Governance in Literature from 2020 to 2025

Research Article

  • Cruz García Lirios ID 1
  • Isabel Cristina Rincón Rodríguez ID 2
  • , Jorge E. Chaparro Medina ID 3

1 University of Health, Mexico City, Mexico

2 Research and Development University (UDI), Colombia

3 National Open and Distance University (UNAD), Colombia

*Corresponding Author: Cruz García Lirios

Citation: Cruz García Lirios, Governance in Literature from 2020 to 2025, J Clinical and Medical Research and Studies, V (4)I(2), DOI: 10.59468/2836-8525/094

Copyright: 2025 Cruz García Lirios. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Received: January 02, 2025 | Accepted: January 24, 2025 | Published: January 28, 2025

Abstract

The digital harassment involves the emergence of a service- oriented of digital village process. In this scenario, deregulation looming state and citizen participation electronic devices to generate ideas for Human Development. However, in either scenario, exclusion or inclusion digital, differences between resources and groups exacerbate asymmetries among Internet. This paper argues that, in both contexts, gap and digital village, electronic harassment. A review of the theoretical and conceptual frameworks and the report two findings on the state of knowledge warns that harassment is generated by perceptions of opportunity that associated with expectations of compatibility, usability and ease generate relationship asymmetric between cyberese’s. Therefore, a model is proposed to study phenomenon to open the discussion about the relevance of electronic devices in the dissemination of equity.


Keywords: Internet; harassment; equity; profit

Introduction

Until February 2025, the pandemic has taken the lives of three million of which, 500 thousand resided in Mexico if the under-records of deaths from atypical pneumonia are considered. In this scenario, mitigation policies have only emphasized confinement and social distancing without investing in protective devices such as the oximeter or ozonometer (WHO, 2021). The impact of the health crisis on the economy has affected education, mainly in the structure of management, production and transfer of knowledge (PAHO, 2021). In this way, governance, understood as conflicts, agreements and co-responsibilities is conditioned by the immunization of political and social actors, but in an electoral year this phenomenon acquires a zero-sum nuance.

This section includes the theoretical and conceptual frameworks that explain the governance process, considering institutionalism, credenialism, isomorphism, and patrimonialism. There are four axes of discussion that theories have established to explain the process that leads higher education institutions to generate controversies, agreements and co-responsibilities. It is a self-regulatory spiral in which academic, administrative and operational actors build an agenda regarding the distribution of resources. That is, the demands of the environment are seen as imponderable in crisis situations such as a pandemic. However, the axes of analysis observe these differences to anticipate coincidences between the parties involved.

Theory of Rational Choice in the first instance, and the Theory of Human Capital in the second instance, pose to human development and product optimization of information and resources. Both approaches warn a rational process that is activated by generating opportunities and skills training. The two theories so s have that freedom of choice predate the capabilities and responsibilities 

However, the model assumes that the individual can gather enough information to anticipate unfavorable or favorable scenarios for their objectives and resources, while the model considers that professional training does not depend on the information available, but on the quality of its content. In this sense, it determines the optimized information management knowledge and expertise that will define objectives and carry colorful strategies for achieving the purposes and goals (Reed and Wolniak, 2005).

Both approaches were synthesized by the Theory of Reasoned Action (TAR) and the Theory of Planned Behavior (TCP), antecedents of the Theory of the Acceptance of Technology (TAT).

TAR points as a key to rational decisions and the formation of capital to the beliefs that are generated from the available information. Access to information sources generates content categorization and establishment of topics to be rejected or accepted by users of the media (Ajzen and Fishbein, 1974). Thus, the information generates deliberate actions, but the generality of content reciter does not correspond to the decisions or actions expected. The TCP that specific beliefs will correlate with the decisions and defined actions (Ajzen, 1991). This is how beliefs about the ease or usefulness of technology will determine more punctually the intensive use of electronic devices. Both theories, TAR and TCP ensures that the surrounding information is processed and more belief for decision-making and actions related to digital technologies but shortchange the effect of that implies acceptance of devices that constant and mind are updating their informative applications. The TAT will propose the perceptions of utility and ease of use as the determining factors of the acceptance and intensive use of digital protocols and electronic devices (Davis, 1993). Thus, the theories consistently explain the process of election, acceptance and use of technologies related to entrepreneurship will enhance human development.

Thus, the theory of Digital Entrepreneurship explains the emergence of agents informative, political cyberactors, Internet and electronic devices that can expand or reduce the same digital gap that would be indicated by the equality and inequality, inclusion and exclusion, compliance and innovation, domination and liberation, control and deregulation, obedience and disobedience (Garcia et al., 2021: p 1). Also, the Theory of Social Entrepreneurship anticipate the outcropping of new agents, actors and subjects to the extent that electronic devices are evolving, innovation intensifies, and the risks increase.

In short, the theories pose asymmetric actors and relationships that break into risk events, although they can be redirected towards the discussion of coincidences and tasks in order to achieve goals that reconfigure the institution as part of a long-term project of co-responsibility. In this vein, governance acquires a sense of representation that activates a willingness to change and reduce conflict. It is a rationality, deliberate, planned and systematic that can anticipate scenarios of discussion, agreement and co-responsibility.

