Search results

1 – 10 of over 3000
Article
Publication date: 25 January 2019

Michael Ballé, Jacques Chaize and Daniel Jones

The creators of the “lean” approach share their extensive experience, highlighting how organizations can reap the benefits of Toyota’s approach.

727

Abstract

Purpose

The creators of the “lean” approach share their extensive experience, highlighting how organizations can reap the benefits of Toyota’s approach.

Design/methodology/approach

Based on the authors expertise and 30 plus years of experience developing and implementing the “lean” approach.

Findings

A shift is required in leaders, away from a chain of command to a chain of help. Type IV learning is required where everyone, including the “leaders”, explores, learns, and figures out, experientially, one change at a time.

Originality/value

The paper provides a succinct summary of the need for a mind-set shift in leaders if they are to create a truly lean culture in their organization. They call for leaders to start a cognitive revolution, rather than look to “bolt on” lean to existing organizational practices.

Details

Development and Learning in Organizations: An International Journal, vol. 33 no. 3
Type: Research Article
ISSN: 1477-7282

Keywords

Article
Publication date: 21 March 2018

Jessica Rose Carre, Shelby R. Curtis and Daniel Nelson Jones

The purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.

1459

Abstract

Purpose

The purpose of this paper is to understand consumer reactions to security breaches and the best approach for companies to minimize the reputational damage that is done.

Design/methodology/approach

The authors assessed trust in a company following a data breach as well as perceptions of individual and corporate responsibility for data security and also measured individual personality.

Findings

The authors found that individuals held companies more responsible for protecting private data and held companies even more responsible following a data breach. Further, perception of responsibility for a data breach significantly affected individuals’ response to a company’s attempt to rebuild trust. Finally, participant personality impacted perceptions of responsibility and trust in a company after a data breach.

Research limitations/implications

Companies are held more responsible for protecting private data than are individuals. Thus, violation of this expectation insofar as a data breach may result in a psychological contract breach which explains reductions in trust in a company which has experienced a data breach. Further, the effect of company’s responses to a data breach depends on individuals’ perception of responsibility and personality. Thus, the best course of action following a data breach may vary across customers.

Practical implications

Companies should consider differences in customer perceptions when responding to a data breach.

Social implications

Individuals differ in how responsible they feel a company is for data security. Further, those differences impact reactions to data breach responses from companies.

Originality/value

This paper explored personality as it impacts perceptions of corporate responsibility in data security. Further, the authors explore the role of perception of responsibility to determine the role of psychological contract breach in reduced trust after data breach.

Details

Managerial Auditing Journal, vol. 33 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 2 February 2021

Daniel Eduardo Jones, Paloma Dulbecco and Santiago L. Cunial

The purpose of this paper is to inquire into the role that sexuality plays in faith-based programs for the prevention and care of problematic drug use.

Abstract

Purpose

The purpose of this paper is to inquire into the role that sexuality plays in faith-based programs for the prevention and care of problematic drug use.

Design/methodology/approach

This paper conducts 25 semi-structured interviews with institutional staff and another 31 with people undergoing treatment in spiritual and religious drug rehabilitation programs in Argentina.

Findings

First, within these therapeutic devices, different sexual experiences are considered initial catalysts for drug use. Also, within these institutions, certain morally condemned sexual behaviors are seen as associated with consumption. Second, these institutions establish diverse rules and recommendations about intimate relationships for people in recovery to improve the outcome of treatments. Third, therapeutic institutions produce gender stereotypes related to the sexuality of drug users. Fourth, institutions assume heterosexuality within their target populations, thereby reinforcing the heteronormative frameworks of these therapeutic interventions.

Research limitations/implications

This is a small qualitative study conducted in Argentina. Although its results cannot be generalized, they serve as a preliminary empirical input to analyze drug treatment programs in the country and other regions of the world.

Originality/value

This study addresses the relationships between problematic drug use, rehabilitation and sexuality from the perspectives of both professionals and men and women who consume drugs. This paper adopts a critical perspective on gender and sexual diversity to analyze how therapeutic institutions reproduce certain gender stereotypes and heteronormativity. In doing so, the research intends to contribute to discussions that can lead to more comprehensive policies regarding problematic drug use.

