Search results

1 – 10 of over 3000
Article
Publication date: 1 May 1983

In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…

16536

Abstract

In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.

Details

Management Decision, vol. 21 no. 5
Type: Research Article
ISSN: 0025-1747

Keywords

Book part
Publication date: 2 May 2006

T. Oron-Gilad, J.Y.C. Chen and P.A. Hancock

When we take a top-down approach to understanding issues surrounding ROV implementation, we can employ the metaphor either literally or as a form of abstraction hierarchy …

Abstract

When we take a top-down approach to understanding issues surrounding ROV implementation, we can employ the metaphor either literally or as a form of abstraction hierarchy (Rasmussen, 1986). Literally, the military's necessity for moment-to-moment information mandates a suite of context-specific technological capabilities for sensor and effector systems. This suite includes but is not limited to systems in outer space (such as geo-synchronized orbiting platforms), high altitude atmospheric systems (such as Global Hawk) and other craft which operate less than hundreds of feet from earth down to almost ground level itself.

Details

Human Factors of Remotely Operated Vehicles
Type: Book
ISBN: 978-0-76231-247-4

Content available
Book part
Publication date: 16 August 2021

Abstract

Details

Intercultural Management in Practice
Type: Book
ISBN: 978-1-83982-827-0

Article
Publication date: 9 November 2015

Hayley Ness, Peter J.B. Hancock, Leslie Bowie, Vicki Bruce and Graham Pike

The introduction of a three-quarter-view database in the PRO-fit facial-composite system has enabled an investigation into the effects of image view in face construction. The…

Abstract

Purpose

The introduction of a three-quarter-view database in the PRO-fit facial-composite system has enabled an investigation into the effects of image view in face construction. The purpose of this paper is to examine the impact of constructing full-face and three-quarter-view composites under different encoding conditions. It also examines the potential value of three-quarter-view composites that can be generated automatically from a front-view composite. The authors also investigate whether there is an identification benefit for presenting full-face and three-quarter composites together.

Design/methodology/approach

Three experiments examine the impact of encoding conditions on composite construction and presentation of composites at the evaluation stage.

Findings

The work revealed that while standard full-face composites perform well when all views of the face have been encoded, care should be taken when a person has only seen one view. When a witness has seen a side view of a suspect, a three-quarter-view composite should be constructed. Also, it would be beneficial for a witness to construct two composites of a suspect, one in full-face view and one in a three-quarter-view, particularly when the witness has only encoded one view. No benefit emerged for use of three-quarter-view composites generated automatically.

Research limitations/implications

This is the first study to examine viewpoint in facial composite construction. While a great deal of research has examined viewpoint dependency in face recognition tasks, composite construction is a reconstruction task involving both recall and recognition. The results indicate that there is a viewpoint effect that is similar to that described in the recognition literature. However, more research is needed in this area.

Practical implications

The practical implications of this research are that it is extremely important for facial composite operators in the field (police operators) to know who will make a good likeness of the target. Research such as this which examines real-life issues is incredibly important. This research shows that if a witness has seen all views of a perpetrator’s face then standard composite construction using a full-face view will work well. However, if they have only seen a single view then it will not.

Social implications

There are obvious wider societal implications for any research which deals with eyewitness memory and the potential identification of perpetrators.

Originality/value

No research to date has formally examined the impact of viewpoint in facial-composite construction.

Details

Journal of Forensic Practice, vol. 17 no. 4
Type: Research Article
ISSN: 2050-8794

Keywords

Book part
Publication date: 17 January 2022

Peter J. Jordan, Neal M. Ashkanasy and Sandra A. Lawrence

Purpose: During turbulent social and economic times, perceptions of job insecurity can be expected to increase. In this chapter, we outline a theoretical model that links…

Abstract

Purpose: During turbulent social and economic times, perceptions of job insecurity can be expected to increase. In this chapter, we outline a theoretical model that links perceptions of job insecurity to lower affective commitment and high work-related stress, resulting in employees' engaging in poor decision-making behavior. We argue further that employees who possess individual skills of being aware of emotions and managing emotions are less susceptible to such behavior. Study Design/Methodology/Approach: We tested our model in two studies. The first study was conducted using an online sample of 217 respondents. The second study used a split administration design conducted in a single organization and used a sample of 579 employees. Findings: Our data revealed that job insecurity is linked to negative decision-making behaviors and that better emotional awareness and management skills may reduce negative decision-making behaviors. Originality/Value: Our findings support the notion of threat rigidity theory where we found that job insecurity affects how individuals make decisions. Our analysis suggests that the individual's level of emotional skills can act as a form of behavioral control that can ameliorate the effects of job insecurity on decision-making behavior. Research Limitations: Both studies had a female gender bias in our sampling frames. There is a possibility of common method variance affecting the results of Study 1, and both studies involved the use of a self-report measure of emotional skills.

