Search results
1 – 10 of 30Valeria Noguti and David S. Waller
This research investigates how consumers who are most active on Facebook during the day vs in the evening differ, differ in their ad consumption, and how advertising effects vary…
Abstract
Purpose
This research investigates how consumers who are most active on Facebook during the day vs in the evening differ, differ in their ad consumption, and how advertising effects vary as a function of a key moderator: gender.
Design/methodology/approach
Using a survey of 281 people, the research identifies Facebook users who are more intensely using mobile social media during the day versus in the evening, and measures five Facebook mobile advertising outcomes: brand and product recall, clicking on ads, acting on ads and purchases.
Findings
The results show that women who are using social media more intensely during the day are more likely to use Facebook to seek information, hence, Facebook mobile ads tend to be more effective for these users compared to those in the evening.
Research limitations/implications
This contributes to the literature by analyzing how the time of day affects social media behavior in relation to mobile advertising effectiveness, and broadening the scope of mobile advertising effectiveness research from other than just clicks on ads to include measures like brand and product recall.
Practical implications
By analyzing the effectiveness of mobile advertising on social media as a function of the time of day, advertisers can be more targeted in their media buys, and so better use their social media budgets, i.e. advertising is more effective for women who use social media (Facebook) more intensely during the day than for those who use social media more intensely in the evening as the former tend to seek more information than the latter.
Social implications
This research extends media ecology theory by drawing on circadian rhythm research to provide a first demonstration of how the time of day relates to different uses of mobile social media, which in turn relate to social media mobile advertising consumption.
Originality/value
While research on social media advertising has been steadily increasing, little has been explored on how users consume ads when they engage with social media at different periods along the day. This paper extends media ecology theory by investigating time of day, drawing on the circadian rhythm literature, and how it relates to social media usage.
Details
Keywords
Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
David B. Grant, Sarah Shaw, Edward Sweeney, Witold Bahr, Siriwan Chaisurayakarn and Pietro Evangelista
Mixed methods research is useful to enhance theoretical and practical research contributions. However, single methods have predominated much logistics and supply chain management…
Abstract
Purpose
Mixed methods research is useful to enhance theoretical and practical research contributions. However, single methods have predominated much logistics and supply chain management (LSCM) research. This paper presents a review of mixed methods research across ten years in LSCM to determine their usage, identify benefits and inhibitors, and provide suggestions for LSCM researchers to realise the benefits from using mixed methods.
Design/methodology/approach
This paper adopts a mixed methods approach through a quantitative analysis of methods used in six leading LSCM journals, an e-mail survey of mixed methods article authors during the review period, and four published case studies that used mixed methods.
Findings
Only 144 (ten percent) of all empirical articles were published using mixed methods during the review period. A range of benefits and inhibitors regarding mixed methods adoption were found. Suggestions for LSCM authors include research training in mixed methods use and developing a project-specific research design due to the specificity and complexity associated with mixed methods research.
Originality/value
LSCM is at a critical juncture, shaped by new contexts, themes and challenges, and would benefit from different research approaches and methods. This paper contributes to the LSCM domain through analysing the current state, benefits and inhibitors of mixed methods research in LSCM journals to provide a renewed call to action and guidelines for mixed methods LSCM research, and suggesting research design adaptation to enable agile and resilient research when investigating rapidly changing and complex phenomena.
Details
Keywords
Aleena Amir, David Roca, Lubaba Sadaf and Asfia Obaid
Given the extensive evidence of femvertising's positive effects in Western cultures, this paper aims to investigate how femvertising may influence customers' perceptions and…
Abstract
Purpose
Given the extensive evidence of femvertising's positive effects in Western cultures, this paper aims to investigate how femvertising may influence customers' perceptions and brand-related outcomes in a patriarchal context such as Pakistan.
Design/methodology/approach
Qualitative methodology was employed in this study, which was based on in-depth interviews involving 17 consumers (including both male and females). Thematic analysis was used to analyse the data.
Findings
Results indicated that male and female consumers revealed varied and sometimes contradictory perspectives on the perception, understanding and behaviour towards femvertised adverts, which are governed by patriarchal gendered norms.
Originality/value
This study contributes to the body of knowledge by exploring the consumer perception towards femvertising in a patriarchal context, where gender disparity is evident. It also draws attention to the underlying cultural elements contributing towards the formation of those perceptions.
Details
Keywords
Matthew J.W. McLarnon, Ian R. Gellatly, David A. Richards and Ofer Arazy
Past research on the motivational processes underpinning knowledge sharing has assumed that the sharing processes are similar for all individuals. Yet, sharing is a fundamental…
Abstract
Purpose
Past research on the motivational processes underpinning knowledge sharing has assumed that the sharing processes are similar for all individuals. Yet, sharing is a fundamental affiliative behavior, and the sharing processes can differ between people. This study aims to propose and test a model of the moderating influence that employee attachment patterns have on the theory of reasoned action (TRA)-defined knowledge sharing processes.
Design/methodology/approach
The authors administered a questionnaire to 1,103 employees from a range of industries who participated in an online Qualtrics survey. Advanced forms for structural equation modeling and latent profile analysis were used to assess the proposed model.
Findings
The results revealed that participants in the study exhibited the latent profiles corresponding to secure, dismissive, preoccupied and fearful patterns. The preoccupied cohort had the lowest knowledge sharing behavior, yet the strongest links within the sharing process. Secure, dismissive and fearful had similar sharing levels, but the strength of the TRA-defined processes differed. These findings underscore equifinality: although sharing may be approximately equal across different attachment patterns, the fundamental processes underpinning sharing differ.
