Search results

1 – 6 of 6
Open Access
Book part
Publication date: 7 December 2020

Mary Ann Glynn, Elizabeth A. Hood and Benjamin D. Innis

As hybrid organizations become increasingly common, the authors observe that some hybrid forms are becoming institutionalized and legitimated. The authors explore the implications…

Abstract

As hybrid organizations become increasingly common, the authors observe that some hybrid forms are becoming institutionalized and legitimated. The authors explore the implications of the institutionalization of hybridity, addressing both the internal tensions that plague many hybrids and the external tensions stemming from evaluator assessments and stakeholder uncertainty. The authors propose that institutionalization can dampen internal tensions associated with hybridity and also facilitate legitimation and acceptance by external audiences. The authors present identity as a useful theoretical lens through which to examine these questions, as identities are born from, but also have the potential to modify, existing institutional arrangements. The authors present directions for future research at the juncture of identity, hybridity, and institutionalization, suggesting potential avenues of inquiry in this productive stream of research.

Details

Organizational Hybridity: Perspectives, Processes, Promises
Type: Book
ISBN: 978-1-83909-355-5

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 1 May 2019

Yan Liu, Marcel Hertogh and Erik-Jan Houwing

How learning is facilitated in inter-organizational projects remains underdeveloped in the literature. The aim of this study is to focus on viewing the relationship between the…

Abstract

Purpose

How learning is facilitated in inter-organizational projects remains underdeveloped in the literature. The aim of this study is to focus on viewing the relationship between the multiple organizations in a project, from a perspective of the learning aspect.

Design/Methodology/Approach

This research analyses the learning trajectory that occurred in the largest tunnel project in the Netherlands. Data were collected through archival documents, in-depth interviews, and site visits. Answering the research question will be done through inductive research.

Findings

The results indicate that the most significant change that exploitative learning has led to is the change in mind-set. The learning paradox of projects does not play a factor in the learning trajectory present at the GSP project.

Research Limitations/Implications

While the research was conducted in a Dutch context, it is suggested that the findings presented would align with the experiences of construction organizations in other parts of the world.

Practical Implications

The findings have implications for understanding learning in practical project management. The organizations need to focus on learning initiatives on people, and not on the collection of data.

Originality/Value

This research responds to the debate over the learning in projects. Learning stimulates openness and that this has positive impact om collaboration.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 1 May 2019

Leif D. Houck

For a public project leader charged with a construction project, it can be crucial to meet the budget, while maximizing the qualities within a construction project. A method to…

Abstract

Purpose

For a public project leader charged with a construction project, it can be crucial to meet the budget, while maximizing the qualities within a construction project. A method to achieve this is to use the “opposite design build” procurement method, in which the price is fixed and the contractors compete on adding a wide range of qualities to the project. However, such procurement approaches are rare, and it is difficult to find models on how to implement such an approach.

Design/Methodology/Approach

This study firstly looks at the literature on design-build, quality-only as the main selection criterion and to some degree on constructors’ bidding behaviour. Secondly, it explains a model for a design-build, quality-only procurement designed within the public tendering legislations. Thirdly, it investigates the outcome of the model applied to a specific case in Norway.

Findings

There seems to be a research gap within literature and cases on design-build, quality-only selection with a fixed price. The developed model allowed for negotiations, which led to more comparable and improved bids. In the investigated case, and the client was able to implement more qualities in the project than expected within the budget.

Research Limitations/Implications

The researcher was himself partly involved in the process as an advisor.

Practical Implications

The developed method is relatively simple and might readily be applied by any client to maximise a project’s qualities within a given fixed price.

Originality/Value

The long-term value should be to widen the range of useful procurement methods.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Access

Only Open Access

Year

Content type

Book part (6)
1 – 6 of 6