This section includes works related to university governance as an entity of asymmetries, agreements and deliberate, planned and systematic activism. Studies concerning the university stand out as a space for the formation of intellectual capital and a link with private initiative. It is assumed that these institutes have followed a galloping governance regarding the dilemma of training professionals for the labor market, or for the local needs of self-employment or entrepreneurship. In that instance, governance is observable by its adjustment of the curriculum with international teaching guidelines. In the case of the pandemic, governance is oriented towards the search for opportunities without detaching itself from the alliances with micro, small and medium-sized companies that offer most of the vacancies for graduates.

Cyberbullying understood as a deliberate, premeditated and systematic attack on a group or individual over another group or individual helpless situation, it has been explained to do from differences between ethnic groups (Campbell and Smalling, 2013; Kupczyński et al., 2013), gender differences (Leon et al, 2011; Buelga and Pons, 2012), differences in pairs (Chaparro, 2020: p. 113) differences between aggressors, bystanders and victims (Garcia et al, 2011), by type of harassment (Mendoza, 2011), differences for socialization (Elizalde, 2010), by using devices (Garcia et al., 2010) and speeches (Gómez, 2013). But the cyberbullying not been explained from perceptual variables.

Although relations between the perceptual variables explain brandished cyberbullying, we must consider a perceptual factor namely the perception of harassment (Juarez et al., 2021: p. 43). Psychological studies of entrepreneurship warn that the perception of opportunity, derived from digital services that the state managed or self - managed citizenship is indicated by the ability, opportunism, compromise, propensity, innovation, trust, motivation and dedication.

Information Technology and Communication (ICT) to influence systems foster the development of perceptions utility that relate dire with production decisions, management and reproduction of knowledge (Zamiri et al., 2012). Learning software involves not only profit expectations and profits but is also accompanied by the generation of a climate of co n bond and commitment within the learning group.

However, the intensive use of ICT requires technical support since most of it deals with devices that require constant maintenance. That is why the perceived usefulness increases when the device or software technology is supported by an expeditious and effective technical support (Zaidel and Zhu, 2010). When the support is enough, the perceived usefulness of technology is associated with the perception that technological and processes of teaching and learning are independent and intensive use of a device or software does not significantly increase instruction in the classroom. In contrast, users who consider it essential technical support for the use of technologies assume that the service should be expedited as it involves losses and costs that can supremacies whether the maintenance of the devices are constantly made.

Because in education systems instructors determine the use of the devices and software based on their relationship with students rather than technical support, this i m plica that intensive use of technology often interrupted by lack (Bakabulindi, 2012). Faced with this situation, instructors develop perceptions of risk that gradually replace perceptions of utility. Uncertainty, risk and insecurity are factors that influence satisfaction in the use of software or electronic device (Sharma and Abrol, 2011). In that sense, the profitability of a technological or electronic system is understood as one that reduces costs and maximizes benefits in terms of investment, time and system maintenance.

But despite that organizations are exposed to contingencies, who make decisions are in chaos, development opportunities from the implementation of technologies or information. Decisions that will affect the work environment are subject by perceptions of usefulness in managerial controls (Wang and Huynh, 2013). Precisely these expectations are opportunities which encourage acceptance, adoption, lamentation purchase devices or software in the transnationals. By partnering perceptions utility with the safety determine adoption technology, the corresponding maintenance and updating involved (Jalal e al., 2011). In cases where the handling of personal data involves risk perception by evil operating that might arise d e personal information, credibility and privacy are determinants of personal capture data.

Referring to the perception of control, capacity and ease of use perceived at the time of training, training or induction to familiarize themselves with the technology, the perception of usefulness determined by the three heapabilities he use of the electronic device (Kotaman, 2010). This is because users are motivated to use technologies from developing insights and skills intensive use. As users guide these skills according to their goals, they meet their goals and disseminate their achievements in your team, trust, commitment and satisfaction determine the effectiveness, efficiency and effectiveness forming a virtuous and innovative circle (García et al., 2013).

However, when the consumption is the accessibility to the device rather than ease of use, control or manipulation determines the technology (Ramayah and Ignatius, 2010). Under the technology is constantly changing, the multiple functions generate helplessness or ambivalent users who perceive these rapid changes as barriers in their attempt and specialize in technology. For helplessness, Users that do not adapt to technological change at the pace that these dictate them end up rejecting its use. In the case of ambivalence, this is seen in those users who have positive attitudes towards electronic devices but using them means a higher cost than b and ben- because without them the results vary lesser extent than with its implementation.

Both of helplessness and ambivalence can be explained by the relationship that perceptions have with beliefs, attitudes, decisions and behaviors (Tekeher, 2013). This is an automatic or linear, improvised or deliberate, spontaneous or planned, systematic relationship in which:

  • Perceptions of risk determine general beliefs, unfavorable attitudes, heuristic decisions and unforeseen actions. O well:
  • Perceptions of utility affect specific beliefs, favorable attitudes, planned decisions and systematic actions.

