Search results
1 – 10 of 394Donato Cutolo, Simone Ferriani and Gino Cattani
Strategy scholars have widely recognized the central role that narratives play in the construction of organizational identities. Moreover, storytelling is an important strategic…
Abstract
Strategy scholars have widely recognized the central role that narratives play in the construction of organizational identities. Moreover, storytelling is an important strategic asset that firms can leverage to inspire employees, excite investors and engage customers' attention. This chapter illustrates how advancements in computational linguistic may offer opportunities to analyze the stylistic elements that make a story more convincing. Specifically, we use a topic model to examine how narrative conventionality influences the performance of 78,758 craftsmen selling their handmade items in the digital marketplace of Etsy. Our findings provide empirical evidence that effective narratives display enough conventional features to align with audience expectations, yet preserve some uniqueness to pique audience interest. By elucidating our approach, we hope to stimulate further research at the interface of style, language and strategy.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Susan Whatman, Jane Wilkinson, Mervi Kaukko, Gørill Warvik Vedeler, Levon Ellen Blue and Kristin Elaine Reimer