Search results
1 – 10 of over 1000Merel T. Feenstra-Verschure, Dorien Kooij, Charissa Freese, Mandy Van der Velde and Evgenia I. Lysova
Many employees experience a “locked at the job” situation and are not satisfied with their current job and at the same time, perceive limited job opportunities. This study…
Abstract
Purpose
Many employees experience a “locked at the job” situation and are not satisfied with their current job and at the same time, perceive limited job opportunities. This study examines the process that individuals who experience locked at the job go through and the coping mechanisms individuals use.
Design/methodology/approach
A total of Thirty in-depth interviews were conducted. Of the participants, 12 were locked at the job at the time of the interview and 18 participants experienced locked at the job in the past.
Findings
The authors identified three phases. Regarding the first phase “becoming locked at the job,” various individual and work environmental causes could be identified. In the second phase “being locked at the job,” the authors identified three levels: low-, medium- and high-locked individuals. Emotion-regulated coping strategies were mainly reappraisal, positive distraction and behavioral avoidance. The third phase “ending locked at the job” revealed that a locked at the job situation often comes to an end either by taking control independently or by external force. Especially, the role of the direct supervisor was decisive during the entire locked at the job process.
Practical implications
In the practical implications, the authors suggest to discuss locked at the job throughout the entire workplace and create an open culture acknowledging that individuals may find themselves in such a situation.
Originality/value
To date, no qualitative study has been conducted before from this perspective. Therefore, it is extremely important to look at this relatively unknown phenomenon from this perspective.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Abstract
Details
Keywords
Bart Kamp and Iñigo Ruiz de Apodaca
This paper aims to study whether international niche market leaders (INMLs) gained their leading position as early mover or diligent follower, and assess whether they leveraged…
Abstract
Purpose
This paper aims to study whether international niche market leaders (INMLs) gained their leading position as early mover or diligent follower, and assess whether they leveraged hard or soft forms of technological, supply pre-emption and customer lock-in advantage mechanisms.
Design/methodology/approach
Empirical material stems from qualitative and quantitative data on a sample of 20 niche companies from the Basque Country (Spain) that operate in business to business markets.
Findings
The sample predominantly followed an early entrant strategy and applied soft measures to reach niche market leadership.
Research limitations/implications
Findings imply that early entering fosters conquering leadership in niche markets, that pioneer advantage is easier to sustain in niches than in mainstream markets, and that soft measures are more effective in niche markets than in larger markets. A limitation to our findings is that they follow from explorative research on a sample of firms from a reduced geographic setting.
Practical implications
Hidden champions and INMLs can be important sources of technological progress and economic value for the localities that host them. Therefore, despite their traditional low profile and the fact that they are not always the largest firms around, policymakers may want to pay more attention to this type of companies.
Originality/value
Tot he best of the authors’ knowledge, this is the first paper to research entry timing and its outcome for market leadership with regard to niche players or hidden champions-type of firms. It introduces an original taxonomy to operationalize and distinguish between hard and soft measures to leverage advantage mechanisms related to market entry timing.
Details
Keywords
Jasper Hessel Heslinga, Mohamad Yusuf, Janianton Damanik and Menno Stokman
The purpose of this viewpoint paper is to show practical post COVID-19 observations as lessons for the future of tourism destination management and help inspire the tourism…
Abstract
Purpose
The purpose of this viewpoint paper is to show practical post COVID-19 observations as lessons for the future of tourism destination management and help inspire the tourism industry and academic community.
Design/methodology/approach
This paper is based on observations by, and discussions among, both international and Indonesian tourism experts and relate to the case of the famous UNESCO World heritage site, the Borobudur temple, in Indonesia.
Findings
As a result, the authors observed the following measures that have been taken by the local authorities; setting limits to the amount of visitors, increase the visitor area, provide guided tours only, work with price mechanism, mitigate the physical impacts of visits and involve the local community in the value chain. The paper shows that the COVID pandemic has unintentionally created urgency and an opportunity for the local authorities to deal with already ongoing and structural overtourism related issues. This demonstrated that a lockdown was needed to get out of a lock-in.
Originality/value
This paper fits in the ongoing debate on the effects of COVID-19 pandemic on the tourism sector. As it provides a practical case, the values of this paper lie in bridging the gap between conceptual contributions to the debate and practical observations. Also many links with the continuation of the overtourism debate are made.
Details
Keywords
Abstract
Details
Keywords
Haya Al-Dajani, Nupur Pavan Bang, Rodrigo Basco, Andrea Calabrò, Jeremy Chi Yeung Cheng, Eric Clinton, Joshua J. Daspit, Alfredo De Massis, Allan Discua Cruz, Lucia Garcia-Lorenzo, William B. Gartner, Olivier Germain, Silvia Gherardi, Jenny Helin, Miguel Imas, Sarah Jack, Maura McAdam, Miruna Radu-Lefebvre, Paola Rovelli, Malin Tillmar, Mariateresa Torchia, Karen Verduijn and Friederike Welter
This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and…
Abstract
Purpose
This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and becoming of entrepreneurial phenomena in business families and family firms.
Design/methodology/approach
Because of the novelty of this research stream, the authors asked 20 scholars in entrepreneurship and family business to reflect on topics, methods and issues that should be addressed to move this field forward.
Findings
Authors highlight key challenges and point to new research directions for understanding family entrepreneuring in relation to issues such as agency, processualism and context.
Originality/value
This study offers a compilation of multiple perspectives and leverage recent developments in the fields of entrepreneurship and family business to advance research on family entrepreneuring.
Details
Keywords
Garret Murray, Malin Falkeling and Shang Gao
The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
Abstract
Purpose
The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
Design/methodology/approach
A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.
Findings
Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.
Research limitations/implications
This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.
Originality/value
This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.
Details