Although the two processes explain the acceptance or rejection of a technology, when the perception of usefulness is associated with sociodemographic factors such as sex, age, occupation and income predict resistance to change or update technology (Mutengezanwa et al., 2013). Microentrepreneurs with older resist using electronic money while professionals with incomes above 10,000 US dollars are more prone to intensive use of technologies that update is steady. 

In the case of digital financial protocols, indicator of economic development and scare, updating software to ensure the safety of investors, it creates uncertainty, risk, dissatisfaction and insecurity that inhibits alliances between multinationals and SMEs in local markets or the internationalization of SMEs through multinationals in the global market.

However, compatibility seems to have a greater influence on the acceptance of technology. Users who accept other technologies associated with the one they intend to adopt are closer to its consumption compared to those who have not been users of any technology linked to the one they intend to acquire. In fact, technological services and products are not only devices or software that are updated according to market demands but are also part of networks of technologies that innovate and transform the lifestyles of users. In this sense, the technologies that have been taken generated enough confidence in users for acquirer any device or software related. In organizations confidence in technology as well as in the working groups is critical to achieving goals (Hsuan et al., 2013). It is a process in which users can select a technology that will enhance your users perceive a high degree of utility in the technology, then they approach a climate of trust that will be disseminated in the work groups, technology providers and customers. In contrast, users who have had negative experiences with technology or inhibit selection of related technologies.

Thus accessibility, compatibility, usability, reliability, commitment, performance, satisfaction. They are part of an organizational and technological process in which devices or software electronic are considered as instruments for achieving goals, quality control, knowledge management and innovation. This is digital ecosystem in which users, managers, suppliers, customers and technologies or are involved in perceptual, emotional, attitudinal, motivational and intentional environments (Wiedmann et al., 2010). In these ecosystems to them as an organizational dilemma underlying confidence in users or dispositive technology. Both are critical to the development of the digital ecosystem, but only confidence in users generates commitment. In contrast, confidence in the technological or affects performance and satisfaction.

In the case of electronic devices, intensive use is linked to user satisfaction (Sago, 2013). An increase in frequency and hours of use leads to an increase in levels of satisfaction with technology. It is a compatibility between the technology and the lifestyle of the user since in its daily activities the technology allows a greater comfort, entertainment, performance or satisfaction. Indeed, the intensive use of technology is related to the lifestyle of the users since the higher number of hours in the use of technology, needs and expectations adjust to the changes that the electronic device software (Ruiz et al., 2010). However, this relationship between compatibility perceived and the use of technology to be mediated by attitudes toward technology reduces its predictive power as the categorization of devices constitutes acceptance reasons given, planned and systematic technology. This implies prior knowledge about the possibilities of technology, which does not always correspond with lifestyles.

Indeed, the formation of attitudes toward technology involves the emergence of perceptions on the quality of electronic devices (Almahamid et al., 2012). When users perceive the usefulness in improving its performant, often perceived quality as a mediating factor regulating labor expectations and skills geared towards a product or service arises. Although perceived quality selects the usefulness of the technology, it is the perception of effectiveness that determines the usefulness of this technology (Ramirez et al., 2010). In this sense, users develop expectations not only of improving their function or purposes, but the possible results that may be obtained by accepting a certain technology.

Because the effectiveness refers to the difference between the expected objectives and results of working groups, underlying social influence as a determinant of adoption (Muhammad and Kabeer, 2013). A decrease in the values to the members of a working group influences the perceived usefulness. Similarly, in the case of risk perception deriving from group expectations, it also regulates the relationship between utility and the decision to use a technology. The perceived effectiveness, expected utility, expectations for ease of use and control technology as well as attitudes, intentions and practices are aimed at user satisfaction (Thiruchelvi and Koteeswari, 2013). It is a virtuous circle in which the perceptions increase as technology produces user satisfaction builds trust, commitment and innovation in the working groups. That is, the intensive use of technology not only makes it compatible with a style of individual and group life, but ta m Well modifies its social appropriation.

The relationship between the individual and technology involves two perceptions of usefulness and ease of use that will impact on attitudes, intentions and behaviors. At the individual level the effects of intensive use of technology that can extend the groups. In the case of communities or societies, usefulness perceived to be associated with variables, socioeconomic and sociocultural offers the possibility to explain the conflict and social change that implies acceptance of the (Torres et al., 2011) technology. In the first case, social conflict is observable in resistance to technological change were oriented by a dominant social paradigm in which technologies were not necessary for everyday or production activities. The advent of ICT or rating a social conflict that led to the acceptance of technology and thus in a New Paradigm Technology, the main indicator of social change.

Acceptance of information technology and communication could be due to compatibility or usefulness, but it was the scalability understood as the inclusion of other technologies into one which determined the increment or selling s electronic devices (San Martin and Lopez, 2010). As technologies merged and included other services, the emerged as another added value of ICT.