Article
Publication date: 13 October 2022

Chien Wen (Tina) Yuan and Nanyi Bi

In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The…

Abstract

Purpose

In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The need to manage unavailability becomes increasingly critical when users employ several communication tools to interact with various ties. A person's availability information disclosure may depend on different social relationships and the technologies used by the person. The study contributes to the literature by drawing on privacy management theory to investigate how users practice availability management and use its deceptive form, which is sometimes called a butler lie, with various ties across different messaging applications (apps) as part of their online privacy. Relevant factors in mediated communication, including facework, common ground, and interpersonal trust, are included in the developed model.

Design/methodology/approach

The authors conducted an online survey (n = 475) to explore the relationship between one's contact with different interactants (significant others, family members, close friends, acquaintances, groups of friends, and groups of acquaintances) and one's practice of availability management and use of butler lies with these interactants at different size levels on various messaging apps.

Findings

Factors such as facework, privacy related to technology, and privacy related to social relationships affect the practice of availability management and the use of butler lies. Notably, butler lies are used most frequently with acquaintances and groups of acquaintances and least frequently with significant others. Moreover, the practice of availability management and the use of butler lies are negatively moderated by people's conversational grounding and trust.

Originality/value

The study examined the practice of cross-app availability management with diverse social ties on mobile technologies, which is a socio-informatic practice that is widely adopted in the contemporary digital landscape but on which limited scientific and theoretic research has been conducted. No research has directly investigated users' availability management across multiple apps from a relational perspective. Building on the theoretical framework of privacy management, the paper aims to bridge the gap in the relevant literature. The results of this study can serve as a reference for library professionals to develop information literacy programs according to users' availability management needs. The results also provide insights to system designers for developing messaging tools.

Article
Publication date: 1 January 1992

J.C.Y. How, C.S. Teo and H.Y. Izan

Since Ball and Brown's (1968) seminal paper on the association between unexpected changes in earnings and share prices, there have been an abundance of empirical studies that…

Abstract

Since Ball and Brown's (1968) seminal paper on the association between unexpected changes in earnings and share prices, there have been an abundance of empirical studies that suggest that announcements of earnings and dividends do indeed convey new and useful information to capital market participants. Most of these studies, however, have examined the information effects of only earnings OR dividend announcements. They did not examine whether the share market evaluates each announcement with respect to the information contained in the other.

Details

Managerial Finance, vol. 18 no. 1
Type: Research Article
ISSN: 0307-4358

Article
Publication date: 1 January 1959

THE Electronic Computer Exhibition and the B.I.M. conference have provided material for serious contemplation. Sir Harold Gillett, Lord Mayor of London, opening the Exhibition…

Abstract

THE Electronic Computer Exhibition and the B.I.M. conference have provided material for serious contemplation. Sir Harold Gillett, Lord Mayor of London, opening the Exhibition suggested that we are living in the age of the second industrial revolution. There are some who share the Lord Mayor's view and others who take the whole matter in their stride. One thing is certain, we shall be able to do more—and do it more efficiently.

Details

Work Study, vol. 8 no. 1
Type: Research Article
ISSN: 0043-8022

Abstract

Details

Storytelling-Case Archetype Decoding and Assignment Manual (SCADAM)
Type: Book
ISBN: 978-1-78560-216-0

Article
Publication date: 9 November 2015

Charlie D. Frowd, William B. Erickson, James M. Lampinen, Faye C. Skelton, Alex H. McIntyre and Peter J.B. Hancock

The purpose of this paper is to assess the impact of seven variables that emerge from forensic research on facial-composite construction and naming using contemporary police…

Abstract

Purpose

The purpose of this paper is to assess the impact of seven variables that emerge from forensic research on facial-composite construction and naming using contemporary police systems: EvoFIT, Feature and Sketch.

Design/methodology/approach

The paper involves regression- and meta-analyses on composite-naming data from 23 studies that have followed procedures used by police practitioners for forensic face construction. The corpus for analyses contains 6,464 individual naming responses from 1,069 participants in 41 experimental conditions.

Findings

The analyses reveal that composites constructed from the holistic EvoFIT system were over four-times more identifiable than composites from “Feature” (E-FIT and PRO-fit) and Sketch systems; Sketch was somewhat more effective than Feature systems. EvoFIT was more effective when internal features were created before rather than after selecting hair and the other (blurred) external features. Adding questions about the global appearance of the face (as part of the holistic-cognitive interview (H-CI)) gives a valuable improvement in naming over the standard face-recall cognitive interview (CI) for all three system types tested. The analysis also confirmed that composites were considerably less effective when constructed from a long (one to two days) compared with a short (0-3.5 hours) retention interval.

Practical implications

Variables were assessed that are of importance to forensic practitioners who construct composites with witnesses and victims of crime.

Originality/value

Using a large corpus of forensically-relevant data, the main result is that EvoFIT using the internal-features method of construction is superior; an H-CI administered prior to face construction is also advantageous (cf. face-recall CI) for EvoFIT as well as for two further contrasting production systems.

Details

Journal of Forensic Practice, vol. 17 no. 4
Type: Research Article
ISSN: 2050-8794

Keywords

1 – 10 of over 3000