Search results
1 – 10 of 205Isaac Nyarko Adu, Angela Duoduaa Nyarko-Tetteh and Michael Kyei-Frimpong
This study aims to examine students' experiences of sexual harassment (SH) in higher education institutions (HEIs) in Ghana as well as their coping strategies.
Abstract
Purpose
This study aims to examine students' experiences of sexual harassment (SH) in higher education institutions (HEIs) in Ghana as well as their coping strategies.
Design/methodology/approach
The study adopted the cross-sectional descriptive survey research design and used the convenience sampling technique to sample 926 students from four public Universities in Ghana. The data collected were analyzed using an independent-sample t-test with the aid of IBM SPSS Statistics version 23.0.
Findings
The study found no significant difference in male and female students' experience of gender harassment and unwanted SH. Additionally, female students were sexually coerced considerably more than males. In the case of coping strategies, the study found no significant differences among male and female students use of passive coping strategies. Finally, the study found significant differences among male and female students use of active, self-blame and benign coping strategies.
Practical implications
This implies that specific attention is required when students experience SH since they may be exposed to more aggressive sexual behavior.
Originality/value
The originality of this present study rest on its unique contribution by exploring the prevalent SH and coping strategies among tertiary students in HEIs in Ghana.
Details
Keywords
This paper aims to outline the role that serendipity can play in providing a complementary and previously unrepresented vector in deliberate and emergent strategies within…
Abstract
Purpose
This paper aims to outline the role that serendipity can play in providing a complementary and previously unrepresented vector in deliberate and emergent strategies within organizations.
Design/methodology/approach
The paper is conceptual in nature and draws upon the serendipity pattern in sociological theory and serendipitous relations in developmental sciences to provide a framework for executives to consider when examining the process of strategy formation. Two case vignettes are used to illustrate the difference between luck and serendipity and the paper also traces key micro foundations of serendipity by returning to the original serendipity fable and a famed science experiment producing “floppy-eared” rabbits.
Findings
The notion of chance favoring the “prepared firm” is espoused where the prepared organizational mind is positioned as an antecedent of serendipitous strategy formation. This is based on Louis Pasteur’s famous aphorism, “chance favors the prepared mind.” Components of the prepared firm include deep domain knowledge, anticipatory mindset, noticing, abductive reasoning, elaboration and relations development.
Research limitations/implications
The paper is a conceptual articulation of a novel concept that now requires deeper empirical case development and ultimately statistical validation. The paper suggests linkages between serendipity and theories of absorptive capacity and the attention-based view of the firm.
Practical implications
Several mindsets, capabilities and relations for architecting organizational serendipity are suggested for executives using a stylized framework.
Originality/value
From a strategy process perspective, the Mintzberg and Waters seminal article “Of strategies deliberate and emergent” is complemented by considering “floppy-eared” strategy characterized by unexpected, anomalous and strategic datum.
Details
Keywords
Fahim Ullah, Oluwole Olatunji and Siddra Qayyum
Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning…
Abstract
Purpose
Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning from discipline-specific experiences, this paper articulates recent advancements in the knowledge and concepts of G-IoT in relation to the construction and smart city sectors. It provides a scoping review for G-IoT as an overlooked dimension. Attention was paid to modern circularity, cleaner production and sustainability as key benefits of G-IoT adoption in line with the United Nations’ Sustainable Development Goals (UN-SDGs). In addition, this study also investigates the current application and adoption strategies of G-IoT.
Design/methodology/approach
This study uses the Preferred Reporting Items for Systematic and Meta-Analyses (PRISMA) review approach. Resources are drawn from Scopus and Web of Science repositories using apt search strings that reflect applications of G-IoT in the built environment in relation to construction management, urban planning, societies and infrastructure. Thematic analysis was used to analyze pertinent themes in the retrieved articles.
Findings
G-IoT is an overlooked dimension in construction and smart cities so far. Thirty-three scholarly articles were reviewed from a total of 82 articles retrieved, from which five themes were identified: G-IoT in buildings, computing, sustainability, waste management and tracking and monitoring. Among other applications, findings show that G-IoT is prominent in smart urban services, healthcare, traffic management, green computing, environmental protection, site safety and waste management. Applicable strategies to hasten adoption include raising awareness, financial incentives, dedicated work approaches, G-IoT technologies and purposeful capacity building among stakeholders. The future of G-IoT in construction and smart city research is in smart drones, building information modeling, digital twins, 3D printing, green computing, robotics and policies that incentivize adoption.
