Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of over 3000
To view the access options for this content please click here
Article
Publication date: 7 May 2019

Lean as a learning system: What do organizations need to do to get the transformational benefits from Toyota’s method?

Michael Ballé, Jacques Chaize and Daniel Jones

The creators of the “lean” approach share their extensive experience, highlighting how organizations can reap the benefits of Toyota’s approach.

HTML
PDF (51 KB)

Abstract

Purpose

The creators of the “lean” approach share their extensive experience, highlighting how organizations can reap the benefits of Toyota’s approach.

Design/methodology/approach

Based on the authors expertise and 30 plus years of experience developing and implementing the “lean” approach.

Findings

A shift is required in leaders, away from a chain of command to a chain of help. Type IV learning is required where everyone, including the “leaders”, explores, learns, and figures out, experientially, one change at a time.

Originality/value

The paper provides a succinct summary of the need for a mind-set shift in leaders if they are to create a truly lean culture in their organization. They call for leaders to start a cognitive revolution, rather than look to “bolt on” lean to existing organizational practices.

Details

Development and Learning in Organizations: An International Journal, vol. 33 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/DLO-11-2018-0147
ISSN: 1477-7282

Keywords

  • Lean
  • Experiential learning
  • Learning strategies

To view the access options for this content please click here
Article
Publication date: 3 April 2018

Ascribing responsibility for online security and data breaches

Jessica Rose Carre, Shelby R. Curtis and Daniel Nelson Jones

The purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.

HTML
PDF (299 KB)

Abstract

Purpose

The purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.

Design/methodology/approach

The authors assessed trust in a company following a data breach as well as perceptions of individual and corporate responsibility for data security and also measured individual personality.

Findings

The authors found that individuals held companies more responsible for protecting private data and held companies even more responsible following a data breach. Further, perception of responsibility for a data breach significantly affected individuals’ response to a company’s attempt to rebuild trust. Finally, participant personality impacted perceptions of responsibility and trust in a company after a data breach.

Research limitations/implications

Companies are held more responsible for protecting private data than are individuals. Thus, violation of this expectation insofar as a data breach may result in a psychological contract breach which explains reductions in trust in a company which has experienced a data breach. Further, the effect of company’s responses to a data breach depends on individuals’ perception of responsibility and personality. Thus, the best course of action following a data breach may vary across customers.

Practical implications

Companies should consider differences in customer perceptions when responding to a data breach.

Social implications

Individuals differ in how responsible they feel a company is for data security. Further, those differences impact reactions to data breach responses from companies.

Originality/value

This paper explored personality as it impacts perceptions of corporate responsibility in data security. Further, the authors explore the role of perception of responsibility to determine the role of psychological contract breach in reduced trust after data breach.

Details

Managerial Auditing Journal, vol. 33 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/MAJ-11-2017-1693
ISSN: 0268-6902

Keywords

  • Personality
  • Psychological contract
  • Perceived responsibility
  • Consumer reactions

To view the access options for this content please click here
Article
Publication date: 3 April 2018

Consumer security behaviors and trust following a data breach

Shelby R. Curtis, Jessica Rose Carre and Daniel Nelson Jones

The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers…

HTML
PDF (302 KB)

Abstract

Purpose

The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach.

Design/methodology/approach

The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company.

Findings

This study found that the presence or absence of a previous breach had a large impact on company perceptions, but a minimal impact on behavioral intentions to be personally more secure.

Research limitations/implications

The authors found that the presence or absence of a previous breach had a large impact on company perceptions, but minimal impact on behavioral intentions to be personally more secure.

Practical implications

Companies need to be cautious about how much confidence they convey to consumers. Companies should not rely on consumers engaging in secure online practices, even following a breach.

Social implications

Companies need to communicate personal security behaviors to consumers in a way that still instills confidence in the company but encourages personal responsibility.

Originality/value

The confidence of company security statements and presence of a previous breach were examined for their impact on company perception and a novel dependent variable of password complexity.

Details

Managerial Auditing Journal, vol. 33 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/MAJ-11-2017-1692
ISSN: 0268-6902

Keywords

  • Cyber security
  • Security statements

To view the access options for this content please click here
Article
Publication date: 1 April 2003

MNEs, globalisation and digital economy: legal and economic aspects

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination…

HTML
PDF (1.4 MB)

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
DOI: https://doi.org/10.1108/03090550310770875
ISSN: 0309-0558

Keywords

  • Globalization
  • Digital marketing
  • Electronic commerce

To view the access options for this content please click here
Article
Publication date: 27 June 2020

Understanding the relationships between social media influencers and their followers: the moderating role of closeness

Brian J. Taillon, Steven M. Mueller, Christine M. Kowalczyk and Daniel N. Jones

The purpose of this paper is to better understand the role of closeness and the relationships between social media influencers and their followers, and, more specifically…

HTML
PDF (961 KB)

Abstract

Purpose

The purpose of this paper is to better understand the role of closeness and the relationships between social media influencers and their followers, and, more specifically, how social media influencers can effectively manage their human brands.

