Search results

1 – 10 of over 2000
Article
Publication date: 10 September 2024

Junyun Liao, Jiawen Chen, Yanghong Hu, Raffaele Filieri, Xiaoliang Feng and Wei Wang

Users frequently target rival brands through direct criticism or indirect customer insults, yet the impact of such attacks on brand advocacy remains unexplored. The purpose of…

Abstract

Purpose

Users frequently target rival brands through direct criticism or indirect customer insults, yet the impact of such attacks on brand advocacy remains unexplored. The purpose of this study is to classify online attacks into brand-targeted attacks and consumer-targeted attacks and further investigate their differential impacts on brand advocacy and the underlying mechanism and a boundary condition of those impacts.

Design/methodology/approach

Three experimental studies using different types of brands (electronics, universities and sports footwear) are conducted to examine the effects of brand-related attack targets on brand advocacy.

Findings

This research shows that consumer-targeted attacks trigger higher brand advocacy through increasing perceived identity threat than brand-targeted attacks. Moreover, the effect of consumer-targeted attacks (versus brand-targeted attacks) on brand advocacy is mediated by perceived identity threat and mitigated when consumers’ identification with the attacked brand is strong.

Practical implications

The study’s findings yield practical applications for marketers and brand managers, assisting them in understanding consumers’ reactions to brand attacks. This study serves as a reference for firms to consider leveraging the association between brand identification and brand-related attack targets and uniting with loyal brand fans to manage online brand conflicts.

Originality/value

The present study extends prior literature on customer-brand relationships in the context of online attacks. Through investigating the impacts of brand-targeted and consumer-targeted attacks on brand advocacy, this research offers theoretical insights into consumers’ responses to online attacks with different targets.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 25 June 2024

Elten Briggs, Abigail Torres Rico, Tracy R. Kizer and Zhiyong Yang

This study aims to examine the ramifications of an unfavorable public incident resulting from an organizational leader’s transgression on member outcomes and their intentions to…

Abstract

Purpose

This study aims to examine the ramifications of an unfavorable public incident resulting from an organizational leader’s transgression on member outcomes and their intentions to purchase associated symbolic products as gifts. This study also considers how members’ attributions of organizational control affect the relationship between members’ organizational identification and their purchase behavior.

Design/methodology/approach

The study applies a longitudinal design involving two rounds of data collection over two years to examine a case of leadership transgression. Using the customer panel of a privately owned retailer, sorority members were surveyed before and after an unfavorable public incident involving their president. This study applied t-tests of mean differences and regression analyses to test the hypotheses.

Findings

After the leader’s transgressions were publicized, sorority members exhibited lower levels of cognitive organizational identification, satisfaction with the organization and purchase intention of organizational gifts. The association between cognitive organizational identification and gift purchase intentions was stronger after the incident. Further, controllability attributions positively moderated the association between cognitive organizational identification and the intended purchase quantity of organizational products after the incident.

Research limitations/implications

The sample limits the generalizability of the findings, as the study is conducted on one case of a leader’s transgression in an identity-based organization (IBO).

Practical implications

The findings imply that efforts to repair customer identification should be taken rather than satisfaction enhancement when a leader of an IBO commits a public transgression.

Originality/value

To the best of the authors’ knowledge, this is the first study to apply identity threat theory to understand how an organizational leader’s public transgression affects member outcomes and purchasing. The findings imply that it is critical to repair members’ identification when these situations arise. The use of a real case and a longitudinal research design are rare contributions to this research stream.

Details

European Journal of Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 25 April 2023

Jie Huang, Chunyong Tang and Yali Li

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Abstract

Purpose

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Design/methodology/approach

The authors adopted a mixed method design in this study where a Likert-type scale to measure PWID was developed based on the interviews of 40 workers and the questionnaires of 625 participants successively. Later, the generalizability of the scale was tested through quantitative data from 412 workers. Finally, validity analysis was conducted based on 380 usable questionnaires. Data were analyzed using IBM SPSS 24 and Mplus 7.0.

Findings

The findings of the study indicate that the reliability measures, exploratory factor analyses, confirmatory factor analysis and subsequent convergent and discriminant validity tests support the PWID scale. The nomological validity of PWID is also presented, which demonstrates its predictive validity.

Originality/value

Despite highlighting the importance of work identity, prior research lacked to provide empirical foundations to understand this perception. This study fills this gap in the literature by providing a measure of PWID, distinguishing it from similar constructs and establishing convergent, discriminant and nomological validity. Moreover, by extending the range of theoretical and measurable deprivation of work identity, the authors hope to allow research to take into account a more complete picture of it. PWID scale can be used to develop more relevant suppression plans.

