Search results

1 – 10 of over 150000
To view the access options for this content please click here
Article
Publication date: 1 June 1993

An overview of all the elements that go into formulating a businessstrategy – including received wisdom from the gurus, vision andvalues, ideas on growth, forecasting…

Abstract

An overview of all the elements that go into formulating a business strategy – including received wisdom from the gurus, vision and values, ideas on growth, forecasting, information, objectives, audits, customers, markets, competition, finances, structure, training – with the focus on how to make it happen. Directed at practising managers whose task this is. Making strategic plans is the easy bit; enacting them requires changing things, getting things done through people. Discusses learning, training and development, culture, quality, with the emphasis on real people in real businesses. Underpinned by the philosophy of “action learning”.

Details

Management Decision, vol. 31 no. 6
Type: Research Article
ISSN: 0025-1747

Keywords

To view the access options for this content please click here
Article
Publication date: 1 August 2002

Anna S. Mattila and Jochen Wirtz

Previous research provides evidence for a conceptual distinction between self‐assessed and objective knowledge, and relatively little is known about the relationship…

Abstract

Previous research provides evidence for a conceptual distinction between self‐assessed and objective knowledge, and relatively little is known about the relationship between knowledge and information search. The current research provides empirical evidence for differentiating the two knowledge types. Furthermore, it suggests that the relative effects of the two types of knowledge on pre‐purchase information search depend on the type of information source. Consistent with prior research, this study shows that self‐assessed knowledge is strongly linked to the consumer’s use of personal sources of information, including internal memory searches and word‐of‐mouth communication. Conversely, objective knowledge seems to have a positive impact on the consumer’s motivation to seek external information (e.g. newspaper articles, mass media sources) about the service provider. Managerial implications for professional service providers are discussed

Details

International Journal of Service Industry Management, vol. 13 no. 3
Type: Research Article
ISSN: 0956-4233

Keywords

To view the access options for this content please click here
Article
Publication date: 18 July 2008

Qingxiong Ma, Allen C. Johnston and J. Michael Pearson

As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have…

Abstract

Purpose

As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and developed many different information security standards and guidelines. Building on these previous efforts, the purpose of this study is to put forth a framework for ISM.

Design/methodology/approach

This framework is derived from the development of an a priori set of objectives and practices as suggested by literature, standards, and reports found in academia and practice; the refinement of these objectives and practices based on survey data obtained from 354 certified information security professionals; and the examination of interrelationships between the objectives and practices.

Findings

The empirical analysis suggests: four factors (information integrity, confidentiality, accountability, and availability) serve as critical information security objectives; most of the security areas and items covered under ISO 17799 are valid with one new area – “external” or “inter‐organizational information security”; and for moderately information‐sensitive organizations, “confidentiality” has the highest correlation with ISM practices; for highly information‐sensitive organizations, “confidentiality”, “accountability”, and “integrity” are the major ISM objectives. The most important contributor to information security objectives is “access control”.

Research limitations/implications

This study contributes to the domain of information security research by developing a parsimonious set of security objectives and practices grounded in the findings of previous works in academia and practical literature.

Practical implications

These findings provide insights for business managers and information security professionals attempting to implement ISM programs within their respective organizational settings.

Originality/value

This paper fulfills a need in the information security community for a parsimonious set of objectives and practices based on the many guidelines and standards available in both academia and practice.

Details

Information Management & Computer Security, vol. 16 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 1996

John M. Artz

Explains that a corporate Web application is a corporate information system that uses World Wide Web technology to provide easy access to a wide variety of corporate…

Abstract

Explains that a corporate Web application is a corporate information system that uses World Wide Web technology to provide easy access to a wide variety of corporate information resources for internal and external users on a wide variety of platforms in geographically distributed locations. Corporate Web applications go beyond corporate web pages in that they serve a specific set of business objectives beyond providing a presence on the World Wide Web. As with all types of information systems, there are two approaches to Web application development: top‐down and evolutionary. Evolutionary development is exploratory and appropriate for learning about the technology and the application domain. However, evolutionary development leads to complex applications that are difficult to use and difficult to maintain. Top‐down development organizes the complexity of these applications and produces applications that can: meet business objectives; be developed by a programming team; and be maintained by people other than the developers. Provides a methodology for top‐down development of corporate Web applications.

Details

Internet Research, vol. 6 no. 2/3
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 14 February 2019

David Lewis Coss and Gurpreet Dhillon

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across…

Abstract

Purpose

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy values with respect to cloud computing to define cloud privacy objectives.

