Search results
1 – 4 of 4Jan Dutkiewicz and Linda Duxbury
The purpose of this paper is to test the validity of a set of best practice principles for managing transformational organizational change by applying them to a specific change…
Abstract
Purpose
The purpose of this paper is to test the validity of a set of best practice principles for managing transformational organizational change by applying them to a specific change initiative in the media. It also aims to examine whether prescriptions for effective change leadership (traditionally confined to single leaders) apply to a situation and organization where there are three distinct leader roles.
Design/methodology/approach
The paper takes the form of a case study of a major change initiative undertaken at a leading Canadian newspaper.
Findings
The paper shows that multiple, relatively autonomous leaders can lead a successful and unified change given specific organizational and environmental conditions. It also concludes that the generally accepted best practice of change leadership does not necessarily apply to a newspaper environment and posits that, in certain circumstances, a major change initiative can succeed despite running counter to the prevalent prescriptions in the literature.
Research limitations/implications
The conclusions drawn may be limited to organizations in the news media or those with similar organizational structures.
Practical implications
The paper suggests shortcoming of existing normative leadership theories, seeks to explain why this is the case, and makes numerous suggestions for further study.
Originality/value
The paper challenges orthodox assumptions and theories about leader roles and necessary qualities in leaders in successful organizational change. It extends understanding of change processes in the news media, which is under‐studied. It also suggests the applicability, but also relative insufficiency, of existing change theory as pertains to the media industry.
Details
Keywords
From 1953 to 1961, the South Korean economy grew slowly; the average per capita GNP growth was a mere percent, amounting to less than $100 in 1961. Few people, therefore, look for…
Abstract
From 1953 to 1961, the South Korean economy grew slowly; the average per capita GNP growth was a mere percent, amounting to less than $100 in 1961. Few people, therefore, look for the sources of later dynamism in this period. As Kyung Cho Chung (1956:225) wrote in the mid‐1950s: “[South Korea] faces grave economic difficulties. The limitations imposed by the Japanese have been succeeded by the division of the country, the general destruction incurred by the Korean War, and the attendant dislocation of the population, which has further disorganized the economy” (see also McCune 1956:191–192). T.R. Fehrenbach (1963:37), in his widely read book on the Korean War, prognosticated: “By themselves, the two halves [of Korea] might possibly build a viable economy by the year 2000, certainly not sooner.”
Rachid Jabbouri, Helmi Issa, Roy Dakroub and Ahmed Ankit
With the rapid diffusion of the metaverse into all aspects of businesses and the education industry, scholars have predominantly focused on examining its projected benefits and…
Abstract
Purpose
With the rapid diffusion of the metaverse into all aspects of businesses and the education industry, scholars have predominantly focused on examining its projected benefits and harms, yet have overlooked to empirically explore its unpredictable nature, which offers an exciting realm of unexplored challenges and opportunities.
Design/methodology/approach
This research adopts a qualitative research design in the form of 24 interviews from a single EdTech to investigate the possibility of unexpected developments resulting from the integration of the metaverse into its solutions.
Findings
Three noteworthy observations have emerged from the analysis: technological obsolescence, resource allocation imbalance, and monoculturalism.
Originality/value
This research pioneers an empirical exploration of the latent outcomes stemming from metaverse adoption within EdTechs, while also introducing a novel theoretical framework termed “meta-governance,” which extends the Edu-Metaverse ecosystem.
Details
Keywords
Satyanarayana Pamarthi and R. Narmadha
Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine…
Abstract
Purpose
Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.
Design/methodology/approach
This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.
Findings
It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.
Originality/value
This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.
Details