Search results

1 – 7 of 7

Abstract

Purpose

This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and becoming of entrepreneurial phenomena in business families and family firms.

Design/methodology/approach

Because of the novelty of this research stream, the authors asked 20 scholars in entrepreneurship and family business to reflect on topics, methods and issues that should be addressed to move this field forward.

Findings

Authors highlight key challenges and point to new research directions for understanding family entrepreneuring in relation to issues such as agency, processualism and context.

Originality/value

This study offers a compilation of multiple perspectives and leverage recent developments in the fields of entrepreneurship and family business to advance research on family entrepreneuring.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 16 August 2021

Malin Tillmar, Helene Ahl, Karin Berglund and Katarina Pettersson

Contrasting Sweden and Tanzania, this paper aims to explore the experiences of women entrepreneurs affected by entrepreneurialism. This study discusses the impact on their…

1355

Abstract

Purpose

Contrasting Sweden and Tanzania, this paper aims to explore the experiences of women entrepreneurs affected by entrepreneurialism. This study discusses the impact on their position in society and on their ability to take feminist action.

Design/methodology/approach

This paper analysed interviews conducted in the two countries over 15 years, using a holistic perspective on context, including its gendered dimensions.

Findings

The results amount to a critique of entrepreneurialism. Women in Sweden did not experience much gain from entrepreneurship, while in Tanzania results were mixed. Entrepreneurialism seems unable to improve the situation for women in the relatively well-functioning economies in the global north, where it was designed.

Research limitations/implications

In mainstream entrepreneurship studies, there is a focus on the institutional context. From the analysis, it is apparent that equal attention must be given to the social and spatial contexts, as they may have severe material and economic consequences for entrepreneurs and entrepreneurship. The paper raises questions for further studies on the gendering of markets in different contexts, as well as questions on the urban-rural dimension.

Practical implications

In Sweden, marketisation of welfare services led to more women-owned businesses, but the position of women did not improve. The results strongly convey the need for a careful analysis of the pre-existing context, before initiating reforms.

Originality/value

The paper adds to the understanding of context in entrepreneurship studies: Africa is largely an underexplored continent and contrasting North and South is an underexplored methodological approach. This paper further extends and develops the model of gendered contexts developed by Welter et al. (2014).

Details

Journal of Enterprising Communities: People and Places in the Global Economy, vol. 16 no. 5
Type: Research Article
ISSN: 1750-6204

Keywords

Abstract

Details

Attaining the 2030 Sustainable Development Goal of Gender Equality
Type: Book
ISBN: 978-1-80455-835-5

Open Access
Article
Publication date: 5 December 2022

Karen Handley and Courtney Molloy

This paper takes a structured literature review (SLR) approach to identify gaps in the literature and suggest future research opportunities. It focuses on corporate governance…

2182

Abstract

Purpose

This paper takes a structured literature review (SLR) approach to identify gaps in the literature and suggest future research opportunities. It focuses on corporate governance (CG) performed outside the formal board of directors’ structure and examines research of alternative CG of small and medium-sized entities (SMEs).

Design/methodology/approach

The authors use the SLR method to search the Scopus database, extracting and synthesising findings relating specifically to SMEs’ CG. These are tabulated and described using bibliometric software.

Findings

The authors highlight an absence of tailored theoretical approaches to understanding CG in SMEs, which differs from the governance of larger entities. They also find evidence of alternative governance structures in SME CG.

Research limitations/implications

Further research should embrace management and other theoretical perspectives and expanded methodologies, nuances in understanding offered in contextualised settings and awareness of practical implications to better understand the specific setting of CG in SMEs.

Practical implications

SMEs seek to access the scarce resources and skills external to their formal CG structures. Regulators and resource providers should mobilise facilitation and training for this expansion.

Originality/value

The authors synthesise a large body of literature to extract findings specific to SMEs. A unique contribution is our focus on alternative forms of CG in SMEs. Evidence of alternative boards points to resolutions for human capital shortages in SMEs.

Details

Meditari Accountancy Research, vol. 30 no. 7
Type: Research Article
ISSN: 2049-372X

Keywords

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3333

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1742

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 December 2021

Karen L. Orengo Serra and Maria Sanchez-Jauregui

Critical infrastructure (CI) plays an essential role in reading, reacting and responding while dealing with natural disasters. This study address food supply chain resilience by…

6010

Abstract

Purpose

Critical infrastructure (CI) plays an essential role in reading, reacting and responding while dealing with natural disasters. This study address food supply chain resilience by proposing an FSC resilience model that explains the food product and transport flow via production, processing, distribution and retailing in circumstances of (CI) collapses post a natural disaster.

Design/methodology/approach

A combination of qualitative methods was conducted to obtain a comprehensive overview of the food and beverage sector in Puerto Rico. The full dataset comprised of seven focus groups for a total of 52 participants and 12 in-depth interviews.

Findings

FSC resilience is seen in this study through the managerial actions taken by members of the Chain: innovating, transforming, adapting, and flexibilising business models and operations.

Originality/value

This study is the first to address FSC resilience from the perspective of net food importer economy in the context of natural disasters and prolonged Critical infrastructure (CI) breakdown, and the first one in proposing an FSC resilience model that explains the food product and transport flow via production, processing, distribution and retailing in circumstances of CI collapses post a natural disaster.

Details

British Food Journal, vol. 124 no. 13
Type: Research Article
ISSN: 0007-070X

Keywords

1 – 7 of 7