Originality/value
This study adds to the normative literature on envisioning potential strategies for adoption and the future of G-IoT in construction and smart cities as an overlooked dimension. No previous study to date has reviewed pertinent literature in this area, intending to investigate the current applications, adoption strategies and future direction of G-IoT in construction and smart cities. Researchers can expand on the current study by exploring the identified G-IoT applications and adoption strategies in detail, and practitioners can develop implementation policies, regulations and guidelines for holistic G-IoT adoption.
Details
Keywords
Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
Naman Sharma, Ekta Sinha and Kumar Shalender
The purpose of this paper is to develop and propose an espoused model of women's entrepreneurship (EMWE) and test its predictive power on women's entrepreneurial intentions. Also…
Abstract
Purpose
The purpose of this paper is to develop and propose an espoused model of women's entrepreneurship (EMWE) and test its predictive power on women's entrepreneurial intentions. Also, the authors examine the moderating role of entrepreneurial self-efficacy, given its dynamic nature that can be influenced by training.
Design/methodology/approach
Data was collected from 303 female students from undergraduate/postgraduate programs in reputed Indian higher education institutions using a self-administered questionnaire.
Findings
The study confirmed that all four factors – perceived entrepreneurial potential, perceived relational support, perceived educational support and perceived structural support – were positively related to the women’s entrepreneurial intentions. Simultaneously, results confirmed the moderating effect of entrepreneurial self-efficacy.
Research limitations/implications
The study presents that more women may be inclined towards adopting entrepreneurship as their career based on their potential and self-efficacy if adequate educational, relational and structural support was provided.
Originality/value
Existing studies in entrepreneurship have focused primarily on men. This work fills this gap and not only proposes but empirically examines the EMWE in the Indian context. It also provides evidence of a significant impact of perceived entrepreneurial potential and perceived relational support on women’s entrepreneurial intentions and posits the role of entrepreneurial self-efficacy as an important moderator, unlike past studies.
Details
Keywords
Ahmed Gadafi, Eric Paul Tudzi and Tahiru Alhassan
The study aims to examine the relationship between corporate real estate (CRE) strategy and corporate strategy (CS) in selected universities in Ghana. It focused on the…
Abstract
Purpose
The study aims to examine the relationship between corporate real estate (CRE) strategy and corporate strategy (CS) in selected universities in Ghana. It focused on the availability, usage, alignment and effects of CRE strategy on CS in universities.
Design/methodology/approach
The study adopted a qualitative research design, using purposive and convenience sampling techniques. Interviews were used to collect data from estate departments of selected Ghanaian higher education institutions (HEIs) in Kumasi.
Findings
All the selected HEIs purported to have CRE strategies, but they lacked a holistic approach. They were essentially just maintenance policies developed based on their CSs to support the institutions in their service delivery. All CRE management decisions were aligned with the CRE strategy.
Originality/value
The study highlights the importance of aligning CRE strategies with CSs in HEIs in developing countries to enhance academic environments.
Details
Keywords
Yusuf Karbhari, Abdelhafid Benamraoui and Ahmad Fahmi Sheikh Hassan
The study applies Erving Goffman's (1974) “frame analysis” principles to examine how Sharia governance is practiced in Islamic banks and explores the interaction and strategies…
Abstract
Purpose
The study applies Erving Goffman's (1974) “frame analysis” principles to examine how Sharia governance is practiced in Islamic banks and explores the interaction and strategies adopted by bank managers to influence the decisions of Sharia scholars. The study also aims to identify inherent flaws in the Sharia compliance review system.
Design/methodology/approach
The study employs the principles of Goffman as a lens to critically analyse a rich dataset obtained through interviews undertaken with 46 key players operating in the governance framework of the Malaysian Islamic banking industry due to its progressive Islamic governance framework.
Findings
The study demonstrates that managers of Islamic banks may engage in “passing” and “covering” strategies while interacting within the governance structure. Concurrently, Sharia boards (SBs) implement “protective practices” during their interactions, adding complexity to their responsibilities within the banks. Consequently, SBs cannot merely be viewed as instruments for legitimising banking operations. This raises questions about the “impression management,” “concealment” and “competence” strategies employed by managers and SB members, as suggested by Goffman's framework. These findings indicate that there is room for further enhancement in the governance practices of Islamic banks.
Research limitations/implications
Future research could explore aspects related to the governance of Islamic banks, such as investigating the independence and effectiveness of internal Sharia officers. Examining the strategies employed during their interactions with external Sharia boards and other stakeholders could provide further valuable insights.
Practical implications
By highlighting shortcomings in the governance and compliance review process, the findings could serve as a valuable resource for policymakers. The insights derived could inform the development of regulations aimed at reducing opportunistic behaviour and promoting accountability in the Islamic banking sector.