Research limitations/implications
The authors used self-report data, given that sharing attitudes, norms and intentions may not be overly amenable to ratings even from well-acquainted others. Further, the use of advanced analytical methods helps to minimize common method concerns. Additionally, causal mechanisms underscoring the TRA have been demonstrated (Ajzen and Fishbein, 2005), allowing us to explore the moderating role of attachment patterns.
Practical implications
This study speaks to the importance of considering employees’ attachment patterns, and developing comprehensive intra-organizational norms, policies and systems that support and encourage knowledge sharing from employees with a variety of attachment patterns.
Originality/value
This study uniquely contributes to knowledge sharing literatures by incorporating attachment patterns as moderators within the TRA-defined sharing processes. The authors provide important insights on the role of individuals’ attachment patterns have for knowledge sharing behaviors, but also highlight how structure of knowledge sharing differed across subgroups of employees, determined based on their dispositional attachment pattern.
Details
Keywords
Killing Eve (BBC 2018–2022) has been hailed as a feminist television show. Its cinematic production values call upon a history of espionage on screen, encompassing international…
Abstract
Killing Eve (BBC 2018–2022) has been hailed as a feminist television show. Its cinematic production values call upon a history of espionage on screen, encompassing international intrigue and glamorised hyperviolent action sequences. Is this violent aesthetic a cathartic reference to newly visible feminist discourse or are we just being sold a new version of old fantasies?
In this chapter Killing Eve is examined in relation to a history of violent women spies on screen, from Emma Peel (The Avengers 1961–1969) to Sydney Bristow (Alias 2001–2006). While Villanelle (Jody Comer) appears to present an amoral account of postfeminist ‘empowerment’, Eve (Sandra Oh) carries echoes of second-wave feminist concerns with community, morality and ethics. With each season the differences between Villanelle and Eve unravel, raising questions about what constitutes ‘quality’ television and how that might intersect with old-fashioned ideas about women's liberation. While the show depicts each character as ‘liberated’ in some respects, they are both entangled in corporate nets which repeatedly put them in danger and pull them back into violence as a form of labour.
Details
Keywords
Matthew M. Lastner, David A. Locander, Michael Pimentel, Andrew Pueschel, Wyatt A. Schrock, George D. Deitz and Adam Rapp
This study aims to examine the applicability of Hartmann et al.’s (2018) service ecosystem framework to the day-to-day management of the modern sales force. The authors provide a…
Abstract
Purpose
This study aims to examine the applicability of Hartmann et al.’s (2018) service ecosystem framework to the day-to-day management of the modern sales force. The authors provide a review of the framework, acknowledging its strengths, while also indicating areas for advancement. The authors conclude with recommendations to the framework and indicate opportunities where future research could advance sales theory.
Design/methodology/approach
A review of the theoretical underpinnings of the service ecosystem framework is weighed against the established roles and responsibilities of the modern sales force in the literature.
Findings
The ability of the framework to capture the multi-level, multi-actor and dynamic aspects of sales represents an improvement in the conceptualization of selling is critical. Suggestions around the refinement for meso-level sales interactions and a more pliant application of service dominant-logic are offered.
Research limitations/implications
The suggested extensions of the framework continue the advancement of novel theorization for the field of sales. Priorities for future research include consideration of ethical implications of the framework and formulations of new management strategies reflective of the broad and dynamic properties of the ecosystem conceptualization.
Practical implications
This paper provides managerial guidelines and implications tied specifically to the thick and thin crossing points and how they may impact employee decision-making.
Originality/value
To the best of the authors’ knowledge, this study is the first to pointedly examine the service ecosystem framework with respect to established principles of managing a modern sales force.
Details
Keywords
David M. Herold, Lorenzo Bruno Prataviera and Katarzyna Nowicka
During the supply chain disruptions caused by COVID-19, logistics service providers (LSPs) have invested heavily in innovations to enhance their supply chain resilience…
Abstract
Purpose
During the supply chain disruptions caused by COVID-19, logistics service providers (LSPs) have invested heavily in innovations to enhance their supply chain resilience capabilities. However, only little attention has been given so far to the nature of these innovative capabilities, in particular to what extent LSPs were able to repurpose capabilities to build supply chain resilience. In response, using the concept of exaptation, this study identifies to what extent LSPs have discovered and utilized latent functions to build supply chain resilience capabilities during a disruptive event of high impact and low probability.
Design/methodology/approach
This conceptual paper uses a theory building approach to advance the literature on supply chain resilience by delineating the relationship between exaptation and supply chain resilience capabilities in the context of COVID-19. To do so, we propose two frameworks: (1) to clarify the role of exaptation for supply chain resilience capabilities and (2) to depict four different exaptation dimensions for the supply chain resilience capabilities of LSPs.
Findings
We illustrate how LSPs have repurposed original functions into new products or services to build their supply chain resilience capabilities and combine the two critical concepts of exploitation and exploration capabilities to identify four exaptation dimensions in the context of LSPs, namely impeded exaptation, configurative exaptation, transformative exaptation and ambidextrous exaptation.
Originality/value
As one of the first studies linking exaptation and supply chain resilience, the framework and subsequent categorization advance the understanding of how LSPs can build exapt-driven supply chain resilience capabilities and synthesize the current literature to offer conceptual clarity regarding the varied implications and outcomes linked to the repurposing of capabilities.
Details
Keywords