Design/methodology/approach

For the purpose of this study, the authors adopted Keeney’s (1994) value-focused thinking approach to identify privacy objectives with respect to cloud computing.

Findings

The results of this study identified the following six fundamental cloud privacy objectives: to increase trust with cloud provider, to maximize identity management controls, to maximize responsibility of information stewardship, to maximize individual’s understanding of cloud service functionality, to maximize protection of rights to privacy, and to maintain the integrity of data.

Research limitations/implications

One limitation is generalizability of the cloud privacy objectives, and the second is research bias. As this study focused on cloud privacy, the authors felt that the research participants’ increased knowledge of technology usage, including that of cloud technology, was a benefit that outweighed risks associated with not having a random selection of the general population. The newness and unique qualities of privacy issues in cloud computing are better fitted to a qualitative study where issues can emerge naturally through a holistic approach opposed to trying to force fit an existing set of variables or constructs into the context of privacy and cloud computing.

Practical implications

The findings of this research study can be used to assist management in the process of formulating a cloud privacy policy, develop cloud privacy evaluation criteria as well as assist auditors in developing their privacy audit work plans.

Originality/value

Currently, there is little to no guidance in the literature or in practice as to what organizations need to do to ensure they protect their stakeholders privacy in a cloud computing environment. This study works at closing this knowledge gap by identifying cloud privacy objectives.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 6 September 2021

Stella Banyana Mosimege and Tyanai Masiya

Many developing countries such as South Africa have been introducing measurement of results to improve public service delivery. The practice of development of performance…

Abstract

Purpose

Many developing countries such as South Africa have been introducing measurement of results to improve public service delivery. The practice of development of performance measures in the public service emanates from pressure exerted by citizens who are calling for more efficiency and effectiveness in delivering services. This article examines the implementation of the audit of pre-determined objectives at the Department of Basic Education (DBE).

Design/methodology/approach

This study is based on a qualitative case study approach. Secondary sources of data were used in order to analyse the DBE's challenges in managing performance information. Key secondary documents used include the AGSA annual audit reports as well as the DBE 2010/11–2014/15 Strategic Plan and Annual Performance Plans (APP) that provide the pre-determined objectives selected by the Department to measure performance for the five-year period.

Findings

The findings indicate that there are shortcomings in the processes of managing performance information. Based on the findings, it is incumbent upon the senior management of the DBE to strive towards understanding and improving their oversight roles and responsibilities in the management of pre-determined objectives.

Originality/value

The study generates a deeper understanding of what has been happening when pre-determined objectives were developed, reported or assessed in the DBE. This will assist the Department and similar public institutions to make further improvements in order to achieve pre-determined objectives.

Details

International Journal of Productivity and Performance Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0401

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 1999

Clifton P. Campbell

Instructional materials enhance the teaching/learning process by exhibiting information necessary to acquire knowledge and skills. Focuses on printed forms of…

Abstract

Instructional materials enhance the teaching/learning process by exhibiting information necessary to acquire knowledge and skills. Focuses on printed forms of instructional materials and provides detailed information, including examples, on five types of job performance aids, three types of instruction sheets, and two types of modules. Checklists of considerations that affect the quality of finished products are also provided. Job performance aids (JPAs)provide procedural or factual guidance in the performance of tasks. They store essential details in a variety of functional forms for use just before or during task performance. Research shows that JPAs are a cost‐effective supplement or alternative to training. They reduce the time needed to master task performance and facilitate the transfer of learning from the training setting to the job. Instruction sheets assure that all trainees have the same complete and accurate information for performing practical work and for completing assignments. These sheets also help manage large groups of trainees with diverse abilities who are working simultaneously at several different tasks. Modules are carefully structured documents which facilitate self‐directed and self‐paced learning. While their components may vary, modules typically include learning objectives, an introduction, instructional content, directions, learning activities, and test questions with feedback answers. With modules, trainees assume personal responsibility for their progress. Regardless of the care used in their preparation, all types of instructional materials must be evaluated prior to general use. Presents a comprehensive quality control procedure for confirming effectiveness and value. This was prepared to enhance both formal classroom instruction and individual study. Figures, tables, checklists, appendices, and a glossary of keywords and terms, supplement the text in explaining the content.

