Three early papers on self-neglect

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Stephen Martineau

Purpose The paper examines three English research papers on self-neglect, from 1957, 1966 and 1975, discussing them in the context of more recent thinking and the statutory framework in England. Design/methodology/approach In reviewing the three research papers, developments and points of continuity in the field of self-neglect were identified and are discussed in this paper. Findings In light of the findings of the three articles, the present paper traces some of the classificatory refinements in this field that have taken place since the papers were published, notably in respect of hoarding and severe domestic squalor. Some of the difficulties in making judgements about behaviour thought to breach societal norms are described, and the challenges practitioners face in intervening in cases, particularly where the person concerned is refusing assistance, are examined. Originality/value By drawing on the historical research context, the paper contributes to our current understanding of the field of self-neglect.

2019 ◽  
Vol 48 (1) ◽  
pp. 91-108
Author(s):  
Remy Low

Purpose For the interested teacher, teacher educator and educational researcher seeking an entry point into how mindfulness relates to teachers’ work, the burgeoning and divergent appeals for the relevance of mindfulness to teachers can be bewildering. The purpose of this paper is to offer teachers, teacher educators and educational researchers a conceptual framework for understanding the different orientations and sources of mindfulness as it has been recommended to teachers. Design/methodology/approach Using Foucault’s (1972) concept of “discursive formations” as a heuristic device, this paper argues that mindfulness as pitched to teachers can be helpfully understood as arising from three distinct orientations. Findings Statements about mindfulness and its relevance to teachers emerge from three distinct discursive formations – traditional, psychological and engaged – that each constitute the “problem” faced by teachers respectively as suffering, stress or alienation. Specific conceptions of mindfulness are then advanced as a solution to these problems by certain authoritative subjects and institutions in ways that are taken as legitimate within each discursive formation. Originality/value Apart from offering a historical and discursive mapping of the different discursive formations from which mindfulness is pitched to teachers, this paper also highlights how each of these orientations impies a normative view of what a teacher should be. Suggestions for further historical research are also offered along the lines of genealogy, epistemology and ontology.


2017 ◽  
Vol 69 (6) ◽  
pp. 674-687 ◽  
Author(s):  
Jose Luis Ortega

Purpose The purpose of this paper is to analyze the relationship between dissemination of research papers on Twitter and its influence on research impact. Design/methodology/approach Four types of journal Twitter accounts (journal, owner, publisher and no Twitter account) were defined to observe differences in the number of tweets and citations. In total, 4,176 articles from 350 journals were extracted from Plum Analytics. This altmetric provider tracks the number of tweets and citations for each paper. Student’s t-test for two-paired samples was used to detect significant differences between each group of journals. Regression analysis was performed to detect which variables may influence the getting of tweets and citations. Findings The results show that journals with their own Twitter account obtain more tweets (46 percent) and citations (34 percent) than journals without a Twitter account. Followers is the variable that attracts more tweets (ß=0.47) and citations (ß=0.28) but the effect is small and the fit is not good for tweets (R2=0.46) and insignificant for citations (R2=0.18). Originality/value This is the first study that tests the performance of research journals on Twitter according to their handles, observing how the dissemination of content in this microblogging network influences the citation of their papers.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Scott Storm ◽  
Karis Jones

Purpose This paper aims to describe the critical literacies of high school students engaged in a youth participatory action research (YPAR) project focused on a roleplaying game, Dungeons and Dragons, in a queer-led afterschool space. The paper illustrates how youth critique and resist unjust societal norms while simultaneously envisioning queer utopian futures. Using a queer theory framework, the authors consider how youth performed disidentifications and queer futurity. Design/methodology/approach This study is a discourse analysis of approximately 85 hours of audio collected over one year. Findings Youth engaged in deconstructive critique, disidentifications and queer futurity in powerful enactments of critical literacies that involved simultaneous resistance, subversion, imagination and hope as youth envisioned queer utopian world-building through their fantasy storytelling. Youth acknowledged the injustice of the present while radically envisioning a utopian future. Originality/value This study offers an empirical grounding for critical literacies centered in queer theory and explores how youth engage with critical literacies in collaboratively co-authored texts. The authors argue that queering critical literacies potentially moves beyond deconstructive critique while simultaneously opening spaces for resistance, imagination and utopian world-making through linguistic and narrative-based tools.