Details

Drugs and Alcohol Today, vol. 21 no. 4
Type: Research Article
ISSN: 1745-9265

Keywords

Article
Publication date: 24 April 2018

Shelby R. Curtis, Jessica Rose Carre and Daniel Nelson Jones

The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact…

1907

Abstract

Purpose

The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach.

Design/methodology/approach

The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company.

Findings

This study found that the presence or absence of a previous breach had a large impact on company perceptions, but a minimal impact on behavioral intentions to be personally more secure.

Research limitations/implications

The authors found that the presence or absence of a previous breach had a large impact on company perceptions, but minimal impact on behavioral intentions to be personally more secure.

Practical implications

Companies need to be cautious about how much confidence they convey to consumers. Companies should not rely on consumers engaging in secure online practices, even following a breach.

Social implications

Companies need to communicate personal security behaviors to consumers in a way that still instills confidence in the company but encourages personal responsibility.

Originality/value

The confidence of company security statements and presence of a previous breach were examined for their impact on company perception and a novel dependent variable of password complexity.

Details

Managerial Auditing Journal, vol. 33 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88270

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 29 June 2020

Brian J. Taillon, Steven M. Mueller, Christine M. Kowalczyk and Daniel N. Jones

The purpose of this paper is to better understand the role of closeness and the relationships between social media influencers and their followers, and, more specifically, how…

20478

Abstract

Purpose

The purpose of this paper is to better understand the role of closeness and the relationships between social media influencers and their followers, and, more specifically, how social media influencers can effectively manage their human brands.

Design/methodology/approach

Two studies were conducted to explore social media influencers. Qualitative content analysis and modeling with path analysis were used to analyze the data.

Findings

Results found attractiveness and likeability to positively predict attitudes toward the influencer, word-of-mouth and purchase intentions, whereas similarity only predicted word-of-mouth from the follower. Closeness served as a moderator but had different effects. Closeness positively moderated the effect of attractiveness on purchase intentions; however, it had a negative effect with similarity on purchase intentions. Moreover, closeness moderated the effect of likeability on attitude toward the influencer.

Research limitations/implications

This study was limited by the student sample as well as the students’ self-identification of a social media influencer. Future research should include experimental design manipulating well-known/followed or fictional social media influencers on different social media.

Practical implications

This paper explores the characteristics of social media influencers as well as the potential outcomes associated with influencers on social media. The implications for marketers and advertisers include a better understanding of how consumers engage with influencers on social media.

Originality/value

The role of closeness is identified as a moderator of consumers’ behaviors toward social media influencers.

Details

Journal of Product & Brand Management, vol. 29 no. 6
Type: Research Article
ISSN: 1061-0421

Keywords

Article
Publication date: 1 May 2006

A. Keivan Zokaei and David W. Simons

A key vision of tomorrow's industry is creating supply chains which collaboratively strive on enhancing the value to the end‐consumer. The purpose of this paper is to introduce…

9206

Abstract

Purpose

A key vision of tomorrow's industry is creating supply chains which collaboratively strive on enhancing the value to the end‐consumer. The purpose of this paper is to introduce the food value chain analysis (FVCA) methodology for improving consumer focus in the agri‐food sector based on the lean paradigm, value stream mapping and value chain analysis (Porter, 1985).

Design/methodology/approach

This contribution presents a case‐study of a UK red meat supply chain explaining how the FVCA method enabled a team of researchers and practitioners to identify the misalignments of both product attributes and supply chain activities with the consumer needs.

Findings

This paper explains how the FVCA methodology potentially realigned the processes along the supply chain with the true consumer requirements and why the supply chain effectiveness was improved; this follows with a description of the subsequent efficiency gains from application of the FVCA methodology.

Originality/value

This paper further defines the demarcation between supply chain “effectiveness” and “efficiency”. This paper contributes to the debate on the importance of supply chain effectiveness by linking to consumer value at every stage of the supply chain.