The inclusion of several technologies into one device was not enough, it was essential that the companies responsible for providing digital services could compete unrestricted (Pepper et al., 2011). That is why the portability understood as the ability of a technology to be managed by more than one company enhanced the acceptance of mobile and electronic devices, as well as virtual social networks.

It is the adaptation of technology to the lifestyle of users, or to other information adequacy decisions inversion intensify technology (Shaheen, 2010). Conversely, mistrust is the factor that inhibits investment as it is an inadequate information. The information available is insufficient for decision making, or is information representing investment in higher - cost devices and uncertain benefits. This means that the technology is not flexible to the environment in which it is used.

Organizations that are characterized by flexible management styles and innovative collaborative networks, often adopt flexible technologies that allow them to perform multiple functions and that quality determines investment in human capital. The technology that will enhance their skills, knowledge and values is here preventing traffic or loss of information (Mehra and Omidian, 2010).

Psychological studies of acceptance of technology have focused on perception or utility purposes, effectiveness, and quality control, as well as attitudes and intentions to be considered determinants of intensive use of electronic devices (Romero et al., 2020: p. 101). Users develop technology skills that allow them to increase their performance whenever there is a deliberate, planned and systematic. This implies the formation of collaborative groups with climates of trust, commitment, innovation and satisfaction. In this sense, the relationship between user and technology is determined by processes compatibility, flexibility, scalability, portability, reliability and privacy that make fictile adoption of a technology and its eventual use.

However, when the relationship between user and technology is ambiguous and uncertain, underlies the perception of risk, unfavorable attitudes towards technology and intentions of resistance to change see the helplessness or ambivalence (Sandoval et al., 2021: p. 343). Associating psychological variables with sociological factors such as age, sex, occupation or income explain the individual and group situations that can be extended to the diagnosis of an organization, community or society. In that sense, a model of relations dependency would be relevant for the diagnosis of social group that intensively use ICT with emphasis on electronic and virtual social networks.

Studies on digital entrepreneurship show that perceptions of compatibility, usability and ease of use are essential to explain the adoption process, acceptation and intensive technologies (Aguilar et al., 2018: p. 24). Referring to the Theory of Digital Entrepreneurship, the state of knowledge warns that opportunism could explain the asymmetries between cybergroups when establishing relations of power and influence where domination and social control would be associated with a perception of risk that would affect the conformity, or, perceptions of utility that would determine the innovation of minorities.

However, while studies on digital entrepreneurship warn that the protocols and electronic devices and skills are essential for is to topics in a virtual public agenda, theoretical and conceptual frameworks have models developed to explain the establishment of a virtual public agenda (Carreon et al., 2018: p. 1). Theories have advanced to the relationship between competition and innovation obviating the social and reducing it to the mere administration of a cyberbook.

As part of the transformation of the state, deregulation of the risks associated with information technology and communication, as well as the right to information, the digital venture would consist of dimensions of affection rather than rationality, because once subtracted the economic bias, entrepreneurship would be the exercise of freedoms, capabilities and responsibilities that transform the netizen an agent of social and digital change.

In summary, the studies on governance deal with the coupling of the institution with the labor market. Through the diagnosis of strategic alliances, professional practitioners and social servants complement their academic training with the activities of their profession and with the challenges of their jobs. A commitment emerges that distinguishes them from other professionals and from other generations of graduates. That is, the opportunities because of a discussion between the parties involved determine the identity of the professional as an academic and worker of an institution or organization.

In this instance, the profile of an institution can be defined from the relationships between the variables that explain the quality of its academic or administrative processes and products. The exclusion or inclusion of variables are determined by the theory of governance, but also from the incidence of external factors such as the pandemic. If studies on university governance describe or explain the differences and agreements between the parties involved, in the pandemic that distinction is at least suspended. As it is a crisis of resources, university governance is only prepared in terms of conflicts between academic, administrative or operational actors, but a consensus is expected from the scarcity but from the abundance of resources.

It refers to the digital enterprise freedoms and capabilities that precede change agents. Unlike Internet users react saturating servers to protest government policies, cyberagents are those who 1) provided the themes for dissemination in the god communication and 2) influence the electorate through systematic dissemination of their rights to access unrestricted access to information and privacy of personal data (Espinoza et al., 2018: p. 1).

The digital entrepreneurship is linked to the social agency while promoting change from the digital skills of the Internet rather than from the use of violence or civil disobedience (Garcia et al., 2017: p. 1). Therefore, the establishment of issues on the public agenda is the result of a reverse process that the media kept to influence mass societies attributing stereotypes to social groups, but now in the information society, networks communication exceed the ratings, but above all influence the decisions and actions of citizens to establish an issue on the public agenda that relates to some unfortunate decision of the authorities or rulers.

If the digital venture is the result of public policies that promote inclusion of citizens in government affairs through digital services, then Digital Entrepreneurship Theory explain two processes: compliance and innovation (Gómez and Llanos, 2014: p. 354). If domination and social control is the purpose of a state and its citizens, then play conformity and obedience would be two indicators contrast with entrepreneurship and characteristic innovation transforming the state and participated in citizen public policy (Johnson et al., 2018 p. 614). There are four areas in which the relationship between state and society generates Representations, habitus, field and capital reproduced from equity and inclusion, but also inequality and exclusion. The digital divide as a result of domination and social control, conformity and obedience is explained from the power exercised by the majority groups on minority groups.

