Search results
1 – 10 of over 10000Andrea Caputo, Raffaele Fiorentino and Stefano Garzella
The purpose of this paper is to examine some of the new capabilities that are required for the facilitation of business processes management (BPM) in the current political and…
Abstract
Purpose
The purpose of this paper is to examine some of the new capabilities that are required for the facilitation of business processes management (BPM) in the current political and technological landscape. Specifically, the goal is to investigate the role of firm boundaries, from a business processes perspective, in new contexts in which the affirmation of digitalization requires more integration across a complex network of partners.
Design/methodology/approach
The paper is based on a review of relevant literature on BPM, firm boundaries and negotiation. By critically integrating this literature, a framework is developed with the objective of supporting the management of boundaries.
Findings
BPM, new competitive contexts, and the technological landscape require the development and management of boundary capabilities. Among these capabilities, “boundary management” – how managers coordinate resources, activities and business processes on the boundaries of the firm – should play a key role. Moreover, as managers must continuously interact with multiple partners in digital supply chains, the organizational model of negotiation serves as a means of effectively managing firm boundaries.
Practical implications
The framework offers insights and guidelines that can help practitioners manage the boundaries of business processes. The authors encourage a focus on business processes occurring at firm boundaries. Furthermore, the authors encourage the development of new capabilities in response to the needs of practitioners to ensure best practices of negotiation.
Originality/value
This study shifts the emphasis of BPM from the boundaries of management to the management of boundaries. By shedding light on new capabilities required, this paper enriches the BPM literature and can assist, on the one hand, in reconfiguring business processes in the new political and technological landscape and, on the other hand, in facilitating effective negotiation.
Details
Keywords
Philip Davies, Glenn Parry, Laura Anne Phillips and Irene C.L. Ng
The purpose of this paper is to explore the interplay between firm boundary decisions and the management of both efficiency and flexibility and the implications this has for…
Abstract
Purpose
The purpose of this paper is to explore the interplay between firm boundary decisions and the management of both efficiency and flexibility and the implications this has for modular design in the provision of advanced services.
Design/methodology/approach
A single case study in the defence industry employs semi-structured interviews supplemented by secondary data. Data are analysed using thematic analysis.
Findings
The findings provide a process model of boundary negotiations for the design of efficient and flexible modular systems consisting of three phases; boundary ambiguity, boundary defences and boundary alignment.
Practical implications
The study provides a process framework for boundary negotiations to help organisations navigate the management of both-and efficiency and flexibility in the provision of advanced services.
Originality/value
Drawing upon modularity, paradox and systems theory, this article provides novel theoretical insight into the relationship between firm boundary decisions and the management of both-and efficiency vs. flexibility in the provision of product upgrade services.
Details
Keywords
Ellinor Tengelin, Rebecka Arman, Ewa Wikström and Lotta Dellve
The purpose of this paper is to explore managers' boundary setting in order to better understand their handling of time commitment to work activities, stress, and recovery during…
Abstract
Purpose
The purpose of this paper is to explore managers' boundary setting in order to better understand their handling of time commitment to work activities, stress, and recovery during everyday work and at home.
Design/methodology/approach
The paper has qualitatively‐driven, mixed method design including observational data, individual interviews, and focus group discussions. Data were analyzed according to Charmaz' view on constructivist grounded theory.
Findings
A first step in boundary setting was to recognize areas with conflicting expectations and inexhaustible needs. Second, strategies were formed through negotiating the handling of managerial time commitment, resulting in boundary‐setting, but also boundary‐dissolving, approaches. The continuous process of individual recognition and negotiation could work as a form of proactive coping, provided that it was acknowledged and questioned.
Research limitations/implications
These findings suggest that recognition of perceived boundary challenges can affect stress and coping. It would therefore be interesting to more accurately assess stress, coping, and health status among managers by means of other methodologies (e.g. physiological assessments).
Practical implications
In regulating managers' work assignments, work‐related stress and recovery, it seems important to: acknowledge boundary work as an ever‐present dilemma requiring continuous negotiation; and encourage individuals and organizations to recognize conflicting perspectives inherent in the leadership assignment, in order to decrease harmful negotiations between them. Such awareness would benefit more sustainable management of healthcare practice.
Originality/value
This paper highlights how managers can handle ever‐present boundary dilemmas in the healthcare sector by regulating their time commitments in various ways.
