Hazra, Ummaha and Priyo, Asad Karim Khan (2022): Unethical practices in online classes during COVID-19 pandemic: an analysis of affordances using routine activity theory. Published in: Journal of Information, Communication & Ethics in Society , Vol. 20, No. 4 (12 October 2022): pp. 546-567.
Preview |
PDF
Unethical practices in online classes during COVID_Revision_MPRA.pdf Download (358kB) | Preview |
Abstract
Purpose: While online classes have enabled many universities to carry out their regular academic activities, they have also given rise to new and unanticipated ethical concerns. We focus on the“dark side” of online class settings and attempt to illuminate the ethical problems associated with them. The purpose of this study is to investigate the affordances stemming from the technology-user interaction that can result in negative outcomes. We also attempt to understand the context in which these deleterious affordances are actualized.
Design/methodology/approach: We obtain the data from narratives written by students at a top private university in Bangladesh about their experiences of online classes and exams and from focus group discussions with them. We use the lens of affordance theory to identify the abilities that goal-oriented actors – primarily students – obtain from the technology-user interactions, which result in negative outcomes. We also attempt to understand the contextual actualization of those affordances through the lens of Routine Activity Theory (RAT).
Findings: We find three deleterious affordances and three associated deviant outcomes. Nonmonitorability which results in academic dishonesty, disguiseability which results in cyber-truancy, and intrudeability which results in embarrassment and harassment. Our findings reveal a deeper underlying problem with the existing educational approach in the universities of Bangladesh and suggest that there is a need to introduce more modern teaching techniques focused on issues such as student engagement and interactive learning.
Originality/value: To the best of our knowledge, this is the first paper that combines affordance theory with RAT to identify unethical practices observed in online class settings in the context of a least developed country like Bangladesh and to examine the environmental components that give rise to the pre-conditions for the unethical practices to surface.
Item Type: | MPRA Paper |
---|---|
Original Title: | Unethical practices in online classes during COVID-19 pandemic: an analysis of affordances using routine activity theory |
Language: | English |
Keywords: | Online education, Unethical practices, Affordances, Routine activity theory, Dark side of technology, COVID-19 pandemic |
Subjects: | I - Health, Education, and Welfare > I2 - Education and Research Institutions > I23 - Higher Education ; Research Institutions I - Health, Education, and Welfare > I2 - Education and Research Institutions > I29 - Other O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights > O31 - Innovation and Invention: Processes and Incentives O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights > O32 - Management of Technological Innovation and R&D O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights > O33 - Technological Change: Choices and Consequences ; Diffusion Processes |
Item ID: | 117853 |
Depositing User: | Asad Priyo |
Date Deposited: | 12 Jul 2023 07:05 |
Last Modified: | 19 Jul 2023 01:50 |
