Search results

1 – 10 of 161
Article
Publication date: 8 June 2012

K.N. Rekha and M.P. Ganesh

The purpose of the study was to understand the learnings of adults (who are undergraduates, post graduates or working professionals) who volunteered to be the mentors to make a…

2573

Abstract

Purpose

The purpose of the study was to understand the learnings of adults (who are undergraduates, post graduates or working professionals) who volunteered to be the mentors to make a difference in the life of the adolescents who are from underprivileged backgrounds.

Design/methodology/approach

The authors conducted their study in a not for profit organization (NPO) which has a unique mentoring program called Dronocharya Ekalavya (DNE) mentoring program in Hyderabad, India. The authors conducted telephonic interviews with 15 mentors using a semi‐structured questionnaire and also administered an online survey to 59 respondents. Since the study is a qualitative research, results cannot be generalisable.

Findings

The findings of the study conclude that mentors do learn from the mentoring program organized by NPO. Mentors learnt soft skills such as interpersonal skills, leadership skills, etc. Also they learnt to build rapport and trust. The study highlighted the changes in behaviors of mentors such as self‐realisation, and change in attitude.

Research limitations/implications

Social desirability effect might have impacted the results but all efforts have been invested in carefully handling the data. A possible longitudinal study can focus on comparing learning outcomes of mentors at the beginning of the mentoring program with learning outcomes of mentors at the end of the mentoring program. Future research could focus on how and what do they learn from each other by expanding the study to many organizations.

Originality/value

There is no empirical research conducted to study the benefits gained by mentors through mentoring program, especially referencing to youth mentoring. This study will help organizations (both NGO and other businesses) understand the benefits of mentoring to the mentors.

Details

International Journal of Mentoring and Coaching in Education, vol. 1 no. 3
Type: Research Article
ISSN: 2046-6854

Keywords

Book part
Publication date: 12 June 2020

Muhammad Zahid Iqbal and Mian Imran ul Haq

This chapter critically examines a Pakistani initiative on youth mentoring at workplace, namely the National Internship Program (NIP), which aims to increase fresh graduates'…

Abstract

This chapter critically examines a Pakistani initiative on youth mentoring at workplace, namely the National Internship Program (NIP), which aims to increase fresh graduates' capability and employability. Through a situational analysis of prevalent education systems, occupational choices and job-related tendencies of Pakistani youth in the backdrop of mega economic activities like the China–Pakistan Economic Corridor (CPEC), this chapter brings forth virtues and limitations of NIP. Further, an elaborative appraisal of the key features, design and process of NIP through an illustrative cycle, a conceptual model has been designed which may fulfil the mentoring needs of developing countries. This conceptual model of youth mentoring at workplace proposes a cycle of six activities: planning, engaging, performing, appraising, ensuing and reflecting.

Details

Mentorship-driven Talent Management
Type: Book
ISBN: 978-1-78973-691-5

Keywords

Article
Publication date: 29 April 2019

M.P. Ganesh, M. Ángeles López-Cabarcos and Paula Vázquez-Rodríguez

The purpose of this paper is to understand the influence of self-leadership on the intention to mentor among university teachers considering the mediating role of self-efficacy…

Abstract

Purpose

The purpose of this paper is to understand the influence of self-leadership on the intention to mentor among university teachers considering the mediating role of self-efficacy and the moderating role of individualism-collectivism dimensions.

Design/methodology/approach

A standardized questionnaire was used to collect data from Indian (n=88) and Spanish (n=105) university teachers. The hypothesized relationships were analyzed using structural equation modeling and hierarchical multiple regression analysis.

Findings

Self-leadership strategies influence the intention to mentor through university teachers’ self-efficacy. The positive relationship between self-efficacy and intention to mentor becomes stronger when the respondents are inclined toward vertical collectivistic or horizontal individualistic values.

Research limitations/implications

The study extends mentoring literature since it incorporates both individual and cultural variables, allowing observing their interplay and giving a holistic understanding of the issue. The main limitation of the study is its cross-sectional survey design, which is the use of data collected from a single-sitting, self-reporting measure. Different procedures were used to control method biases.

Practical implications

Intention to mentor can help university teachers (especially the younger staffs) and students to establish the process that can reinforce their commitment toward realistic goals. In the long term, entering into a mentoring relationship might boost self-efficacy and self-leadership qualities of the mentors themselves.

Originality/value

The comprehensiveness and relevance of the variables in the context chosen is the primary strength of this research. In the scenario of increasing professionalization and globalization, the cross-cultural nature of this study brings in a global perspective of the research problem.