Details
Keywords
The purpose of this paper is to investigate boundary spanning tactics in a cross-organizational virtual alliance and discuss the analytical value of “digging” into technology for…
Abstract
Purpose
The purpose of this paper is to investigate boundary spanning tactics in a cross-organizational virtual alliance and discuss the analytical value of “digging” into technology for excavating boundaries and understanding their dynamic and emergent features.
Design/methodology/approach
Although boundaries, their role and implications have been extensively investigated across a variety of online settings, the results are inconclusive as to the features of technology that create, dissolve or re-locate boundaries. This is attributed to the fact that in most cases technology is addressed as a black box – a discrete artefact of practice – without seeking justification for the inscribed functions that enable or constrain use. The paper overcomes these shortcomings by analysing digital trace data compiled through a virtual ethnographic assessment of a cross-organizational tourism alliance. Data comprise electronic traces of online collaboration whose interpretive capacity is augmented using knowledge visualization techniques capable of revealing dynamic and emergent features of boundary spanning.
Findings
Boundary spanning in virtual settings entails micro-negotiations around several types of boundaries. Some of them are either enforced by or inscribed into technology, while others are enacted in practice. Knowledge visualization of digital trace data allows “excavation” of these boundaries, assessment of their implications on distributed organizing of online ensembles and discovery of “hidden” knowledge that drives boundary spanning tactics of collaborators.
Practical implications
In cross-organizational collaborative settings, boundary spanning represents an enacted capability stemming from the intertwining between material and social/collective agencies. Consequently, boundaries surface as first class design constructs, directing design attention not only to features inscribed in technology (i.e. user profiles, registration mechanisms, moderation policies) but also the way such features are appropriated to re-shape, re-locate or dissolve boundaries.
Originality/value
An empirical data pool compiled through virtual ethnographic assessment of online collaboration is revisited and augmented with knowledge visualization techniques that enhance the interpretive capacity of the data and reveal “hidden” aspects of the collaborators’ boundary spanning behaviour and tactics.
Details
Keywords
Raphael Lissillour and Jean-Michel Sahut
Technological firms increasingly depend on open innovation to compete in hypercompetitive markets. To openly engage the creativity of a multitude of private actors, firms can rely…
Abstract
Purpose
Technological firms increasingly depend on open innovation to compete in hypercompetitive markets. To openly engage the creativity of a multitude of private actors, firms can rely on crowdsourcing. Crowdsourcing challenges global companies as they span organizational boundaries to attract multiple local partners. Global companies must engage in boundary spanning to successfully communicate and create a sense of community with smaller local partners despite status and cultural differences. The collaboration between Google and developers in China deserves to be studied in particular, because it operates within a restricted market.
Design/methodology/approach
This paper argues that crowdsourcing for innovation on a global scale requires effective boundary spanning capabilities. These boundary-spanning practices ensure smooth cooperation with the crowd and solve problems relating to differences in status and organizational contexts. This study applies Bourdieu's theory of practice including the concept of capital (economic, intellectual, social and symbolic) to understand the social relationships between Google and a growing community of Chinese developers. It also draws on a case study including ten semistructured interviews, which have been triangulated with internal documents and data from selected websites.
Findings
Four types of capital (symbolic, intellectual, social and economic) have been identified as important devices to understand the sources of power and the stakes of Googlers and developers in the joint field. These types of capital contribute to structure the social fields in which developers and Google cooperate and their practice. The success of the collaboration between Google and Chinese developers can arguably be attributed to Google's ability to create boundary-spanning activities in order to reduce the endowment differential in the four types of capital and improve their communication. Therefore, this research provides a deep and conceptualized description of boundary-spanning practices, as well as providing a useful contribution for managers involved in crowdsourcing via platform in culturally different markets.
Research limitations/implications
The main limitation of this study is methodological in nature, relating to the absence of interviews with board members of Google China who are reluctant to speak about Google activities in China for political raisons. This restriction is partly counterbalanced by the analysis of publicly available secondary data such as news and communications.
Practical implications
This research has generated practical recommendations for managers of organizations, which require optimal boundary spanning for crowdsourcing. Managers must understand the different sources of social boundaries between their organization and the crowd. The crowd should be segmented into smaller groups with distinctive identities, and organizations should systematically design boundary-spanning activities to address each boundary of each segment. The boundary-spanning activities involve a specific set of tools, programs and platforms to address the target group. Efficient boundary spanning depends on the necessity to select boundary spanners with high cultural intelligence and communication skills.