In contrast, the global village would spread confidence, entrepreneurship, co m commitment, innovation and satisfaction as central elements of state deregulation and citizen participation, but as a stage propellant perception of compatibility, usability and self - efficacy are determinants domination relations such as peer harassment (Garcia et al., 2018: p. 1).

Entrepreneurship refers to civil initiatives and citizens proposals on safety and sustainability with the aim of integrating such amendments in the pol book, government policies, programs crime prevention and strategies of justice and sustainability (Hernandez et al., 2018: p. 235). Since the social sciences have built models such as - management integrated to such consisting of; 1) the diagnosis of social representations of the state and city to indicated by the establishment of a public agenda on security-sustainability, 2) disseminating information about trust, commitment, Entrepreneurships the innovation and satisfaction as determinants of social representations of the state and citizenship; 3) the evaluation of diffusion determinants state representation and citizenship

However, building a civil calendar or social self - management involves the dissemination in demands and resources, opportunities and skills training, as are the networks dig such that -Trolling- question the public agenda or the strengthen – Stalking and Trending – (Darmastuti et al., 2020: p. 42). Therefore, entrepreneurship cyberpolitical refers to intensive technology’s information and communication, as well as electronic devices for establishing an age n given in terms of trolling, stalking or trending toward a figure or political process. In the case of voting intentions or choices.

Human development is the intensification of education in virtual environments, but the issues relating to the groups that make up digital networks exacerbate differ stances that inhibit the development of computational skills (Sandoval et al., 2018: p. 1). In the case of cyberbullying that is the product of the utility and efficacy information on the use of protocols and electronic devices while they are complemented by ridiculing strategies, sexism or aggression on the Internet. In this sense, human capital, as posed by rational choice, forms skills, knowledge and values ​​that not only lead to self-education, but the establishment of asymmetrical relations with their peers and networks that make up rather are an extension of social exclusion in the network.

Under that entrepreneurship is an emerging or at least adjacent to the uncertainty and risk phenomenon, main factors that motivate human development, present work is based on theoretical and conceptual frameworks to explain the entrepreneurialism digital (Di Russo and Douglas, 2013). Accordingly, the digital entrepreneurship understood as perceptions of opportunity and innovation management capabilities and steerable knowledge to human development presupposes a community response to the issues concerning the digital divide (Sánchez et al., 2018: p. 467). The information society, the digital venture is the product of scientific and technological advances in the intensive use of electron devices allow diversification initiatives and discussion of issues that by their degree of trend impact on public opinion.

However, the digital enterprise, unlike the social entrepreneurship is subedited to do with technological advancement and adoption of lifestyles compatible with electronic and discursive innovations of Internet users (Elizarraráz et al., 2018: p. 10). While the digital venture involves specialization and updating knowledge and skills, social entrepreneurship perceptions of risk and opportunity (Hernández et al., 2018; p, 232). A review of psychological studies of social and digital entrepreneurship shows that perceptions of risk, self-efficacy and opportunity are decisive initiatives person to them, group or organizational, but are perceptions of compatibility, usability and ease of use of the devices electronic explaining the generation of ideas and innovation, but also harassment among users.

If social entrepreneurship determines the human development, then the perception of opportunity, risk and self - efficacy are explanatory factors of educational advancement but in the case of digital entrepreneurship, perceived compatibility, usability and ease of use not only explain the progress of human capital, but also harassment peer when interacting with a technology or electronic device.

It is possible to appreciate that university governance complies with the first question about the asymmetries of the actors in the face of the pandemic. Knowledge management alone is evidence of the governance structure in the face of the resource crisis, but immediately afterwards, the co-responsibility system cannot be established as an agreement between parties but rather as an urgent need for subsistence in the face of the health and financial crisis. Consequently, the conflict continues alongside the pandemic and its effects on stakeholders. In this way, governance sees itself as a barrier to building the agenda that allows for an agreement.

The objective of this work is to carry out a theoretical, conceptual and empirical review of the variables related to university governance in order to be able to model their predictive relationships of conflict scenarios between political and social actors, public and private sectors with respect to the mitigation policies, focused on distancing and social confinement and that resulted in the displacement of the classroom

What are the relationships between the variables that reflect the conflicts between political and academic actors, as well as student, administrative and teaching actors in a scenario of risks of contagion, social distancing, and a virtual classroom without training or training?

The premise that guides this systematic review suggests that the health and economic crisis affects the education sector in a direct way, where the variables that explain the phenomenon can be considered as a reflection of the situation, but also as determinants of it (Garcia, 2020: p. 1). This double condition connotes an environment of complexity, indicated by the emergence of new actors such as Internet users at the time of the virtual classroom (Bahadur, 2021: p. 41). It is an environment of systematic violence in which espionage, nongame, ridicule, discrediting, sexism and harassment derived from addiction and anxiety that involves interaction with technological devices prevail.

