Search results

1 – 10 of 13
Content available
Book part
Publication date: 10 April 2019

Abstract

Details

Standing on the Shoulders of Giants
Type: Book
ISBN: 978-1-78756-336-0

Open Access
Article
Publication date: 30 April 2021

Lakshmi Balachandran Nair

Many management scholars view templates as rigid rulebooks suffocating qualitative research. This viewpoint article recommends that, instead, templates should be viewed through…

2313

Abstract

Purpose

Many management scholars view templates as rigid rulebooks suffocating qualitative research. This viewpoint article recommends that, instead, templates should be viewed through the lens of organizational routines.

Design/methodology/approach

To facilitate this viewpoint, this article first clarifies the confusions surrounding templates. It points out that how using templates, like following routines in an organization, constitutes three parts - the artifact, the ostensive and the performative; the latter two being often neglected by template critics. The use of templates is encouraged by discussing the learning advantages for novice researchers, through an autoethnographic note narrating the author’s own research and teaching experiences.

Findings

This article deliberates upon the criticisms against templates. It then discusses templates using a perspective offered by organizational routines. Thereafter, the use of templates in qualitative management research is discussed, with the help of examples from published reports. Finally, the article explains a way of reflexively using templates through an autoethnographic note detailing the author’s own research and teaching experiences.

Originality/value

In its entirety, the article submits that the artifacts offered by the templates and the ostensive and performative engagements of the template-users must co-exist for co-creating excellent qualitative research.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 16 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Open Access
Article
Publication date: 18 July 2023

Guido Noto, Carmelo Marisca and Gustavo Barresi

The COVID-19 pandemic has forced many organisations to transform face-to-face teams into virtual ones through the adoption of remote working modes. This event has represented the…

1668

Abstract

Purpose

The COVID-19 pandemic has forced many organisations to transform face-to-face teams into virtual ones through the adoption of remote working modes. This event has represented the starting point of a process that is changing how management control (MC) systems are designed and implemented to guide employees towards organisational objectives. The previous literature on virtual teams (VTs) has devoted scant attention to MC issues. This study aims to fill this gap by exploring how MC – and particularly cultural control – has changed to cope with the shift from face-to-face to VTs and by analysing the interrelationship between the different control mechanisms and the resulting tensions.

Design/methodology/approach

The research adopts the methodological framework based on abduction to provide a theoretical explanation and conceptualisation of MC in virtual settings. To tackle the research objective, this work undertakes a cross-sectional field study based on semi-structured interviews with managers of different service companies.

Findings

The results of the research highlight the key challenges that managers are called to deal with to design and change MC systems when implementing remote working. In particular, managers must cope with the reduced possibility to leverage cultural controls. To do this, this study’s analysis found that managers act by introducing and/or removing formal and informal controls and by orchestrating the interplays and tensions between these mechanisms.

Originality/value

To the best of the authors’ knowledge, to date limited attention has been paid to MC in VTs. Moreover, few researchers have investigated the process of MC change from face-to-face to VTs. This work aims to contribute to this nascent stream of literature by providing interesting implications for both research and practice.

Details

Qualitative Research in Accounting & Management, vol. 20 no. 5
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Book part
Publication date: 8 February 2019

Alison Bowes and Alison Dawson

Abstract

Details

Designing Environments for People with Dementia
Type: Book
ISBN: 978-1-78769-974-8

Content available
Book part
Publication date: 19 December 2017

Karin Klenke

Abstract

Details

Women in Leadership 2nd Edition
Type: Book
ISBN: 978-1-78743-064-8

Content available
Book part
Publication date: 5 December 2014

Abstract

Details

Inquiry-Based Learning for the Arts, Humanities, and Social Sciences: A Conceptual and Practical Resource for Educators
Type: Book
ISBN: 978-1-78441-236-4

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3282

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Article
Publication date: 2 October 2017

Gina Grandy, Patricia Lewis and Sharon Mavin

466

Abstract

Details

Gender in Management: An International Journal, vol. 32 no. 7
Type: Research Article
ISSN: 1754-2413

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1705

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access

Abstract

Details

Designing Environments for People with Dementia
Type: Book
ISBN: 978-1-78769-974-8

Access

Only content I have access to

Year

Content type

1 – 10 of 13