Social implications
This paper draws on Bourdieu's theory of practice to investigate the role of boundary spanning in crowdsourcing for innovation, specifically in the joint field between Google and Chinese developers. This research reveals how boundary objects such as developer documents, websites, programs and events are essential for developers to be able to participate on Google's platform. Companies should be prepared to invest in the design and delivery of boundary-spanning activities and objects, knowing that these are also a locus for negotiation with local partners.
Originality/value
This research contributes to the literature by applying the boundary-spanner theory to Google crowdsourcing practices within a restricted market. Bourdieu's theory of practice has proven to be a potent perspective with which to better understand the positive role of boundary spanners in the joint field between Google and Chinese developers. Moreover, this practice perspective has not been used in prior research to highlight power relations in crowdsourcing for innovation. This study has shown that, in addition to boundary objects, boundary spanners can also contribute in the transfer of intellectual capital, which is the pivotal resource for boundary spanning in this field.
Details
Keywords
Min Li, Leigh Plunkett Tost and Kimberly Wade‐Benzoni
The purpose of this article is to review and comment on recent and emerging trends in negotiation research, and to highlight the importance of the interactions between various…
Abstract
Purpose
The purpose of this article is to review and comment on recent and emerging trends in negotiation research, and to highlight the importance of the interactions between various dimensions of negotiation.
Design/methodology/approach
Consistent with the behavioral negotiation framework, a two‐level structure is maintained consisting of the contextual characteristics of negotiation, on the one hand, and the negotiators themselves, on the other. The framework is supplemented with updated research, and the influence of culture in negotiation is commented upon – noting its increasing role in negotiator cognition, motivation, attribution, and cooperation. The paper also adds new themes to reflect the recent advancements in negotiation research. In particular, it focuses on the ways in which negotiator effects can mediate and/or moderate contextual effects, as well as the ways in which contextual effects can mediate and/or moderate negotiator effects.
Findings
The paper suggests that efforts to integrate the recent developments in negotiation research are necessary and that the behavioral negotiation perspective, due to its simultaneous simplicity and flexibility, is appropriate and effective for incorporating the various streams of negotiation research into a systematic framework. Critically, this framework highlights the dynamic interaction between the two levels and leaves much room for further exploration of these dynamics.
Originality/value
The paper identifies emerging areas of inquiry that can be especially fruitful in helping negotiation scholars to expand more traditional approaches to conflict in bold new ways and open up innovative avenues for thinking about the domain of negotiation. The paper offers a comprehensive model that integrates various dimensions of negotiation and illustrates the interaction among them.
Details
Keywords
Noa Nelson, Raphaele Fuchs and Mayan Kurtz-Cohen
Work–family conflict (WFC) is a chronic source of stress, threatening contemporary organizations. Employees' own characteristics, which have received limited scientific attention…
Abstract
Purpose
Work–family conflict (WFC) is a chronic source of stress, threatening contemporary organizations. Employees' own characteristics, which have received limited scientific attention, can help mitigate WFC. The current two studies tested, for the first time, the links of higher-order trait resilience models to WFC, while exploring possible mediators and differentiating the contributions of interpersonal vs. intrapersonal resilient traits.
Design/methodology/approach
In study 1, the authors tested a mediation model in which trait negotiation resilience (TNR), which is oriented toward challenges that involve balancing conflicting needs with others, predicted multidimensional (time, strain and behavior based) WFC, through three mediators: emotion regulation (intrapersonal), self-monitoring and work–family balance negotiation (both interpersonally oriented). In study 2, both TNR and the more intrapersonal Connor–Davidson Resilience Scale (CD-RISC) were associated with a global, more parsimonious measurement of WFC. Additionally, TNR's factors were separately correlated with the latter.
Findings
TNR associated with lower multidimensional WFC through emotion regulation, which partly mediated TNR's effect; and through self-monitoring, which suppressed TNR's effect because it related to higher WFC (balance negotiation had no effect). In study 2, CD-RISC, but not TNR, related to lower global WFC. Additionally, two intrapersonal TNR factors tended to relate to lower WFC, while one interpersonal factor related to higher WFC.