Details

Journal of European Industrial Training, vol. 23 no. 2
Type: Research Article
ISSN: 0309-0590

Keywords

To view the access options for this content please click here
Article
Publication date: 2 February 2015

Hyo-Jin Jeong and Dong-Mo Koo

The purpose of this paper is to propose a model to test whether the combined effects of valence and objectivity/subjectivity of online review have an effect on consumer…

Abstract

Purpose

The purpose of this paper is to propose a model to test whether the combined effects of valence and objectivity/subjectivity of online review have an effect on consumer judgment and whether e-WOM platforms have a moderating effect.

Design/methodology/approach

In total, 480 respondents participated in online experiments with a four (positive+objective, positive+subjective, negative+objective, and negative+subjective online review) by two (marketer-generated vs consumer-generated brand community web sites) between subject design.

Findings

The experiment showed that: an objective negative online review was rated higher in terms of message usefulness compared to the other types of online reviews; positive reviews, whether they are objective or subjective, were rated higher in terms of attitudes toward and intention to purchase the reviewed product, and the effects of online reviews moderated by e-WOM platforms on consumer judgment were supported.

Research limitations/implications

The present study, based on an established theoretical foundation, will help the research community to gain a deeper understanding of the combined effects of online review valence and attributes on consumer judgment and whether user-generated web community is better for consumers to consult product experience.

Practical implications

The findings of this study can provide interested firms with useful strategies and tactics to enhance users’ acceptance of online reviews in terms of who operates the web sites.

Originality/value

With increasing use of consumers’ online reviews, the present study proposed and tested a comprehensive research model integrating both the valence and objectivity/subjectivity of online review, which has rarely been addressed in previous research.

Details

Internet Research, vol. 25 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 8 June 2015

Sushma Mishra

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational…

Abstract

Purpose

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security governance (OSG) objectives pose significant challenges for organizations considering the ever-increasing vulnerability from lack of or misuse of appropriate controls. In recent years, there have been several cases of colossal losses to businesses due to inadequate security governance measure. In many cases, organizations do not even know as to what their ISG objectives might be. Following an extensive empirical study, this paper proposes 6 fundamental and 17 means objectives for designing security governance. The objectives were developed from individual values of information technology and security executives across a wide range of firms. The study comprised 52 interview respondents across 9 firms, which resulted in 23 OSG objectives. Theoretically, the study was grounded in Catton’s (1959) value theory and Keeney’s (1992) value-focused thinking. The objectives provide a useful basis for strategic planning for information security governance.

Design/methodology/approach

This research is grounded in value-focused thinking methodology. Step 1: develop a comprehensive list of personal values underlying the problem being explored. The researcher undertakes extensive interviews, using relevant probes, to elicit underlying values of respondents. Step 2: change the values enlisted to a common form and convert them into objectives. The data collected in Step 1 is collated and presented in a common form, which enables cross-comparison and easy interpretation. Step 3: classify the objectives as means and fundamental for the decision context. Objectives are clustered into groups and then classified into fundamental and means.

Findings

This study uses a value-focused approach to develop OSG objectives. Incorporating individual values in developing governance objectives would facilitate alignment of individual and organizational values about OSG. This study proposes 6 fundamental and 17 means objectives for OSG. The study provides a comprehensive list of OSG that is rooted in values of stakeholders in an organization.

Originality/value

The main contributions study can be classified in two categories. First, it represents a collective set of OSG objectives which touch upon technical, formal, informal, moral and ethical dimensions of governance. This is a unique, synthesized and cohesive framework for OSG, which incorporates several aspects of OSG into one platform, thus allowing the development of a comprehensive security management program. Second, some of the objectives developed in this research (“establish corporate control strategy”, “establish punitive structure”, “establish clear control development process”, “ensure formal control assessment functionality” and “maximize group cohesiveness”) have not been emphasized enough in security governance literature.

Details

Information & Computer Security, vol. 23 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Book part
Publication date: 20 July 2005

Lilia Pavlovsky

It has been suggested that “space and artifacts constitute systems of communication which organizations build up within themselves” (Gagliardi, 1992a, b, p. vi) and…

Abstract

It has been suggested that “space and artifacts constitute systems of communication which organizations build up within themselves” (Gagliardi, 1992a, b, p. vi) and reflect the cultural life within that organization. This is a study of how the “landscape” of a public library (“Library X”), as an information retrieval system, relates to the values of the people who created it. The efforts here are geared towards understanding the physical instantiation of institutional culture and, more specifically, institutional values as they are reflected through the artifact.

Details

Advances in Library Administration and Organization
Type: Book
ISBN: 978-1-84950-338-9

1 – 10 of over 150000