If you consider the definition of cyberbullying and empirical evidence with other variables over a period of 2010 to 2024 dropped by Search Dianet, Latindex, Redalyc, Scielo, Scopus, WoS, Zenodo, Zotero main reference data in Spanish for Latin America, then psychological studies of cyberbullying have demonstrated the direct, positive and significant effect of perceived usefulness on harassment, aggression or violence on the Internet or social networks. This work is documentary cut since studies criteria keywords are reviewed; "Entrepreneurship", "innovation", "utility", "support", "ease" or "accessibility" in three search engines considered bastions of information. Delphi technique was used to establish relationships paths dependence between factors advanced in the theoretical, empirical and conceptual frameworks. Is the to hypotheses for contrasting scenarios according to literature.

Method

The observation of university governance supposes instruments that measure characteristics of it, but in the face of a health and economic crisis, governance is fragmented in conflict and co-responsibility, delaying all negotiations between the parties. Therefore, the investigation of documents that reflect these asymmetries warrants a systematic review to inquire about the possibilities that the pandemic opens to governance, as well as the barriers to consensus. Thus, meta-analysis is ruled out, but the descriptive rapid review is more suitable.

Thus, the review followed the PRISMA standards for documentary analysis, as well as discussion of findings. An inventory was used with a sample of extracts taken from the literature sectioned in the first stage (10 out of 100), considering the Delphi Technique for the qualification of results by expert judges about governance. 

From the search engine www.google.scholar.com we proceeded to select the abstracts and extracts, considering the keywords, as well as the registration in the inventory with the qualifications of the expert judges. In order to establish the normal distribution, the mean and deviation coefficients were estimated, as well as probability proportions for the extracts. At the end, the equation model was estimated in order to appreciate the composition of categories and extracts.

Results 

The values of the qualifications of expert judges in university governance reached minimum permissible values to establish multivariate analyzes. there is a tendency to consider the selected extracts as directly related to the categories.

In order to be able to observe the structure of the extracts in risk thresholds with respect to the conflict and co-responsibility categories, the probability proportions of their combinations were estimated.

The probability ratio structure shows that the combinations of the extracts fall within the permissible thresholds of the conflict and co-responsibility categories. That is to say, the governance, indicated by the extracts, seems to act in a probabilistic way before the categories. In order to appreciate its trajectory structure and relationships, a model of structural equations was estimated.

The adjustment and residual parameters ⌠χ2 = 14,21 (13df) p < ,05; CFI ,990; GFI ,997; RMSEA = ,008⌡suggest the non-rejection of the hypothesis regarding the significant differences between the governance structure reported in the literature with respect to that observed in the present work.

Discussion

The contribution of this work to the state of the question lies in the establishment of a structure of trajectories and relationships concerning university governance in a pandemic scenario. Allowable risk thresholds were established in which selected extracts were distinguished at the time of relating to two categories or instances of governance: conflict and co-responsibility. This is so because studies warn of co-management in both phases of governance.

Carreon et al., (2018: p. 15) in which violence is seen as a major factor in transforming public safety perceptions insecurity, this paper has stated that electronic devices accelerate transformation in question. This is because violence, according to this study, derived from the asymmetrical relationship between authorities and public. Indeed, violence being the result of perceptions of social exclusion is a spread of beliefs, attitudes, decisions and behavior in areas technology like the Internet and social networks.

Souza et al., (2020: p. 10) suggest that innovation in the face of the pandemic supposes a transition from the conflict between the rulers and the ruled with respect to the health and economic crisis towards a capacity for agreement. In the present review, it is noted that such a transition is already being reported in the literature with permissible risk thresholds. That is, decision makers can consult the literature and guide their objectives, defects and goals towards a transition from differences to symmetries.

Ullah et al., (2021: p. 86) showed that the governance of natural resources and public services is associated with their availability, but in the face of the health contingency, the concern is centered on community transmission. They proposed observing the distribution and supply system as a transmission and prevention factor. In the present work, the literature review did not focus only on the conflict that distinguishes governance in its initial phase, but also established thresholds with respect to co-responsibility. Both categories reported in the literature are related to the selected extracts and differentiate one instance from the other. In other words, the pandemic not only affects the conflict, it also extends to the phase of co-responsibility when the parties involved decide to agree on a common front in the face of the health crisis.

Research lines concerning the modeling of the revised variables will allow structuring an agenda for discussion and agreements between the parties regarding the impact of the pandemic on their resources. Governance as a co-management system in the face of risk events can be an alternative to the spiral of conflict between governments and citizens. The communication of risks of the Covid-19 opens the discussion about the transition towards a consensus between the parties that the literature registers after the differences between the actors. 

