Search results
1 – 10 of 29This paper aims to introduce a growth comprehensive pattern to explain the phenomenon of individual foreign investment, first at the global level and then at the regional level…
Abstract
Purpose
This paper aims to introduce a growth comprehensive pattern to explain the phenomenon of individual foreign investment, first at the global level and then at the regional level. The patterns are developed based on a number of main theories with grounded theory (GT) as the foundation, distributed on the two pull and push forces of international business theory and migration theory; simultaneously, it is classified on the three levels (attribute–consequence–value [ACV]) of means-end theory.
Design/methodology/approach
An embedded method is applied to generate two complementary datasets from two approaches: in-depth interviews and secondary data analysis.
Findings
In this structure, the investor plays a central role as the decision-maker based on the entrepreneur's motives for internationalization (economics-driven and psychology-driven factors) and the householders' motives for emigration (aspiration and access capabilities). The external forces considered are a push from the home country (structures) and pull from the host country (immigrant investment programs [IIPs]), in which the factor of (dis)trust/misconception as a moderator has an additional impact on this mobility. Demographic factors such as gender, region, generation/age, level of education, religion and occupation generally describe the characteristics of each specific target group.
Research limitations/implications
This paper is to develop a conceptual framework.
Originality/value
The results of this study, in addition to fulfilling its own objectives, will also serve as the foundation for further research in several scientific fields such as economics, sociology and politics.
Peer review
The peer review history for this article is available at https://publons.com/publon/10.1108/IJSE-12-2022-0786
Details
Keywords
Linda M. Waldron, Danielle Docka-Filipek, Carlie Carter and Rachel Thornton
First-generation college students in the United States are a unique demographic that is often characterized by the institutions that serve them with a risk-laden and deficit-based…
Abstract
First-generation college students in the United States are a unique demographic that is often characterized by the institutions that serve them with a risk-laden and deficit-based model. However, our analysis of the transcripts of open-ended, semi-structured interviews with 22 “first-gen” respondents suggests they are actively deft, agentic, self-determining parties to processes of identity construction that are both externally imposed and potentially stigmatizing, as well as exemplars of survivance and determination. We deploy a grounded theory approach to an open-coding process, modeled after the extended case method, while viewing our data through a novel synthesis of the dual theoretical lenses of structural and radical/structural symbolic interactionism and intersectional/standpoint feminist traditions, in order to reveal the complex, unfolding, active strategies students used to make sense of their obstacles, successes, co-created identities, and distinctive institutional encounters. We find that contrary to the dictates of prevailing paradigms, identity-building among first-gens is an incremental and bidirectional process through which students actively perceive and engage existing power structures to persist and even thrive amid incredibly trying, challenging, distressing, and even traumatic circumstances. Our findings suggest that successful institutional interventional strategies designed to serve this functionally unique student population (and particularly those tailored to the COVID-moment) would do well to listen deeply to their voices, consider the secondary consequences of “protectionary” policies as potentially more harmful than helpful, and fundamentally, to reexamine the presumption that such students present just institutional risk and vulnerability, but also present a valuable addition to university environments, due to the unique perspective and broader scale of vision their experiences afford them.
Details
Keywords
Ram Shankar Uraon and Ravikumar Kumarasamy
The paper aims to examine the effect of justice perceptions of performance appraisal (JPPA) practices (i.e. distributive, procedural, informational and interpersonal justice) on…
Abstract
Purpose
The paper aims to examine the effect of justice perceptions of performance appraisal (JPPA) practices (i.e. distributive, procedural, informational and interpersonal justice) on organizational citizenship behavior (OCB) and affective commitment (AC) and the effect of AC on OCB. Further, it investigates the mediating role of AC in the relationship between JPPA practices and OCB. Moreover, this study examines the moderating effect of job level on the relationship between JPPA practices and OCB.
Design/methodology/approach
The data were collected using a self-reported structured questionnaire. A total of 650 questionnaires were distributed among the employees of 50 information technology (IT) companies in India, and 503 samples were obtained. The conceptual framework was tested using the partial least squares structural equation modeling (PLS-SEM) method, and the moderating effect was tested using process macro.
