Search results
1 – 10 of over 3000Michael Ballé, Jacques Chaize and Daniel Jones
The creators of the “lean” approach share their extensive experience, highlighting how organizations can reap the benefits of Toyota’s approach.
Abstract
Purpose
The creators of the “lean” approach share their extensive experience, highlighting how organizations can reap the benefits of Toyota’s approach.
Design/methodology/approach
Based on the authors expertise and 30 plus years of experience developing and implementing the “lean” approach.
Findings
A shift is required in leaders, away from a chain of command to a chain of help. Type IV learning is required where everyone, including the “leaders”, explores, learns, and figures out, experientially, one change at a time.
Originality/value
The paper provides a succinct summary of the need for a mind-set shift in leaders if they are to create a truly lean culture in their organization. They call for leaders to start a cognitive revolution, rather than look to “bolt on” lean to existing organizational practices.
Details
Keywords
Jessica Rose Carre, Shelby R. Curtis and Daniel Nelson Jones
The purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.
Abstract
Purpose
The purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.
Design/methodology/approach
The authors assessed trust in a company following a data breach as well as perceptions of individual and corporate responsibility for data security and also measured individual personality.
Findings
The authors found that individuals held companies more responsible for protecting private data and held companies even more responsible following a data breach. Further, perception of responsibility for a data breach significantly affected individuals’ response to a company’s attempt to rebuild trust. Finally, participant personality impacted perceptions of responsibility and trust in a company after a data breach.
Research limitations/implications
Companies are held more responsible for protecting private data than are individuals. Thus, violation of this expectation insofar as a data breach may result in a psychological contract breach which explains reductions in trust in a company which has experienced a data breach. Further, the effect of company’s responses to a data breach depends on individuals’ perception of responsibility and personality. Thus, the best course of action following a data breach may vary across customers.
Practical implications
Companies should consider differences in customer perceptions when responding to a data breach.
Social implications
Individuals differ in how responsible they feel a company is for data security. Further, those differences impact reactions to data breach responses from companies.
Originality/value
This paper explored personality as it impacts perceptions of corporate responsibility in data security. Further, the authors explore the role of perception of responsibility to determine the role of psychological contract breach in reduced trust after data breach.
Details
Keywords
Shelby R. Curtis, Jessica Rose Carre and Daniel Nelson Jones
The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers…
Abstract
Purpose
The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach.
Design/methodology/approach
The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company.
Findings
This study found that the presence or absence of a previous breach had a large impact on company perceptions, but a minimal impact on behavioral intentions to be personally more secure.
Research limitations/implications
The authors found that the presence or absence of a previous breach had a large impact on company perceptions, but minimal impact on behavioral intentions to be personally more secure.
Practical implications
Companies need to be cautious about how much confidence they convey to consumers. Companies should not rely on consumers engaging in secure online practices, even following a breach.
Social implications
Companies need to communicate personal security behaviors to consumers in a way that still instills confidence in the company but encourages personal responsibility.
Originality/value
The confidence of company security statements and presence of a previous breach were examined for their impact on company perception and a novel dependent variable of password complexity.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
Brian J. Taillon, Steven M. Mueller, Christine M. Kowalczyk and Daniel N. Jones
The purpose of this paper is to better understand the role of closeness and the relationships between social media influencers and their followers, and, more specifically…
Abstract
Purpose
The purpose of this paper is to better understand the role of closeness and the relationships between social media influencers and their followers, and, more specifically, how social media influencers can effectively manage their human brands.
Design/methodology/approach
Two studies were conducted to explore social media influencers. Qualitative content analysis and modeling with path analysis were used to analyze the data.
Findings
Results found attractiveness and likeability to positively predict attitudes toward the influencer, word-of-mouth and purchase intentions, whereas similarity only predicted word-of-mouth from the follower. Closeness served as a moderator but had different effects. Closeness positively moderated the effect of attractiveness on purchase intentions; however, it had a negative effect with similarity on purchase intentions. Moreover, closeness moderated the effect of likeability on attitude toward the influencer.
Research limitations/implications
This study was limited by the student sample as well as the students’ self-identification of a social media influencer. Future research should include experimental design manipulating well-known/followed or fictional social media influencers on different social media.
Practical implications
This paper explores the characteristics of social media influencers as well as the potential outcomes associated with influencers on social media. The implications for marketers and advertisers include a better understanding of how consumers engage with influencers on social media.
Originality/value
The role of closeness is identified as a moderator of consumers’ behaviors toward social media influencers.
Details
Keywords
A. Keivan Zokaei and David W. Simons
A key vision of tomorrow's industry is creating supply chains which collaboratively strive on enhancing the value to the end‐consumer. The purpose of this paper is to…
Abstract
Purpose
A key vision of tomorrow's industry is creating supply chains which collaboratively strive on enhancing the value to the end‐consumer. The purpose of this paper is to introduce the food value chain analysis (FVCA) methodology for improving consumer focus in the agri‐food sector based on the lean paradigm, value stream mapping and value chain analysis (Porter, 1985).
