Multi-faceted discipline strategies of Chinese parenting

2017 ◽  
Vol 41 (4) ◽  
pp. 472-481 ◽  
Author(s):  
Heidi Fung ◽  
Jin Li ◽  
Chi Kwan Lam

Parental disciplining of their misbehaving children continues to draw much research attention. Baumrind’s typology of parenting styles has been frequently used to classify Chinese parenting as more authoritarian. Although influential, research tends predominantly to focus on abstract characterization. Yet, parenting is a practice informed by specific cultural ethnotheories and enacted in response to their children’s behavior in specific contexts. Our study attempted to explore this type of disciplining in situ. We interviewed 89 mothers from Taiwan (45) and Hong Kong (44) with children from near the end of infancy to beginning-school age. Mothers were asked to share their disciplinary strategies for handling four hypothetical yet common situations in which children misbehaved. These situations varied in setting, social distance among participants, possible consequences, nature of rules involved, and degree of conflict. We found five strategy types. Moreover, mothers prioritized them differently for different situations. Finally, we identified four ways of using strategies: single, contingent, simultaneous, or ratcheting-up. Depending on their strategies in a given situation, these uses also varied. We were compelled to conclude that Chinese parenting is more multi-faceted than has been typically portrayed in research. Implications for future research on parenting across cultures are discussed.

2018 ◽  
Vol 39 (4) ◽  
pp. 378-399 ◽  
Author(s):  
Jacob Yuichung Chan ◽  
Alicia J. Harlow ◽  
Rebecca Kinsey ◽  
Lawrence H. Gerstein ◽  
Annis Lai Chu Fung

This study utilized a hierarchical regression model to explore the relationship between reactive aggression, forms of peer victimization, and authoritarian parenting styles. Participants included 1,021 Hong Kong youth and their parents ( N = 1,021), drawn from ten primary schools throughout the municipality. Children completed the Reactive and Proactive Aggression Questionnaire and the Multidimensional Peer Victimization Scale, while parents completed the Parental Styles Dimensions Questionnaire. Results indicated that authoritarian parenting, parental use of verbal hostility, verbal victimization by peers, social manipulation, and attacks on property by peers, all significantly contributed to the variance in reactive aggression. Conversely, physical attacks by peers, physical coercion by parents, and non-reasoning parenting styles were not found to significantly contribute to the regression model. Additionally, gender was found to predict reactive aggression with boys reporting higher scores than girls. The implications of these findings for future research, as well as the limitations of this study are discussed.


Author(s):  
P. Bhavani ◽  
T. G. Amuthavally

The research for the review of literature is one of the first and foremost important steps in the research process. The search for related literature is a time consuming but fruitful phase of any research programme. In this article, the researcher was made an attempt to present findings from the collected related literature on parenting styles and emotional intelligence of adolescents. The main motto behind this article is to review of related literature from 1990 to till date. The paper also summarizes the findings of the studies on Emotional Intelligence and Parenting Styles giving a direction for future research.


2020 ◽  
Author(s):  
Barbara Chuen Yee Lo ◽  
Nok Man Lai ◽  
Ting Kin Ng ◽  
Haobi Wang

BACKGROUND With growing accessibility and need over the past decades, the Internet has experienced a rapid increase in use globally. Specifically, with the accelerated development in information technology, more than 90% of Hong Kong’s citizens use the Internet, and 70% of children in the age group of 6-17 have daily access to it. However, despite the benefits of Internet technology, its addiction could pose serious social and health issues. Therefore, conducting research to investigate its causes and risk factors is fundamental. OBJECTIVE In this study, we examined the relationship between worry and Internet addiction among children in Hong Kong, and investigated the moderating effect of the permissive parenting style on such relationship. METHODS The participants consisted of 227 fourth-grade and fifth-grade students (120 males, 52.9%) from primary schools in Hong Kong with a mean age of 9.55 (SD = .58). Each participant was asked to complete the questionnaires, including the Internet Addiction Test for Internet addiction, the Penn State Worry Questionnaire for Children for worry, and the Parental Authority Questionnaire for the permissive parenting style. RESULTS The results indicated that worry was related to greater Internet addiction among children. Furthermore, there was a moderating effect of the permissive parenting style such that the positive association between worry and Internet addiction was stronger when the permissive parenting style was higher. CONCLUSIONS Our findings imply that parenting styles are influential in the prevention of Internet addiction.


