Search results

1 – 10 of over 1000
Article
Publication date: 25 April 2023

Jie Huang, Chunyong Tang and Yali Li

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Abstract

Purpose

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Design/methodology/approach

The authors adopted a mixed method design in this study where a Likert-type scale to measure PWID was developed based on the interviews of 40 workers and the questionnaires of 625 participants successively. Later, the generalizability of the scale was tested through quantitative data from 412 workers. Finally, validity analysis was conducted based on 380 usable questionnaires. Data were analyzed using IBM SPSS 24 and Mplus 7.0.

Findings

The findings of the study indicate that the reliability measures, exploratory factor analyses, confirmatory factor analysis and subsequent convergent and discriminant validity tests support the PWID scale. The nomological validity of PWID is also presented, which demonstrates its predictive validity.

Originality/value

Despite highlighting the importance of work identity, prior research lacked to provide empirical foundations to understand this perception. This study fills this gap in the literature by providing a measure of PWID, distinguishing it from similar constructs and establishing convergent, discriminant and nomological validity. Moreover, by extending the range of theoretical and measurable deprivation of work identity, the authors hope to allow research to take into account a more complete picture of it. PWID scale can be used to develop more relevant suppression plans.

Details

Chinese Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 23 May 2023

Yung-Ching Tseng, Hua-Wei Hung and Bou-Wen Lin

This paper examines the framing of digital transformation. The research questions are specified as follows: what are the different types of framing strategies in response to…

Abstract

Purpose

This paper examines the framing of digital transformation. The research questions are specified as follows: what are the different types of framing strategies in response to digital transformation? How do the strategies differ across organizations? Theoretically, the authors draw on the framing perspective to emphasize the use of linguistic frames in shaping innovation and change processes. Empirically, the authors choose to study the Taiwanese sectors, including publicly governed entities, traditional private business or technology-based ventures.

Design/methodology/approach

The authors’ approach combines topic modeling and qualitative analysis. Using data collected from newspaper and magazine articles, the authors employ topic modeling to generate a set of distinctive framings that Taiwanese actors typically adopt to motivate and justify their digital move. The authors also conduct personal interviews to qualitatively complement the authors’ topic modeling analysis and to identify the rationale behind the linguistic framings and the strategic differences brought about by the various organizations.

Findings

The authors identify five topics that the Taiwanese actors commonly used in the framing of digital transformation. These topics or frames are labeled as cross-domain coordination, market demand, intelligent technology, global trend and competition and digital innovation. The practical use of the framings is contingent on organizational characteristics. Furthermore, the authors show how the framings can be classified as either positive framing (e.g. winning the next war) or negative framing (e.g. innovate or die), generally applicable to organizations around the world struggling to cope with digital disruption.

Research limitations/implications

The authors’ study has two research implications. First, the authors extend the appreciation of the digital transformation from the usual concern with technological and business model innovations to linguistic or framing practices. Second, the authors enrich the framing analysis by emphasizing a practice or contingency perspective based on sector difference. The findings are subject to the limitations of the choice of only established and reputable media outlets, the diatextual reading and filtering of useful articles for topic modeling analysis and the use of world frequency to account for frame significance.

Practical implications

The authors shift actors' attention from improving technical efficiency to acquiring linguistic resources in the pursuit of digitalization. For example, framing the digital transformation in terms of creating a market orientation calls for not only real consumer power but also strategic discursive competence that enables the move to change. The findings also point out that practitioners can enlarge the scope of their agency rather than being trapped in the habituated routine of practices. Despite social embeddedness, organizations are more often widely connected and built enough to call for more of the cognitive frames to appeal to heterogeneous stakeholders.

