Search results
1 – 6 of 6Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…
Abstract
Purpose
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.
Design/methodology/approach
Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.
Findings
Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.
Originality/value
Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.
Details
Keywords
Charles D.T. Macaulay and Ajhanai C.I. Keaton
This paper explores organization-level racialized work strategies for maintaining racialized organizations (Ray, 2019). It focuses on intentional actions to maintain dominant…
Abstract
Purpose
This paper explores organization-level racialized work strategies for maintaining racialized organizations (Ray, 2019). It focuses on intentional actions to maintain dominant racial norms, demonstrating how work strategies are informed by dominant racial structures that maintain racial inequities.
Design/methodology/approach
We compiled a chronological case study (Yin, 2012) based on 168 news media articles and various organizational documents to examine responses to athlete protests at the University of Texas at Austin following the death of George Floyd. Gioia et al.’s (2013) method uncovered how dominant racial norms inform organizational behaviors.
Findings
The paper challenges institutional theory neutrality and identifies several racialized work strategies that organizations employ to maintain racialized norms and practices. The findings provide a framework for organizations to interrogate their strategies and their role in reproducing dominant racial norms and inequities.
Originality/value
In 2020, the Black Lives Matter (BLM) movement was reinvigorated within sporting and corporate domains. However, many organizations engaged in performativity, sparking criticism about meaningful change in organizational contexts. Our case study examines how one organization responded to athlete activists’ BLM-fueled demands, revealing specific racialized work strategies that maintain structures of racism. As organizations worldwide disrupt and discuss oppressive structures such as racism, we demonstrate how organizational leadership, while aware of policies and practices of racism, may choose not to act and actively maintain such structures.
Details
Keywords
Alexander (Degreat) Narh Tetteh, Qingxiong (Derek) Weng, Lincoln Jisuvei Sungu and Magdalene Zeinab Akosua Adams
The aim of this study is to understand the levels (i.e. mild vs intense) of task conflict (TC) expressions between angel investors and entrepreneurs at the post-investment stage…
Abstract
Purpose
The aim of this study is to understand the levels (i.e. mild vs intense) of task conflict (TC) expressions between angel investors and entrepreneurs at the post-investment stage and how it affect angel investors’ follow-on investment intentions with the same entrepreneur.
Design/methodology/approach
Survey data was gathered from 71 angel investors in China. Mplus was used to test the proposed research model.
Findings
This study found that angels perceive affective conflict (AC) when engaged in intense TC, unlike the case for mild TC expressions. Furthermore, the analysis shows that, unlike mild TC expressions, intense TC expressions impede angels’ reinvestment intentions when they perceive ACs. Other results indicate that when angels perceive that entrepreneurs are not open to coaching, the prominence of mild TC expression is sharply mitigated and becomes as detrimental as intense TC expressions.
Research limitations/implications
This study only focused on one specific aspect of the angel–entrepreneur post-investment relationship: The effect of their TC expressions on angels’ reinvestment intentions. By no means do the authors imply that TC expression in the angel–entrepreneur post-investment relationship is the only factor that matters to angel investors in their follow-on investment intentions with the same entrepreneur.
Practical implications
The findings suggest that entrepreneurs should pay careful attention to TC that may arise between them and their financiers. TCs are not entirely detrimental, but their negative effect might depend on how they are expressed. An appropriate level of TC may also improve enterprise performance and collaboration. Thus, angels and entrepreneurs should set clear goals and performance standards, where task interactions mainly focus on the goals and expected outcomes.
Originality/value
Prior to this study, little was known about whether all TCs potentially lead to ACs. By distinguishing between levels (i.e. mild vs intense) of TC expressions between angels and entrepreneurs, this study adds a novel aspect to it by showing that TC, in and of itself, does not necessarily lead to AC but can lead to AC once its intensity grows.
Details
Keywords
Minyan Wei, Juntao Zheng, Shouzhen Zeng and Yun Jin
The main aim of this paper is to establish a reasonable and scientific evaluation index system to assess the high quality and full employment (HQaFE).
Abstract
Purpose
The main aim of this paper is to establish a reasonable and scientific evaluation index system to assess the high quality and full employment (HQaFE).
Design/methodology/approach
This paper uses a novel Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria framework to evaluate the quality and quantity of employment, wherein the integrated weights of attributes are determined by the combined the Criteria Importance Through Inter-criteria Correlation (CRITIC) and entropy approaches.
Findings
Firstly, the gap in the Yangtze River Delta in employment quality is narrowing year by year; secondly, employment skills as well as employment supply and demand are the primary indicators that determine the HQaFE; finally, the evaluation scores are clearly hierarchical, in the order of Shanghai, Jiangsu, Zhejiang and Anhui.
Originality/value
A scientific and reasonable evaluation index system is constructed. A novel CRITIC-entropy-TOPSIS evaluation is proposed to make the results more objective. Some policy recommendations that can promote the achievement of HQaFE are proposed.
Details
Keywords
The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the…
Abstract
Purpose
The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the organization of sciences and Fuchs’ (1993) theory about scientific change.
Design/methodology/approach
The study combines historical source analysis with conceptual and theoretical analysis for characterizing LIS. An attempt is made to empirically validate the distinction between LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.
Findings
The origin of fragmentation in LIS due the contributions of other disciplines can be traced in the 1960s and 1970s for solving the problems produced by the growth of scientific literature. Computer science and business established academic programs and started research relevant to LIS community focusing on information retrieval and bibliometrics. This has led to differing research interests between LIS and other disciplines concerning research topics and methods. LIS has been characterized as fragmented adhocracy as a whole, but we make a distinction between research topics LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.
Originality/value
The paper provides an elaborated historical perspective on the fragmentation of LIS in the pressure of other disciplines. It also characterizes LIS as discipline in a fresh way by applying Whitley’s (1984) theory.
Details
Keywords
The goal was emancipatory, to characterise and dislodge oppressive management practices, to allow for the possibility of seeking an alternative organisational construction free of…
Abstract
Purpose
The goal was emancipatory, to characterise and dislodge oppressive management practices, to allow for the possibility of seeking an alternative organisational construction free of postcolonial/subaltern subordination and discrimination in a local, well-documented narrative.
Design/methodology/approach
The study was informed by a postcolonial/subaltern perspective and drew on the employment experience of an Aboriginal woman, Canada’s first Indigenous Dean of a law school. The researcher employed a combination of case study and critical discourse analysis with the aim of advancing rich analyses of the complex workings of power and privilege in sustaining Western, postcolonial relations.
Findings
The study made several conclusions: first, that the institution, a medium-sized Canadian university, carefully controlled the Indigenous subaltern to remake her to be palatable to Western sensibilities. Second, the effect of this control was to assimilate her, to subordinate her Indigeneity and to civilise in a manner analogous to the purpose of Indian residential schools. Third, that rather than management’s action being rational and neutral, focused on goal attainment, efficiency and effectiveness, it was an implicit moral judgement based on her race and an opportunity to exploit her value as a means for the university’s growth and status.
Originality/value
Through a postcolonial/subaltern perspective, this study demonstrated how management practices reproduced barriers to the participation of an Indigenous woman and the First Nations community that an organisation was intended to serve. The study demonstrated how a Western perspective – that of a university’s administration, faculty and staff – was privileged, or taken for granted, and the Indigenous perspective subordinated, as the university remained committed to the dispossession of Indigenous knowledge and values.
Details