Search results

1 – 10 of 94
Article
Publication date: 18 April 2024

Emilie Gibeau

Despite much attention being devoted to shared leadership, the negotiation of such arrangements remains underexplored. In parallel, the revival of interest in matrix structures…

Abstract

Purpose

Despite much attention being devoted to shared leadership, the negotiation of such arrangements remains underexplored. In parallel, the revival of interest in matrix structures reveals their challenges but neglects the dynamics of shared leadership. In this case study, the author analyzes the tensions experienced by senior managers of a healthcare organization transitioning from a hierarchical to matrix structure as they negotiate their leadership roles in this new arrangement.

Design/methodology/approach

The author interviewed 16 senior managers, observed their meetings and analyzed documents. These data were combined with secondary data including previous interviews and observations of this top leadership team. The author then conducted an inductive data analysis.

Findings

The author's analysis reveals that the tensions experienced by senior managers as they negotiate their roles reflect the co-existence of leadership surpluses (too much leadership) and deficits (too little leadership) in matrix organizations. The author argues that surpluses and deficits are not mutually exclusive but are interrelated and shows how leadership surpluses can create leadership deficits.

Practical implications

The author’s findings suggest that in contexts of leader abundance, actors should explore leadership voids. Particular attention should be paid to incidents of intrusion and exclusion, moments of transition and intense role negotiation, as those contexts are particularly conducive to leadership deficits.

Originality/value

While previous work on matrix structures focuses on leadership surpluses, the author discusses leadership deficits. The author explores how more leaders do not necessarily mean more leadership, but instead how more leaders may result in leadership voids.

Details

International Journal of Organization Theory & Behavior, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1093-4537

Keywords

Article
Publication date: 25 April 2024

Philippe Orsini, Toru Uchida, Remy Magnier-Watanabe, Caroline Benton and Kimihiko Nagata

We empirically assessed the antecedents of subjective well-being at work for French permanent employees.

Abstract

Purpose

We empirically assessed the antecedents of subjective well-being at work for French permanent employees.

Design/methodology/approach

The methodology includes qualitative and quantitative data analyses. In the first phase, interviews elicited the antecedents of subjective well-being at work among permanent French employees. In the second phase, a questionnaire survey was used to confirm the relevance of the antecedents uncovered in the first phase.

Findings

We found 14 distinct elements that influence French employees’ subjective well-being at work: corporate culture, job dissonance, relationships with colleagues, achievement, professional development, relationships with superiors, status, workload, perks, feedback, workspace, diversity and pay. Moreover, we identified discrete antecedents for the three components of subjective well-being at work: work achievement and relationships with superiors and colleagues for positive emotions at work, job dissonance and workload for negative emotions at work and organizational culture and professional development for satisfaction with one’s work.

Originality/value

The original contribution of this study is to have unpacked the black box of the antecedents of subjective well-being in the French workplace and to have uncovered discriminant predictors for each of the three components of subjective well-being at work. Furthermore, we specifically linked each of these three components with their most significant antecedents.

Details

Evidence-based HRM: a Global Forum for Empirical Scholarship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-3983

Keywords

Article
Publication date: 9 May 2023

Jing Chen, Hongli Chen and Yingyun Li

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily…

Abstract

Purpose

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily search tactics during the cross-app interaction search process.

Design/methodology/approach

In total, 204 young participants' impressive cross-app search experiences in real daily situations were collected. The search tactics and tactic transition sequences in their search process were obtained by open coding. Statistical analysis and sequence analysis were used to analyze the frequently applied tactics, the frequency and probability of tactic transitions and the tactic transition sequences representing characteristics of tactic transitions occurring at the beginning, middle and ending phases. 

Findings

Creating the search statement (Creat), evaluating search results (EvalR), evaluating an individual item (EvalI) and keeping a record (Rec) were the most frequently applied tactics. The frequency and probability of transitions differed significantly between different tactic types. “Creat? EvalR? EvalI? Rec” is the typical path; Initiate the search in various ways and modifying the search statement were highlighted at the beginning phase; iteratively creating the search statement is highlighted in the middle phase; Moreover, utilization and feedback of information are highlighted at the ending phase. 

