Search results
1 – 10 of 17Priscilla Huldt Navarro and Linnea Haag
The purpose of this paper is to explore how process management (PM) can support small- and medium-sized enterprises (SMEs) in pursuing sustained competitive advantage. For this…
Abstract
Purpose
The purpose of this paper is to explore how process management (PM) can support small- and medium-sized enterprises (SMEs) in pursuing sustained competitive advantage. For this purpose, a dynamic capabilities (DC) lens was used.
Design/methodology/approach
A narrative literature review and a multiple case study with an action research approach at two road freight transport companies were used.
Findings
PM provides structure and system thinking to support the development of competitive advantage. Concerning PM, management of knowledge, management style and process orientation are key factors for the generation of competitive advantage for SMEs.
Research limitations/implications
This study contributes to PM literature by studying its support for and implementation at SMEs. Furthermore, the study contributes to the literature on DC by providing concrete examples of activities linked to such capabilities.
Practical implications
This study contributes to practitioners by providing examples of implementing PM and identifying competitive advantage, connected with PM elements.
Social implications
This study has social and environmental implications for the quality of life of the Swedish people.
Originality/value
This paper contributes to clarifying the connection between the research fields of quality management and DC to explore how PM can support SMEs in pursuing sustained competitive advantage.
Details
Keywords
Sewanu Awhangansi, Titilayo Salisu, Oluwayemisi Awhangansi, Adefunke Dadematthews, Eghonghon Abumere, Benazir Siddiq, Eden Phillips, Meera Mogan, Ayoyimika Olushola, Atim Archibong, Adeniran Okewole, Increase Adeosun, Oladipo Sowunmi, Sunday Amosu, Michael Lewis, Philip John Archard, Olugbenga Owoeye and Michelle O'Reilly
This paper aims to examine the role of bullying victimization in predicting psychopathology, encompassing post-traumatic stress disorder (PTSD), risk of developing prodromal…
Abstract
Purpose
This paper aims to examine the role of bullying victimization in predicting psychopathology, encompassing post-traumatic stress disorder (PTSD), risk of developing prodromal psychosis and emotional and behavioural problems, among in-school Nigerian adolescents.
Design/methodology/approach
A total of 351 junior secondary students (n = 173 males, 178 females; age range: 9–17 years) were recruited from five randomly selected public secondary schools in Nigeria. Students completed a variety of self-report measures, including a socio-demographic questionnaire, the prodromal questionnaire – brief version, the strengths and difficulties questionnaire (SDQ) and the multidimensional peer victimization scale. They were also interviewed using the PTSD module of the Mini International Neuropsychiatric Interview-Kid Version.
Findings
Although bullying victimization was not found to predict the presence of PTSD, it predicted the risk of developing prodromal psychosis. All SDQ subscales also held significant positive associations with bullying victimization. This indicates that higher levels of victimization are associated with increased behavioural and emotional difficulties among adolescents.
Practical implications
The study findings add support to whole system approaches involving relevant stakeholders in health, education, social and criminal justice sectors via protective policies to address the problems of bullying in schools.
Originality/value
The study contributes to evidence demonstrating a need for improved understanding regarding the role of exposure to bullying victimization in predicting various forms of psychopathology. Furthermore, there is specifically a need for research with this focus in developing countries in sub-Saharan Africa and the Nigerian education system.
Details
Keywords
Yu-Hsiang (John) Huang, Bradley Meyer, Daniel Connolly and Troy Strader
Taiwan’s hotel industry was adversely impacted by the COVID-19 pandemic. This study aims to examine the effect of strategic choices by Taiwanese international tourist hotels…
Abstract
Purpose
Taiwan’s hotel industry was adversely impacted by the COVID-19 pandemic. This study aims to examine the effect of strategic choices by Taiwanese international tourist hotels before and during the pandemic environments.
Design/methodology/approach
A data envelopment analysis (DEA)-based Malmquist methodology is used in this study to provide a mechanism to assess Taiwanese hotel strategy performance. Changes in the productivity and performance of Taiwanese international tourist hotels were analyzed in the periods before and during the pandemic to uncover insights useful should a similar crisis occur in the future. Panel data were obtained from the annual report of international tourist hotels published by the Taiwan Tourism Bureau from 2017–2020. Two groups of hotels were analyzed in this study: city hotels and scenic hotels.
Findings
The findings of this study reveal that chain hotels tended to perform better than independent hotels in both city and scenic areas during the global pandemic. Specifically, the crisis caused a substantial decline in productivity and profitability for international tourist hotels in Taipei City during the COVID-19 period. Compared to city hotels, findings also indicate that most international tourist hotels in scenic areas were able to maintain better productivity, including larger-sized scenic hotels.
Originality/value
The DEA-based analysis provides unique and valuable insights for hotel firm leaders on how to better identify and make strategic choices when responding to future crises.
Details
Keywords
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, Muzammil Mahmood and Muhammad Aslam Asadi
This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive…
Abstract
Purpose
This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive analysis using machine learning (ML) algorithms.
Design/methodology/approach
This study employs a total of 241 questionnaire-based responses in a nonmandated security setting and uses multimethod approach. The research model includes both security intention and behavior making use of a valid smartphone security behavior scale. Structural equation modeling (SEM) – explanatory analysis was used in understanding the relationships. ML algorithms were employed to predict the accuracy of the PMT model in an experimental evaluation.
Findings
The results revealed that the threat-appraisal element of the PMT did not have any influence on the intention to secure smartphone while the response efficacy had a role in explaining the smartphone security intention and behavior. The ML predictive analysis showed that the protection motivation elements were able to predict smartphone security intention and behavior with an accuracy of 73%.