Originality/value
The studies demonstrate the role of higher-order trait resilience in WFC, while fine-tuning understanding of the contributions of intrapersonal vs. interpersonal resilience. The findings may be relevant to other organizational challenges, beyond WFC, and inform employee recruitment and training.
Details
Keywords
Norhayati Zakaria, Jeffrey M. Stanton and Shreya T.M. Sarkar‐Barney
The Internet, World Wide Web, and related information technologies, originally developed in Western countries, have rapidly spread to a great variety of countries and cultures…
Abstract
The Internet, World Wide Web, and related information technologies, originally developed in Western countries, have rapidly spread to a great variety of countries and cultures. Many of these technologies facilitate and mediate interpersonal communication, an activity whose modes and means bind closely to cultural values. This article provides a theoretical integration of a framework for culture values together with a model for understanding privacy and related issues that arise when personal information is shared or exchanged using information technology. The resulting hybrid framework can help understand and predict individuals’ culturally linked reactions to various communication‐related IT applications (e.g. e‐mail, e‐commerce sites, Web‐logs, bulletin boards, newsgroups) in diverse cultural contexts. An application of the framework to cultural settings in Middle Eastern nations concludes the article.
Details
Keywords
Cathrine Filstad, Boyka Simeonova and Max Visser
The purpose of this study is to investigate the crossing of knowledge and power boundaries within a bureaucratic organization by using enterprise social media (ESM). (Carlile’s…
Abstract
Purpose
The purpose of this study is to investigate the crossing of knowledge and power boundaries within a bureaucratic organization by using enterprise social media (ESM). (Carlile’s 2002) boundary crossing framework is used to guide this research.
Design/methodology/approach
This is a qualitative study based on semi-structured interviews and observations in a large Norwegian public sector organization.
Findings
The authors find that investigating crossing knowledge and power boundaries by using ESM is problematic at syntactic, semantic and pragmatic levels. ESM is used predominantly for sharing, storing and retrieving explicit knowledge, which is a display of crossing the information-processing boundary. Hence, the possibilities of shifts in formal power positions where all employees can participate on equal terms is not achieved. On the contrary, as shared meaning on how to use EMS, taking the perspective of other on how to share knowledge and thus creating new knowledge practices in EMS by overcoming these knowledge barriers is not evident. Therefore, examples of crossing the semantic and pragmatic knowledge boundaries are rarely found.
Research limitations/implications
The framework could be applied to a variety of contexts to further explore the role of ESM in learning and knowledge sharing and its ability to cross power and knowledge boundaries.
Originality/value
This paper addresses a gap in the literature around discussions of power, trust, boundary crossing and the use of ESM for knowledge sharing and learning.
Details
Keywords
Chien Wen (Tina) Yuan and Nanyi Bi
In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The…
Abstract
Purpose
In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The need to manage unavailability becomes increasingly critical when users employ several communication tools to interact with various ties. A person's availability information disclosure may depend on different social relationships and the technologies used by the person. The study contributes to the literature by drawing on privacy management theory to investigate how users practice availability management and use its deceptive form, which is sometimes called a butler lie, with various ties across different messaging applications (apps) as part of their online privacy. Relevant factors in mediated communication, including facework, common ground, and interpersonal trust, are included in the developed model.
Design/methodology/approach
The authors conducted an online survey (n = 475) to explore the relationship between one's contact with different interactants (significant others, family members, close friends, acquaintances, groups of friends, and groups of acquaintances) and one's practice of availability management and use of butler lies with these interactants at different size levels on various messaging apps.
Findings
Factors such as facework, privacy related to technology, and privacy related to social relationships affect the practice of availability management and the use of butler lies. Notably, butler lies are used most frequently with acquaintances and groups of acquaintances and least frequently with significant others. Moreover, the practice of availability management and the use of butler lies are negatively moderated by people's conversational grounding and trust.
Originality/value
The study examined the practice of cross-app availability management with diverse social ties on mobile technologies, which is a socio-informatic practice that is widely adopted in the contemporary digital landscape but on which limited scientific and theoretic research has been conducted. No research has directly investigated users' availability management across multiple apps from a relational perspective. Building on the theoretical framework of privacy management, the paper aims to bridge the gap in the relevant literature. The results of this study can serve as a reference for library professionals to develop information literacy programs according to users' availability management needs. The results also provide insights to system designers for developing messaging tools.
Details