Originality/value

The present study shed new light on tactic transitions in the cross-app interactive environment to explore information search behaviour. The findings of this work provide targeted suggestions for optimizing APP query, browsing and monitoring systems.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 5 April 2024

Aku Valtakoski and Besma Glaa

The study aims to promote the use of qualitative methods in service research by investigating how these methods are reported in service journals, how the level of reporting has…

Abstract

Purpose

The study aims to promote the use of qualitative methods in service research by investigating how these methods are reported in service journals, how the level of reporting has evolved and whether methodological reporting influences the downloads or citations received by qualitative articles.

Design/methodology/approach

Methodological reporting practices were identified through content analysis of 318 qualitative articles published in three major service research journals and comparison with prior methodological literature. Regression analysis was used to test how the level of methodological reporting influences article downloads and citations.

Findings

The study identifies 29 reporting practices related to 9 key methodological reporting areas. The overall level of methodological reporting in published qualitative articles has increased over time. While differences in the level of reporting between service journals persist, they are narrowing. The level of methodological reporting did not influence downloads or citations of qualitative articles.

Research limitations/implications

Service scholars using qualitative methods should pay attention to methodological reporting as it can improve the chances of being published. Factors such as theoretical contributions are likely to have a greater influence on article impact than methodological reporting.

Originality/value

No prior study has explored methodological reporting practices across different qualitative methodologies or how reporting influences article impact. For authors, reviewers and editors, the study provides an inventory of reporting practices relevant for evaluating qualitative articles, which should lower barriers for qualitative methods in service research by providing practical guidelines on what to focus on when reporting and assessing qualitative research.

Details

Journal of Service Management, vol. 35 no. 6
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 26 April 2024

Yann Levy and Ouidade Sabri

This study aims to introduce and define the concept of phygital brand community (PBC). It discusses the potential conflicts that can arise from engaging in multiple PBCs and…

Abstract

Purpose

This study aims to introduce and define the concept of phygital brand community (PBC). It discusses the potential conflicts that can arise from engaging in multiple PBCs and propose an enriched netnographic methodological approach to explore the role of PBC engagement overlap and its influence on the phygital experience.

Design/methodology/approach

Following a critical analysis of the inherent limitations of netnographic methodological approaches in the context of PBCs, this study develops an enriched netnographic research protocol that accounts for the challenges of engagement overlap among PBCs.

Findings

This study proposes two methods of analysis, namely, “participatory netnography” and “witness netnography,” which are derived from a mixed-methodology approach that integrates elements of netnography.

Research limitations/implications

The findings of this study underscore the requisite methodological refinements imperative for enhancing netnographic analysis, particularly in its application for a better comprehension of individual behaviors within the realm of PBCs. In pursuit of this objective, the identified adjustments encompass ethical considerations, evaluation methods and their application in a digital milieu, where intricate mechanics and technologies frequently elude conventional methodologies.

Originality/value

In this study, the authors present a novel conceptualization of PBCs, highlighting their role and development, as well as the challenges they pose. To adequately capture the impact of PBC engagement overlap, the authors propose the need for an enriched mixed-methodological approach.

Details

Qualitative Market Research: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1352-2752

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 24 April 2024

Jan Mei Soon-Sinclair, Rounaq Nayak and Louise Manning

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used…

Abstract

Purpose

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used linear approaches to examine the root causes of the melamine milk scandal.

Design/methodology/approach

In the present study, we applied a systems approach to the melamine milk scandal to identify the complex systems-level failures across the supply chain leading to the incident and why food fraud incidents such as this occurred in the dairy sector. Additionally, systemic failures associated with food fraud vulnerability factors were considered (i.e. opportunities, motivation and control measures).

Findings

48 contributory factors of influence were identified and grouped across six sociotechnical levels across the Chinese dairy system, from government to equipment and surroundings. Lack of vertical integration (processes and communication) contributed to the failure. When viewed from a broader perspective, the melamine milk scandal can be linked to a series of human errors and organisational issues associated with government bodies, the dairy supply chain, individual organisations and management decisions and individual actions of staff or processes.

Practical implications

This approach is of value to policymakers and the industry as it supports public health investigations of food fraud incidents and proactive food safety management.