Conclusion

There are three scenarios that this revision expected; 1) digital enterprise as indicator of the gap between Internet and digital cybergroups. In this scenario, the management and innovation of knowledge is unregulated by the state and subject to for-profit organizations, 2) digital entrepreneurship as an indicator of equity informational hacktivists and Internet. Management and innovation depends on the empathetic relations, the commitment and life satisfaction generating information exchange, 3) digital enterprise as an indicator of the informational diversity promoted by the transformation and strengthening of citizen participation and the opening of the media and access to technologies and electronic devices. Each of the three scenarios involves the interaction between software agents, actors cyberplaces, Internet and artificial intelligences that how compatible, utility and other scenarios build self-efficacy power, influence, control and social domination

However, the perception of opportunity seems to appear as a key factor in adv and tenancy of any of the scenarios, as while the state does not guarantee access to Internet and citizenship not self-gestion access to the Internet, cyberspheres of Internet gene and ran opportunities to be perceived by other cyberese’s represent the approach in this process. If the cyberbullying refers to a series of actions that intimidate or ridicule the use of technology by individuals or defenseless groups, then the perception of harassment of those symptoms experienced by users of a technology when i n would refer with other users who are perceived as threats to the adoption of a technology or at least encourage the development of skills and knowledge for self - defense of a victim of cyberbullying or harassment intensified by an aggressor.

The model specification involves explaining relationships between variables that interaction can be correlated with a third variable. The specification may size that form a construct or latent variable from which it is intended to explain the emergence of a new process such as the digital enterprise. Thus, reflective dimensional model assumes that each of the indicators is linked together by the influence of a process common factor is also emerging as well. From the theoretical, conceptual and empirical review it was possible to establish a model for the study of entrepreneurship cyberpolitical. The proposal includes four explanatory hypotheses paths of dependency relationships among the factors established as determinants in the literature.

Values, beliefs and perceptions regarding needs, expectations, demands, opportunities and resources available for security and sustainability as determinants attitudes, motives and knowledge of entrepreneurship indicated by Trolling (aggression), Stalking (espionage) and Trending (promotion). Values, beliefs and perceptions determinants of attitudes, motives, and with or foundations that influence the entrepreneurial intention. Values, beliefs and perceptions indirect determinants of entrepreneurship through attitudes, motives and intentions determinants of knowledge. The model variables include those most cited, but also the specifications of other models would accommodate the use explanatory logic social networks electronics. Indeed, perceptions of control, efficiency, utility and risk attitudes, intentions and use of technology to explain the satisfaction.

In this network of relationships socio - cultural variables relating to standards, beliefs and values, socio economic and demographic variables such as gender, age, occupation, income, and marital status, and organizational variables concerning compatibility, flexibility, scalability, portability, credibility and privacy would be excluded. This is because the model explains the rational, deliberate, planned and systematic processes that underlie between users and technology.

However, when satisfaction with technology and perceptions of control and constructs risk that psychological studies have not established empirically, the relationship model specified dependency only included perceptions of efficiency and utility as exogenous constructs that directly affect the use of technology, and uprightly through mediating variables such as attitude to technology and in intention of use. The model includes nine hypotheses considering the direct and relationships lines between perceptions and use of technology.

Thus, the interrelationship between the perception of efficiency and utility perceived directly and indirectly determine the intensive technology. In co n sequence, expectations efficient operation from adopting technology would impact directly on intensive use. Or, the perception of efficiency to influence decisions making electronic devices increases its predictive power over or so of technology. Similarly, the expectation of improving the impact decisions consumer electronics determine u so technology.

Now, when expectations increase efficiency by adopting a technology produce categories that influence consumer decisions and are in the technology. Similarly, the expected benefits from the use of technology generate favorable their acceptance decisions and these will improve us or technology.

However, the use of technology may be because consumers simply a device as favorable for objectives, or the use of technology could be because acceptance decisions had an emotional origin. That is, as technology product or service is likely to be prom or life as an object of desire and it is from this phenomenon that consumers accept, purchase, adopt and use technology.

The contribution of this the state of knowledge lies in specifying a model including three hypotheses explaining trajectories relationships between determinants of the enterprise in the form of Trolling, Stalking or Trending , but unlike the social enterprise which involves the construction of a public agenda to empathy, commitment, innovation and cooperation, entrepreneurship cyberpolitical assumes that civil initiatives and proposals are conceived from distrust and aggression to the authorities, just as through monitoring supporting figures political processes.

However, studies of mass communication warn two logical consisting of the likelihood of state propaganda and verifiability of its achievements released god, aspects that the model does not include, but should be considered in scenarios of info r month government or elections.

This work has exposed the problem of the digital divide to be inserted into the issue and to review the theoretical and conceptual frameworks and the latest findings in order to propose a model of reflective relations for the study of entrepreneurship with emphasis on the perception of opportunity, major factor in the documentary.

However, the digital enterprise, unlike the social entrepreneurship involves perceptions opportunity focused on electronic devices rather than trust. In this regard, it is necessary to study the impact of technological advances on the life of Internet users, their abilities and use decisions. As investigations will specialize will be possible to anticipate scenarios that human development will be the result of venture cyberspheres civil or citizens rather than the regulation and state administration since the transcultural and trans territoriality of Internet involves a digital government to ensure the same principles of freedom and justice.