Originality/value
This study uniquely employs Goffman's concepts of “frontstage” and “backstage” strategies to offer insights into the interactions between Islamic bank managers and SBs and the impact of these interactions on Sharia compliance. The study contributes to the understanding of the dynamics between key players in the governance of Islamic banks and the factors influencing their adherence to Sharia principles.
Details
Keywords
Quynh Do, Nishikant Mishra, Fernando Correia and Stephen Eldridge
Circular economy advocates innovations that upcycle wastes in the food supply chain to generate high added-value materials. These innovations are not only disruptive and green but…
Abstract
Purpose
Circular economy advocates innovations that upcycle wastes in the food supply chain to generate high added-value materials. These innovations are not only disruptive and green but also they are often initiated by startups, leading to the emergence of novel open-loop supply chains connecting actors in food and non-food sectors. While earlier research has highlighted the need to seek legitimacy for disruptive innovations to survive and grow, little is known about how these innovations occur and evolve across sectors. This paper aims to elaborate on this mechanism by exploring the function of the circular economy as a boundary object to facilitate legitimacy-seeking strategies.
Design/methodology/approach
An exploratory multiple-case research design is adopted and features food waste innovation projects with multi-tier supply chains consisting of a food producer, a startup and a buying firm. The study is investigated from the legitimacy and boundary object lenses.
Findings
The findings proposed a framework for the role of a boundary object in enabling legitimacy-seeking strategies for novel food waste innovations. First, the interpretative flexibility of the circular economy affords actors symbolic resources to conduct manipulation strategy to achieve cognitive legitimacy. Second, small-scale work arrangements enable creation strategy for the new supply chain to harness moral legitimacy. Finally, pragmatic legitimacy is granted via diffusion strategy enabled by scalable work arrangements.
Originality/value
This paper provides novel insights into the emergence of food waste innovation from a multi-tier supply chain perspective. It also highlights the key role of the boundary object in the legitimacy-seeking process.
Details
Keywords
Emergent research suggests that compulsive social media usage (CSMU) has a correlational link with well-being. Previous research in this area primarily focused on the prevalence…
Abstract
Purpose
Emergent research suggests that compulsive social media usage (CSMU) has a correlational link with well-being. Previous research in this area primarily focused on the prevalence, dynamics and consequences of social media usage. However, the knowledge of these occurrences among school and university students is still in its infancy stage. This research study addresses the knowledge gap by investigating the nexus between fear of missing out (FOMO), phubbing, CSMU and well-being.
Design/methodology/approach
Cross-sectional surveys were conducted for collecting the data of school students and university students during COVID-19 when the exposure to the Internet and social media among the students had increased tremendously. Multivariate analysis and Moderated Mediated analysis techniques were performed to analyze the data using the structural equation modeling approach.
Findings
The results indicated that while on one side, students experience “FOMO”, on the other, they phone snub the individuals available to them to interact. FOMO significantly influences well-being; phubbing also has a significant impact on well-being; phubbing partially mediates the relationship between CSMU and well-being. However, for university students, the full mediation of phubbing in the relationship between CSMU and well-being was confirmed. It was also found that sleep fully mediated the relationship between CSMU and well-being.
Originality/value
This study provides novel highlights of the differential effects of FOMO, phubbing, sleep hygiene and well-being among the university and school-attending cohorts.
Details
Keywords
This study examines how assurors make sense of sustainability assurance (SA) work and how interactions with assurance team members and clients shape assurors’ sensemaking and…
Abstract
Purpose
This study examines how assurors make sense of sustainability assurance (SA) work and how interactions with assurance team members and clients shape assurors’ sensemaking and their actual SA work.
Design/methodology/approach
To obtain detailed accounts of how SA work occurs on the ground, this study explores three SA engagements by interviewing the main actors involved, both at the client firms and at their Big Four assurance providers.
Findings
Individual assurors’ (i.e. partners and other team members) sensemaking of SA work results in the crafting of their logics of action (LoAs), that is, their meanings about the objectives of SA work and how to conduct it. Without organizational socialization, team members may not arrive at shared meanings and deviate from the team-wide assurance approach. To fulfill their objectives for SA work, assurors may engage in socialization with clients or assume a temporary role. Yet, the role negotiations taking place in the shadows of the scope negotiations determine their default role during the engagement.
Practical implications
Two options are available to help SA statement users gauge the relevance of SA work: either displaying the SA work performed or making it more uniform.
Originality/value
This study theoretically grounds how assurors make sense of SA work and documents how (the lack of) professional socialization, organizational socialization and socialization of frequent interaction partners at the client shape actual SA work. Thereby, it unravels the SA work concealed behind SA statements.
Details