Findings
The findings of this study reveal that the JPPA practices positively affect OCB and AC and AC affects OCB. Further, AC partially mediates this relationship between JPPA practices and OCB. Furthermore, the direct effect of JPPA practices on OCB happens to be strengthened when the job level decreases, thus confirming the moderating role of job level.
Research limitations/implications
The findings of this study augment the social exchange theory (SET) by suggesting that individuals perceiving justice or fairness in performance appraisal practices are likely to have a greater AC that ultimately engages employees in OCB.
Practical implications
This study will be helpful for human resource practitioners in IT companies who are responsible for the fairness of performance appraisal practices and expect their employees to be emotionally attached to the organization and engaged in OCB.
Originality/value
The study adds to the body of knowledge of how justice in performance appraisal practices links to OCB through AC and moderates by job level in an emerging economy in Asia.
Details
Keywords
The qualitative approach was applied the discover the optimum answers to the research objectives, which are (1) to understand the cultural and hedonistic characteristics of the…
Abstract
Purpose
The qualitative approach was applied the discover the optimum answers to the research objectives, which are (1) to understand the cultural and hedonistic characteristics of the (Lanna) Songkran festival; and (2) to examine the dilemma between cultural rituals and hedonistic activity for tourism.
Design/methodology/approach
This study used a case study of the Songkran festival in Chiang Mai to examine the dilemma between cultural rituals and hedonism for tourism, which brings lost or misperceived cultural values and identities. The semi-structured interview (SSI) with senior locals and participant observation during the festival was conducted in Chiang Mai, Thailand, to obtain the in-depth phenomena of the existing celebration pattern at the festival.
Findings
The study findings show three crucial phenomena that explain characteristics of unsynchronized cultural rituals and hedonistic activities for tourism: (1) the parallel phenomenon between cultural values and celebration practice, (2) the movement of local culture and(3) the hedonistic characteristics of the festival.
Practical implications
The study extends the knowledge on the interplay phenomena between cultural festivals and tourism; also, the involved stakeholders, such as local communities, public sectors and private sectors, can use the study findings in creating policies for using cultural festivals to promote a destination and urban economic development that will minimise cultural values distort while increase tourism economic values.
Originality/value
This study was conducted qualitatively, including SSIs and participant observation at the Songkran festival in Chiang Mai. The study findings were analysed, based on the empirical data, into significant themes representing the characteristics of dilemma phenomena within the festival.
Details
Keywords
Leila Namdarian and Hamid Reza Khedmatgozar
This study aims to elucidate institutional analysis as an effective approach to investigating and designing the multilevel policymaking system of online social networks (OSN) for…
Abstract
Purpose
This study aims to elucidate institutional analysis as an effective approach to investigating and designing the multilevel policymaking system of online social networks (OSN) for achieving a participatory model.
Design/methodology/approach
The institutional mapping approach has been used to analyze Iran’s OSN multilevel policymaking system. A combination of two matrices, including institutions-institutions and institutions-functions, was used to perform the institutional mapping. Two main steps were taken to draw the mentioned matrices. First, a review of related studies in Iran’s OSN policymaking system was conducted and the policy functions mentioned in these studies were identified and categorized using the meta-synthesis. Second, based on analyzing two policy documents of Iran’s OSN, institutions and their interactions were identified and policy functions were allocated to institutions.
Findings
Based on the results, the most important policy functions in the current OSN policymaking system in Iran are support, regulatory, monitoring and evaluation, business environment development, culture building and promotion, organizing licenses and permissions, policymaking and legislation. Also, the results show that there are shortcomings in this system, some of the most important of which are lack of transparency in regulatory, little work in culture building and promotion, neglect of the training of specialized human resources and research and development, slow development of the business environment and neglecting the role of nongovernmental organizations in policymaking.
Originality/value
By examining and analyzing how different institutions operate within a multilevel policymaking system, the policymaking process and its overall effectiveness can be enhanced. This analysis helps identify any inconsistencies, overlaps or conflicts in the roles and policies of these institutions, leading to a better understanding of how a multilevel policymaking system is organized.
Details
Keywords
This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It…
Abstract
Purpose
This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It explores the ethical and professional considerations of investigative journalists, how they approach privacy and information-sharing and how this differs from intelligence practice in government and industry. The paper assesses the strengths and limitations of Collaborative Investigative Reporting based on Information Leaks (CIRIL) as a kind of public-facing intelligence practice.
