Search results

1 – 8 of 8
Article
Publication date: 11 May 2023

Xenia Bolschakow, Thomas Rigotti and Kathleen Otto

The benefits of authentic leadership for followers have been thoroughly researched, but the effects on leaders’ well-being remain unclear. To address this research gap, the…

Abstract

Purpose

The benefits of authentic leadership for followers have been thoroughly researched, but the effects on leaders’ well-being remain unclear. To address this research gap, the authors hypothesized reciprocal relationships between authentic leadership and work engagement as well as emotional exhaustion.

Design/methodology/approach

The hypotheses were tested in a German sample with leaders from different work sectors using a cross-lagged panel design with a time lag of 14 months (N = 137 at T1; N = 217 at T2).

Findings

Well-being significantly predicted leaders’ engagement in authentic leadership at the second measurement point, whereas the reciprocal relationships were not significant.

Research limitations/implications

Drawing on the Conservation of Resources Theory, possible processes underlying the observed impact of leaders’ well-being on their leadership behavior are discussed. The present research provides evidence that well-being constitutes a crucial basic resource for leaders to engage in constructive leadership behaviors such as authentic leadership.

Originality/value

This study contributes to the literature by uncovering the causal order linking authentic leadership and leaders’ health.

Details

Leadership & Organization Development Journal, vol. 44 no. 3
Type: Research Article
ISSN: 0143-7739

Keywords

Content available
Book part
Publication date: 30 October 2023

Abstract

Details

Leadership in Turbulent Times
Type: Book
ISBN: 978-1-83753-494-4

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 6 February 2024

Maria Petrescu, John Gironda and Kathleen Bay O'Leary

This paper aims to evaluate and structure the basic heuristics consumers use in evaluating word-of-mouth (WOM) about luxury hotel brands while analyzing the impact of deception in…

Abstract

Purpose

This paper aims to evaluate and structure the basic heuristics consumers use in evaluating word-of-mouth (WOM) about luxury hotel brands while analyzing the impact of deception in online consumer reviews.

Design/methodology/approach

The research used a two-study mixed-methods approach, using interpersonal deception theory and social proof theory as lenses to conduct our analysis. For the first study, a qualitative conceptual mapping analysis was conducted, examining online consumer reviews to identify key concepts and their relationships in the context of luxury hotel brands. In the second study, the themes were further examined using a fuzzy-set qualitative comparative analysis to analyze their causal complexity and association between variables to determine how they influence the perceived helpfulness of online reviews for luxury hotel brands.

Findings

The results underline the importance of functional, objective variables, such as the number of reviews and stars, as social proof heuristics and other factors, including clout, authenticity and analytic tone, as interpersonal communication heuristics. Therefore, consumers use a combination of social and interpersonal communication heuristics to extract information from reviews and manage deception risk.

Research limitations/implications

The paper contributes to the consumer–brand relationship literature by assessing the heuristics consumers use in evaluating online reviews and provides additional information for research in online reputation management.

Practical implications

This study’s results can help marketing practitioners and brand managers manage their online reputations better. It can also aid managers in improving their messaging on hotel websites to entice consumers to complete bookings. Heuristics play an essential role in such messaging and understanding them can help marketers appeal directly to their target market.

Originality/value

This study contributes to the literature on consumer–brand relationships by providing a framework of heuristics that consumers use when evaluating luxury service brands and contributes to WOM and online reputation research by highlighting factors that may make online reviews more helpful.

Details

Journal of Product & Brand Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1061-0421

Keywords

Book part
Publication date: 1 August 2023

Henry Tran and Zach Jenkins

In this chapter, the emerging education workforce management approach known as talent-centered education leadership (TCEL) is reviewed. The approach takes inspiration from…

Abstract

In this chapter, the emerging education workforce management approach known as talent-centered education leadership (TCEL) is reviewed. The approach takes inspiration from progressive and cutting-edge talent management thinking and practices that emphasizes employers' intentional focus on humanizing and authentically engaging with their workforce. Pertinent to the theme of the book, the discussion then segues to the importance of diversity and inclusion as a precursor for these efforts and demonstrates how equity and organizational excellence are mutually compatible in the workplace. Relatedly, consideration is given to how traditional perceptions of “professionalism” can exacerbate inequity in the workplace. The chapter concludes by highlighting the seven core principles of TCEL to prepare school employers to embrace the future of education work.

