Search results

1 – 10 of 13
Open Access
Article
Publication date: 10 April 2024

Fredrik Svärdsten and Kristina Tamm Hallström

The aim of this paper is to contribute to knowledge about the diversity of credibility arrangements in new audit spaces “in the margins” of auditing and the implications of such…

Abstract

Purpose

The aim of this paper is to contribute to knowledge about the diversity of credibility arrangements in new audit spaces “in the margins” of auditing and the implications of such arrangements.

Design/methodology/approach

The paper is based on an in-depth qualitative study of the lesbian, gay, bisexual, transgender, queer and intersex (LGBTQI) rights certification run by the Swedish Federation for Lesbian, Gay, Bisexual, Transgender, Queer and Intersex Rights (RFSL) during its first decade of operation. We have interviewed employees and studied documents at the certification units within the RFSL. We have also interviewed certified organizations.

Findings

We highlight two features that explain the unusual credibility arrangements in this audit practice: the role of beneficiaries in the organizational arrangements chosen and the role of responsibility as an organizing value with consequences for responsibility allocation in this certification. These features make it possible for the RFSL to act as a credible auditor even though it deviates from common arrangements for credible audits.

Originality/value

The RFSL certification is different in several ways. First, the RFSL acts as both a trainer and an auditor. Second, the trainers/auditors at the RFSL have no accreditation to guarantee their credibility. Third, the RFSL decides for itself what standards should apply for the certification and adapts these standards to the operation being audited. Therefore, this case provides a good opportunity to study alternative credibility arrangements in the margins of auditing as well as their justifications.

Details

Accounting, Auditing & Accountability Journal, vol. 37 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 1 September 2023

Saima Kazmi, Mark Heisten and Burton St John III

This study is concerned with the dynamics of the internal communications at Netflix following the release of The Closer and the public debate that followed, testing Netflix's…

Abstract

Purpose

This study is concerned with the dynamics of the internal communications at Netflix following the release of The Closer and the public debate that followed, testing Netflix's long-standing reputation for promoting diverse content and supporting a progressive organizational culture.

Design/methodology/approach

Using the circuit of culture (CoC) as a theoretical framework, this study applies a case study approach to analyze internal communication and strategic public relations in addressing this crisis.

Findings

This study's findings illustrate that by failing to interpret two of the five moments of the CoC, production and identity, Netflix negated the very values that constitute its brand. These findings have implications for how public relations' long-standing focus on two-way symmetrical communication is problematic, especially in the workplace.

Originality/value

The findings situate how the exertion of power within an organization, particularly in moments of identity and production, problematize the role of two-way symmetrical communication within an organization in crisis.

Details

Corporate Communications: An International Journal, vol. 29 no. 3
Type: Research Article
ISSN: 1356-3289

Keywords

Article
Publication date: 19 April 2024

Frank Gregory Cabano, Mengge Li and Fernando R. Jiménez

This paper aims to examine how and why consumers respond to chief executive officer (CEO) activism on social media. The authors developed a conceptual model that proposes…

Abstract

Purpose

This paper aims to examine how and why consumers respond to chief executive officer (CEO) activism on social media. The authors developed a conceptual model that proposes impression management as a mechanism for consumer response to CEO activism.

Design/methodology/approach

In Study 1a, the authors examined 83,259 tweets from 90 CEOs and compared consumer responses between controversial and noncontroversial tweets. In Study 1b, the authors replicated the analysis, using a machine-learning topic modeling approach. In Studies 2 and 3, the authors used experimental designs to test the theoretical mechanism.

Findings

On average, consumers tend to respond more to CEO posts dealing with noncontroversial issues. Consumers’ relative reluctance to like and share controversial posts is motivated by fear of rejection. However, CEO fame reverses this effect. Consumers are more likely to engage in controversial activist threads by popular CEOs. This effect holds for consumers high (vs low) in public self-consciousness. CEO fame serves as a “shield” behind which consumers protect their online image.

Research limitations/implications

The study focused on Twitter (aka “X”) in the USA. Future research may replicate the study in other social media platforms and countries. The authors introduce “shielding” – liking and sharing content authored by a recognizable source – as a tactic for impression management on social media.

Practical implications

Famous CEOs should speak up about controversial issues on social media because their voice helps consumers engage more in such conversations.

Originality/value

This paper offers a theoretical framework to understand consumer reactions to CEO activism.

Details

European Journal of Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0309-0566

Keywords

Expert briefing
Publication date: 23 April 2024

The military government has in recent months lost considerable territory to its battlefield opponents, including ethnic armed organisations (EAOs) that have long fought the…

Article
Publication date: 23 April 2024

Margaret Anne Murray and April Marvin

The Astroworld concert tragedy is used as an example of crisis (mis)management and the potential utility of the 4R model. Although the 4R model has been implemented in high-risk…

Abstract

Purpose

The Astroworld concert tragedy is used as an example of crisis (mis)management and the potential utility of the 4R model. Although the 4R model has been implemented in high-risk emergency management situations, it is useful in the PR field because of its actionable approach, creating a way for practitioners to prepare for and manage crisis situations.

