Search results
1 – 4 of 4Marco Minciullo and Matteo Pedrini
This article aims at investigating knowledge transfer and exchange (KTE) between founder firms and corporate foundations (CFs), looking at mechanisms able to enhance CFs’…
Abstract
Purpose
This article aims at investigating knowledge transfer and exchange (KTE) between founder firms and corporate foundations (CFs), looking at mechanisms able to enhance CFs’ orientation of effectiveness.
Methodology/approach
We analyze 50 questionnaires collected through a survey of CFs based in Italy (redemption of 42.7% of the total). We use a number of regressions to verify the change of explained variance moving from a basic model with control variables (enter method) and a model including KTE mechanisms with an impact on orientation to effectiveness (stepwise method).
Findings
The analysis produced a model which underlines the influence of knowledge transfer mechanisms in stimulating orientation to effectiveness. The adoption of specific knowledge transfer mechanisms by founder firms can have a significant influence on how CFs manage their effectiveness. Three mechanisms emerge from the study as elements with a positive impact.
Practical implication
The results apply to nonprofit or public bodies, especially if we consider partnerships or organizational networks. The individuated criteria for selecting a positive KTE could drive similar choices of other nonprofit bodies.
Social implication
The study individuates a set of practices that are potentially able to influence positively the orientation to effectiveness of CFs, and the capacity to perform their activities and respond to social needs more successfully.
Originality/value
This research considers CFs as founder firms’ subsidiaries, with a growing strategic importance. This research reveals how KTE mechanisms can foster the development of orientation to effectiveness if implying interaction, firms’ commitment, autonomy, and alignment with the firms’ strategy and CFs’ purposes.
Details
Keywords
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details
Keywords
The Nationwide Suspicious Activity Reporting Initiative (NSI) is the focal point of the Information Sharing Environment (ISE), a radical reformulation of policies governing…
Abstract
The Nationwide Suspicious Activity Reporting Initiative (NSI) is the focal point of the Information Sharing Environment (ISE), a radical reformulation of policies governing government intelligence activities within US borders. In the wake of the September 11th attacks, long-standing informational norms for the production, use, and circulation of domestic intelligence records containing personal information are being replaced with far less restrictive norms, altering a status quo that had been in effect since mid-1970s. Although the NSI represents an unprecedented expansion of human resources dedicated to the collection and production of domestic intelligence, it is not well known in privacy advocacy community. This chapter considers these and other terms in the context of relevant US law and policy, including the Privacy Act of 1974, the E-Government Act of 2002, Executive Order 12333, and 28 CFR Part 23. In addition to describing the federal (ISE-SAR) standard, the chapter examines the critical role of guidance in the logic of suspicious activity report (SAR) production, and the problematic role finished ISE-SARs seem to play in the matrix of federal and state-level watch lists. The program, if not properly regulated, could pose a considerable threat to personal privacy and the life chances and self-determination of all US persons. The chapter considers this threat in terms of Nissenbaum's (2010) “contextual integrity,” a theory of context-relative informational norms.
Details