Article
Publication date: 9 May 2023

Priyanka Sinha, Subaveerapandiyan A. and Manoj Kumar Sinha

This study aims to understand the research data management (RDM) services offered by academic libraries in South Asian and Southeast Asian countries. This study aims to evaluate…

Abstract

Purpose

This study aims to understand the research data management (RDM) services offered by academic libraries in South Asian and Southeast Asian countries. This study aims to evaluate the library and information science professionals’ required RDM skills and the challenges faced with providing RDM services.

Design/methodology/approach

The research methodology for this study used a survey method with purposive sampling. Data were collected through online structured questionnaires, which were used to examine the current state of RDM services offered in academic libraries in South Asia and Southeast Asia.

Findings

South Asian and Southeast Asian region major types of RDM services provided were data repository, data management training, maintaining Web resources, data study and analysis, and promoting awareness of reusable data sources. Little attention was given to advisory services on data analysis/mining/visualization and supporting reproducibility and workflow transparency. The results indicated that most respondents agreed that metadata standards and data management planning skills were required for RDM services in South Asia and Southeast Asia.

Originality/value

This study is significant because it offers a comprehensive assessment of ongoing RDM services in academic libraries of South Asia and Southeast Asia. Most current literature focuses on best practices in developed nations. This study highlights the need for more competent and dedicated academic staff for effective RDM services. Library professionals can use this study to identify the gaps in RDM services and suggest formative measures to overcome such challenges.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 3 April 2024

Fateh Saci, Sajjad M. Jasimuddin and Justin Zuopeng Zhang

This paper aims to examine the relationship between environmental, social and governance (ESG) performance and systemic risk sensitivity of Chinese listed companies. From the…

Abstract

Purpose

This paper aims to examine the relationship between environmental, social and governance (ESG) performance and systemic risk sensitivity of Chinese listed companies. From the consumer loyalty and investor structure perspectives, the relationship between ESG performance and systemic risk sensitivity is analyzed.

Design/methodology/approach

Since Morgan Stanley Capital International (MSCI) ESG officially began to analyze and track China A-shares from 2018, 275 listed companies in the SynTao Green ESG testing list for 2015–2021 are selected as the initial model. To measure the systematic risk sensitivity, this study uses the beta coefficient, from capital asset pricing model (CPAM), employing statistics and data (STATA) software.

Findings

The study reveals that high ESG rating companies have high corresponding consumer loyalty and healthy trading structure of institutional investors, thereby the systemic risk sensitivity is lower. This paper reveals that companies with high ESG rating are significantly less sensitive to systemic risk than those with low ESG rating. At the same time, ESG has a weaker impact on the systemic risk of high-cap companies than low-cap companies.

Practical implications

The study helps the companies understand the influence of market value on the relationship between ESG performance and systemic risk sensitivity. Moreover, this paper explains explicitly why ESG performance insulates a firm’s stock from market downturns with the lens of consumer loyalty theory and investor structure theory.

Originality/value

The paper provides new insights on the company’s ESG performance that significantly affects the company’s systemic risk sensitivity.

Details

Management of Environmental Quality: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1477-7835

Keywords

Case study
Publication date: 10 October 2023

Arvind Sahay and Tara Tiwari

HSBC (The Hong Kong and Shanghai Banking Corporation Limited) Holdings Plc. is a part of various trade finance consortia which aimed to digitise the traditional paper-based trade…

Abstract

HSBC (The Hong Kong and Shanghai Banking Corporation Limited) Holdings Plc. is a part of various trade finance consortia which aimed to digitise the traditional paper-based trade finance process. It had successfully executed multiple trade finance pilots using a blockchain based platform Voltron and was launching its Contour blockchain trade finance platform as a service to its clients. The trade finance market was estimated to be USD 18 trillion on an annual basis and HSBC had a 12% share in the trade finance transactions worldwide. This case revolves around the challenges facing banks/consortia while porting the traditional trade finance process to the blockchain based system. The crux is how the banks form the consortia, implement blockchain and facilitate trading globally given that it is a new technology and will require bringing all the stakeholders involved in the trade finance value chain to the blockchain based platform. HSBC is facing some decision questions on the formation, governance and management of the consortium, on the interoperability between consortia and on how to price its services to its customers.

Details

Indian Institute of Management Ahmedabad, vol. no.
Type: Case Study
ISSN: 2633-3260
Published by: Indian Institute of Management, Ahmedabad

Keywords

1 – 8 of 8