Design/methodology/approach

Two studies were conducted to explore social media influencers. Qualitative content analysis and modeling with path analysis were used to analyze the data.

Findings

Results found attractiveness and likeability to positively predict attitudes toward the influencer, word-of-mouth and purchase intentions, whereas similarity only predicted word-of-mouth from the follower. Closeness served as a moderator but had different effects. Closeness positively moderated the effect of attractiveness on purchase intentions; however, it had a negative effect with similarity on purchase intentions. Moreover, closeness moderated the effect of likeability on attitude toward the influencer.

Research limitations/implications

This study was limited by the student sample as well as the students’ self-identification of a social media influencer. Future research should include experimental design manipulating well-known/followed or fictional social media influencers on different social media.

Practical implications

This paper explores the characteristics of social media influencers as well as the potential outcomes associated with influencers on social media. The implications for marketers and advertisers include a better understanding of how consumers engage with influencers on social media.

Originality/value

The role of closeness is identified as a moderator of consumers’ behaviors toward social media influencers.

Details

Journal of Product & Brand Management, vol. 29 no. 6
Type: Research Article
DOI: https://doi.org/10.1108/JPBM-03-2019-2292
ISSN: 1061-0421

Keywords

  • Social media
  • Closeness
  • Celebrity branding
  • Influencers

To view the access options for this content please click here
Article
Publication date: 1 May 2006

Value chain analysis in consumer focus improvement: A case study of the UK red meat industry

A. Keivan Zokaei and David W. Simons

A key vision of tomorrow's industry is creating supply chains which collaboratively strive on enhancing the value to the end‐consumer. The purpose of this paper is to…

HTML
PDF (117 KB)

Abstract

Purpose

A key vision of tomorrow's industry is creating supply chains which collaboratively strive on enhancing the value to the end‐consumer. The purpose of this paper is to introduce the food value chain analysis (FVCA) methodology for improving consumer focus in the agri‐food sector based on the lean paradigm, value stream mapping and value chain analysis (Porter, 1985).

Design/methodology/approach

This contribution presents a case‐study of a UK red meat supply chain explaining how the FVCA method enabled a team of researchers and practitioners to identify the misalignments of both product attributes and supply chain activities with the consumer needs.

Findings

This paper explains how the FVCA methodology potentially realigned the processes along the supply chain with the true consumer requirements and why the supply chain effectiveness was improved; this follows with a description of the subsequent efficiency gains from application of the FVCA methodology.

Originality/value

This paper further defines the demarcation between supply chain “effectiveness” and “efficiency”. This paper contributes to the debate on the importance of supply chain effectiveness by linking to consumer value at every stage of the supply chain.

Details

The International Journal of Logistics Management, vol. 17 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/09574090610689934
ISSN: 0957-4093

Keywords

  • Value chain
  • Supply chain management
  • Customer requirements
  • Meat
  • Food industry
  • United Kingdom

To view the access options for this content please click here
Article
Publication date: 1 April 2005

Application of lean paradigm in red meat processing

David Simons and Keivan Zokaei

Lean is a well‐established industrial paradigm and has proved to be of significant benefit in different sectors of the manufacturing industry (e.g. automotive and…

HTML
PDF (347 KB)

Abstract

Purpose

Lean is a well‐established industrial paradigm and has proved to be of significant benefit in different sectors of the manufacturing industry (e.g. automotive and aerospace). This paper aims to report on the introduction of lean to a new sector – the “UK red meat industry”. It highlights the benefits of lean production in one specific manufacturing area, the “cutting room”, where meat is split down from a carcass into retail cuts of meat.

Design/methodology/approach

A multiple case study approach is adopted in this paper. As part of the Red Meat Industry Forum's Value Chain Analysis Initiative, five cutting plants are presented as case studies in this paper.

Findings

This paper identifies two “traditional” and three “advanced” cutting rooms and reports a typical 25 per cent productivity gap. The paper tentatively concludes this is due to the advanced cases practicing lean techniques, such as “Takt‐time” and “work standardization”.

Originality/value

The literature review identifies a gap in previous research on the applications of logistics and operations management concepts and practices into the red meat industry. Particularly, lean techniques have been overlooked in the red meat industry.

Details

British Food Journal, vol. 107 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/00070700510589495
ISSN: 0007-070X

Keywords

  • Lean production
  • Meat
  • Food manufacturing processes
  • United Kingdom

To view the access options for this content please click here
Article
Publication date: 5 September 2008

Template based production system design

D.T. Matt

The purpose of this paper is to provide a methodological guidance for the practical use of the axiomatic designed production module template presented in a former…

HTML
PDF (887 KB)

Abstract

Purpose

The purpose of this paper is to provide a methodological guidance for the practical use of the axiomatic designed production module template presented in a former publication. The objective is to accelerate the design process and increase the quality of results in the design of lean production systems.