References: | Adedoyin, O. B., & Soykan, E. (2020): Covid-19 pandemic and online learning: the challenges and opportunities. Interactive Learning Environments, DOI: 10.1080/10494820.2020.1813180 Al-Nuaimi, M. N., Bouazza, A., & Abu-Hilal, M. M. (2020). ICT ethics-related cognition among undergraduate students. Journal of Information, Communication and Ethics in Society, 18(4), 589-607. doi: 10.1108/jices-08-2019-0097 Alleyne, P., & Phillips, K. (2011). Exploring Academic Dishonesty among University Students in Barbados: An Extension to the Theory of Planned Behaviour. Journal of Academic Ethics, 9(4), 323-338. doi: 10.1007/s10805-011-9144-1 Amzalag, M., Shapira, N., & Dolev, N. (2021). Two sides of the coin: Lack of academic integrity in exams during the corona pandemic, students’ and lecturers’ perceptions. Journal of Academic Ethics. doi: https://doi.org/10.1007/s10805-021-09413-5 Archambault, L., Kennedy, K., & Bender, S. (2013). Cyber-Truancy. Journal of Research on Technology in Education, 46(1), 1-28. doi: 10.1080/15391523.2013.10782611 Arco-Tirado, J. L., Fernández-Martín, F. D., & Hervás-Torres, M. (2020). Evidence-based peer-tutoring program to improve students’ performance at the university. Studies in Higher Education, 45(11), 2190-2202. doi:10.1080/03075079.2019.1597038 Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: Technological antecedents and implications. MIS Quarterly, 35(4), 831-858. Azlan, C. A., Wong, J. H. D., Tan, L. K., Huri, M. S. N., Ung, N. M., Pallath, V, Tan, C.P.L., Yeong, C.H. and Ng, K.H. (2020). Teaching and learning of postgraduate medical physics using Internet-based e-learning during the COVID-19 pandemic – A case study from Malaysia. Physica Medica, 80, https://doi.org/10.1016/j.ejmp.2020.10.002 Bailenson, J. N. (2021). Nonverbal Overload: A Theoretical Argument for the Causes of Zoom Fatigue. Technology, Mind, and Behavior, 2(1). Doi: https://doi.org/10.1037/tmb0000030 Becker, M. (2019). Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy. Ethics and Information Technology, 21(4), 307-317. Doi: 10.1007/s10676-019-09508-z Bennett, A. A., Campion, E. D., Keeler, K. R., & Keener, S. K. (2021). Videoconference fatigue? Exploring changes in fatigue after videoconference meetings during COVID-19. Journal of Applied Psychology, 106(3), 330-344. Doi: 10.1037/apl0000906 Bernhard, E., Recker, J., & Burton-Jones, A. (2013, 15-18 December). Understanding the actualization of affordances: A study in the process modeling context. Paper presented at the International Conference on Information Systems, Università Bocconi, Milan. Bhaskar, R. (2008). A realist theory of science. Abingdon, UK: Routledge. Bloomfield, B. P., Latham, Y., & Vurdubakis, T. (2010). Bodies, Technologies and Action Possibilities : When is an Affordance? Sociology, 44(3), 415–433. Bonwell, C. C., & Eison, J. A. (1991). Active learning: Creating excitement in the classroom. 1991 ASHE-ERIC higher education reports: ERIC. Bowman-Perrott, L., Davis, H., Vannest, K., Williams, L., Greenwood, C., & Parker, R. (2013). Academic benefits of peer tutoring: A meta-analytic review of single-case research. School psychology review, 42(1), 39-55. Doi:10.1080/02796015.2013.12087490 Brady, P. Q., Randa, R., & Reyns, B. W. (2016). From WWII to the World Wide Web: A research note on social changes, online “places,” and a new online activity ratio for routine activity theory. Journal of Contemporary Criminal Justice, 32(2), 129-147. Doi: 10.1177/1043986215621377 Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Reseach in Psychology, 3, 77-101. Bygstad, B., Munkvold, B. E., & Volkoff, O. (2016). Identifying Generative Mechanisms through Affordances: A Framework for Critical Realist Data Analysis. Journal of Information Technology, 31(1), 83-96. Doi: 10.1057/jit.2015.13 Castillo, R. V. C., Catanaoan, M.