Search results1 – 10 of 247
Utilizes “critical incident analysis” to uncoverbusiness traveller attitudes to current changes in business travelpolicy. Examines the importance of flight and hotel…
Utilizes “critical incident analysis” to uncover business traveller attitudes to current changes in business travel policy. Examines the importance of flight and hotel arrangements as part of the motivation and satisfaction of the business traveller. The findings provide evidence of how the self‐esteem of travellers is affected. Also indicates that a “good hotel” and additional spare time are important factors which provide for higher levels of satisfaction.
This chapter will begin by exploring the importance for people living with dementia of maintaining a sense of self or ‘personhood’, and how this is linked directly to…
This chapter will begin by exploring the importance for people living with dementia of maintaining a sense of self or ‘personhood’, and how this is linked directly to wellbeing. It will chart how the initial pilot projects were developed to embrace older people living with a dementia diagnosis, and how we teamed up with different partners in Brazil and on Merseyside, showing how the methodology outlined in the toolkit can be used to foster this sense of self or ‘personhood’. In both geographical locations it proved vital to establish contacts with enthusiastic partners and to work closely with occupational therapists and/or nursing home staff. On Merseyside we also benefitted from the expertise of a local community cinema which had extensive experience of running dementia-friendly film screenings. Finally, drawing on concrete results from the use of the toolkit's methodology in a recent project that Lisa conducted in Brazil, this chapter will present some conclusions about how music and film can help carers connect with the person living with dementia, and be used as a powerful tool for restoring a sense of personhood, thus increasing a sense of wellbeing and improving the quality of care.
The purpose of this study is to examine how the pressures from stakeholders located in company's country of origin and level of internationalization of the company…
The purpose of this study is to examine how the pressures from stakeholders located in company's country of origin and level of internationalization of the company influence the implementation of socially responsible supply chain management (SR-SCM) practices.
To assess this level of influence, an SR-SCM performance index is developed by building on existing theoretical frameworks and using secondary data from ThomsonReuters’ WorldScope and ASSET4 databases to capture responsible supply chain actions categorized in communication, compliance and supplier development strategies. The analysis is based on 1,252 international companies from diverse countries and sectors between 2007 and 2016.
The effectiveness of stakeholder pressures in facilitating the adoption of socially responsible practices varies greatly with regard to the strategic element of SR-SCM and the type stakeholders considered. Companies that are more internationalized tend to adopt a greater number of SR-SCM practices, whereas home country stakeholders are of diminishing relevance with the increasing internationalization of a company.
Governments in companies’ countries of origin should ensure that social issues in supply chains are adequately covered by regulations. Ideally, laws should not only cover firms’ domestic operations but also their global activities.
Citizens should be given the opportunities to raise their voice and publicly express their disagreement with business misconduct and non-compliance. Apart from that, the role of workers’ associations and investors in the social sustainability debate should be strengthened.
This study contributes to SR-SCM theory development by operationalizing existing conceptual frameworks, showing how domestic stakeholders shape SR-SCM performance and analyzing whether the influence of certain stakeholder groups diminishes or increases when a company is more globally-oriented in its operations.
Pebble Technology Corporation (Pebble) was an early entrant into the smartwatch industry. Pebble’s Founder, Eric Migicovsky, began thinking about creating a smartwatch in…
Pebble Technology Corporation (Pebble) was an early entrant into the smartwatch industry. Pebble’s Founder, Eric Migicovsky, began thinking about creating a smartwatch in 2008 while still an undergraduate engineering student. After selling about 1,500 prototype watches, he was accepted into Silicon Valley’s prestigious Y Combinator business start-up program. Finding it difficult to attract investors, Migicovsky launched a crowdfunding campaign that raised a record-breaking $10.27m on Kickstarter. The case concludes shortly after Apple’s unveiling of its soon-to-be-released Apple Watch. The case provides an opportunity to evaluate Pebble’s various strategic options at the time of Apple’s announcement.
The authors observed over 30 h of video and audio recordings of speeches, interviews and other events involving Pebble’s founder, other Pebble executives, investors and competitors. These recordings are all publicly available. Whenever possible, the authors also reviewed the Twitter feeds, Facebook sites and personal websites of Pebble’s top executives over time. Similarly, the authors followed Pebble’s official website, corporate blog and Kickstarter campaign websites. The authors also drew from numerous media reports. Due to the public nature of the data, no company release is provided nor has any information been disguised in any way.
Relevant courses and levels
The case is designed for both undergraduate and graduate students for courses in strategic management.
Prior to 9/11 criminologists paid relatively little attention to the study of terrorism. In 2004, the authors argued that criminologists had much to offer to advance our…
Prior to 9/11 criminologists paid relatively little attention to the study of terrorism. In 2004, the authors argued that criminologists had much to offer to advance our understanding of terrorism and urged scholars to conduct such research. This chapter accounts the theoretical and methodological contributions by the field of criminology to terrorist research.
This chapter demonstrates how the study of terrorism has begun to get more attention in various professional settings of criminology. It then reviews applications of criminological theory and methodological advances by criminologist to terrorism research. It ends by describing efforts to build terrorism event databases.
Terrorism-related research has become common at both of the major criminological professional association meetings. Funding for research on terrorism, especially a large program on domestic extremism sponsored by the National Institute of Justice, has contributed to a growing research literature. Academic courses on terrorism have also been added to criminology programs around the country. While the criminological literature on terrorism has expanded greatly more progress has been made in applying criminological methods than theories to the study of terrorism. To date the most common theoretical perspective from criminology applied to terrorism studies has been rational choice and deterrence.
This chapter takes inventory on how criminology has contributed to terrorism research. It serves to validate current efforts while encouraging continued progress.
This paper develops a theoretical perspective on gender and information technology (IT) by examining socio‐cultural influences on women who are members of the information…
This paper develops a theoretical perspective on gender and information technology (IT) by examining socio‐cultural influences on women who are members of the information technology profession in Australia and New Zealand. In‐depth interviews with both practitioners and academics give evidence of a range of socio‐cultural influences on the professional development and working lives of women IT professionals. The paper rejects the essentialist view of women and their relationship to IT that has been put forth in the information systems literature arguing, instead, the primacy of societal and structural influences. The particular contribution of this paper is a theoretical perspective of individual differences which is presented to characterize the way individual women respond in a range of specific ways to the interplay between individual characteristics and environmental influences. This perspective contributes to a better understanding of women’s involvement in the IT sector and suggests areas for proactive policy response.