Search results
1 – 10 of 82
Abstract
Details
Keywords
Angelo Cavallo, Silvia Sanasi, Antonio Ghezzi and Andrea Rangone
This paper aims to examine how competitive intelligence (CI) relates to the strategy formulation process of firms.
Abstract
Purpose
This paper aims to examine how competitive intelligence (CI) relates to the strategy formulation process of firms.
Design/methodology/approach
Due to the novelty of the phenomenon and to the depth of the investigation required to grasp the mechanisms and logics of CI, a multiple case study has been performed related to four companies located in Brazil that adopted CI practices within dedicated business units to inform and support strategic decision-making.
Findings
The authors provide detailed empirical evidence on the connection and use of CI practices throughout each stage of the strategy formulation process. Moreover, the study suggests that CI practices, despite their strategic relevance and diffusion, are still extensively adopted for tactical use.
Originality/value
This study sheds light on how CI practices may inform, support, and be integrated in the strategy formulation process, as few studies have done before.
Details
Keywords
J. Tuomas Harviainen, Miikka J. Lehtonen and Sören Kock
This article aims to examine instances of timeliness and temporality in information sharing conducted by members of the Finnish game design community. By doing so, it provides new…
Abstract
Purpose
This article aims to examine instances of timeliness and temporality in information sharing conducted by members of the Finnish game design community. By doing so, it provides new knowledge into the ways in which organizational information practices may take place on an individual and interpersonal level, and the ways in which timeliness impact information sharing.
Design/methodology/approach
The article is based on three sets of interviews, gathered in 2012–2014, 2017–2018 and 2018–2020.
Findings
The authors identify six themes of information sharing and show that time is strongly tied to the ways in which people in the Finnish game development industry share information outside of their own companies.
Originality/value
This type of information sharing has not been previously researched. This study brings forth new knowledge on how timeliness influence information sharing within creative industries.
Details
Keywords
Roisin Donnelly and Anthony Ryan
This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if…
Abstract
Purpose
This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if background images evoking gendered stereotypes of leadership can cue stereotype threat in female technology workers undertaking a leadership activity, thus negatively effecting performance. This study aims to contribute to the body of research on stereotype threat by establishing whether virtual backgrounds used in video conferencing software are inherently identity safe or whether their use could have a negative performance impact on marginalised groups.
Design/methodology/approach
Using a mixed methods research design with 22 participants in two countries working in the one large organisation, using two quantitative methods (an experiment and a survey) and one qualitative method (semi-structured interviews), the study examined the relationship between performance on the leadership activity and exposure to gendered backgrounds on a video conference call.
Findings
It found that female leaders undertaking a leadership test experienced more anxiety and achieved lower scores on average when exposed to a male-gendered virtual background compared to male colleagues or female leaders exposed to a female gendered background. It was also found that these leaders were aware of the stereotype of leadership being White and male, and showed symptoms of prolonged exposure to stereotype threat in the workplace. While the authors still are working through a post-pandemic environment, it may be judicious for organisations to restrict the use of virtual backgrounds to identity-safe ones, specifically chosen by the company.
Research limitations/implications
The study makes several practical recommendations, indicating actions which can be taken at the individual, team and corporate levels. Re-running this experiment in a more controlled environment with a larger sample set could yield more definitive, statistically significant results and contribute more to the literature.
Practical implications
Some individual impacts were found via the interviews. Male leaders in the organisation need to do more to mentor and endorse their female colleagues. By doing this, they can counter the negative effects of solo status and the subsequent performance degradations of their female counterparts, while also setting an example for other leaders. Participation in the mentoring programme and initiatives such as Dare and value, inclusion, belonging, and equity should be encouraged and supported. Reverse mentoring should also be encouraged among the population of male leaders to aid in allyship and bias-awareness.
Social implications
Teams should note that a democratic vote is not always the best way to decide on the names of teams, projects or meeting rooms. These may skew towards niche interests that can serve to alienate members of the team who do not associate themselves with that interest. Rather, the teams should strive to be fully inclusive and educated on the need for identity-safety. Team events may also serve to alienate members if teams are not mindful of the need to be inclusive. Activities, such as “go-kart” racing and physical or competitive team events have been highlighted as unsuitable for some team members, and should be avoided in favour of inclusivity.
Originality/value
A significant body of research has documented the effect to which stereotype threat can be triggered by both the physical environment and by the use of various technology media. However, there is a dearth of research exploring the relationship between stereotype threat, defined as “the concrete, real-time threat of being judged and treated poorly in settings where a negative stereotype about one’s group applies” (Steele et al., 2002, p. 385), and video conferencing software features, such as virtual backgrounds.
Details
Keywords
Constructive deviance has received increasing attention across the last 20 years. However, because the distinction between constructive and traditional forms of deviance (i.e.…
Abstract
Constructive deviance has received increasing attention across the last 20 years. However, because the distinction between constructive and traditional forms of deviance (i.e., destructive) is based on the intent behind the behaviors, it can be difficult to determine which acts are constructive. As an umbrella construct consisting of several forms of deviant acts (e.g., whistle-blowing, employee voice, necessary evils), research into constructive deviance has largely remained focused on the individual behaviors to date. While advancements have been made, this focus has limited the consideration of an overarching understanding of constructive deviance in the workplace. Further, constructs like constructive deviance that straddle the bounds between beneficial and detrimental necessitate the exploration into their antecedents as determined by the employees (i.e., apples), their environments (e.g., barrels), or some combination of the two. The author seeks to advance the research in constructive deviance by proposing a testable model. In which, the author develops an interactionist perspective of the antecedents to reposition constructive deviance as the acts of good employees in restrictive or negative environments. In doing so, the author considers how various aspects of individuals, their organizational environments, and the influence of their leaders interact. The author then develops a multi-stakeholder approach to the outcomes of constructive deviance to consider how the various parties (i.e., organization, coworkers, customers) are expected to respond and how these responses impact the more distal outcomes as well as the likelihood of engaging in future constructive deviance.
Details