-j. T., Obliopas, J. F. E., & Linsangan, N. B. (2018). Class Attendance Generation through Multiple Facial Detection and Recognition Using Artificial Neural Network. Paper presented at the Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, Ha Noi, Viet Nam. https://doi.org/10.1145/3278312.3278320 Chan, T. K. H., Cheung, C. M. K., & Wong, R. Y. M. (2019). Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives. Journal of Management Information Systems, 36(2), 574-609. Doi: 10.1080/07421222.2019.1599500 Chankova, M. (2020). Teaching Academic Integrity: the Missing Link. Journal of Academic Ethics, 18(2), 155-173. Doi: 10.1007/s10805-019-09356-y Chauhan, P. K., Wood, E., Plummer, T., & Forsyth, G. (2018). Peer-Based Interventions on Academic Integrity: Assessing Immediate and Long Term Learning. Journal of Academic Ethics, 16(2), 133-149. Doi: 10.1007/s10805-017-9296-8 Chen, J., & Lin, T.-F. (2008). Class Attendance and Exam Performance: A Randomized Experiment. The Journal of Economic Education, 39(3), 213-227. Doi: 10.3200/jece.39.3.213-227 Cohen, L., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44, 588–608. Curtis, G. J., & Clare, J. (2017). How Prevalent is Contract Cheating and to What Extent are Students Repeat Offenders? Journal of Academic Ethics, 15(2), 115-124. Doi: 10.1007/s10805-017-9278-x Davison, R. M. (2012). Making a world of a difference. Journal of Information Technology, 27(2), 100-101. Doi: 10.1057/jit.2012.7 Davison, R. M. (2020). The Transformative Potential of Disruptions: A Viewpoint. International Journal of Information Management, 55, 102149. Doi: https://doi.org/10.1016/j.ijinfomgt.2020.102149 Davison, R. M. (2021). Special issue: Indigenous theory. Information Systems Journal. Doi: https://doi.org/10.1111/isj.12354 Durden, G. C., & Ellis, L. V. (1995). The Effects of Attendance on Student Learning in Principles of Economics. The American Economic Review, 85(2), 343-346. Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. New York: St. Martin’s Press. Fask, A., Englander, F., & Wang, Z. (2014). Do Online Exams Facilitate Cheating? An Experiment Designed to Separate Possible Cheating from the Effect of the Online Test Taking Environment. Journal of Academic Ethics, 12(2), 101-112. Doi: 10.1007/s10805-014-9207-1 Gaver, W. W. (1991). Technology affordances. Paper presented at the CHI ‘91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New Orleans, Louisiana, USA. Gibson, J. J. (1979). The Ecological Approach to Visual Perception. Boston, MA: Houghton Mifflin Company. Hazra, U., & Priyo, A. K. K. (2021). Mobile financial services in Bangladesh: Understanding the affordances. The Electronic Journal of Information Systems in Developing Countries, 87(3), doi: https://doi.org/10.1002/isd2.12166 Iglesias-Pradas, S., Hernández-García, A., Chaparro-Peláez, J., & Prieto, J. L. (2021). Emergency remote teaching and students’ academic performance in higher education during the COVID-19 pandemic: A case study. Computers in Human Behavior, 119, https://doi.org/10.1016/j.chb.2021.106713 Ireland, L. (2021). Predicting online target hardening behaviors: An extension of routine activity theory for privacy enhancing technologies and techniques. Deviant Behavior, 42(12), doi: 10.1080/01639625.2020.1760418 Ison, D. C. (2012). Plagiarism Among Dissertations: Prevalence at Online Institutions. Journal of Academic Ethics, 10(3), 227-236. doi: 10.1007/s10805-012-9165-4 Ison, D. C. (2015). The Influence of the Internet on Plagiarism Among Doctoral Dissertations: An Empirical Study. Journal of Academic Ethics, 13(2), 151-166. doi: 10.1007/s10805-015-9233-7 Johnson, D. W., Johnson, R. T., & Smith, K. A. (2014). Cooperative learning: Improving university instruction by basing practice on validated theory. Journal on Excellence in University Teaching, 25(4), 1-26. Kettula, K., & Berghäll, S. (2013). Drama-based role-play: