Search results
1 – 10 of 123Arne Kroeger, Nicole Siebold, Franziska Günzel-Jensen, Fouad Philippe Saade and Jukka-Pekka Heikkilä
In this paper, we contribute to the understanding of how entrepreneurs can deploy their values to enable joint action of heterogeneous stakeholders. Such an understanding forms a…
Abstract
In this paper, we contribute to the understanding of how entrepreneurs can deploy their values to enable joint action of heterogeneous stakeholders. Such an understanding forms a critical endeavor to tackle grand challenges adequately. Building on sensegiving research, we conducted a single-case study of an entrepreneurial initiative that tackles gender inequality in Lebanon which has been successful in mobilizing heterogeneous stakeholders who ordinarily would not collaborate with each other. We find that the values of the founders were pivotal for the initiative’s success as those values activated latent values of stakeholders through processes of contextualization and enactment. We subsume these processes under the label value-driven sensegiving. As a result of value-driven sensegiving, heterogeneous stakeholders could make sense of the founders’ aspirational vision and the role they could play in it, which paved ways for tackling grand challenges collaboratively. Our study provides insights into the centrality of values for mobilizing heterogeneous stakeholders across boundaries. Therefore, it contributes to the body of work on sensegiving, societal grand challenges, and new forms of organizing.
Details
Keywords
Democratic therapeutic communities (TCs), use a “flattened hierarchy” model whereby staff and clients are considered to have an equal voice, sharing administrative and some…
Abstract
Purpose
Democratic therapeutic communities (TCs), use a “flattened hierarchy” model whereby staff and clients are considered to have an equal voice, sharing administrative and some therapeutic responsibility. Using the sociological framework of interaction ritual chain theory, the purpose of this paper is to explain how TC client members negotiated and enforced community expectations through an analysis of power within everyday interactions outside of structured therapy.
Design/methodology/approach
The study used narrative ethnography, consisting of participant observation with two democratic communities, narrative interviews with 21 client members, and semi-structured interviews with seven staff members.
Findings
The findings indicate social interactions could empower clients to recognise their personal agency and to support one another. However, these dynamics could be destructive when members were excluded or marginalised. Some clients used their interactions at times to consolidate power amongst dominant members.
Practical implications
It is argued that the flattened hierarchy approach theoretically guiding TC principles does not operate as a flattened model in practice. Rather, a fluid hierarchy, whereby clients shift and change social positions, seems more suited to explaining how the power structure worked within the communities, including amongst the client group. Recognising the hierarchy as “fluid” may open dialogues within TCs as to whether, and how, members experience exclusion.
Originality/value
Explorations of power have not specifically focused on power dynamics between clients. Moreover, this is one of the first papers to look at power dynamics outside of structured therapy.
Details
Keywords
Valérie Rocchi and Daniel Brissaud
Industry 4.0 is a promising concept that allows industries to meet customers’ demands with flexible and resilient processes, and highly personalised products. This concept is made…
Abstract
Industry 4.0 is a promising concept that allows industries to meet customers’ demands with flexible and resilient processes, and highly personalised products. This concept is made up of different dimensions. For a long time, innovative digital technology has been thought of as the only dimension to succeed in digital transformation projects. Other dimensions have been identified such as organisation, strategy, and human resources as key while rolling out digital technology in factories. From these findings, researchers have designed industry 4.0 theoretical models and then built readiness models that allow for analysing the gap between the company initial situation and the theoretical model. Nevertheless, this purely deductive approach does not take into consideration a company’s background and context, and eventually favours one single digital transformation model. This article aims at analysing four actual digital transformation projects and demonstrating that the digital transformation’s success or failure depends on the combination of two variables related to a company’s background and context. This research is based on a double approach: deductive and inductive. First, a literature review has been carried out to define industry 4.0 concept and its main dimensions and digital transformation success factors, as well as barriers, have been investigated. Second, a qualitative survey has been designed to study in-depth four actual industry digital transformation projects, their genesis as well as their execution, to analyse the key variables in succeeding or failing. 46 semi-structured interviews were carried out with projects’ members; interviews have been analysed with thematic content analysis. Then, each digital transformation project has been modelled regarding the key variables and analysed with regards to succeeding or failing. Investigated projects have consolidated the models of digital transformation. Finally, nine digital transformation types have been identified.
Details
Keywords
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details