Design/methodology/approach

This is an analysis of the crisis that occurred at Astroworld, spanning preparation, day-of events, casualties and enduring reputational impact. The paper applies the 4R method to the Astroworld tragedy to show how it could have lessened or even prevented the tragedy. Finally, the SCCT model is used to explain why the official post-crisis statements were ineffective.

Findings

Social media has heightened the importance of a quick and effective organizational response to risk and crisis situations because poor responses can go viral quickly. However, social media also provides intelligence and crowd sourced information that can inform PR practitioners of emerging crisis scenarios. It is also an underutilized tool for two-way communication during crises.

Practical implications

The 4R approach is beneficial to general practitioners as it simplifies crisis best-practices, something essential for quick action. As our world changes and becomes less predictable, practitioners must have a clear plan to protect their organizations and the public surrounding them. This approach includes reduction, readiness, response and recovery, which are all essential in crisis communication.

Originality/value

The 4R method has not been explored or applied in the PR field. This paper highlights how the model has been utilized in the emergency management field and illustrates the way 4R can serve the PR field.

Details

Corporate Communications: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1356-3289

Keywords

Article
Publication date: 17 April 2024

Dirk H.R. Spennemann, Jessica Biles, Lachlan Brown, Matthew F. Ireland, Laura Longmore, Clare L. Singh, Anthony Wallis and Catherine Ward

The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi…

Abstract

Purpose

The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi can be used to obtain guidance on how to avoid detection when commissioning and submitting contract-written assignments and how workable the offered solutions are.

Design/methodology/approach

Although ChatGPT is programmed not to provide answers that are unethical or that may cause harm to people, ChatGPT’s can be prompted to answer with inverted moral valence, thereby supplying unethical answers. The authors tasked ChatGPT to generate 30 essays that discussed the benefits of submitting contract-written undergraduate assignments and outline the best ways of avoiding detection. The authors scored the likelihood that ChatGPT’s suggestions would be successful in avoiding detection by markers when submitting contract-written work.

Findings

While the majority of suggested strategies had a low chance of escaping detection, recommendations related to obscuring plagiarism and content blending as well as techniques related to distraction have a higher probability of remaining undetected. The authors conclude that ChatGPT can be used with success as a brainstorming tool to provide cheating advice, but that its success depends on the vigilance of the assignment markers and the cheating student’s ability to distinguish between genuinely viable options and those that appear to be workable but are not.

Originality/value

This paper is a novel application of making ChatGPT answer with inverted moral valence, simulating queries by students who may be intent on escaping detection when committing academic misconduct.

Details

Interactive Technology and Smart Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-5659

Keywords

Book part
Publication date: 30 April 2024

Lilith Green and Carol Rambo

Gender-diverse people experience unique cultural and interpersonal stigma in mainstream society and sometimes within their own communities; they face allegations of inauthenticity…

Abstract

Gender-diverse people experience unique cultural and interpersonal stigma in mainstream society and sometimes within their own communities; they face allegations of inauthenticity based on their nonconformity to either cisnormative or transnormative gender regimes. Based on 21 in-depth life history interviews, we unveil the intricate interactional process of negotiating identity and authenticity in the biographical work of gender-diverse individuals. In this study, gender-diverse people engaged in a “gender audit” with their gender-diverse interviewer. Gender audits yield verbal performances of gender with oneself and others. Ambiguity was “accounted for” or “embraced and created” in their biographical work to organize their life stories and undermine binary essentialism – a discourse that was “discursively constraining.” Gender audits took place in participants' day-to-day lives, either through self-audits, questioning from others, or both. In the final analysis, we assert that we all engage in gender auditing. Gender audits are intersubjective sites of domination, subordination, resistance, and social change. Gender diversity, then, can be viewed as a product of gender in flux.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Abstract

Details

Black Expression and White Generosity
Type: Book
ISBN: 978-1-80382-758-2

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Book part
Publication date: 19 April 2024

Knut S. Vikør

While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some…

Abstract

While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some entities, like Egypt, did have a clear political and cultural identity before colonialism, others, like Algeria, did not. This chapter discusses the four states of the Maghreb: Morocco, Algeria, Tunisia and Libya, through the perspective of “country creation” going into and coming out of colonial rule. We can see here two “models” of fairly similar types of historical development, one showing a gradual process through a protectorate period to relatively stable modern nations, another through violent conquest and direct colonization ending in violent liberation and military and wealthy but fragile states. The article asks whether these models for the history of country creation and the presence or absence of pre-colonial identities can help explain the modern history and nature of these states in the Arab Spring and the years thereafter. Then, a more tentative attempt is made to apply these models to two countries of the Arab east, Syria and Iraq. While local variations ensure that no model can be transferred directly, it can show the importance of studying the historical factors that go into the transition from geographical region to a country with people that can form the basis of a nation.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

1 – 10 of 13