Search results

1 – 10 of 17
Open Access
Article
Publication date: 27 May 2024

Priscilla Huldt Navarro and Linnea Haag

The purpose of this paper is to explore how process management (PM) can support small- and medium-sized enterprises (SMEs) in pursuing sustained competitive advantage. For this…

Abstract

Purpose

The purpose of this paper is to explore how process management (PM) can support small- and medium-sized enterprises (SMEs) in pursuing sustained competitive advantage. For this purpose, a dynamic capabilities (DC) lens was used.

Design/methodology/approach

A narrative literature review and a multiple case study with an action research approach at two road freight transport companies were used.

Findings

PM provides structure and system thinking to support the development of competitive advantage. Concerning PM, management of knowledge, management style and process orientation are key factors for the generation of competitive advantage for SMEs.

Research limitations/implications

This study contributes to PM literature by studying its support for and implementation at SMEs. Furthermore, the study contributes to the literature on DC by providing concrete examples of activities linked to such capabilities.

Practical implications

This study contributes to practitioners by providing examples of implementing PM and identifying competitive advantage, connected with PM elements.

Social implications

This study has social and environmental implications for the quality of life of the Swedish people.

Originality/value

This paper contributes to clarifying the connection between the research fields of quality management and DC to explore how PM can support SMEs in pursuing sustained competitive advantage.

Details

International Journal of Lean Six Sigma, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-4166

Keywords

Book part
Publication date: 9 September 2024

Reham ElMorally

Abstract

Details

Recovering Women's Voices: Islam, Citizenship, and Patriarchy in Egypt
Type: Book
ISBN: 978-1-83608-249-1

Abstract

Purpose

This paper aims to examine the role of bullying victimization in predicting psychopathology, encompassing post-traumatic stress disorder (PTSD), risk of developing prodromal psychosis and emotional and behavioural problems, among in-school Nigerian adolescents.

Design/methodology/approach

A total of 351 junior secondary students (n = 173 males, 178 females; age range: 9–17 years) were recruited from five randomly selected public secondary schools in Nigeria. Students completed a variety of self-report measures, including a socio-demographic questionnaire, the prodromal questionnaire – brief version, the strengths and difficulties questionnaire (SDQ) and the multidimensional peer victimization scale. They were also interviewed using the PTSD module of the Mini International Neuropsychiatric Interview-Kid Version.

Findings

Although bullying victimization was not found to predict the presence of PTSD, it predicted the risk of developing prodromal psychosis. All SDQ subscales also held significant positive associations with bullying victimization. This indicates that higher levels of victimization are associated with increased behavioural and emotional difficulties among adolescents.

Practical implications

The study findings add support to whole system approaches involving relevant stakeholders in health, education, social and criminal justice sectors via protective policies to address the problems of bullying in schools.

Originality/value

The study contributes to evidence demonstrating a need for improved understanding regarding the role of exposure to bullying victimization in predicting various forms of psychopathology. Furthermore, there is specifically a need for research with this focus in developing countries in sub-Saharan Africa and the Nigerian education system.

Details

The Journal of Forensic Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-8794

Keywords

Open Access
Article
Publication date: 23 May 2023

Yu-Hsiang (John) Huang, Bradley Meyer, Daniel Connolly and Troy Strader

Taiwan’s hotel industry was adversely impacted by the COVID-19 pandemic. This study aims to examine the effect of strategic choices by Taiwanese international tourist hotels…

Abstract

Purpose

Taiwan’s hotel industry was adversely impacted by the COVID-19 pandemic. This study aims to examine the effect of strategic choices by Taiwanese international tourist hotels before and during the pandemic environments.

Design/methodology/approach

A data envelopment analysis (DEA)-based Malmquist methodology is used in this study to provide a mechanism to assess Taiwanese hotel strategy performance. Changes in the productivity and performance of Taiwanese international tourist hotels were analyzed in the periods before and during the pandemic to uncover insights useful should a similar crisis occur in the future. Panel data were obtained from the annual report of international tourist hotels published by the Taiwan Tourism Bureau from 2017–2020. Two groups of hotels were analyzed in this study: city hotels and scenic hotels.

