Search results

1 – 4 of 4
Book part
Publication date: 19 July 2014

Marco Minciullo and Matteo Pedrini

This article aims at investigating knowledge transfer and exchange (KTE) between founder firms and corporate foundations (CFs), looking at mechanisms able to enhance CFs’…

Abstract

Purpose

This article aims at investigating knowledge transfer and exchange (KTE) between founder firms and corporate foundations (CFs), looking at mechanisms able to enhance CFs’ orientation of effectiveness.

Methodology/approach

We analyze 50 questionnaires collected through a survey of CFs based in Italy (redemption of 42.7% of the total). We use a number of regressions to verify the change of explained variance moving from a basic model with control variables (enter method) and a model including KTE mechanisms with an impact on orientation to effectiveness (stepwise method).

Findings

The analysis produced a model which underlines the influence of knowledge transfer mechanisms in stimulating orientation to effectiveness. The adoption of specific knowledge transfer mechanisms by founder firms can have a significant influence on how CFs manage their effectiveness. Three mechanisms emerge from the study as elements with a positive impact.

Practical implication

The results apply to nonprofit or public bodies, especially if we consider partnerships or organizational networks. The individuated criteria for selecting a positive KTE could drive similar choices of other nonprofit bodies.

Social implication

The study individuates a set of practices that are potentially able to influence positively the orientation to effectiveness of CFs, and the capacity to perform their activities and respond to social needs more successfully.

Originality/value

This research considers CFs as founder firms’ subsidiaries, with a growing strategic importance. This research reveals how KTE mechanisms can foster the development of orientation to effectiveness if implying interaction, firms’ commitment, autonomy, and alignment with the firms’ strategy and CFs’ purposes.

Details

Mechanisms, Roles and Consequences of Governance: Emerging Issues
Type: Book
ISBN: 978-1-78350-706-1

Keywords

Abstract

Details

Drones and the Law
Type: Book
ISBN: 978-1-80043-249-9

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Book part
Publication date: 26 January 2011

Kenneth Farrall

The Nationwide Suspicious Activity Reporting Initiative (NSI) is the focal point of the Information Sharing Environment (ISE), a radical reformulation of policies governing…

Abstract

The Nationwide Suspicious Activity Reporting Initiative (NSI) is the focal point of the Information Sharing Environment (ISE), a radical reformulation of policies governing government intelligence activities within US borders. In the wake of the September 11th attacks, long-standing informational norms for the production, use, and circulation of domestic intelligence records containing personal information are being replaced with far less restrictive norms, altering a status quo that had been in effect since mid-1970s. Although the NSI represents an unprecedented expansion of human resources dedicated to the collection and production of domestic intelligence, it is not well known in privacy advocacy community. This chapter considers these and other terms in the context of relevant US law and policy, including the Privacy Act of 1974, the E-Government Act of 2002, Executive Order 12333, and 28 CFR Part 23. In addition to describing the federal (ISE-SAR) standard, the chapter examines the critical role of guidance in the logic of suspicious activity report (SAR) production, and the problematic role finished ISE-SARs seem to play in the matrix of federal and state-level watch lists. The program, if not properly regulated, could pose a considerable threat to personal privacy and the life chances and self-determination of all US persons. The chapter considers this threat in terms of Nissenbaum's (2010) “contextual integrity,” a theory of context-relative informational norms.

Access

Year

Content type

Book part (4)
1 – 4 of 4