a tool to supplement work-based learning in higher education. Journal of Workplace Learning, 25(8), 556-575. doi:10.1108/JWL-04-2012-0036 Khan, Z. R., Hemnani, P., Raheja, S., & Joshy, J. (2020). Raising Awareness on Contract Cheating –Lessons Learned from Running Campus-Wide Campaigns. Journal of Academic Ethics, 18(1), 17-33. doi: 10.1007/s10805-019-09353-1 Kordzadeh, N., & Ghasemaghaei, M. (2021). Algorithmic bias: review, synthesis, and future research directions. European Journal of Information Systems, 1-22. doi: 10.1080/0960085x.2021.1927212 Lanamäki, A., Thapa, D., & Stendal, K. (2016). When is an affordance? Outlining four stances. Paper presented at the Working Conference on Information Systems and Organizations (ISO), Dublin, Ireland. LeBaron, J., & Miller, D. (2005). The Potential of Jigsaw Role Playing to Promote the Social Construction of Knowledge in an Online Graduate Education Course. Teachers College Record: The Voice of Scholarship in Education, 107(8), 1652 - 1674. Leonardi, P. M. (2013). When does technology use enable network change in organizations? A comparative study of feature use and shared affordances. MIS Quarterly, 37(3), 749-775. Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280. doi: 10.1080/01639625.2015.1012409 Lukkarinen, A., Koivukangas, P., & Seppälä, T. (2016). Relationship between Class Attendance and Student Performance. Procedia - Social and Behavioral Sciences, 228, 341-347. doi: https://doi.org/10.1016/j.sbspro.2016.07.051 Luo, X. R., Li, H., Hu, Q., & Xu, H. (2020). Why individual employees commit malicious computer abuse: A routine activity theory perspective. Journal of the Association for Information Systems, 21 (6), 1552-1593. doi: 10.17705/1jais.000646 MacLeod, P. D., & Eaton, S. E. (2020). The Paradox of Faculty Attitudes toward Student Violations of Academic Integrity. Journal of Academic Ethics, 18(4), 347-362. doi: 10.1007/s10805-020-09363-4 Markus, M. L., & Silver, S. M. (2008). A foundation for the study of IT effects: A new look at DeSanctis and Poole's concepts of structural features and spirit. Journal of the Association for Information Systems, 9(10/11), 609-632. McKibban, A. R., & Burdsal, C. A. (2013). Academic Dishonesty: An In-Depth Investigation of Assessing Measurable Constructs and a Call for Consistency in Scholarship. Journal of Academic Ethics, 11(3), 185-197. doi: 10.1007/s10805-013-9187-6 Maatuk, A.M., Elberkawi, E.K., Aljawarneh, S., Rashaideh, H, & Alharbi, H. (2022). The COVID-19 pandemic and E-learning: challenges and opportunities from the perspective of students and instructors. Journal of Computing in Higher Education, 34, 21–38 (2022). https://doi.org/10.1007/s12528-021-09274-2 Neuwirth, L. S., Jović, S., & Mukherji, B. R. (2021). Reimagining higher education during and post-COVID-19: Challenges and opportunities. Journal of Adult and Continuing Education, 27(2). 141-156. https://doi.org/10.1177/1477971420947738 Noble, S. U. (2013). Google search: Hyper-visibility as a means of rendering black women and girls invisible. Invisible Culture: An Electronic Journal for Visual Studies, 19. Noble, S. U. (2018). Algorithms of opression: How search engines reinforce racism. New York: New York University Press. Okokpujie, K., Noma-Osaghae, E., John, S., & Oputa, R. (2017, 29-31 Oct. 2017). Development of a facial recognition system with email identification message relay mechanism. Paper presented at the 2017 International Conference on Computing Networking and Informatics (ICCNI). Osmundsen, K. S., Meske, C., & Thapa, D. (2022). Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective. Information Systems Journal, doi:https://doi.org/10.1111/isj.12383 Park, C., Kier, C., & Jugdev, K. (2011). Debate as a learning tool. Canadian Journal of Learning and Technology, 37(3), 1-17. Paul, R. (2020). Bangladesh extends school shutdown over second COVID-19 wave Retrieved January 7, 2021, from https://www.reuters.com/article/us-health-coronavirus-bangladesh-educati/bangladesh-extends-school-shutdown-over-second-covid-19-wave-idUSKBN27S26A Pérez, C. C. (2019). Invisible women: Exposing data bias in a world designed for men. London: Chatto & Windus. Poornima, S., Sripriya, N., Vijayalakshmi, B., & Vishnupriya, P. (2017, 10-11 Jan. 2017). Attendance monitoring system using facial recognition with audio output and gender classification. Paper presented at the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP). Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267-296. doi: 10.1177/0022427810365903 Quah, C. H., Stewart, N., & Lee, J. W. C. (2012). Attitudes of Business Students’ Toward Plagiarism. Journal of Academic Ethics, 10(3), 185-199. doi: 10.1007/s10805-012-9157-4 Ragu-Nathan, T. S., Tarafdar, M., Ragu-Nathan, B. S., & Tu, Q. (2008). The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation. Information Systems Research, 19(4), 417-433. doi: 10.1287/isre.1070.0165 Regan, P. M., & Jesse, J. (2019). Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking. Ethics and Information Technology, 21(3), 167-179. doi: 10.1007/s10676-018-9492-2 Reyneke, Y., Shuttleworth, C. C., & Visagie, R. G. (2021). Pivot to online in a post-COVID-19 world: critically applying BSCS 5E to enhance plagiarism awareness of accounting students. Accounting Education, 30(1), 1-21. doi: https://doi.org/10.1080/09639284.2020.1867875 Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149-1169. doi: 10.1177/0093854811421448 Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148-168. doi: 10.1177/1043986215621378 Roberson, B., & Franchini, B. (2014). Effective task design for the TBL classroom. Journal on Excellence in College Teaching, 25(3&4), 275-302. Rogerson, S., Miller, K. W., Winter, J. S., & Larson, D. (2019). Information systems ethics – challenges and opportunities. Journal of Information, Communication and Ethics in Society, 17(1), 87-97. doi: 10.1108/jices-07-2017-0041 Romer, D. (1993). Do Students Go to Class? Should They? Journal of Economic Perspectives, 7(3), 167-174. doi: 10.1257/jep.7.3.167 Rosenberg, M. (2011). Principled autonomy and plagiarism. Journal of Academic Ethics, 9(1), 61-69. doi: https://doi.org/10.1007/s10805-011-9132-5 Royakkers, L., Timmer, J., Kool, L., & van Est, R. (2018). Societal and ethical issues of digitization. Ethics and Information Technology, 20(2), 127-142. doi: 10.1007/s10676-018-9452-x Salmani, N., Bagheri, I., & Dadgari, A. (2022). Iranian nursing students experiences regarding the status of e-learning during COVID-19 pandemic. PLoS One, 17(2):e0263388. doi: 10.1371/journal.pone.0263388. PMID: 35108327; PMCID: PMC8809553. Scrimpshire, A. J, Stone, T. H., Kisamore, J. L., & Jawahar, I. M. (2017). Do Birds of a Feather Cheat Together? How Personality and Relationships Affect Student Cheating. Journal of Academic Ethics, 15(1), 1-22. doi: 10.1007/s10805-016-9267-5 Sein, M. K., Thapa, D., Hatakka, M., & Sæbø, Ø. (2019). A holistic perspective on the theoretical foundations for ICT4D research. Information Technology for Development, 25(1), 7-25. doi: 10.1080/02681102.2018.1503589 Strong, D. M., Volkoff, O., Johnson, S. A., Pelletier, L. R., Tulu, B., Isa, B.