Design/methodology/approach
This contribution presents a case‐study of a UK red meat supply chain explaining how the FVCA method enabled a team of researchers and practitioners to identify the misalignments of both product attributes and supply chain activities with the consumer needs.
Findings
This paper explains how the FVCA methodology potentially realigned the processes along the supply chain with the true consumer requirements and why the supply chain effectiveness was improved; this follows with a description of the subsequent efficiency gains from application of the FVCA methodology.
Originality/value
This paper further defines the demarcation between supply chain “effectiveness” and “efficiency”. This paper contributes to the debate on the importance of supply chain effectiveness by linking to consumer value at every stage of the supply chain.
Details
Keywords
David Simons and Keivan Zokaei
Lean is a well‐established industrial paradigm and has proved to be of significant benefit in different sectors of the manufacturing industry (e.g. automotive and…
Abstract
Purpose
Lean is a well‐established industrial paradigm and has proved to be of significant benefit in different sectors of the manufacturing industry (e.g. automotive and aerospace). This paper aims to report on the introduction of lean to a new sector – the “UK red meat industry”. It highlights the benefits of lean production in one specific manufacturing area, the “cutting room”, where meat is split down from a carcass into retail cuts of meat.
Design/methodology/approach
A multiple case study approach is adopted in this paper. As part of the Red Meat Industry Forum's Value Chain Analysis Initiative, five cutting plants are presented as case studies in this paper.
Findings
This paper identifies two “traditional” and three “advanced” cutting rooms and reports a typical 25 per cent productivity gap. The paper tentatively concludes this is due to the advanced cases practicing lean techniques, such as “Takt‐time” and “work standardization”.
Originality/value
The literature review identifies a gap in previous research on the applications of logistics and operations management concepts and practices into the red meat industry. Particularly, lean techniques have been overlooked in the red meat industry.
Details
Keywords
The purpose of this paper is to provide a methodological guidance for the practical use of the axiomatic designed production module template presented in a former…
Abstract
Purpose
The purpose of this paper is to provide a methodological guidance for the practical use of the axiomatic designed production module template presented in a former publication. The objective is to accelerate the design process and increase the quality of results in the design of lean production systems.
Design/methodology/approach
Two case studies based on practical cases were presented to different test teams. A first test cycle helped to improve the user friendliness of the axiomatic designed tree of functional requirements and design parameters. The second test cycle served to prove the practicability of the template, comparing the teams' results with the realized solution.
Findings
Based on the teams' feedbacks, ten “easy‐to‐use” steps for the systematic design of lean production systems were developed. The guideline obtains the best results if used in combination with the value stream mapping concept.
Research limitations/implications
Apart from one case study in injection moulding, practical evaluations were focused on applications in the field of manual, hybrid or automated assembly systems, which perhaps limits the applicability of the presented approach in some machining processes.
Practical implications
Several successful implementations demonstrated the validity of the presented method in terms of results, planning time and user friendliness. Even students with nearly no practical experiences in production system design were able to present astonishing results within short timeframes.
Originality/value
This paper fulfils an identified need of a methodological guidance in the design of lean production systems and offers practical help to shorten the design times and improve the quality of the design results.
Details
Keywords
The purpose of this paper is to demonstrate how the lean Six Sigma method can be applied to procurement, processes where there is an extensive use of information…
Abstract
Purpose
The purpose of this paper is to demonstrate how the lean Six Sigma method can be applied to procurement, processes where there is an extensive use of information technology and communication (ICT) systems. The paper defines a method to streamline, digitize and reduce waste in procurement processes by using the “lean Six Sigma and digitize” methodology.
Design/methodology/approach
A framework was developed and applied to the procurement processes, based on the analysis of best practices and on several implementations.
Findings
It was found that the digitization of a procurement process which is not streamlined can generate problems. A process must be mapped to highlight waste and low quality. Only when the new process is improved, taking into account also that it will be possible to use ICT supports, can it be digitized. The new process will digitize only value‐added activities recognized by the users and by the organization.
Practical implications
The paper should be of interest to the academic world, as well as to management working in all types of organizations.
Originality/value
Within the field of lean Six Sigma and information and telecommunication technology, there has been a continuous debate as to whether both approaches are complementary or contradictory. This paper fulfils an identified need to study the interactions between a modern example of information technology and its role within procurement, making a valid contribution within this field of research.
Details
Keywords
The purpose of this paper is to develop a common theme between the six research articles submitted for IJHG 24.3.
Abstract
Purpose
The purpose of this paper is to develop a common theme between the six research articles submitted for IJHG 24.3.
Design/methodology/approach
All articles are read and themes extracted which are used to write a review summarising the key points in each while developing an overarching theme for the issue of IJHG. Other literature supporting the development of this theme is also reviewed and used to contribute insights.
Findings
The findings consist of the common themes developed. In this issue, the common theme was improving care while saving costs in healthcare and the theme was explored in each article in relation to a lean healthcare management/governance philosophy.
Practical implications
The review section of IJHG allows readers to gain a quick overview of the content and then select the articles they wish to read in full.
Originality/value
IJHG is the only journal in the Emerald portfolio with a review section of this kind. Thus it provides added value.
Details