Search results

1 – 10 of 82
Content available
Book part
Publication date: 30 June 2023

Lisa M. Given, Donald O. Case and Rebekah Willson

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Content available
Book part
Publication date: 19 February 2021

Sally Myers

Abstract

Details

Jerome Bruner, Meaning Making and Education for Conflict Resolution
Type: Book
ISBN: 978-1-80071-074-0

Content available
Article
Publication date: 1 December 2002

Tony Cawkell

181

Abstract

Details

Journal of Documentation, vol. 58 no. 6
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 13 May 2020

Angelo Cavallo, Silvia Sanasi, Antonio Ghezzi and Andrea Rangone

This paper aims to examine how competitive intelligence (CI) relates to the strategy formulation process of firms.

13710

Abstract

Purpose

This paper aims to examine how competitive intelligence (CI) relates to the strategy formulation process of firms.

Design/methodology/approach

Due to the novelty of the phenomenon and to the depth of the investigation required to grasp the mechanisms and logics of CI, a multiple case study has been performed related to four companies located in Brazil that adopted CI practices within dedicated business units to inform and support strategic decision-making.

Findings

The authors provide detailed empirical evidence on the connection and use of CI practices throughout each stage of the strategy formulation process. Moreover, the study suggests that CI practices, despite their strategic relevance and diffusion, are still extensively adopted for tactical use.

Originality/value

This study sheds light on how CI practices may inform, support, and be integrated in the strategy formulation process, as few studies have done before.

Details

Competitiveness Review: An International Business Journal , vol. 31 no. 2
Type: Research Article
ISSN: 1059-5422

Keywords

Open Access
Article
Publication date: 30 September 2021

J. Tuomas Harviainen, Miikka J. Lehtonen and Sören Kock

This article aims to examine instances of timeliness and temporality in information sharing conducted by members of the Finnish game design community. By doing so, it provides new…

1478

Abstract

Purpose

This article aims to examine instances of timeliness and temporality in information sharing conducted by members of the Finnish game design community. By doing so, it provides new knowledge into the ways in which organizational information practices may take place on an individual and interpersonal level, and the ways in which timeliness impact information sharing.

Design/methodology/approach

The article is based on three sets of interviews, gathered in 2012–2014, 2017–2018 and 2018–2020.

Findings

The authors identify six themes of information sharing and show that time is strongly tied to the ways in which people in the Finnish game development industry share information outside of their own companies.

Originality/value

This type of information sharing has not been previously researched. This study brings forth new knowledge on how timeliness influence information sharing within creative industries.

Details

Journal of Documentation, vol. 78 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Book part
Publication date: 16 August 2023

Abstract

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Open Access
Article
Publication date: 23 October 2023

Roisin Donnelly and Anthony Ryan

This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if…

Abstract

Purpose

This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if background images evoking gendered stereotypes of leadership can cue stereotype threat in female technology workers undertaking a leadership activity, thus negatively effecting performance. This study aims to contribute to the body of research on stereotype threat by establishing whether virtual backgrounds used in video conferencing software are inherently identity safe or whether their use could have a negative performance impact on marginalised groups.

Design/methodology/approach

Using a mixed methods research design with 22 participants in two countries working in the one large organisation, using two quantitative methods (an experiment and a survey) and one qualitative method (semi-structured interviews), the study examined the relationship between performance on the leadership activity and exposure to gendered backgrounds on a video conference call.

Findings

It found that female leaders undertaking a leadership test experienced more anxiety and achieved lower scores on average when exposed to a male-gendered virtual background compared to male colleagues or female leaders exposed to a female gendered background. It was also found that these leaders were aware of the stereotype of leadership being White and male, and showed symptoms of prolonged exposure to stereotype threat in the workplace. While the authors still are working through a post-pandemic environment, it may be judicious for organisations to restrict the use of virtual backgrounds to identity-safe ones, specifically chosen by the company.

Research limitations/implications

The study makes several practical recommendations, indicating actions which can be taken at the individual, team and corporate levels. Re-running this experiment in a more controlled environment with a larger sample set could yield more definitive, statistically significant results and contribute more to the literature.

Practical implications

Some individual impacts were found via the interviews. Male leaders in the organisation need to do more to mentor and endorse their female colleagues. By doing this, they can counter the negative effects of solo status and the subsequent performance degradations of their female counterparts, while also setting an example for other leaders. Participation in the mentoring programme and initiatives such as Dare and value, inclusion, belonging, and equity should be encouraged and supported. Reverse mentoring should also be encouraged among the population of male leaders to aid in allyship and bias-awareness.

Social implications

Teams should note that a democratic vote is not always the best way to decide on the names of teams, projects or meeting rooms. These may skew towards niche interests that can serve to alienate members of the team who do not associate themselves with that interest. Rather, the teams should strive to be fully inclusive and educated on the need for identity-safety. Team events may also serve to alienate members if teams are not mindful of the need to be inclusive. Activities, such as “go-kart” racing and physical or competitive team events have been highlighted as unsuitable for some team members, and should be avoided in favour of inclusivity.

Originality/value

A significant body of research has documented the effect to which stereotype threat can be triggered by both the physical environment and by the use of various technology media. However, there is a dearth of research exploring the relationship between stereotype threat, defined as “the concrete, real-time threat of being judged and treated poorly in settings where a negative stereotype about one’s group applies” (Steele et al., 2002, p. 385), and video conferencing software features, such as virtual backgrounds.

Details

International Journal of Organizational Analysis, vol. 31 no. 8
Type: Research Article
ISSN: 1934-8835

Keywords

Content available
Book part
Publication date: 30 June 2023

Lisa M. Given, Donald O. Case and Rebekah Willson

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Content available
Book part
Publication date: 4 October 2022

John E. Baur

Constructive deviance has received increasing attention across the last 20 years. However, because the distinction between constructive and traditional forms of deviance (i.e.

Abstract

Constructive deviance has received increasing attention across the last 20 years. However, because the distinction between constructive and traditional forms of deviance (i.e., destructive) is based on the intent behind the behaviors, it can be difficult to determine which acts are constructive. As an umbrella construct consisting of several forms of deviant acts (e.g., whistle-blowing, employee voice, necessary evils), research into constructive deviance has largely remained focused on the individual behaviors to date. While advancements have been made, this focus has limited the consideration of an overarching understanding of constructive deviance in the workplace. Further, constructs like constructive deviance that straddle the bounds between beneficial and detrimental necessitate the exploration into their antecedents as determined by the employees (i.e., apples), their environments (e.g., barrels), or some combination of the two. The author seeks to advance the research in constructive deviance by proposing a testable model. In which, the author develops an interactionist perspective of the antecedents to reposition constructive deviance as the acts of good employees in restrictive or negative environments. In doing so, the author considers how various aspects of individuals, their organizational environments, and the influence of their leaders interact. The author then develops a multi-stakeholder approach to the outcomes of constructive deviance to consider how the various parties (i.e., organization, coworkers, customers) are expected to respond and how these responses impact the more distal outcomes as well as the likelihood of engaging in future constructive deviance.

Content available
Book part
Publication date: 6 August 2020

Mert Gürlek

Abstract

Details

Tech Development through HRM
Type: Book
ISBN: 978-1-80043-312-0

1 – 10 of 82