Design/methodology/approach
This study draws on academic literature, source material from investigations by the International Consortium of Investigative Journalists and the Organised Crime and Corruption Reporting Project, and a survey of financial crime compliance professionals conducted in 2022.
Findings
The paper identifies three key causal factors that have enabled the rise of CIRIL even as traditional journalism has declined: the digital storage of information; increasing public interest in offshore finance and tax evasion; and “virtual newsrooms” enabled by internet communications. It concludes that the primary strength of CIRIL is its creation of complex global narratives to inform the public about corruption and tax evasion, while its key weakness is that the scale and breadth of the data released makes it difficult to focus on likely criminal activity. Results of a survey of industry and government professionals indicate that CIRIL is generally more effective as public information than as an investigative resource, owing to the volume, age and quality of information released. However, the trends enabling CIRIL are likely to continue, and this means that governments and financial institutions need to become more effective at using leaked information.
Originality/value
Over the past decade, large-scale, data-driven investigative journalism projects such as the Pandora Papers and the Russian Laundromat have had a significant public impact by exposing money laundering, financial crime and corruption. These projects share certain hallmarks: the use of human intelligence, often sourced from anonymous leaks; inventive fusion of this intelligence with data from open sources; and collaboration among a global collective of investigative journalists to build a narrative. These projects prioritise informing the public. They are also an important information source for government and private sector organisations working to investigate and disrupt financial crime.
Details
Keywords
Gender-diverse people experience unique cultural and interpersonal stigma in mainstream society and sometimes within their own communities; they face allegations of inauthenticity…
Abstract
Gender-diverse people experience unique cultural and interpersonal stigma in mainstream society and sometimes within their own communities; they face allegations of inauthenticity based on their nonconformity to either cisnormative or transnormative gender regimes. Based on 21 in-depth life history interviews, we unveil the intricate interactional process of negotiating identity and authenticity in the biographical work of gender-diverse individuals. In this study, gender-diverse people engaged in a “gender audit” with their gender-diverse interviewer. Gender audits yield verbal performances of gender with oneself and others. Ambiguity was “accounted for” or “embraced and created” in their biographical work to organize their life stories and undermine binary essentialism – a discourse that was “discursively constraining.” Gender audits took place in participants' day-to-day lives, either through self-audits, questioning from others, or both. In the final analysis, we assert that we all engage in gender auditing. Gender audits are intersubjective sites of domination, subordination, resistance, and social change. Gender diversity, then, can be viewed as a product of gender in flux.
Details
Keywords
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Abstract
Purpose
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.
Design/methodology/approach
This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.
Findings
The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.
Social implications
The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.
Originality/value
This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.
Details
Keywords
Escalation in the number of online food ordering platforms, along with extensive junk food marketing, lucrative offers and discounts, innovation in food flavors, and doorstep…
Abstract
Escalation in the number of online food ordering platforms, along with extensive junk food marketing, lucrative offers and discounts, innovation in food flavors, and doorstep delivery of food, have triggered the consumption of high-calorie and unhealthy food products which pose serious threats to the health and future well-being of individuals by making them more obese. To date, several public policy frameworks have been developed to confront obesity; however, their efficacy seems debatable. Directionally, the objective of this study is to highlight the potential influence of “digital nudging” which aims at steering individuals in desired directions, at the same time delimiting their freedom of choice. The study also establishes the effectiveness of digital nudges promoting a healthy lifestyle by steering individuals toward healthier food choices. The author strongly believes that this conceptual perusal will offer immense inputs to healthy food marketers and researchers alike in addressing the matters of obesity. Addressing the menace of obesity calls for joint efforts of the government, the public, researchers, and more specifically food product manufacturers/marketers who should incorporate healthier food options into their portfolios. E-tailers are also urged to adopt such practices in virtual markets and promote healthier food options to effectively tackle obesity.
Details
Keywords
Arindam Bhattacharjee and Anita Sarkar
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…
Abstract
Purpose
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.
Design/methodology/approach
Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.
Findings
Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.
Originality/value
This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.
Details