-O., . . . Garber, L. (2014). A Theory of Organization - EHR Affordance Actualization. Journal of the Association for Information Systems, 15(2), 53-85. Tarafdar, M., Gupta, A., & Turel, O. (2015). Editorial. Information Systems Journal, 25(3), 161-170. doi: https://doi.org/10.1111/isj.12070 Tarafdar, M., Tu, Q., Ragu-Nathan, B. S., & Ragu-Nathan, T. S. (2007). The impact of technostress on role stress and productivity. Journal of Management Information Systems, 24(1), 301-328. doi: 10.2753/mis0742-1222240109 Thapa, D., & Sein, M. K. (2018). Trajectory of affordances: Insights from a case of telemedicine in Nepal. Information Systems Journal, 28(5), 796-817. Thapa, D., & Zheng, Y. (2019, May 1–3, 2019). Capabilities and Affordances in the ICT4D Context: Similarities, Differences, and Complementarities. Paper presented at the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania UNICEF. (2020). Bangladeshi children share experiences of remote learning and the challenges they face Retrieved July 26, 2021, from https://www.unicef.org/bangladesh/en/stories/bangladeshi-children-share-experiences-remote-learning-and-challenges-they-face Vakhitova, Z. I., Alston-Knox, C. L., Reynald, D. M., Townsley, M. K., & Webster, J. L. (2019). Lifestyles and routine activities: Do they enable different types of cyber abuse? Computers in Human Behavior, 101, 225-237. doi: https://doi.org/10.1016/j.chb.2019.07.012 Volkoff, O., & Strong, D. M. (2017). Affordance theory and how to use it in IS research. In R. D. Galliers & M.-K. Stein (Eds.), The Routledge Companion of Management Information Systems. Abingdon: Routledge. Waizenegger, L., McKenna, B., Cai, W., & Bendz, T. (2020). An affordance perspective of team collaboration and enforced working from home during COVID-19. European Journal of Information Systems, 29(4), 429-442. doi: 10.1080/0960085x.2020.1800417 Walker, M., & Townley, C. (2012). Contract cheating: a new challenge for academic honesty? Journal of Academic Ethics, 10(1), 27-44. doi: 10.1007/s10805-012-9150-y Walker, N., & Holtfreter, K. (2015). Applying criminological theory to academic fraud. Journal of Financial Crime, 22(1), 48-62. doi: http://dx.doi.org/10.1108/JFC-12-2013-0071 Warren, M., & Lucas, R. (2016). Ethics and ICT: Why all the fuss? Journal of Information, Communication and Ethics in Society, 14(2), 167-169. doi: 10.1108/jices-12-2015-0043 Wei, T., Chesnut, S. R., Barnard-Brak, L., & Schmidt, M. (2014). University Students’ Perceptions of Academic Cheating: Triangulating Quantitative and Qualitative Findings. Journal of Academic Ethics, 12(4), 287-298. doi: 10.1007/s10805-014-9219-x Wilcox, P., Land, K. C., & Hunt, S. A. (2003). Criminal Circumstance: A Dynamic Multicontextual Criminal Opportunity Theory. New York: Walter de Gruyter, Inc. Williams-Brown, Z. (2015). The use of in-class debates as a teaching strategy in increasing students’ critical thinking and collaborative learning skills in higher education. Educationalfutures, 7(1), 39-55. World Bank. (2021). Keeping Bangladesh’s Students Learning During the COVID-19 Pandemic Retrieved July 26, 2021, from https://www.worldbank.org/en/results/2021/04/18/keeping-bangladesh-s-students-learning-during-the-covid-19-pandemic Wynn, D., & Williams, C. K. (2012). Principles for Conducting Critical Realist Case Study Research in Information Systems. MIS Quarterly, 36(3), 787-810. doi: 10.2307/41703481 Yar, M. (2005). The novelty of “cybercrime”: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407-427. doi: 101177/147737080556056 Zuboff, S. (1988). In the Age of the Smart Machine: The Future of Work and Power New York: Basic Books. Zuboff, S. (2015). Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75-89. doi: 10.1057/jit.2015.5 |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/117853 |
Available Versions of this Item
- Unethical practices in online classes during COVID-19 pandemic: an analysis of affordances using routine activity theory. (deposited 12 Jul 2023 07:05) [Currently Displayed]