Originality/value

To the best of our knowledge, this is the first study to analyse a food safety or fraud incident using the AcciMap approach and the food fraud vulnerability assessment (FFVA) technique. AcciMap analysis is applied to both unintentional and intentional aspects of the incident.

Details

British Food Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 20 March 2024

Ayse KUCUK YILMAZ, Konstantinos N. MALAGAS and Triant G. FLOURIS

This study aims to develop an inclusive, multidisciplinary, flexible and organizationally adaptable safety risk management framework, including diversity management, that will be…

Abstract

Purpose

This study aims to develop an inclusive, multidisciplinary, flexible and organizationally adaptable safety risk management framework, including diversity management, that will be implemented to ensure safety is and remains at the desired level. If the number of incidents and potential incidents that could lead to accidents and their impact rates are to be reduced operationally and administratively, aviation safety risks and sources of risk must be better understood, sources of risk identified, and the safety risk management framework designed in an organization-specific and organization-wide sustainable way. At this point, it is necessary to draw the conceptual framework well and to define the boundaries of the concepts well. In this study, a framework model that can be adapted to the organization is proposed to optimize the management of risks and provide both efficient and effective resource allocation and organizational structure design in its operations and management functions.

Design/methodology/approach

The qualitative research method – triple techniques – was deemed appropriate for this study, which aims to identify, examine, interpret and develop the situations of safety management models. In this context, document analysis, business process modeling technique and Delphi techniques from qualitative research methods were used via integration as the methodology of this research.

Findings

To manage dynamic civil aviation management activities and business processes effectively and efficiently, the risk management process is the building block of the “Proposed Process Model” that supports the decision-making processes of aviation organizations and managers. This “Framework Conceptual Model” building block also helps build capacity and resilience by enabling continuous development, organizational learning, and flexible structuring.

Research limitations/implications

This research is limited to air transportation and aviation safety management issues. This research is limited specifically to a safety-based risk management framework for the aviation industry. This research may have social implications as source saving, optimum resource use and capacity building will make a contribution to society and add value besides operational and practical implementation.

Social implications

This research may contribute to more safe operations and functions in the aviation industry.

Originality/value

Management and academia may gain considerable support from this research to manage their safety risks via a corporate-tailored risk management framework, both improving resilience and developing corporate capacity. With this model presented, decision-makers will have a guiding structure that can optimally manage the main risk types that may be encountered in the safety risk in the fields of suppliers, manufacturers, demand changes, logistics, information management, environmental, legal and regulatory. Existing studies in the literature are generally in the form of algorithms and cannot be used as a decision-making support tool. This model aims to fill the gap in the literature. In addition, added value may be created by applying this model to optimum management safety risks in the real aviation industry and its related sectors.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 3
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 2 November 2023

Adesegun Oyedele and Emily Goenner

This study aims to investigate the effect of social influence and value-driven mobile marketing activities on consumers’ acceptance of mobile marketing offers.

Abstract

Purpose

This study aims to investigate the effect of social influence and value-driven mobile marketing activities on consumers’ acceptance of mobile marketing offers.

Design/methodology/approach

The method used is survey questionnaire. A proposed model was tested by using structural model analysis and data gathered from 356 Mexico consumers and 346 US consumers.

Findings

The study shows the number of peers and providing information are the main predictor variables of consumer acceptance of mobile marketing offers in both countries. These results suggest that social value factors are important variables for explaining consumers’ responses to mobile marketing offers across two countries characterized by dissimilar macro-environmental conditions.

Research limitations/implications

The study’s overall implication about standardization vs adaptation is that social value messages can be standardized across countries. However, the marketing tools and touch points required to communicate any message appeal must be adapted across countries. One limitation in this study is the use of a convenience sample of undergraduate college students. This study did not control for different types of mobile phones and the screen sizes of mobile phones.

Practical implications

The overall implication of standardization vs adaptation from the study results is that social value messages can be standardized across countries. However, the marketing tools and touch points required to communicate any message appeal must be adapted across countries.

Originality/value

Unlike previous studies where the emphasis is to explicate the effect of value-oriented mobile activity, this study examines the combined effect of social influence and value-driven mobile activities on acceptance of mobile marketing.

Details

Young Consumers, vol. 25 no. 2
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 94