Search results

1 – 10 of over 1000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 13 August 2019

Jessica Martinez and Meredith Forrey

New librarians rarely feel fully prepared for academic library instruction. This could be attributed to many factors in both Master of Library and Information Science programs and…

1816

Abstract

Purpose

New librarians rarely feel fully prepared for academic library instruction. This could be attributed to many factors in both Master of Library and Information Science programs and work environments. Imposter syndrome or imposter phenomenon is a common way this insecurity manifests. Imposter phenomenon, first defined in 1978, is an individual’s feeling that they will be exposed as a fraud, regardless of how qualified or knowledgeable they actually are. Throughout the first year as new instruction librarians, the authors tracked their experiences with instruction and the imposter phenomenon. This paper aims to illuminate how imposter phenomenon impacts library instruction, provide suggestions for individual librarians and identify what academic libraries can do institutionally to mitigate feelings of fraudulence among their employees.

Design/methodology/approach

This paper outlines the history and symptoms of imposter phenomenon, focusing on its presence in libraries. The authors draw on existing literature in psychology and library science, their own experience and a survey of 172 librarians. Suggestions for best practices for easing imposter phenomenon are then discussed based on the experiences of the authors and survey respondents.

Findings

This paper suggests several ways to ease the feelings of imposter phenomenon among those employed in academic libraries.

Research limitations/implications

This paper is based on the authors’ experiences, as well as a survey of 172 librarians. The survey was self-selecting, so the results may be skewed, but the themes apparent throughout the responses indicate that imposter phenomenon in libraries is pervasive and warrants further research.

Practical implications

The recommendations presented in this paper will provide new librarians and library administrators with concrete ways to identify and ameliorate imposter phenomenon among new instruction librarians.

Originality/value

Though imposter phenomenon has gained popular attention in wider society, extant research has not sufficiently addressed its role in the realm of academic library instruction. Given that most MLIS programs focus on theory rather than practice, finding ways to give new instruction librarians confidence in their positions is an area of research that warrants more exploration.

Details

Reference Services Review, vol. 47 no. 3
Type: Research Article
ISSN: 0090-7324

Keywords

Access Restricted. View access options

Abstract

Details

“C” Leadership: A New Way to Beat the Competition and Manage Organization Stakeholders
Type: Book
ISBN: 978-1-80117-054-3

Access Restricted. View access options
Book part
Publication date: 17 June 2002

H. M. Zhang and Wei-Hua Lin

Abstract

Details

Transportation and Traffic Theory in the 21st Century
Type: Book
ISBN: 978-0-080-43926-6

Access Restricted. View access options
Article
Publication date: 1 March 1989

W. Cassidy and J. Fryer

A survey of the composition of minced meat – fat, protein,gristle – was carried out in Somerset. Its findings are describedand it is concluded that the recommendation of the Food…

39

Abstract

A survey of the composition of minced meat – fat, protein, gristle – was carried out in Somerset. Its findings are described and it is concluded that the recommendation of the Food Standard Committee for the control of the fat content of mince should be implemented.

Details

British Food Journal, vol. 91 no. 3
Type: Research Article
ISSN: 0007-070X

Keywords

Available. Content available
Book part
Publication date: 27 June 2013

Abstract

Details

Transformational and Charismatic Leadership: The Road Ahead 10th Anniversary Edition
Type: Book
ISBN: 978-1-78190-600-2

Access Restricted. View access options
Article
Publication date: 20 March 2007

Gyöngyi Kovács and Karen M. Spens

This paper aims to further the understanding of planning and carrying out logistics operations in disaster relief.

39605

Abstract

Purpose

This paper aims to further the understanding of planning and carrying out logistics operations in disaster relief.

Design/methodology/approach

Topical literature review of academic and practitioner journals.

Findings

Creates a framework distinguishing between actors, phases, and logistical processes of disaster relief. Drawing parallels of humanitarian logistics and business logistics, the paper discovers and describes the unique characteristics of humanitarian logistics while recognizing the need of humanitarian logistics to learn from business logistics.

Research limitations/implications

The paper is conceptual in nature; empirical research is needed to support the framework. The framework sets a research agenda for academics.

Practical implications

Useful discussion of the unique characteristics of humanitarian logistics. The framework provides practitioners with a tool for planning and carrying out humanitarian logistics operations.

Originality/value

No overarching framework for humanitarian logistics exists in the logistics literature so far. The field of humanitarian logistics has so far received limited attention by logistics academics.

Details

International Journal of Physical Distribution & Logistics Management, vol. 37 no. 2
Type: Research Article
ISSN: 0960-0035

Keywords

Access Restricted. View access options
Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

1127

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Access Restricted. View access options
Article
Publication date: 1 July 2010

J. H. Bickford

To best challenge students’ thinking, researchers and educators must locate or create innovative ways to spark enthusiasm and facilitate criticality. This paper investigates how…

36

Abstract

To best challenge students’ thinking, researchers and educators must locate or create innovative ways to spark enthusiasm and facilitate criticality. This paper investigates how middle school students analyzed various primary and secondary historical documents to construct original political cartoons. Students articulated newly generated understandings about the complex historical event within these original political cartoons. Students then examined and discussed peers’ original political cartoons. This approach was novel because the research literature indicated students rarely are asked to construct original political cartoons to express opinions and understandings. Political cartoons mostly are used as tools for interpretation and usually only with gifted and older students. This approach was successful because of the positive impact that original political cartooning had on students’ engagement, interpretational skills, criticality, expressivity, and the class’s discussions. The original political cartoons served as engaging teaching and learning tools that enabled students to see history’s complex and unsettled nature.

Details

Social Studies Research and Practice, vol. 5 no. 2
Type: Research Article
ISSN: 1933-5415

Keywords

Access Restricted. View access options
Book part
Publication date: 16 July 2015

Laura Senier, Matthew Kearney and Jason Orne

This mixed-methods study reports on an outreach clinics program designed to deliver genetic services to medically underserved communities in Wisconsin.

Abstract

Purpose

This mixed-methods study reports on an outreach clinics program designed to deliver genetic services to medically underserved communities in Wisconsin.

Methodology/approach

We show the geographic distribution, funding patterns, and utilization trends for outreach clinics over a 20-year period. Interviews with program planners and outreach clinic staff show how external and internal constraints limited the program’s capacity. We compare clinic operations to the conceptual models guiding program design.

Findings

Our findings show that state health officials had to scale back financial support for outreach clinic activities while healthcare providers faced increasing pressure from administrators to reduce investments in charity care. These external and internal constraints led to a decline in the overall number of patients served. We also find that redistribution of clinics to the Milwaukee area increased utilization among Hispanics but not among African-Americans. Our interviews suggest that these patterns may be a function of shortcomings embedded in the planning models.

Research/Policy Implications

Planning models have three shortcomings. First, they do not identify the mitigation of health disparities as a specific goal. Second, they fail to acknowledge that partners face escalating profit-seeking mandates that may limit their capacity to provide charity services. Finally, they underemphasize the importance of seeking trusted partners, especially in working with communities that have been historically marginalized.

Originality/Value

There has been little discussion about equitably leveraging genetic advances that improve healthcare quality and efficacy. The role of State Health Agencies in mitigating disparities in access to genetic services has been largely ignored in the sociological literature.

Access Restricted. View access options
Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

1 – 10 of over 1000
Per page
102050