Details

Chinese Management Studies, vol. 18 no. 3
Type: Research Article
ISSN: 1750-614X

Keywords

Open Access
Article
Publication date: 27 August 2024

Babar Dharani

Intersectionality addresses complex avenues of oppression that emanate at the intersections of one’s identities. However, the intersectional framework assumes static identities…

Abstract

Purpose

Intersectionality addresses complex avenues of oppression that emanate at the intersections of one’s identities. However, the intersectional framework assumes static identities, which are increasingly being acknowledged for their fluidity. This research explored the extent of the fluidity of social identities to draw implications for the application of the framework in research.

Design/methodology/approach

27 participants from a post-graduate elective course on diversity and inclusion identified their significant social identities, and submitted a write-up using hermeneutic phenomenology in which the participants shared their lived experiences of the fluidity of their social identities in different spaces they occupy or find themselves in.

Findings

Fluidity-triggering stimuli in different environments and their associations with identity-related motives were uncovered using thematic analysis. Stimuli operating at micro-, meso- and macro-levels rationally explained identity fluidity. However, in addition to types, intensity and frequency of stimuli, psychological factors, such as identity status, were decisive in determining the degree of generalization of stimuli across individuals and spaces that significantly influenced identity fluidity.

Originality/value

This research explored the extent of the fluidity of social identities to draw implications for the application of the intersectional framework in research. The findings contribute to future research by identifying limitations of the intersectional framework based on the fluidity of social identities arising from environmental stimuli that operate at micro-, meso- and macro-levels, and the extent of psychological generalization of these stimuli across spaces.

Details

Equality, Diversity and Inclusion: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7149

Keywords

Article
Publication date: 17 July 2024

Andrew Silke

Since 2011, the Extremism Risk Guidance (ERG 22+) has been the primary risk assessment framework used for terrorist and violent extremist offenders in England and Wales. The aim…

Abstract

Purpose

Since 2011, the Extremism Risk Guidance (ERG 22+) has been the primary risk assessment framework used for terrorist and violent extremist offenders in England and Wales. The aim of this study was to conduct a rapid evidence assessment to examine the research literature on the ERG22+ factors and to identify possible significant new and emerging knowledge around potential new factors.

Design/methodology/approach

Searches were conducted of the Google Scholar database to identify relevant literature published between 2012 and 2020. In total, 29 documents were identified, which examined new radicalisation models and frameworks, 339 were identified, which explored to some extent one or more of the current ERG factors, and a further 138 articles were identified, which focused on potentially relevant additional issues/factors.

Findings

Most of the ERG factors were the focus of substantial research activity between 2012 and 2020. Six factors, however, received very little research attention. Potential implications of these trends are considered. Ten research themes were identified with the potential to either form new factors or which could play a significant role in the updating or revision of some existing factors.

Originality/value

This paper is the first rapid evidence assessment on the ERG22+ risk factors. It provides an important picture of the published scientific research of potential relevance in this area and helps to inform the review process for the ERG22+.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Book part
Publication date: 13 August 2024

Nicholas P. Salter, Jenna-Lyn R. Roman and Ngoc S. Duong

Organizational research on diversity, equity, and inclusion (DEI) is at times siloed; the experience of one minoritized or underrepresented group is treated as completely separate…

Abstract

Organizational research on diversity, equity, and inclusion (DEI) is at times siloed; the experience of one minoritized or underrepresented group is treated as completely separate and different from the experience of another group and thus research separately. For example, there are terms that are studied only in the context of one group, and a different term is used to study a very similar (or identical) concept among a different group. Indeed, there are many unique experiences that specific minority groups encounter at work. Because of this end, minority groups should not be fully categorized together, and their individual should not be erased. However, there are shared experiences that many or all minorities experience at work, whether they are a gender minority, racial minority, or a member of any other minoritized group. Recognizing these shared experiences can help scholars develop a deeper understanding of what it's like to be minoritized or underrepresented at work, and therefore help to better serve these communities. To this end, our chapter highlights three such shared but unique minority experiences: three experiences that are common across all minority groups but operationalize slightly differently in different populations. The first experience we discuss is discrimination, as all minorities typically experience some form of negative differential treatment at work. The second experience we discuss is identity management, as many minorities need to actively think about how they present their minority identity to others (regardless of if their identity is “concealable” or not). Finally, we discuss strength through adversity, as many minorities argue that their minority identity is a source of strength and an area that benefits them at work. We conclude the chapter with a call toward intraminority solidarity, suggesting that recognizing shared experiences and working together can help build better workplaces for all minority employees.

Details

Diversity, Equity, and Inclusion (DEI) Management
Type: Book
ISBN: 978-1-83549-259-8

Keywords

Open Access
Article
Publication date: 28 May 2024

Tom A.S. McLaren, Erich C. Fein, Michael Ireland and Aastha Malhotra

The purpose of this empirical study was to test whether presenting organizational change in a way that enhances employee self-worth will result in increased employee support for…

1169

Abstract

Purpose

The purpose of this empirical study was to test whether presenting organizational change in a way that enhances employee self-worth will result in increased employee support for the identified change. In doing so, we developed a new measure, which includes a novel baseline element.