Details

Cross Cultural & Strategic Management, vol. 26 no. 2
Type: Research Article
ISSN: 2059-5794

Keywords

Article
Publication date: 25 January 2019

Elly Quinlan, Trevor Crowe, Frank P. Deane and Meredith Whittington

The purpose of this paper is to examine how a peer mentoring relationship may support provisional psychologists engaged in postgraduate education in Australia. The theoretical…

Abstract

Purpose

The purpose of this paper is to examine how a peer mentoring relationship may support provisional psychologists engaged in postgraduate education in Australia. The theoretical lens for this study draws from the real relationship framework and significant events literature.

Design/methodology/approach

Quantitative and qualitative data were obtained via a web survey from a sample of 23 mentors and 41 mentees. Participants had engaged in a one-year peer mentoring program on a volunteer basis. The survey contained measures of functions of mentoring, perceived genuineness and realism in the relationship, and overall satisfaction with peer mentoring. Participants also provided accounts of helpful events, hindering events and open feedback.

Findings

Perceived satisfaction was significantly correlated with greater genuineness and realism in the relationship. Satisfaction was associated with psychosocial and clinical functions of mentoring for both mentors and mentees, and career functions for mentees only. Qualitative findings indicated that the most helpful events included psychosocial support, mutual understanding and skill development. The most frequent hindering events were logistics/time, lack of structure and mentor technique/activity.

Practical implications

Peer mentors show great promise for supporting provisional psychologists. Recommendations for higher education providers include providing peer mentors with guidance regarding the importance of psychosocial support, clinical skill development and creating genuine and real relationships. Peer mentor training would also benefit from the inclusion of career development strategies and psychoeducation on transference.

Originality/value

This study is the first to apply the real relationship framework and significant events analysis to the psychology peer mentoring context.

Details

International Journal of Mentoring and Coaching in Education, vol. 8 no. 1
Type: Research Article
ISSN: 2046-6854

Keywords

Article
Publication date: 1 June 2015

Graham Cole

– This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

1650

Abstract

Purpose

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

Design/methodology/approach

This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.

Findings

Learning is fundamental to the growth and success of any organization. And any business that fails to comprehend its importance is surely destined for a place among the also-rans. Various possibilities exist where learning and development is concerned. One such option gaining in popularity is mentoring. It has now become recognized as having a key role in the personal and professional development of those participating in such programs. Mentoring typically involves an older person imparting their knowledge and experience to a less worldly individual placed under their guidance. Enabling the “mentee” to learn thus tends to be the main objective of these arrangements.

Practical implications

The paper provides strategic insights and practical thinking that have influenced some of the world’s leading organizations.

Originality/value

The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.

Details

Development and Learning in Organizations: An International Journal, vol. 29 no. 4
Type: Research Article
ISSN: 1477-7282

Keywords

Article
Publication date: 5 September 2016

Jia Liang and Donna Augustine-Shaw

The purpose of this paper is to present findings from an initial year of mentoring and induction provided to new assistant principals (APs) served by the Kansas Educational…

Abstract

Purpose

The purpose of this paper is to present findings from an initial year of mentoring and induction provided to new assistant principals (APs) served by the Kansas Educational Leadership Institute (KELI) and to identify program characteristics that support leadership development for first year APs.

Design/methodology/approach

The current research utilized surveys and interviews for data collection. The participants included 12 new AP mentees and five mentors currently participating in the KELI program. Two comparable questionnaires are designed to examine perceptions of both groups on the effectiveness of the program in general, mentoring/induction approaches used, and the appropriateness of the intensity of engagement required. The semi-structured interviews provide contextualized understanding of the same aspects examined in the surveys.

Findings

The findings reveal that mentees found mentoring/induction experiences with KELI highly valuable. The mentor-mentee matching mechanism together with other structured components in the KELI program such as mentor coaching training and multiple professional learning opportunities was instrumental for promoting a trustful relationship, reciprocal learning, and personalized and growth-based assistance that are key to successful mentoring/induction experiences.

Research limitations/implications

The study findings will inform the research-based requirements in KELI’s model and further define effective components in serving the unique and varied responsibilities inherent in the AP position.

Originality/value

There is a need to identify elements in effective mentoring and induction support for new APs and to encapsulate best practices to further develop skills and dispositions for this important leadership position.

Details

International Journal of Mentoring and Coaching in Education, vol. 5 no. 3
Type: Research Article
ISSN: 2046-6854

Keywords

Article
Publication date: 6 June 2014

Ouedraogo Noufou, Davar Rezania and Muhammad Hossain

– The purpose of this paper is to measure students’ willingness to mentor their peers and explores key factors to student peer mentoring effectiveness.