Findings

The findings of this study reveal that chain hotels tended to perform better than independent hotels in both city and scenic areas during the global pandemic. Specifically, the crisis caused a substantial decline in productivity and profitability for international tourist hotels in Taipei City during the COVID-19 period. Compared to city hotels, findings also indicate that most international tourist hotels in scenic areas were able to maintain better productivity, including larger-sized scenic hotels.

Originality/value

The DEA-based analysis provides unique and valuable insights for hotel firm leaders on how to better identify and make strategic choices when responding to future crises.

Article
Publication date: 28 May 2024

Naurin Farooq Khan, Hajra Murtaza, Komal Malik, Muzammil Mahmood and Muhammad Aslam Asadi

This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive…

Abstract

Purpose

This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive analysis using machine learning (ML) algorithms.

Design/methodology/approach

This study employs a total of 241 questionnaire-based responses in a nonmandated security setting and uses multimethod approach. The research model includes both security intention and behavior making use of a valid smartphone security behavior scale. Structural equation modeling (SEM) – explanatory analysis was used in understanding the relationships. ML algorithms were employed to predict the accuracy of the PMT model in an experimental evaluation.

Findings

The results revealed that the threat-appraisal element of the PMT did not have any influence on the intention to secure smartphone while the response efficacy had a role in explaining the smartphone security intention and behavior. The ML predictive analysis showed that the protection motivation elements were able to predict smartphone security intention and behavior with an accuracy of 73%.

Research limitations/implications

The findings imply that the response efficacy of the individuals be improved by cybersecurity training programs in order to enhance the protection motivation. Researchers can test other PMT models, including fear appeals to improve the predictive accuracy.

Originality/value

This study is the first study that makes use of theory-driven SEM analysis and data-driven ML analysis to bridge the gap between smartphone security’s theory and practice.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. 48 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Book part
Publication date: 23 September 2024

Werner Schirmer

Organizations are affected top-down by the overarching societies and bottom-up by foundational face-to-face encounters: societies provide norms, values, laws, institutions…

Abstract

Organizations are affected top-down by the overarching societies and bottom-up by foundational face-to-face encounters: societies provide norms, values, laws, institutions, beliefs, markets, political structures, and knowledge bases. What happens within organizations is done by people interacting with other people, arguing, discussing, convincing each other when preparing and making decisions. Organizations operate within social environments that leave their – however indirect – imprint on what is going on within organizations. This article argues that organizational sociology can benefit from an integrated theoretical framework that accounts for the embeddedness of organizations within the micro- and macro-levels of social order. The argument is developed in two main points: First, this article introduces the multilevel framework provided by Niklas Luhmann’s systems theory to demonstrate how organizations are shaped by the functionally differentiated macro-structure of society. Organizations follow and reproduce the operational logics of societal domains such as the political system, the economy, science, law, religion, etc. Second, this paper demonstrates how organizations are shaped by micro-level dynamics of face-to-face interactions. Face-to-face encounters form a social reality of its own kind that restricts and resists the formalization of organizational processes. Here, this article draws on Erving Goffman’s and Randall Collins’ work on interaction rituals, emotions, and solidarity, which is inspired by Durkheimian micro-sociology. At the end, this article brings together all the elements into one general account of organizations within the context of their macro- and micro-structural social environments. This account can yield a deeper and more sociological understanding of organizational behavior.

Details

Sociological Thinking in Contemporary Organizational Scholarship
Type: Book
ISBN: 978-1-83549-588-9

Keywords

Abstract

Details

Destination Boardroom: Secrets of a Discrete Profession – Executive Search Unveiled
Type: Book
ISBN: 978-1-83797-963-9

Article
Publication date: 30 November 2023

Marc Oberhauser

This study aims to investigate how the Chinese Belt and Road Initiative (BRI) and Chinese outward foreign direct investments (FDI) impact the Belt and Road countries (BRCs). It…

Abstract

Purpose

This study aims to investigate how the Chinese Belt and Road Initiative (BRI) and Chinese outward foreign direct investments (FDI) impact the Belt and Road countries (BRCs). It draws on postcolonial theory to investigate the (geo)political objectives behind the financial and economic means.