Originality/value

The authors study contributes to the literature by developing a linguistic or socio-cognitive view of digital transformation strategy that is capable of expanding organizational attention toward change and innovation. The authors explore menus of strategic frames employed by actors in response to digital transformation. We also address the application of a machine-learning tool such as topic modeling to explore the socio-cognitive dimensions of digital transformation. Furthermore, the analysis leads us to identify the outcomes or effects – either positive or negative – that move beyond the particular Taiwanese case to explain the framing of digital transformation in general.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 25 August 2022

Sana Mumtaz

This research focuses on the distinct group of high-status employees commonly referred to as workplace vigilantes, and conceptually investigates how unethical requests by these…

1124

Abstract

Purpose

This research focuses on the distinct group of high-status employees commonly referred to as workplace vigilantes, and conceptually investigates how unethical requests by these individuals impact the behavior and attitude of other employees over time using the social identity theory.

Design/methodology/approach

For developing a conceptual model, literature from the domains of social identity, organizational behavior and general management was searched through Google Scholar. To search the literature, some key terms such as “unethical activities”, “Islamic work ethics” and “social identity” were searched and analyzed.

Findings

Using the social identity theory, a conceptual process model is developed which suggests that when high-status employees propose unethical requests to employees, individuals with high morality are likely to refuse those unethical requests to protect their self-categorizations. However, taking the unfair advantage of their illegitimate powers, high-status employees are likely to eventually make wrong judgments and give unnecessary punishments to moral employees. It is further argued that consistent victimization is likely to negatively impact the social identity of such employees and leads to irritability in moral employees, particularly when such individuals are unable to get the requisite social support from their leaders.

Originality/value

While a considerable body of literature has focused on the antecedents and consequences of intense unethical business practices and the crucial role of leaders in such activities, limited attention has been given to the role of other employees and how they engage in mild unethical misconduct regularly, which is the key focus of this research. The novel conceptual framework needs to be tested in diverse contexts for further development and validation.

Details

PSU Research Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 13 October 2023

Maud van Merriënboer, Michiel Verver and Miruna Radu-Lefebvre

Drawing on an intersectional perspective on racial, migrant and entrepreneurial identities, this paper investigates the identity work of racial minority entrepreneurs with…

1224

Abstract

Purpose

Drawing on an intersectional perspective on racial, migrant and entrepreneurial identities, this paper investigates the identity work of racial minority entrepreneurs with native-born and migrant backgrounds, confronted to experiences of othering in a White entrepreneurial ecosystem.

Design/methodology/approach

The study takes a qualitative-interpretivist approach and builds on six cases of racial minority entrepreneurs in nascent stages of venture development within the Dutch technology sector. The dataset comprises 24 in-depth interviews conducted over the course of one and a half year, extensive case descriptions and online sources. The data is thematically and inductively analysed.

Findings

Despite strongly self-identifying as entrepreneurs, the research participants feel marginalised and excluded from the entrepreneurial ecosystem, which results in ongoing threats to their existential authenticity as they build a legitimate entrepreneurial identity. Minority entrepreneurs navigate these threats by either downplaying or embracing their marginalised racial and/or migrant identities.

Originality/value

The study contributes to the literature on the identity work of minority entrepreneurs. The paper reveals that, rather than “strategising away” the discrimination and exclusion resulting from othering, racial minority entrepreneurs seek to preserve their sense of existential authenticity and self-worth, irrespective of entrepreneurial outcomes. In so doing, the study challenges the dominant perspective of entrepreneurial identity work among minority entrepreneurs as overly instrumental and market-driven. Moreover, the study also contributes to the literature on authenticity in entrepreneurship by highlighting how racial minority entrepreneurs navigate authenticity threats while building legitimacy in a White ecosystem.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 9 January 2024

Almaas Sultana and Rayees Farooq

The purpose of the study is to develop a valid measure of stereotype threat.

Abstract

Purpose

The purpose of the study is to develop a valid measure of stereotype threat.

Design/methodology/approach

A convenience sample of 2,900 respondents from different occupational sectors, including managers, engineers and health-care professionals, was used for the present study. The data were collected from various government and private organizations in North India. The questionnaire survey was administered in three phases. During the first phase, 800 questionnaires were circulated, followed by 1,200 questionnaires in the second phase, and the third phase involves 900 questionnaires. The data were analysed using exploratory factor analysis, confirmatory factor analysis and structural equation modelling.

