Search results

1 – 10 of 14
Article
Publication date: 26 January 2024

Valerie A. Chambers, Matthew J. Hayes and Philip M.J. Reckers

Counterproductive work behavior (CWB) imposes significant costs on organizations, thus antecedents of CWB are of particular interest to both practitioners and academics. The…

Abstract

Purpose

Counterproductive work behavior (CWB) imposes significant costs on organizations, thus antecedents of CWB are of particular interest to both practitioners and academics. The authors examine how one’s own narcissism interacts with co-worker narcissism to influence willingness to engage in retaliatory CWB against a co-worker.

Design/methodology/approach

The data for this study were obtained from Amazon Mechanical Turk participants and Master of Business Administration students, representing a cross-section of employee representatives.

Findings

The authors find that employees expect narcissistic co-workers to engage in continuing future CWB and this, in turn, increases employees' willingness to engage in retaliatory CWB. That is, non-narcissistic employees are provoked to engage in organizationally-destructive behaviors by peers perceived as narcissists. This affect is attenuated by the employee’s own narcissism. Relative to non-narcissists, narcissistic employees find a narcissistic co-worker more likeable, which reduces their willingness to engage in retaliatory CWB against the co-worker.

Practical implications

For corporations and HR managers, this study demonstrates the caution necessary when considering hiring and operational practices. Specifically, non-narcissists demonstrate increased willingness to engage in organizationally-destructive behaviors after interpersonal conflict with a narcissistic co-worker.

Originality/value

The authors extend prior research about interpersonal drivers of CWB, which primarily considered superior-subordinate dyad, by examining the joint effects of individual and co-worker narcissism in peer-to-peer relationships.

Details

Journal of Organizational Effectiveness: People and Performance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2051-6614

Keywords

Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 23 October 2023

Alexander (Degreat) Narh Tetteh, Qingxiong (Derek) Weng, Lincoln Jisuvei Sungu and Magdalene Zeinab Akosua Adams

The aim of this study is to understand the levels (i.e. mild vs intense) of task conflict (TC) expressions between angel investors and entrepreneurs at the post-investment stage…

Abstract

Purpose

The aim of this study is to understand the levels (i.e. mild vs intense) of task conflict (TC) expressions between angel investors and entrepreneurs at the post-investment stage and how it affect angel investors’ follow-on investment intentions with the same entrepreneur.

Design/methodology/approach

Survey data was gathered from 71 angel investors in China. Mplus was used to test the proposed research model.

Findings

This study found that angels perceive affective conflict (AC) when engaged in intense TC, unlike the case for mild TC expressions. Furthermore, the analysis shows that, unlike mild TC expressions, intense TC expressions impede angels’ reinvestment intentions when they perceive ACs. Other results indicate that when angels perceive that entrepreneurs are not open to coaching, the prominence of mild TC expression is sharply mitigated and becomes as detrimental as intense TC expressions.

Research limitations/implications

This study only focused on one specific aspect of the angel–entrepreneur post-investment relationship: The effect of their TC expressions on angels’ reinvestment intentions. By no means do the authors imply that TC expression in the angel–entrepreneur post-investment relationship is the only factor that matters to angel investors in their follow-on investment intentions with the same entrepreneur.

Practical implications

The findings suggest that entrepreneurs should pay careful attention to TC that may arise between them and their financiers. TCs are not entirely detrimental, but their negative effect might depend on how they are expressed. An appropriate level of TC may also improve enterprise performance and collaboration. Thus, angels and entrepreneurs should set clear goals and performance standards, where task interactions mainly focus on the goals and expected outcomes.

Originality/value

Prior to this study, little was known about whether all TCs potentially lead to ACs. By distinguishing between levels (i.e. mild vs intense) of TC expressions between angels and entrepreneurs, this study adds a novel aspect to it by showing that TC, in and of itself, does not necessarily lead to AC but can lead to AC once its intensity grows.

Details

International Journal of Conflict Management, vol. 35 no. 2
Type: Research Article
ISSN: 1044-4068

Keywords

Book part
Publication date: 30 April 2024

Natalie Wall

Abstract

Details

Black Expression and White Generosity
Type: Book
ISBN: 978-1-80382-758-2

Article
Publication date: 18 March 2024

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

Abstract

Purpose

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

Design/methodology/approach

This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.

Findings

This paper identified that as the circular approach is relatively new it brings with it some new risks that organizations need to address.

Originality/value

The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.

Details

Strategic Direction, vol. 40 no. 3
Type: Research Article
ISSN: 0258-0543

Keywords

Article
Publication date: 16 April 2024

Peter Ackers

This paper presents an historical reconstruction of the radicalisation of Alan Fox, the industrial sociologist and a detailed analysis of his early historical and sociological…

Abstract

Purpose

This paper presents an historical reconstruction of the radicalisation of Alan Fox, the industrial sociologist and a detailed analysis of his early historical and sociological writing in the classical pluralist phase.

Design/methodology/approach

An intellectual history, including detailed discussion of key Fox texts, supported by interviews with Fox and other Biographical sources.

Findings

Fox’s radicalisation was incomplete, as he carried over from his industrial relations (IR) pluralist mentors, Allan Flanders and Hugh Clegg, a suspicion of political Marxism, a sense of historical contingency and an awareness of the fragmented nature of industrial conflict.

Originality/value

Recent academic attention has centred on Fox’s later radical pluralism with its “structural” approach to the employment relationship. This paper revisits his early, neglected classical pluralist writing. It also illuminates his transition from institutional IR to a broader sociology of work, influenced by AH Halsey, John Goldthorpe and others and the complex nature of his radicalisation.