Author(s):  
Sam A. Hardy ◽  
David C. Dollahite ◽  
Chayce R. Baldwin

The purpose of this chapter is to review research on the role of religion in moral development within the family. We first present a model of the processes involved. Parent or family religiosity is the most distal predictor and affects moral development through its influence on parenting as well as child or adolescent religiosity. Additionally, parenting affects moral development directly, but also through its influence on child or adolescent religiosity. In other words, parent or family religiosity dynamically interconnects with parenting styles and practices, and with family relationships, and these in turn influence moral development directly as well as through child or adolescent religiosity. We also discuss how these processes might vary across faith traditions and cultures, and point to directions for future research.


2001 ◽  
Vol 80 (3-4) ◽  
pp. 315-321 ◽  
Author(s):  
J.F. Cadorin ◽  
D. Jongmans ◽  
A. Plumier ◽  
T. Camelbeeck ◽  
S. Delaby ◽  
...  

AbstractTo provide quantitative information on the ground acceleration necessary to break speleothems, laboratory measurements on samples of stalagmite have been performed to study their failure in bending. Due to their high natural frequencies, speleothems can be considered as rigid bodies to seismic strong ground motion. Using this simple hypothesis and the determined mechanical properties (a minimum value of 0.4 MPa for the tensile failure stress has been considered), modelling indicates that horizontal acceleration ranging from 0.3 m/s2 to 100 m/s2 (0.03 to 10g) are necessary to break 35 broken speleothems of the Hotton cave for which the geometrical parameters have been determined. Thus, at the present time, a strong discrepancy exists between the peak accelerations observed during earthquakes and most of the calculated values necessary to break speleothems. One of the future research efforts will be to understand the reasons of the defined behaviour. It appears fundamental to perform measurements on in situ speleothems.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Huoyin Zhang ◽  
Shiyunmeng Zhang ◽  
Jiachen Lu ◽  
Yi Lei ◽  
Hong Li

AbstractPrevious studies in humans have shown that brain regions activating social exclusion overlap with those related to attention. However, in the context of social exclusion, how does behavioral monitoring affect individual behavior? In this study, we used the Cyberball game to induce the social exclusion effect in a group of participants. To explore the influence of social exclusion on the attention network, we administered the Attention Network Test (ANT) and compared results for the three subsystems of the attention network (orienting, alerting, and executive control) between exclusion (N = 60) and inclusion (N = 60) groups. Compared with the inclusion group, the exclusion group showed shorter overall response time and better executive control performance, but no significant differences in orienting or alerting. The excluded individuals showed a stronger ability to detect and control conflicts. It appears that social exclusion does not always exert a negative influence on individuals. In future research, attention to network can be used as indicators of social exclusion. This may further reveal how social exclusion affects individuals' psychosomatic mechanisms.


2021 ◽  
Vol 2 (1) ◽  
pp. 43-61
Author(s):  
Francesc Fusté-Forné ◽  
Tazim Jamal

Research on the relationship between automation services and tourism has been rapidly growing in recent years and has led to a new service landscape where the role of robots is gaining both practical and research attention. This paper builds on previous reviews and undertakes a comprehensive analysis of the research literature to discuss opportunities and challenges presented by the use of service robots in hospitality and tourism. Management and ethical issues are identified and it is noted that practical and ethical issues (roboethics) continue to lack attention. Going forward, new directions are urgently needed to inform future research and practice. Legal and ethical issues must be proactively addressed, and new research paradigms developed to explore the posthumanist and transhumanist transitions that await. In addition, closer attention to the potential of “co-creation” for addressing innovations in enhanced service experiences in hospitality and tourism is merited. Among others, responsibility, inclusiveness and collaborative human-robot design and implementation emerge as important principles to guide future research and practice in this area.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-36
Author(s):  
Fei Chen ◽  
Duming Luo ◽  
Tao Xiang ◽  
Ping Chen ◽  
Junfeng Fan ◽  
...  

Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.


AMS Review ◽  
2020 ◽  
Vol 10 (3-4) ◽  
pp. 279-298 ◽  
Author(s):  
Sven Heidenreich ◽  
Katrin Talke

AbstractIn organizations, mandated adoption contexts are the rule rather than the exception. Individuals, who are denied the choice between adopting and rejecting an innovation, are more likely to engage in opposition behavior, particularly if the innovation conflicts with their held beliefs. Interestingly, neither the construct of forced adoption nor its consequences have received much research attention. To address this gap, we conduct a systematic literature review and provide theoretical rationales for the emergence of innovation resistance and opposition behaviors in organizations. We then develop an innovation decision model of individual adoption behavior that localizes negative outcomes of the secondary adoption process along the different process stages, providing insights into their emergence and potential consequences for the organization. Furthermore, we identify important avenues for future research and show how our innovation decision model can be used to advance theory development on forced adoption.


Sign in / Sign up

Export Citation Format

Share Document