Design/methodology/approach

Items were developed, and then categorical validation data were collected through an online cross-sectional survey in which 222 respondents (adults over 18 years of age, and at least 6 months tenure) participated.

Findings

Within the items, we framed the activation of self-worth bias as requests for employee comments regarding change efforts. Results indicate there is a difference between asking for employee comment on change efforts, compared to asking for employee comment on change efforts and also providing feedback considerate of that input.

Originality/value

This study explores and presents a convergence between behavioral economics, management and applied psychology research – using both self-worth bias, and organizational change management communications; no other such comparable study or analysis could be found during the preparation of this research effort. Furthermore, a novel measure and innovative method is presented for developing and measuring self-worth bias during organizational change management communications.

Details

Journal of Organizational Change Management, vol. 37 no. 8
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 19 July 2024

Bassam Mohammad Maali, M. Kabir Hassan and Mamunur Rashid

Islamic banks (IBs) place significant importance on their religious identity, prompting the utilization of impression management (IM) strategies to emphasize such identity. This…

Abstract

Purpose

Islamic banks (IBs) place significant importance on their religious identity, prompting the utilization of impression management (IM) strategies to emphasize such identity. This paper aims to discuss the motivations behind using IM in the creation of religious identity by IBs, and to explore the use of religious symbols and language as a form of religious rhetoric. It is argued that to counteract the threats to their religious identity, IBs use IM techniques, predominantly through the inclusion of religious symbols and rhetoric.

Design/methodology/approach

An empirical exploratory study, using content analysis, was conducted on the annual reports of the largest IBs for the year 2022. The analyses involved a total of 39 banks based on a filtered list from The Banker’s Top Islamic Financial Institutions of 2022. A manual content analysis was undertaken to extract religious symbols, images and contents.

Findings

The findings reveal the use of IM techniques that emphasize the religious identity of these banks. Notably, IBs consistently reaffirm their commitment to Sharia compliance and disclose their contributions to Zakah. In addition, the analysis reveals the incorporation of Quranic verses, religious iconographic images and other religious rhetoric statements in the annual reports of many IBs.

Research limitations/implications

The analysis concludes that the assertion by IBs that their guiding principles are rooted in Islamic values are supported by the religious terminology and imagery embedded in their annual reports. Alongside mere religious symbolism, the terms and images are integral part of the corporate identity of the Islamic that not only sends persuasive signals to stakeholders but also help build an impression on the activities of the IBs.

Originality/value

IM has been a key objective and strategy of companies. This study aimed at exploring whether and how IBs used religious symbolism as an integral part of IM and corporate identity.

Details

International Journal of Islamic and Middle Eastern Finance and Management, vol. 17 no. 4
Type: Research Article
ISSN: 1753-8394

Keywords

Article
Publication date: 5 April 2024

Manoj Krishnan and Satish Krishnan

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Abstract

Purpose

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Design/methodology/approach

The study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.

Findings

Through meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.

Research limitations/implications

This study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.

Practical implications

Many ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.

Originality/value

There have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 30 April 2024

Nimish Rustagi and L.J. Shrum

Studies have shown that within-domain compensatory consumption can successfully repair the damaged self, but other research indicates that it can undermine self-control because…

Abstract

Purpose

Studies have shown that within-domain compensatory consumption can successfully repair the damaged self, but other research indicates that it can undermine self-control because such consumption causes self-threat rumination that impairs self-regulatory resources. This paper aims to identify a boundary condition that reconciles and explains these contradictory findings.

Design/methodology/approach

The authors conducted three experiments to show that within-domain compensatory consumption undermines self-control, but only in some situations. They test a boundary condition (i.e. type of connections between within-domain products and self-threat domain) for the effects of such consumption on self-threat rumination and self-control.

Findings

This paper demonstrates that within-domain (but not across-domain) compensatory consumption induces rumination and reduces subsequent self-control, but only when the product’s connection to the self-threat domain is made explicit through brand names or slogans. When the connection is merely implicit, rumination and self-control deficits are not observed.

Practical implications

Consumers may seek certain products to bolster threatened aspects of their self-concept. Marketing tactics that explicitly highlight connections to such self-aspects can lower a consumer’s self-control resulting in stronger purchase intent, while at the same time hindering the possibility of self-concept repair. Managers need to be wary of ethical concerns.

Originality/value

This research qualifies the existing findings by presenting “type of product connection” as a key determinant of within-domain compensatory consumption’s impact on self-control. Researchers need to be conscious of the type of products (explicitly vs implicitly connected to the self-threat domain) they use in compensatory consumption studies, because this may influence their findings.

Details

Journal of Consumer Marketing, vol. 41 no. 4
Type: Research Article
ISSN: 0736-3761

Keywords

1 – 10 of over 2000