Findings

The results indicate nine dimensions, namely, occupational identification, occupational stigma consciousness, gender identification, gender stigma consciousness, religion identification, religion stigma consciousness, caste identification, caste stigma consciousness and negative effect of stereotype threat. The study ensures the reliability and validity of the stereotype threat scale. The measure also fulfils the assumptions of nomological validity.

Originality/value

To the best of the authors’ knowledge, the study is the first of its kind to develop and validate the stereotype threat scale adhering to scale development procedures.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 5 April 2024

Manoj Krishnan and Satish Krishnan

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Abstract

Purpose

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Design/methodology/approach

The study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.

Findings

Through meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.

Research limitations/implications

This study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.

Practical implications

Many ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.

Originality/value

There have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 March 2024

Yupeng Mou, Yixuan Gong and Zhihua Ding

Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer…

Abstract

Purpose

Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer resistance. Thus, drawing on the user resistance theory, this study explores factors that influence consumers’ resistance to AI and suggests ways to mitigate this negative influence.

Design/methodology/approach

This study tested four hypotheses across four studies by conducting lab experiments. Study 1 used a questionnaire to verify the hypothesis that AI’s “substitute” image leads to consumer resistance to AI; Study 2 focused on the role of perceived threat as an underlying driver of resistance to AI. Studies 3–4 provided process evidence by the way of a measured moderator, testing whether AI with servant communication style and literal language style is resisted less.

Findings

This study showed that AI’s “substitute” image increased users' resistance to AI. This occurs because the substitute image increases consumers’ perceived threat. The study also found that using servant communication and literal language styles in the interaction between AI and consumers can mitigate the negative effects of AI-substituted images.

Originality/value

This study reveals the mechanism of action between AI image and consumers’ resistance and sheds light on how to choose appropriate image and expression styles for AI products, which is important for lowering consumer resistance to AI.

Details

Marketing Intelligence & Planning, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 2 April 2024

Farjam Eshraghian, Najmeh Hafezieh, Farveh Farivar and Sergio de Cesare

The applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a…

Abstract

Purpose

The applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.

Design/methodology/approach

We gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.

Findings

We found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.

Practical implications

Overall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.

Originality/value

Our study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 April 2023

Chunqing Li, Xiaoli Wang, Jieli Zhang and Chenxi Li

This paper aims to explore the key elements and dynamic formation mechanisms involved in the company identity construction during multicompany identification.

Abstract

Purpose

This paper aims to explore the key elements and dynamic formation mechanisms involved in the company identity construction during multicompany identification.

Design/methodology/approach

This study adopted a longitudinal single case study method, selected a representative company as the study case and analyzed the interactive practice of identity construction between the company and its external stakeholders based on the theory of organizational identity and sensemaking.

Findings

This study finds that the process of company identity construction for external stakeholders involves six elements. Companies mainly use a highly controlled, equality and interaction model to develop identity for a single stakeholder. Company identity is based on the company’s core identity claims and is formed by gradually integrating and cooperating with the identity claims of different stakeholders. Meeting the self-defining needs of stakeholders is a key driving force behind the evolution of company identity.

Practical implications

This study offers practical implications for companies to pursue and construct multicompany identity. For different types of external stakeholders, companies can adopt different identity sensemaking models. To build a new company identity, a company needs to do more on the basis of identity insights to break cognitive constraints and build new identity claim. Companies need to integrate new identity claims with the original identity claims. If different identity claims conflict or are difficult to reconcile, it may damage their original identity claims and companies need to evaluate the trade-offs.

Originality/value

This study expands the concept of company identity construction from the individual perspective to organizational identity and contributes to research in relationship marketing. This study identifies the key elements of company identity construction with multistakeholder participation and contributes to theory building in company identity research. The results of this study reveal the company identity construction mechanism for different external stakeholders and the dynamic formation process of multicompany identity.

Details

Nankai Business Review International, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-8749

Keywords

1 – 10 of over 1000