Search results

1 – 4 of 4
Article
Publication date: 8 February 2013

Jan Dutkiewicz and Linda Duxbury

The purpose of this paper is to test the validity of a set of best practice principles for managing transformational organizational change by applying them to a specific change…

1221

Abstract

Purpose

The purpose of this paper is to test the validity of a set of best practice principles for managing transformational organizational change by applying them to a specific change initiative in the media. It also aims to examine whether prescriptions for effective change leadership (traditionally confined to single leaders) apply to a situation and organization where there are three distinct leader roles.

Design/methodology/approach

The paper takes the form of a case study of a major change initiative undertaken at a leading Canadian newspaper.

Findings

The paper shows that multiple, relatively autonomous leaders can lead a successful and unified change given specific organizational and environmental conditions. It also concludes that the generally accepted best practice of change leadership does not necessarily apply to a newspaper environment and posits that, in certain circumstances, a major change initiative can succeed despite running counter to the prevalent prescriptions in the literature.

Research limitations/implications

The conclusions drawn may be limited to organizations in the news media or those with similar organizational structures.

Practical implications

The paper suggests shortcoming of existing normative leadership theories, seeks to explain why this is the case, and makes numerous suggestions for further study.

Originality/value

The paper challenges orthodox assumptions and theories about leader roles and necessary qualities in leaders in successful organizational change. It extends understanding of change processes in the news media, which is under‐studied. It also suggests the applicability, but also relative insufficiency, of existing change theory as pertains to the media industry.

Details

Journal of Organizational Change Management, vol. 26 no. 1
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 1 November 1997

John Lie

From 1953 to 1961, the South Korean economy grew slowly; the average per capita GNP growth was a mere percent, amounting to less than $100 in 1961. Few people, therefore, look for…

Abstract

From 1953 to 1961, the South Korean economy grew slowly; the average per capita GNP growth was a mere percent, amounting to less than $100 in 1961. Few people, therefore, look for the sources of later dynamism in this period. As Kyung Cho Chung (1956:225) wrote in the mid‐1950s: “[South Korea] faces grave economic difficulties. The limitations imposed by the Japanese have been succeeded by the division of the country, the general destruction incurred by the Korean War, and the attendant dislocation of the population, which has further disorganized the economy” (see also McCune 1956:191–192). T.R. Fehrenbach (1963:37), in his widely read book on the Korean War, prognosticated: “By themselves, the two halves [of Korea] might possibly build a viable economy by the year 2000, certainly not sooner.”

Details

International Journal of Sociology and Social Policy, vol. 17 no. 11/12
Type: Research Article
ISSN: 0144-333X

Article
Publication date: 28 May 2024

Rachid Jabbouri, Helmi Issa, Roy Dakroub and Ahmed Ankit

With the rapid diffusion of the metaverse into all aspects of businesses and the education industry, scholars have predominantly focused on examining its projected benefits and…

Abstract

Purpose

With the rapid diffusion of the metaverse into all aspects of businesses and the education industry, scholars have predominantly focused on examining its projected benefits and harms, yet have overlooked to empirically explore its unpredictable nature, which offers an exciting realm of unexplored challenges and opportunities.

Design/methodology/approach

This research adopts a qualitative research design in the form of 24 interviews from a single EdTech to investigate the possibility of unexpected developments resulting from the integration of the metaverse into its solutions.

Findings

Three noteworthy observations have emerged from the analysis: technological obsolescence, resource allocation imbalance, and monoculturalism.

Originality/value

This research pioneers an empirical exploration of the latent outcomes stemming from metaverse adoption within EdTechs, while also introducing a novel theoretical framework termed “meta-governance,” which extends the Edu-Metaverse ecosystem.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 21 September 2021

Satyanarayana Pamarthi and R. Narmadha

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine…

Abstract

Purpose

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

Findings

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

1 – 4 of 4