Design/methodology/approach

In line with the nature of postcolonial studies, the study applies a discourse analysis integrating it with empirical data on indebtedness and trade.

Findings

This study finds that FDI and the BRI, as a development project, need to be considered a double-edged sword for the receiving countries. The authors provide evidence that China has instrumentalized financial and economic means to gain political influence and pursue geopolitical ambitions. Moreover, investments into sensitive sectors (e.g. energy, infrastructure), combined with the BRCs’ inability to pay back loans, could eventually lead to China gaining control of these assets.

Research limitations/implications

The study investigates the financial and economic means that are instrumentalized to gain political influence while not considering flows of technology and know-how. It also limits itself to the study of FDI coming from one specific country, i.e. China. Therefore, no comparison and evaluation are made of FDI from other countries, such as the USA or European countries.

Practical implications

By revealing noncommercial objectives and geopolitical ambitions that China pursues through the BRI, the authors derive policy implications for the BRCs, third countries and China.

Originality/value

The study contributes to postcolonial theory and neocolonialism by investigating how China uses financial and economic means to achieve noncommercial objectives and pursue geopolitical ambitions. Additionally, the authors enhance the understanding of FDI by highlighting more subtle aspects of the complex and contextual nature of FDI as a social phenomenon, which have been overlooked thus far. The authors challenge the predominant positive framing of FDI and provide a counterpoint to the way FDI is often coined.

Details

International Journal of Development Issues, vol. 23 no. 2
Type: Research Article
ISSN: 1446-8956

Keywords

Open Access
Article
Publication date: 16 January 2024

Candida Brush, Birgitte Wraae and Shahrokh Nikou

Despite the considerable increase in research on entrepreneurship education, few studies examine the role of entrepreneurship educators. Similarly, most frameworks from…

1533

Abstract

Purpose

Despite the considerable increase in research on entrepreneurship education, few studies examine the role of entrepreneurship educators. Similarly, most frameworks from entrepreneurship education recognize the educator’s importance in facilitating instruction and assessment, but the factors influencing the educator role are not well understood. According to the identity theory, personal factors including self-efficacy, job satisfaction and personal values influence the perspective of self, significance and anticipations that an individual in this role associates with it, determining their planning and actions. The stronger the role identity the more likely entrepreneurship educators will be in effectively developing their entrepreneurial skills as well as the overall learning experience of their students. The objective of this study is to pinpoint the factors that affect entrepreneurial role identity.

Design/methodology/approach

Drawing upon the identity theory, this study developed a theoretical framework and carried out an empirical investigation involving a survey of 289 entrepreneurship educators across the globe. Structural equation modeling (SEM) technique was applied to analyze and explore the factors that impact the identity of the educators in their role as entrepreneurship teachers.

Findings

The findings show that the role identity of entrepreneurship educators is significantly influenced by their self-efficacy, job satisfaction and personal values. Among these factors, self-efficacy and job satisfaction have the most significant impacts on how educators perceive their role. The implications of these results and directions for future research are also discussed.

Originality/value

The novelty of the current study is derived from its conceptualization of the antecedents of role perception among entrepreneurship educators. This study stands out as one of the earliest attempts to investigate the factors that shape an individual’s scene of self and professional identity as an entrepreneurship educator. The significance of comprehending the antecedents of role perception lies in the insights it can offer into how educators undertake and execute their role, and consequently, their effectiveness in teaching entrepreneurship.

Details

Education + Training, vol. 66 no. 10
Type: Research Article
ISSN: 0040-0912

Keywords

1 – 10 of 17