instruction librarians confidence in their positions is an area of research that warrants more exploration.
Details
Keywords
W. Cassidy and J. Fryer
A survey of the composition of minced meat – fat, protein,gristle – was carried out in Somerset. Its findings are describedand it is concluded that the recommendation of the Food…
Abstract
A survey of the composition of minced meat – fat, protein, gristle – was carried out in Somerset. Its findings are described and it is concluded that the recommendation of the Food Standard Committee for the control of the fat content of mince should be implemented.
Details
Keywords
Gyöngyi Kovács and Karen M. Spens
This paper aims to further the understanding of planning and carrying out logistics operations in disaster relief.
Abstract
Purpose
This paper aims to further the understanding of planning and carrying out logistics operations in disaster relief.
Design/methodology/approach
Topical literature review of academic and practitioner journals.
Findings
Creates a framework distinguishing between actors, phases, and logistical processes of disaster relief. Drawing parallels of humanitarian logistics and business logistics, the paper discovers and describes the unique characteristics of humanitarian logistics while recognizing the need of humanitarian logistics to learn from business logistics.
Research limitations/implications
The paper is conceptual in nature; empirical research is needed to support the framework. The framework sets a research agenda for academics.
Practical implications
Useful discussion of the unique characteristics of humanitarian logistics. The framework provides practitioners with a tool for planning and carrying out humanitarian logistics operations.
Originality/value
No overarching framework for humanitarian logistics exists in the logistics literature so far. The field of humanitarian logistics has so far received limited attention by logistics academics.
Details
Keywords
Abdullah Oguz, Nikhil Mehta and Prashant Palvia
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…
Abstract
Purpose
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.
Design/methodology/approach
The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.
Findings
A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.
Originality/value
As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.
Details
Keywords
To best challenge students’ thinking, researchers and educators must locate or create innovative ways to spark enthusiasm and facilitate criticality. This paper investigates how…
Abstract
To best challenge students’ thinking, researchers and educators must locate or create innovative ways to spark enthusiasm and facilitate criticality. This paper investigates how middle school students analyzed various primary and secondary historical documents to construct original political cartoons. Students articulated newly generated understandings about the complex historical event within these original political cartoons. Students then examined and discussed peers’ original political cartoons. This approach was novel because the research literature indicated students rarely are asked to construct original political cartoons to express opinions and understandings. Political cartoons mostly are used as tools for interpretation and usually only with gifted and older students. This approach was successful because of the positive impact that original political cartooning had on students’ engagement, interpretational skills, criticality, expressivity, and the class’s discussions. The original political cartoons served as engaging teaching and learning tools that enabled students to see history’s complex and unsettled nature.
Details
Keywords
Laura Senier, Matthew Kearney and Jason Orne
This mixed-methods study reports on an outreach clinics program designed to deliver genetic services to medically underserved communities in Wisconsin.
Abstract
Purpose
This mixed-methods study reports on an outreach clinics program designed to deliver genetic services to medically underserved communities in Wisconsin.
Methodology/approach
We show the geographic distribution, funding patterns, and utilization trends for outreach clinics over a 20-year period. Interviews with program planners and outreach clinic staff show how external and internal constraints limited the program’s capacity. We compare clinic operations to the conceptual models guiding program design.
Findings
Our findings show that state health officials had to scale back financial support for outreach clinic activities while healthcare providers faced increasing pressure from administrators to reduce investments in charity care. These external and internal constraints led to a decline in the overall number of patients served. We also find that redistribution of clinics to the Milwaukee area increased utilization among Hispanics but not among African-Americans. Our interviews suggest that these patterns may be a function of shortcomings embedded in the planning models.
Research/Policy Implications
Planning models have three shortcomings. First, they do not identify the mitigation of health disparities as a specific goal. Second, they fail to acknowledge that partners face escalating profit-seeking mandates that may limit their capacity to provide charity services. Finally, they underemphasize the importance of seeking trusted partners, especially in working with communities that have been historically marginalized.
Originality/Value
There has been little discussion about equitably leveraging genetic advances that improve healthcare quality and efficacy. The role of State Health Agencies in mitigating disparities in access to genetic services has been largely ignored in the sociological literature.
Details
Keywords
Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…
Abstract
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.
In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.
In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.
Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.