1068

Abstract

Purpose

The purpose of this paper is to measure students’ willingness to mentor their peers and explores key factors to student peer mentoring effectiveness.

Design/methodology/approach

The paper uses a hybrid research methodology consisting of a survey and a focus group discussion. The survey was conducted with students of a bachelor of commerce (BCom) program of a North American university to analyze the impact of organizational culture and altruism on their willingness to mentor their peers. The focus group discussion was carried out with students of the same program to explore the objectives, focus, and factors contributing to their willingness to mentor and to peer mentoring effectiveness.

Findings

Organizational culture and altruism significantly affect students’ emotional and intentional willingness to mentor their peers. Peer mentoring can help students prepare their transition from high school to university, guide them through university programs, and help them prepare their transition from university to workplace. Critical factors to peer mentoring effectiveness include a good fit between mentors and mentees, a reasonable ratio of mentor to protégés, and an understanding of and a willingness to address each student's specific needs.

Practical implications

Business schools should embrace and promote a culture of mutual help, look for altruistic students as prospective peer mentors, and promote voluntary student peer mentoring. A mentoring program should be flexible enough to meet each student's needs. Attention should be paid to finding a good fit between mentors and protégés. Communication should focus on the benefits of student peer mentoring for mentors and protégés.

Originality/value

This research brings empirical evidence on peer mentoring by testing and confirming the impact of altruism and organizational culture on students’ willingness to mentor their peers. It also provides practical insight to business schools for implementing student peer mentoring programs.

Details

International Journal of Mentoring and Coaching in Education, vol. 3 no. 2
Type: Research Article
ISSN: 2046-6854

Keywords

Article
Publication date: 7 September 2015

Ann Darwin

The purpose of this paper is to discuss the challenges and obstacles encountered in the implementation of a mentoring program for Master of Business Administration (MBA) students…

Abstract

Purpose

The purpose of this paper is to discuss the challenges and obstacles encountered in the implementation of a mentoring program for Master of Business Administration (MBA) students at the University of South Australia (UniSA) Business School. The paper starts with an exploration into the need for a mentoring program, the trial and subsequent four years of implementation. The paper also explores the network model of mentoring and the reasons why this, rather than a more traditional model, was chosen for the program’s implementation.

Design/methodology/approach

This exploratory case study uses data from over 600 students and their alumni mentors over a five-year period to evaluate and improve the program as well as cultivating a critical community of adult learners.

Findings

Feedback from students indicates that the mentoring program is regarded by most as a value-added feature of their early learning as it offers support, if and when it is required, from those who have been there before.

Research limitations/implications

Results are limited to one institution. However, as research into mentoring for higher education students is thin on the ground, this study contributes to our understanding of the positive impacts of mentoring on student success.

Practical implications

This paper emphasizes the importance of business leaders giving back to their alma mater through mentoring current MBA students. It shows how mentoring can support learning and management development.

Originality/value

This is an original study which explores ways to increase the learning of higher education students for positive social outcomes.

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 31 December 2021

Jyothi N. and Rekha Patil

This study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.

Abstract

Purpose

This study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.

Design/methodology/approach

The authors built a deep learning-based optimized trust mechanism that removes malicious content generated by selfish VANET nodes. This deep learning-based optimized trust framework is the combination of the Deep Belief Network-based Red Fox Optimization algorithm. A novel deep learning-based optimized model is developed to identify the type of vehicle in the non-line of sight (nLoS) condition. This authentication scheme satisfies both the security and privacy goals of the VANET environment. The message authenticity and integrity are verified using the vehicle location to determine the trust level. The location is verified via distance and time. It identifies whether the sender is in its actual location based on the time and distance.

Findings

A deep learning-based optimized Trust model is used to detect the obstacles that are present in both the line of sight and nLoS conditions to reduce the accident rate. While compared to the previous methods, the experimental results outperform better prediction results in terms of accuracy, precision, recall, computational cost and communication overhead.

Practical implications

The experiments are conducted using the Network Simulator Version 2 simulator and evaluated using different performance metrics including computational cost, accuracy, precision, recall and communication overhead with simple attack and opinion tampering attack. However, the proposed method provided better prediction results in terms of computational cost, accuracy, precision, recall, and communication overhead than other existing methods, such as K-nearest neighbor and Artificial Neural Network. Hence, the proposed method highly against the simple attack and opinion tampering attacks.

Originality/value

This paper proposed a deep learning-based optimized Trust framework for trust prediction in VANET. A deep learning-based optimized Trust model is used to evaluate both event message senders and event message integrity and accuracy.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 161