However, studies concerning the digital enterprise in its field intensive shows that perceptions of compatibility, usability and ease are determinants of relationship asymmetric between cyberese’s and thereby asymmetries. That because social exclusion seems to be played on the Internet, but processing capabilities information depending on the evolution of technology which would explain the digital divide between them Internet.

The difference between Internet users and cyberagents lies not only in their capacity or competences, but the opportunities and freedoms that the state restricts to monitor digital protocols, deregulate by allowing the violation of privacy. According to the theoretical and conceptual frameworks, taking risks assumed Internet users decided to take when compared to the benefits informative and communicative. In contrast, the state of knowledge warns that the cyberbullying is the main factor of exclusion, thereby reducing the problematization of electronic devices and digital skills that exacerbate the digital divide in the same users of the same generation.

Consequently, a model was proposed to address discrepancies between theories and studies on social entrepreneurship. In this specification relations, cyberbullying only considered an indicator of the digital divide, although eight dimensions for the study of a factor associated with entrepreneurship are proposed, the perception of opportunity should have more dimensions that relate to the use of electronic devices and skills development for the harassment of users who are unaware of their der and digital civil.

However, the digital divide will not be reduced only to the promotion of rights on the Internet, but with the transformation of protests or electronic forms with the development of capabilities and knowledge to not only react to the exclusion, but to promote equitable relationships and not discriminate between users on the same network or protocol electronic.

That is, it requires empowering victims of cyberbullying to increase their self - esteem, but also to hone their skills that will enable you to build virtual scenarios of respect and solidarity, commitment and empathy for those without computer skills and digital capabilities that society demand information every day.

The empirical test of the model specified allow progress towards predicting violent and aggressive styles of life and compare devices that facilitate empathy, commitment and satisfaction without users are confronted. This work has systematized the state focused on establishing knowledge between ethnic groups, sex, couple, perpetrators, bystanders, victims, differences in terms of socialization; devices or speeches regarding cyberbullying.

However, these findings have contributed to the discussion on the human development as a scenario in which perceptions of usefulness, self-efficacy and compatibility are differences between groups and socialization of devices and speeches. As differences are exacerbated between groups, there emerges a debate on the perceptual factors that make them different to the requirements of human development focused on human capital formation and would in cyberbullying one direct differences found in the literature review.

However, the state of knowledge does not establish a link between group differences with respect to the observed differences in socialization of devices and corresponding speeches. It is therefore necessary to carry out a study on the differences between groups and differences as to the uses of technology. In this process, useful perceptions, to compatibility allow clarify the connection between groups and academic training devices. It is likely that the difference between groups allow anticipate and uses perceptual differences device, but it could happen that, in symmetric groups, perceptions utility, self-efficacy and compatibility generate or at least exacerbate differences. If perceptions are determinants of differences between groups and uses of technologies, then it will be possible to anticipate the emergence of cyberbullying longer as a phenomenon but as a phenomenon in which electronic devices generate perceptions that exacerbate.

The contribution of this work to the theoretical and conceptual frameworks and the findings reported by the state of knowledge lies in the proposal of a model for the study of exclusion and digital, building a global digital village in which entrepreneurship and innovation would be their preponderant indicators.

However, the model does not include variables of technological and organizational order anticipate differences between users no longer from their skills and knowledge, but of the resources available and the groups to which they belong. This paper discussed the theoretical, empirical and conceptual axes cyberbullying around which human development has been regarded as a stage of affinities, perceptions and capabilities. This trident largely explains the relationship between users and technology at the time of filing asymmetrical relations.

Revised frameworks pose to cyberbullying because of the aggressive styles of life and information technologies that will enhance the peers. Asymmetrical relations that are developing in social networks represent the emergence of information technologies that facilitate anonymity and encourage diversification of aggression. Internet is a scenario in which converge opportunities and capabilities, factors understand the cyberbullying as a phenomenon of social networks whose impact on perceptions focuses on the individual and the devices can be used for aggressive purposes.

However, theories, concepts and findings are still focused on raising the cyberbullying as a psychological state between victim and aggressor. Thus, review to allusive the impact of lifestyles emphasizes perceptions as determinants of the adoption of an electronic device, the main instrument of aggression against Internet users and social networking. Thus, human development is not only a scenario of asymmetrical relations that result in violence and aggression, it is also an area of ​​perceived usefulness in technologies and devices become instruments of harassment.

The cyberbullying referring to human development implies:

Opportunities, technologies and capabilities to reproduce the asymmetric relations that are developing in everyday life. In this regard, harassment, aggression and violence on the Internet and social networks indicate the convergence of electronic devices and computation skills used to exacerbate differences between aggressors and victims.

Theories, concepts and findings that explain the asymmetric relations between users. Thus, the profile of the aggressor in social networks seems to have a perception of value that triggers perceptions of ease, attitudes, intentions and behaviors of harassment of users who do not perceive the usefulness of networks for their defense, not to have the strategies to inhibit harassment, to report attacks prevent saw. Internet and social networks as potential scenarios for harassment, aggression and violence as these technologies inhibit solitude with continuous and ongoing user interaction.

References