Research limitations/implications
The findings imply that the response efficacy of the individuals be improved by cybersecurity training programs in order to enhance the protection motivation. Researchers can test other PMT models, including fear appeals to improve the predictive accuracy.
Originality/value
This study is the first study that makes use of theory-driven SEM analysis and data-driven ML analysis to bridge the gap between smartphone security’s theory and practice.
Details
Keywords
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…
Abstract
Purpose
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.
Design/methodology/approach
An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.
Findings
The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.
Originality/value
This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
Details
Keywords
Organizations are affected top-down by the overarching societies and bottom-up by foundational face-to-face encounters: societies provide norms, values, laws, institutions…
Abstract
Organizations are affected top-down by the overarching societies and bottom-up by foundational face-to-face encounters: societies provide norms, values, laws, institutions, beliefs, markets, political structures, and knowledge bases. What happens within organizations is done by people interacting with other people, arguing, discussing, convincing each other when preparing and making decisions. Organizations operate within social environments that leave their – however indirect – imprint on what is going on within organizations. This article argues that organizational sociology can benefit from an integrated theoretical framework that accounts for the embeddedness of organizations within the micro- and macro-levels of social order. The argument is developed in two main points: First, this article introduces the multilevel framework provided by Niklas Luhmann’s systems theory to demonstrate how organizations are shaped by the functionally differentiated macro-structure of society. Organizations follow and reproduce the operational logics of societal domains such as the political system, the economy, science, law, religion, etc. Second, this paper demonstrates how organizations are shaped by micro-level dynamics of face-to-face interactions. Face-to-face encounters form a social reality of its own kind that restricts and resists the formalization of organizational processes. Here, this article draws on Erving Goffman’s and Randall Collins’ work on interaction rituals, emotions, and solidarity, which is inspired by Durkheimian micro-sociology. At the end, this article brings together all the elements into one general account of organizations within the context of their macro- and micro-structural social environments. This account can yield a deeper and more sociological understanding of organizational behavior.
Details
Keywords
This study aims to investigate how the Chinese Belt and Road Initiative (BRI) and Chinese outward foreign direct investments (FDI) impact the Belt and Road countries (BRCs). It…
Abstract
Purpose
This study aims to investigate how the Chinese Belt and Road Initiative (BRI) and Chinese outward foreign direct investments (FDI) impact the Belt and Road countries (BRCs). It draws on postcolonial theory to investigate the (geo)political objectives behind the financial and economic means.
Design/methodology/approach
In line with the nature of postcolonial studies, the study applies a discourse analysis integrating it with empirical data on indebtedness and trade.
Findings
This study finds that FDI and the BRI, as a development project, need to be considered a double-edged sword for the receiving countries. The authors provide evidence that China has instrumentalized financial and economic means to gain political influence and pursue geopolitical ambitions. Moreover, investments into sensitive sectors (e.g. energy, infrastructure), combined with the BRCs’ inability to pay back loans, could eventually lead to China gaining control of these assets.
Research limitations/implications
The study investigates the financial and economic means that are instrumentalized to gain political influence while not considering flows of technology and know-how. It also limits itself to the study of FDI coming from one specific country, i.e. China. Therefore, no comparison and evaluation are made of FDI from other countries, such as the USA or European countries.
Practical implications
By revealing noncommercial objectives and geopolitical ambitions that China pursues through the BRI, the authors derive policy implications for the BRCs, third countries and China.
Originality/value
The study contributes to postcolonial theory and neocolonialism by investigating how China uses financial and economic means to achieve noncommercial objectives and pursue geopolitical ambitions. Additionally, the authors enhance the understanding of FDI by highlighting more subtle aspects of the complex and contextual nature of FDI as a social phenomenon, which have been overlooked thus far. The authors challenge the predominant positive framing of FDI and provide a counterpoint to the way FDI is often coined.
Details
Keywords
Candida Brush, Birgitte Wraae and Shahrokh Nikou
Despite the considerable increase in research on entrepreneurship education, few studies examine the role of entrepreneurship educators. Similarly, most frameworks from…
Abstract
Purpose
Despite the considerable increase in research on entrepreneurship education, few studies examine the role of entrepreneurship educators. Similarly, most frameworks from entrepreneurship education recognize the educator’s importance in facilitating instruction and assessment, but the factors influencing the educator role are not well understood. According to the identity theory, personal factors including self-efficacy, job satisfaction and personal values influence the perspective of self, significance and anticipations that an individual in this role associates with it, determining their planning and actions. The stronger the role identity the more likely entrepreneurship educators will be in effectively developing their entrepreneurial skills as well as the overall learning experience of their students. The objective of this study is to pinpoint the factors that affect entrepreneurial role identity.
Design/methodology/approach
Drawing upon the identity theory, this study developed a theoretical framework and carried out an empirical investigation involving a survey of 289 entrepreneurship educators across the globe. Structural equation modeling (SEM) technique was applied to analyze and explore the factors that impact the identity of the educators in their role as entrepreneurship teachers.
Findings
The findings show that the role identity of entrepreneurship educators is significantly influenced by their self-efficacy, job satisfaction and personal values. Among these factors, self-efficacy and job satisfaction have the most significant impacts on how educators perceive their role. The implications of these results and directions for future research are also discussed.
Originality/value
The novelty of the current study is derived from its conceptualization of the antecedents of role perception among entrepreneurship educators. This study stands out as one of the earliest attempts to investigate the factors that shape an individual’s scene of self and professional identity as an entrepreneurship educator. The significance of comprehending the antecedents of role perception lies in the insights it can offer into how educators undertake and execute their role, and consequently, their effectiveness in teaching entrepreneurship.
Details