Search results

1 – 10 of over 1000
Content available
Book part
Publication date: 30 May 2017

Abstract

Details

Brazil
Type: Book
ISBN: 978-1-78635-785-4

Content available
Book part
Publication date: 25 October 2021

Abstract

Details

Re-conceptualizing Safe Spaces
Type: Book
ISBN: 978-1-83982-250-6

Content available
Book part
Publication date: 27 September 2021

KiMi Wilson

Abstract

Details

Black Boys’ Lived and Everyday Experiences in STEM
Type: Book
ISBN: 978-1-80043-996-2

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Open Access
Article
Publication date: 28 March 2023

Virpi Ala-Heikkilä and Marko Järvenpää

This study aims to take a step toward integrating research regarding the image, role and identity of management accountants by understanding how employers’ perceptions of the…

4078

Abstract

Purpose

This study aims to take a step toward integrating research regarding the image, role and identity of management accountants by understanding how employers’ perceptions of the ideal management accountant image differ from operational managers’ perceived role expectations, how management accountants perceive their identity and how those factors shape management accountants’ understanding of who they are and want to be.

Design/methodology/approach

A qualitative design draws upon the case company’s 100 job advertisements and 31 semi-structured interviews with management accountants and operational managers. Those data are entwined with role theory and its core concepts of expectations and identities and also early recruitment-related theoretical aspects such as image and employer branding.

Findings

The findings reveal how employers’ perceptions of the ideal image and operational managers’ role expectations shape and influence the identity of management accountants. However, management accountants distance themselves from a brand image and role expectations. They experience identity conflict between their current and desired identity, the perception of not being able to perform the currently desired role. Although this study presents some possible reasons and explanations, such as employer branding for the misalignment and discrepancy between perceptions of employer (image), expectations of operational managers (role) and management accountants’ self-conception of the role (identity), this study argues that the identity of a management accountant results from organizational aspects of image and role and individual aspects of identity.

Research limitations/implications

Image and external role expectations can challenge identity construction and also serve as a source of conflict and frustration; thus, a more comprehensive approach to studying the identity of management accountants is necessary to understand what contributes to the fragility of their identity.

Practical implications

The results provide an understanding of the dynamics of the image, role and identity to support management accountants and employers and to further address the suggested dissonance and ambiguities.

Originality/value

This study contributes by showing how the dynamics and connections between the image, role and identity influence the identity construction of management accountants. Moreover, this study shows how overpromising as a part of employer branding might not reflect the reality experienced by management accountants but may cause frustration and threaten the management accountants’ identity.

Details

Qualitative Research in Accounting & Management, vol. 20 no. 3
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Book part
Publication date: 4 June 2021

Ari Ezra Waldman

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…

Abstract

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 23 October 2023

Roisin Donnelly and Anthony Ryan

This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if…

Abstract

Purpose

This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if background images evoking gendered stereotypes of leadership can cue stereotype threat in female technology workers undertaking a leadership activity, thus negatively effecting performance. This study aims to contribute to the body of research on stereotype threat by establishing whether virtual backgrounds used in video conferencing software are inherently identity safe or whether their use could have a negative performance impact on marginalised groups.

Design/methodology/approach

Using a mixed methods research design with 22 participants in two countries working in the one large organisation, using two quantitative methods (an experiment and a survey) and one qualitative method (semi-structured interviews), the study examined the relationship between performance on the leadership activity and exposure to gendered backgrounds on a video conference call.

Findings

It found that female leaders undertaking a leadership test experienced more anxiety and achieved lower scores on average when exposed to a male-gendered virtual background compared to male colleagues or female leaders exposed to a female gendered background. It was also found that these leaders were aware of the stereotype of leadership being White and male, and showed symptoms of prolonged exposure to stereotype threat in the workplace. While the authors still are working through a post-pandemic environment, it may be judicious for organisations to restrict the use of virtual backgrounds to identity-safe ones, specifically chosen by the company.

Research limitations/implications

The study makes several practical recommendations, indicating actions which can be taken at the individual, team and corporate levels. Re-running this experiment in a more controlled environment with a larger sample set could yield more definitive, statistically significant results and contribute more to the literature.

Practical implications

Some individual impacts were found via the interviews. Male leaders in the organisation need to do more to mentor and endorse their female colleagues. By doing this, they can counter the negative effects of solo status and the subsequent performance degradations of their female counterparts, while also setting an example for other leaders. Participation in the mentoring programme and initiatives such as Dare and value, inclusion, belonging, and equity should be encouraged and supported. Reverse mentoring should also be encouraged among the population of male leaders to aid in allyship and bias-awareness.

Social implications

Teams should note that a democratic vote is not always the best way to decide on the names of teams, projects or meeting rooms. These may skew towards niche interests that can serve to alienate members of the team who do not associate themselves with that interest. Rather, the teams should strive to be fully inclusive and educated on the need for identity-safety. Team events may also serve to alienate members if teams are not mindful of the need to be inclusive. Activities, such as “go-kart” racing and physical or competitive team events have been highlighted as unsuitable for some team members, and should be avoided in favour of inclusivity.

Originality/value

A significant body of research has documented the effect to which stereotype threat can be triggered by both the physical environment and by the use of various technology media. However, there is a dearth of research exploring the relationship between stereotype threat, defined as “the concrete, real-time threat of being judged and treated poorly in settings where a negative stereotype about one’s group applies” (Steele et al., 2002, p. 385), and video conferencing software features, such as virtual backgrounds.

Details

International Journal of Organizational Analysis, vol. 31 no. 8
Type: Research Article
ISSN: 1934-8835

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Content available
Article
Publication date: 16 October 2009

Howard Thomas

1016

Abstract

Details

Management Decision, vol. 47 no. 9
Type: Research Article
ISSN: 0025-1747

Content available
Book part
Publication date: 30 September 2019

Abstract

Details

Lifelong Learning and the Roma Minority in Central and Eastern Europe
Type: Book
ISBN: 978-1-83867-260-7

1 – 10 of over 1000