2020 ◽  
Vol 31 (2) ◽  
pp. 173-208
Author(s):  
Britta Gammelgaard ◽  
Satish Kumar ◽  
Debidutta Pattnaik ◽  
Rohit Joshi

PurposeInternational Journal of Logistics Management (IJLM) celebrated 30 years of its publication in 2019. This study provides a retrospective overview of the IJLM articles between 1990 and 2019.Design/methodology/approachThe authors applied bibliometrics to study and present a retrospective summary of the publication trends, citations, pattern of authorship, productivity, popularity depicting influence, and the impact of the IJLM, its contributors, their affiliations, and discusses the conceptual layout of IJLM's prolific themes.FindingsWith 23 yearly articles, IJLM contributed 689 specialized research papers on Supply Chain Management (SCM) by 2019. Authorship grew by 42 new contributors adding up to 1,256 unique IJLM authors by 2019. Each of its lead contributors associated with 1.55 other authors to contribute an article in the journal among which 93% are cited at least once. Survey-based research dominated in last 30 years. The h-index of the journal is 73 while its g-index suggests that 133 IJLM articles were cited at least 17,689 times in Scopus. IJLM authors affiliated to the Cranfield University and the US contributed the highest count of articles. Bibliographic coupling analysis groups IJLM articles into eight bibliographic clusters while network analysis exposes the thematic layout of IJLM articles.Research limitations/implicationsThe literature selection is confined to the Scopus database starting from 1990, a year before the inception of the IJLM, thereby limiting its scope.Originality/valueThis study is the first retrospective bibliometric analysis of the IJLM, which is useful for aspiring contributors.


2020 ◽  
Vol 54 (2) ◽  
pp. 380-418 ◽  
Author(s):  
Xiaohui Shi ◽  
Feng Li ◽  
Pattarin Chumnumpan

Purpose As a frequently observed business phenomenon, the use of product scarcity to improve a product’s market performance has received increasing attention from both academics and practitioners. The resulting literature has covered a wide variety of issues based on various theories, using different research methods, in a diverse range of settings. However, this diversity also makes it difficult to grasp the core themes and findings, and to see the outstanding knowledge gaps. This paper aims to review previous studies on the use of product scarcity in marketing and identifies new directions for future research. Design/methodology/approach A systematic review was conducted to identify and analyse 66 research papers published in business and management journals between 1970 and 2017. Findings The authors examined the underlying theories of scarcity-based marketing, and developed a conceptual framework that describes the key factors of product scarcity and how they influence both consumers and the market. They also highlighted some key achievements in modelling the processes involved in using product scarcity in marketing. Originality/value This analysis of the identified papers suggests that there are substantial gaps in our knowledge of this field, which opens up new paths for future research. For future research, the authors identified three directions aimed at: addressing the practical needs of firms in understanding product scarcity; guiding the implementation of scarcity-based strategies; and measuring, monitoring and predicting the level of product scarcity and its impacts during implementation.


2020 ◽  
Vol 33 (7) ◽  
pp. 1627-1655
Author(s):  
Da Yang ◽  
John Dumay ◽  
Dale Tweedie

PurposeThis paper examines how accounting either contributes to or undermines worker resistance to unfair pay, thereby enhancing our current understanding of the emancipatory potential of accounting.Design/methodology/approachWe apply Jacques Rancière's concept of politics and build on recent calls to introduce Rancière's work to accounting by analysing a case based on workers in an Australian supermarket chain who challenged their employer Coles over wage underpayments.FindingsWe find that in this case, accounting is, in part, a means to politics and a part of the police in Rancière's sense. More specifically, accounting operated within the established order to constrain the workers, but also provided workers with a resource for their political acts that enabled change.Originality/valueThis empirical research adds to Li and McKernan (2016) and Brown and Tregidga (2017) conceptual work on Rancière. It also contributes more broadly to emancipatory accounting research by identifying radical possibilities for workers' accounting to bring about change.


2020 ◽  
Vol 36 (2) ◽  
pp. 149-156
Author(s):  
Hero Khezri ◽  
Peyman Rezaei-Hachesu ◽  
Reza Ferdousi

Purpose Nowadays, there is a rapid growth in different sciences that has led to thousands of publications in the form of scientific research papers. The readers of these papers are generally the people that are involved in science (i.e. researchers, students, teachers and professors). On the other hand, practitioners rarely use these articles as a resource to learn and apply new methods. They prefer an easy to understand, step-by-step guide (i.e. cookbook) helping them skip over the difficult scientific terms and structures. Therefore, because of a shortage of tools in this space, it takes practitioners many years to use newly developed methods. Design/methodology/approach The purpose of this study is to review the literature on verified repositories and presents the necessity of method repositories. Findings This paper aims to introduce method repositories as new tools to bridge the gap between science and practice. Originality/value Method repositories presented in this paper act as an easy to understand guide for newly developed methods in specific fields.