Details

The International Journal of Logistics Management, vol. 17 no. 2
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 1 April 2005

David Simons and Keivan Zokaei

Lean is a well‐established industrial paradigm and has proved to be of significant benefit in different sectors of the manufacturing industry (e.g. automotive and aerospace). This…

4567

Abstract

Purpose

Lean is a well‐established industrial paradigm and has proved to be of significant benefit in different sectors of the manufacturing industry (e.g. automotive and aerospace). This paper aims to report on the introduction of lean to a new sector – the “UK red meat industry”. It highlights the benefits of lean production in one specific manufacturing area, the “cutting room”, where meat is split down from a carcass into retail cuts of meat.

Design/methodology/approach

A multiple case study approach is adopted in this paper. As part of the Red Meat Industry Forum's Value Chain Analysis Initiative, five cutting plants are presented as case studies in this paper.

Findings

This paper identifies two “traditional” and three “advanced” cutting rooms and reports a typical 25 per cent productivity gap. The paper tentatively concludes this is due to the advanced cases practicing lean techniques, such as “Takt‐time” and “work standardization”.

Originality/value

The literature review identifies a gap in previous research on the applications of logistics and operations management concepts and practices into the red meat industry. Particularly, lean techniques have been overlooked in the red meat industry.

Details

British Food Journal, vol. 107 no. 4
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 5 September 2008

D.T. Matt

The purpose of this paper is to provide a methodological guidance for the practical use of the axiomatic designed production module template presented in a former publication. The…

2610

Abstract

Purpose

The purpose of this paper is to provide a methodological guidance for the practical use of the axiomatic designed production module template presented in a former publication. The objective is to accelerate the design process and increase the quality of results in the design of lean production systems.

Design/methodology/approach

Two case studies based on practical cases were presented to different test teams. A first test cycle helped to improve the user friendliness of the axiomatic designed tree of functional requirements and design parameters. The second test cycle served to prove the practicability of the template, comparing the teams' results with the realized solution.

Findings

Based on the teams' feedbacks, ten “easy‐to‐use” steps for the systematic design of lean production systems were developed. The guideline obtains the best results if used in combination with the value stream mapping concept.

Research limitations/implications

Apart from one case study in injection moulding, practical evaluations were focused on applications in the field of manual, hybrid or automated assembly systems, which perhaps limits the applicability of the presented approach in some machining processes.

Practical implications

Several successful implementations demonstrated the validity of the presented method in terms of results, planning time and user friendliness. Even students with nearly no practical experiences in production system design were able to present astonishing results within short timeframes.

Originality/value

This paper fulfils an identified need of a methodological guidance in the design of lean production systems and offers practical help to shorten the design times and improve the quality of the design results.

Details

Journal of Manufacturing Technology Management, vol. 19 no. 7
Type: Research Article
ISSN: 1741-038X

Keywords

Article
Publication date: 31 May 2013

Bernardo Nicoletti

The purpose of this paper is to demonstrate how the lean Six Sigma method can be applied to procurement, processes where there is an extensive use of information technology and…

3979

Abstract

Purpose

The purpose of this paper is to demonstrate how the lean Six Sigma method can be applied to procurement, processes where there is an extensive use of information technology and communication (ICT) systems. The paper defines a method to streamline, digitize and reduce waste in procurement processes by using the “lean Six Sigma and digitize” methodology.

Design/methodology/approach

A framework was developed and applied to the procurement processes, based on the analysis of best practices and on several implementations.

Findings

It was found that the digitization of a procurement process which is not streamlined can generate problems. A process must be mapped to highlight waste and low quality. Only when the new process is improved, taking into account also that it will be possible to use ICT supports, can it be digitized. The new process will digitize only value‐added activities recognized by the users and by the organization.

Practical implications

The paper should be of interest to the academic world, as well as to management working in all types of organizations.

Originality/value

Within the field of lean Six Sigma and information and telecommunication technology, there has been a continuous debate as to whether both approaches are complementary or contradictory. This paper fulfils an identified need to study the interactions between a modern example of information technology and its role within procurement, making a valid contribution within this field of research.

Details

International Journal of Lean Six Sigma, vol. 4 no. 2
Type: Research Article
ISSN: 2040-4166

Keywords

1 – 10 of over 3000