Details

Employee Relations: The International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0142-5455

Keywords

Article
Publication date: 18 March 2024

James D. Grant

The goal was emancipatory, to characterise and dislodge oppressive management practices, to allow for the possibility of seeking an alternative organisational construction free of…

Abstract

Purpose

The goal was emancipatory, to characterise and dislodge oppressive management practices, to allow for the possibility of seeking an alternative organisational construction free of postcolonial/subaltern subordination and discrimination in a local, well-documented narrative.

Design/methodology/approach

The study was informed by a postcolonial/subaltern perspective and drew on the employment experience of an Aboriginal woman, Canada’s first Indigenous Dean of a law school. The researcher employed a combination of case study and critical discourse analysis with the aim of advancing rich analyses of the complex workings of power and privilege in sustaining Western, postcolonial relations.

Findings

The study made several conclusions: first, that the institution, a medium-sized Canadian university, carefully controlled the Indigenous subaltern to remake her to be palatable to Western sensibilities. Second, the effect of this control was to assimilate her, to subordinate her Indigeneity and to civilise in a manner analogous to the purpose of Indian residential schools. Third, that rather than management’s action being rational and neutral, focused on goal attainment, efficiency and effectiveness, it was an implicit moral judgement based on her race and an opportunity to exploit her value as a means for the university’s growth and status.

Originality/value

Through a postcolonial/subaltern perspective, this study demonstrated how management practices reproduced barriers to the participation of an Indigenous woman and the First Nations community that an organisation was intended to serve. The study demonstrated how a Western perspective – that of a university’s administration, faculty and staff – was privileged, or taken for granted, and the Indigenous perspective subordinated, as the university remained committed to the dispossession of Indigenous knowledge and values.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 19 no. 1
Type: Research Article
ISSN: 1746-5648

Keywords

Article
Publication date: 6 February 2024

Abdul Moid, M. Masoom Raza, Mohammad Javed and Keshwar Jahan

Records are current documents containing crucial personal, legal, financial and medical information, while archives house non-current documents with the same details. This study…

Abstract

Purpose

Records are current documents containing crucial personal, legal, financial and medical information, while archives house non-current documents with the same details. This study specifically aims to measure existing research in records and archives management with various scientific indicators.

Design/methodology/approach

Data extraction was conducted using the Web of Science, resulting in a data set of 2003 records for further analysis. Biblioshiny and VOSviewer have been used for mapping and visualization of the extracted data.

Findings

Managing and organizing this essential information is equally vital to maintaining records and archives. The findings encompass various aspects such as publications and citations, influential authors, source impact factors, relevant articles, affiliations, co-authorship trends across the top 10 countries and regions, references, publication year spectroscopy, keyword co-occurrence and historiography. The study concludes that medical records management prominently dominates the selected research area.

Originality/value

The study reflects the advancements in management systems and continues to emerge as research on the management of records and archives has gained significance.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 15 February 2024

Pertti Vakkari

The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the…

Abstract

Purpose

The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the organization of sciences and Fuchs’ (1993) theory about scientific change.

Design/methodology/approach

The study combines historical source analysis with conceptual and theoretical analysis for characterizing LIS. An attempt is made to empirically validate the distinction between LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.

Findings

The origin of fragmentation in LIS due the contributions of other disciplines can be traced in the 1960s and 1970s for solving the problems produced by the growth of scientific literature. Computer science and business established academic programs and started research relevant to LIS community focusing on information retrieval and bibliometrics. This has led to differing research interests between LIS and other disciplines concerning research topics and methods. LIS has been characterized as fragmented adhocracy as a whole, but we make a distinction between research topics LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.

Originality/value

The paper provides an elaborated historical perspective on the fragmentation of LIS in the pressure of other disciplines. It also characterizes LIS as discipline in a fresh way by applying Whitley’s (1984) theory.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 26 March 2024

Md. Nurul Islam, Guangwei Hu, Murtaza Ashiq and Shakil Ahmad

This bibliometric study aims to analyze the latest trends and patterns of big data applications in librarianship from 2000 to 2022. By conducting a comprehensive examination of…

Abstract

Purpose

This bibliometric study aims to analyze the latest trends and patterns of big data applications in librarianship from 2000 to 2022. By conducting a comprehensive examination of the existing literature, this study aims to provide valuable insights into the emerging field of big data in librarianship and its potential impact on the future of libraries.

Design/methodology/approach

This study employed a rigorous four-stage process of identification, screening, eligibility and inclusion to filter and select the most relevant documents for analysis. The Scopus database was utilized to retrieve pertinent data related to big data applications in librarianship. The dataset comprised 430 documents, including journal articles, conference papers, book chapters, reviews and books. Through bibliometric analysis, the study examined the effectiveness of different publication types and identified the main topics and themes within the field.

Findings

The study found that the field of big data in librarianship is growing rapidly, with a significant increase in publications and citations over the past few years. China is the leading country in terms of publication output, followed by the United States of America. The most influential journals in the field are Library Hi Tech and the ACM International Conference Proceeding Series. The top authors in the field are Minami T, Wu J, Fox EA and Giles CL. The most common keywords in the literature are big data, librarianship, data mining, information retrieval, machine learning and webometrics.

Originality/value

This bibliometric study contributes to the existing body of literature by comprehensively analyzing the latest trends and patterns in big data applications within librarianship. It offers a systematic approach to understanding the state of the field and highlights the unique contributions made by various types of publications. The study’s findings and insights contribute to the originality of this research, providing a foundation for further exploration and advancement in the field of big data in librarianship.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 14