2017 ◽  
Vol 119 (1) ◽  
pp. 105-121 ◽  
Author(s):  
Robert Smith

Purpose The contemporary rustler is a shrewd businessman, or rogue farmer exploiting food supply chain anomalies. Indeed, the first conviction in the UK for 20 years was a farmer stealing from neighbouring farmers. The theft of sheep in the UK is an expanding criminal enterprise which remains under researched. The purpose of this paper is to examine what is known of the illegal trade and its links to food fraud from a supply chain perspective with an emphasis on food integrity issues. Design/methodology/approach There is a dearth of current viable literature on livestock theft in a western context making it necessary to turn to socio-historical research and to official documents such as those published by the NFU and other insurance companies to build up a picture of this illegal practice. This is supplemented by documentary research of articles published in the UK press. Findings From this raw data a typology of rustlers is developed. The findings point to insider “supply chain” knowledge being a key facet in the theft of livestock. Other examples in the typology relate to urban thieves wrestling live sheep into a car and to industry insiders associated with the abattoir sector. Research limitations/implications The obvious limitations is that as yet there are few detected cases of rustling in the UK so the developing typology of rustlers is sketchy. Another limitation is that much of the evidence upon which the typology is developed is anecdotal. Originality/value The typology should prove helpful to academics, insurance companies, investigators, industry insiders and farmers to help them understand this contemporary crime and how to prevent its spread. It also sheds light on food integrity in relation to the purchase and consumption of the end product in that customers expect to be purchasing legally and ethically reared animal products.


2020 ◽  
Vol 36 (4) ◽  
pp. 1-3
Author(s):  
Mayuree Sengupta

Purpose The article examines strategically directing the breadth of scope of a patent and hazards of litigation vis-à-vis the length of claims for innovating firms. Design/methodology/approach This paper enumerates latest literature on assessing patent scope and hence protection afforded to firm innovations. Based on prior research findings, this paper proposes to maintain a balanced and nuanced approach to claim drafting to assure grant of patent while minimizing litigation threats. Findings To strategically manage patent grant and minimize litigation threat, firms would better take a leaf out of academic discourse and streamline claim drafting – not too wide to earn an examiner’s ire and not too narrow to let an infringer bypass by. Unlike smaller firms or universities, big firms are less likely to renew a patent with less scope. Research limitations/implications The study sample in contemporary literature is exclusive to patents from US Patent and Trademark Office. Whether the same result will be replicated for diverse countries is uncertain. Practical implications The understanding that patent scope not only influences grant chances but also is an indicator of future litigation threat can help patent practitioners and innovating firms in strategically directing the patent. Originality/value The paper draws from the findings of three well-articulated recent research papers. The paper’s originality and value is in providing practical insights on how to perfect patent scope in a real world based on academic discourse.


2020 ◽  
Vol 21 (2) ◽  
pp. 291-307
Author(s):  
Giampaolo Bella

PurposeSecurity ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of human behaviour. For example, this is the case with the recent news headline of a large-scale attack against Electrum Bitcoin wallets, which manages to spread a malicious update of the wallet app. The author therefore sets out to look at things through a different lens.Design/methodology/approachThe author makes the (metaphorical) hypothesis that humans arrived on Earth along with security ceremonies from a very far planet, the Cybersecurity planet. The author’s hypothesis continues, in that studying (by huge telescopes) the surface of Cybersecurity in combination with the logical projection on that surface of what happens on Earth is beneficial for us earthlings.FindingsThe author has spotted four cities so far on the remote planet. Democratic City features security ceremonies that allow humans to follow personal paths of practice and, for example, make errors or be driven by emotions. By contrast, security ceremonies in Dictatorial City compel to comply, hence humans here behave like programmed automata. Security ceremonies in Beautiful City are so beautiful that humans just love to follow them precisely. Invisible City has security ceremonies that are not perceivable, hence humans feel like they never encounter any. Incidentally, the words “democratic” and “dictatorial” are used without any political connotation.Originality/valueA key argument the author shall develop is that all cities but Democratic City address the human factor, albeit in different ways. In the light of these findings, the author will also discuss security ceremonies of our planet, such as WhatsApp Web login and flight boarding, and explore room for improving them based upon the current understanding of Cybersecurity.


Sign in / Sign up

Export Citation Format

Share Document