Design/methodology/approach

Two case studies based on practical cases were presented to different test teams. A first test cycle helped to improve the user friendliness of the axiomatic designed tree of functional requirements and design parameters. The second test cycle served to prove the practicability of the template, comparing the teams' results with the realized solution.

Findings

Based on the teams' feedbacks, ten “easy‐to‐use” steps for the systematic design of lean production systems were developed. The guideline obtains the best results if used in combination with the value stream mapping concept.

Research limitations/implications

Apart from one case study in injection moulding, practical evaluations were focused on applications in the field of manual, hybrid or automated assembly systems, which perhaps limits the applicability of the presented approach in some machining processes.

Practical implications

Several successful implementations demonstrated the validity of the presented method in terms of results, planning time and user friendliness. Even students with nearly no practical experiences in production system design were able to present astonishing results within short timeframes.

Originality/value

This paper fulfils an identified need of a methodological guidance in the design of lean production systems and offers practical help to shorten the design times and improve the quality of the design results.

Details

Journal of Manufacturing Technology Management, vol. 19 no. 7
Type: Research Article
DOI: https://doi.org/10.1108/17410380810898741
ISSN: 1741-038X

Keywords

  • Manufacturing systems
  • Production methods
  • Lean production
  • Design for assembly

To view the access options for this content please click here
Article
Publication date: 31 May 2013

Lean Six Sigma and digitize procurement

Bernardo Nicoletti

The purpose of this paper is to demonstrate how the lean Six Sigma method can be applied to procurement, processes where there is an extensive use of information…

HTML
PDF (189 KB)

Abstract

Purpose

The purpose of this paper is to demonstrate how the lean Six Sigma method can be applied to procurement, processes where there is an extensive use of information technology and communication (ICT) systems. The paper defines a method to streamline, digitize and reduce waste in procurement processes by using the “lean Six Sigma and digitize” methodology.

Design/methodology/approach

A framework was developed and applied to the procurement processes, based on the analysis of best practices and on several implementations.

Findings

It was found that the digitization of a procurement process which is not streamlined can generate problems. A process must be mapped to highlight waste and low quality. Only when the new process is improved, taking into account also that it will be possible to use ICT supports, can it be digitized. The new process will digitize only value‐added activities recognized by the users and by the organization.

Practical implications

The paper should be of interest to the academic world, as well as to management working in all types of organizations.

Originality/value

Within the field of lean Six Sigma and information and telecommunication technology, there has been a continuous debate as to whether both approaches are complementary or contradictory. This paper fulfils an identified need to study the interactions between a modern example of information technology and its role within procurement, making a valid contribution within this field of research.

Details

International Journal of Lean Six Sigma, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/20401461311319356
ISSN: 2040-4166

Keywords

  • Lean Six Sigma
  • Procurement
  • Service
  • Digitization
  • Information systems
  • Information and communication systems

To view the access options for this content please click here
Article
Publication date: 21 August 2019

Chasing the golden fleece: Increasing healthcare quality, efficiency and patient satisfaction while reducing costs

Fiona MacVane Phipps

The purpose of this paper is to develop a common theme between the six research articles submitted for IJHG 24.3.

HTML
PDF (115 KB)

Abstract

Purpose

The purpose of this paper is to develop a common theme between the six research articles submitted for IJHG 24.3.

Design/methodology/approach

All articles are read and themes extracted which are used to write a review summarising the key points in each while developing an overarching theme for the issue of IJHG. Other literature supporting the development of this theme is also reviewed and used to contribute insights.

Findings

The findings consist of the common themes developed. In this issue, the common theme was improving care while saving costs in healthcare and the theme was explored in each article in relation to a lean healthcare management/governance philosophy.

Practical implications

The review section of IJHG allows readers to gain a quick overview of the content and then select the articles they wish to read in full.

Originality/value

IJHG is the only journal in the Emerald portfolio with a review section of this kind. Thus it provides added value.

Details

International Journal of Health Governance, vol. 24 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/IJHG-06-2019-0047
ISSN: 2059-4631

Keywords

  • Evidence-based practice
  • Management
  • Quality
  • Teamwork
  • Clinical governance
  • Healthcare quality
  • Emerging healthcare delivery structures
  • Health economics

Access
Only content I have access to
Only Open Access
Year
  • Last week (10)
  • Last month (29)
  • Last 3 months (84)
  • Last 6 months (157)
  • Last 12 months (290)
  • All dates (3098)
Content type
  • Article (2282)
  • Book part (710)
  • Earlycite article (84)
  • Case study (22)
1 – 10 of over 3000
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here