Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 20 December 2022

Merel T. Feenstra-Verschure, Dorien Kooij, Charissa Freese, Mandy Van der Velde and Evgenia I. Lysova

Many employees experience a “locked at the job” situation and are not satisfied with their current job and at the same time, perceive limited job opportunities. This study…

2144

Abstract

Purpose

Many employees experience a “locked at the job” situation and are not satisfied with their current job and at the same time, perceive limited job opportunities. This study examines the process that individuals who experience locked at the job go through and the coping mechanisms individuals use.

Design/methodology/approach

A total of Thirty in-depth interviews were conducted. Of the participants, 12 were locked at the job at the time of the interview and 18 participants experienced locked at the job in the past.

Findings

The authors identified three phases. Regarding the first phase “becoming locked at the job,” various individual and work environmental causes could be identified. In the second phase “being locked at the job,” the authors identified three levels: low-, medium- and high-locked individuals. Emotion-regulated coping strategies were mainly reappraisal, positive distraction and behavioral avoidance. The third phase “ending locked at the job” revealed that a locked at the job situation often comes to an end either by taking control independently or by external force. Especially, the role of the direct supervisor was decisive during the entire locked at the job process.

Practical implications

In the practical implications, the authors suggest to discuss locked at the job throughout the entire workplace and create an open culture acknowledging that individuals may find themselves in such a situation.

Originality/value

To date, no qualitative study has been conducted before from this perspective. Therefore, it is extremely important to look at this relatively unknown phenomenon from this perspective.

Details

Career Development International, vol. 28 no. 1
Type: Research Article
ISSN: 1362-0436

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Article
Publication date: 1 June 2001

84

Abstract

Details

Industrial and Commercial Training, vol. 33 no. 3
Type: Research Article
ISSN: 0019-7858

Keywords

Open Access
Article
Publication date: 28 April 2023

Bart Kamp and Iñigo Ruiz de Apodaca

This paper aims to study whether international niche market leaders (INMLs) gained their leading position as early mover or diligent follower, and assess whether they leveraged…

Abstract

Purpose

This paper aims to study whether international niche market leaders (INMLs) gained their leading position as early mover or diligent follower, and assess whether they leveraged hard or soft forms of technological, supply pre-emption and customer lock-in advantage mechanisms.

Design/methodology/approach

Empirical material stems from qualitative and quantitative data on a sample of 20 niche companies from the Basque Country (Spain) that operate in business to business markets.

Findings

The sample predominantly followed an early entrant strategy and applied soft measures to reach niche market leadership.

Research limitations/implications

Findings imply that early entering fosters conquering leadership in niche markets, that pioneer advantage is easier to sustain in niches than in mainstream markets, and that soft measures are more effective in niche markets than in larger markets. A limitation to our findings is that they follow from explorative research on a sample of firms from a reduced geographic setting.

Practical implications

Hidden champions and INMLs can be important sources of technological progress and economic value for the localities that host them. Therefore, despite their traditional low profile and the fact that they are not always the largest firms around, policymakers may want to pay more attention to this type of companies.

Originality/value

Tot he best of the authors’ knowledge, this is the first paper to research entry timing and its outcome for market leadership with regard to niche players or hidden champions-type of firms. It introduces an original taxonomy to operationalize and distinguish between hard and soft measures to leverage advantage mechanisms related to market entry timing.

Details

Competitiveness Review: An International Business Journal , vol. 33 no. 6
Type: Research Article
ISSN: 1059-5422

Keywords

Content available
Article
Publication date: 1 April 2005

139

Abstract

Details

Disaster Prevention and Management: An International Journal, vol. 14 no. 2
Type: Research Article
ISSN: 0965-3562

Open Access
Article
Publication date: 28 August 2023

Jasper Hessel Heslinga, Mohamad Yusuf, Janianton Damanik and Menno Stokman

The purpose of this viewpoint paper is to show practical post COVID-19 observations as lessons for the future of tourism destination management and help inspire the tourism…

2425

Abstract

Purpose

The purpose of this viewpoint paper is to show practical post COVID-19 observations as lessons for the future of tourism destination management and help inspire the tourism industry and academic community.

Design/methodology/approach

This paper is based on observations by, and discussions among, both international and Indonesian tourism experts and relate to the case of the famous UNESCO World heritage site, the Borobudur temple, in Indonesia.

Findings

As a result, the authors observed the following measures that have been taken by the local authorities; setting limits to the amount of visitors, increase the visitor area, provide guided tours only, work with price mechanism, mitigate the physical impacts of visits and involve the local community in the value chain. The paper shows that the COVID pandemic has unintentionally created urgency and an opportunity for the local authorities to deal with already ongoing and structural overtourism related issues. This demonstrated that a lockdown was needed to get out of a lock-in.

Originality/value

This paper fits in the ongoing debate on the effects of COVID-19 pandemic on the tourism sector. As it provides a practical case, the values of this paper lie in bridging the gap between conceptual contributions to the debate and practical observations. Also many links with the continuation of the overtourism debate are made.

Details

Journal of Tourism Futures, vol. 10 no. 1
Type: Research Article
ISSN: 2055-5911

Keywords

Content available
Article
Publication date: 1 August 2005

386

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 77 no. 4
Type: Research Article
ISSN: 0002-2667

Keywords

Abstract

Purpose

This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and becoming of entrepreneurial phenomena in business families and family firms.

Design/methodology/approach

Because of the novelty of this research stream, the authors asked 20 scholars in entrepreneurship and family business to reflect on topics, methods and issues that should be addressed to move this field forward.

Findings

Authors highlight key challenges and point to new research directions for understanding family entrepreneuring in relation to issues such as agency, processualism and context.

Originality/value

This study offers a compilation of multiple perspectives and leverage recent developments in the fields of entrepreneurship and family business to advance research on family entrepreneuring.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 5 July 2024

Garret Murray, Malin Falkeling and Shang Gao

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Abstract

Purpose

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Design/methodology/approach

A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.

Findings

Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.

Research limitations/implications

This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.

Originality/value

This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 1 October 1999

18

Abstract

Details

Nutrition & Food Science, vol. 99 no. 5
Type: Research Article
ISSN: 0034-6659

1 – 10 of over 1000