Search results

1 – 10 of 64
Article
Publication date: 29 March 2024

Jiming Hu, Zexian Yang, Jiamin Wang, Wei Qian, Cunwan Feng and Wei Lu

This study proposes a novel method utilising a speech-word pair bipartite network to examine the correlation structure between members of parliament (MPs) in the context of the…

Abstract

Purpose

This study proposes a novel method utilising a speech-word pair bipartite network to examine the correlation structure between members of parliament (MPs) in the context of the UK- China relationship.

Design/methodology/approach

We construct MP-word pair bipartite networks based on the co-occurrence relationship between MPs and words in their speech content. These networks are then mapped into monopartite MPs correlation networks. Additionally, the study calculates correlation network indicators and identifies MP communities and factions to determine the characteristics of MPs and their interrelation in the UK-China relationship. This includes insights into the distribution of key MPs, their correlation structure and the evolution and development trends of MP factions.

Findings

Analysis of the parliamentary speeches on China-related affairs in the British Parliament from 2011 to 2020 reveals that the distribution and interrelationship of MPs engaged in UK-China affairs are centralised and discrete, with a few core MPs playing an integral role in the UK-China relationship. Among them, MPs such as Lord Ahmad of Wimbledon, David Cameron, Lord Hunt of Chesterton and Lord Howell of Guildford formed factions with significant differences; however, the continuity of their evolution exhibits unstableness. The core MP factions, such as those led by Lord Ahmad of Wimbledon and David Cameron, have achieved a level of maturity and exert significant influence.

Research limitations/implications

The research has several limitations that warrant acknowledgement. First, we mapped the MP-word pair bipartite network into the MP correlation network for analysis without directly analysing the structure of MPs based on the bipartite network. In future studies, we aim to explore various types of analysis based on the proposed bipartite networks to provide more comprehensive and accurate references for studying UK-China relations. In addition, we seek to incorporate semantic-level analyses, such as sentiment analysis of MPs, into the MP-word -pair bipartite networks for in-depth analysis. Second, the interpretations of MP structures in the UK-China relationship in this study are limited. Consequently, expertise in UK-China relations should be incorporated to enhance the study and provide more practical recommendations.

Practical implications

Firstly, the findings can contribute to an objective understanding of the characteristics and connotations of UK-China relations, thereby informing adjustments of focus accordingly. The identification of the main factions in the UK-China relationship emphasises the imperative for governments to pay greater attention to these MPs’ speeches and social relationships. Secondly, examining the evolution and development of MP factions aids in identifying a country’s diplomatic focus during different periods. This can assist governments in responding promptly to relevant issues and contribute to the formulation of effective foreign policies.

Social implications

First, this study expands the research methodology of parliamentary debates analysis in previous studies. To the best of our knowledge, we are the first to study the UK-China relationship through the MP-word-pair bipartite network. This outcome inspires future researchers to apply various knowledge networks in the LIS field to elucidate deeper characteristics and connotations of UK-China relations. Second, this study provides a novel perspective for UK-China relationship analysis, which deepens the research object from keywords to MPs. This finding may offer important implications for researchers to further study the role of MPs in the UK-China relationship.

Originality/value

This study proposes a novel scheme for analysing the correlation structure between MPs based on bipartite networks. This approach offers insights into the development and evolving dynamics of MPs.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 15 September 2023

Richard G. Mathieu and Alan E. Turovlin

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an…

Abstract

Purpose

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an Enterprise Resource Planning (ERP) system such as systemanalyse programmentwicklung (SAP). The ERP environment by itself can be overwhelming for a typical ERP Manager, coupled with increasing cybersecurity issues that arise creating periods of intense time pressure, stress and workload, increasing risk to the organization. This paper aims to identify a pragmatic approach to prioritize vulnerabilities for the ERP Manager.

Design/methodology/approach

Applying attention-based theory, a pragmatic approach is developed to prioritize an organization’s response to the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) vulnerabilities using a Classification and Regression Tree (CART).

Findings

The application of classification and regression tree (CART) to the National Institute of Standards and Technology’s National Vulnerability Database identifies prioritization unavailable within the NIST’s categorization.

Practical implications

The ERP Manager is a role between technology, functionality, centralized control and organization data. Without CART, vulnerabilities are left to a reactive approach, subject to overwhelming situations due to intense time pressure, stress and workload.

Originality/value

To the best of the authors’ knowledge, this work is original and has not been published elsewhere, nor is it currently under consideration for publication elsewhere. CART has previously not been applied to the prioritizing cybersecurity vulnerabilities.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 10 November 2023

Catherine Olphin, Joanne Larty and David Tyfield

Despite widespread recognition of the importance of place in entrepreneurship research, much less attention has been paid to the methodological challenges that inquiries into…

Abstract

Despite widespread recognition of the importance of place in entrepreneurship research, much less attention has been paid to the methodological challenges that inquiries into place presents. Understanding the relationship between place and entrepreneurship is becoming increasingly important as focus turns to sustainable entrepreneurship and as policy makers turn to ‘place-based’ approaches to regional sustainability challenges. This chapter provides insight one researcher’s experiences engaging stakeholders in discussions about the relationship between a place-based university programme for sustainability and local sustainability agendas. The chapter reveals the struggles experienced by both researcher and participants in articulating what places and the local region means to both individuals and to the programme. The findings provide an important insight into how researchers studying place need to be cognisant of the limitations and flexibility of language when engaging research participants in discussing the relationship between place, sustainability, and entrepreneurship.

Details

Nurturing Modalities of Inquiry in Entrepreneurship Research: Seeing the World Through the Eyes of Those Who Research
Type: Book
ISBN: 978-1-80262-186-0

Keywords

Book part
Publication date: 31 October 2023

Paul Oslington

I suggest that the search for Adam Smith’s theodicy is likely to be in vain. The paper begins with a brief history of approaches to evil, emphasizing the context in which they…

Abstract

I suggest that the search for Adam Smith’s theodicy is likely to be in vain. The paper begins with a brief history of approaches to evil, emphasizing the context in which they arose, and the questions authors were addressing. Approaches most relevant to Adam Smith include those of Augustine and Calvin, and the early modern theodicies of Leibniz, Samuel Clarke and William King, as well as the attacks on them by Bayle and Voltaire. Scottish Enlightenment writers were not terribly interested in theodicy, though Hutcheson and Kames did devote space to their versions of problems of evil. David Hume’s Dialogues on Natural Religion are often taken to be classic statement of the problem of theodicy and argument against religious belief, but his concern was to demolish rationalistic theodicies rather than religious belief or practice. The paper then turns to Smith’s writings, considering similarities and differences to these approaches to evil. Smith emphasizes the wisdom and beneficence of God, and that evils we observe are part of a larger providential plan. He makes no attempt to justify the God in the face of evil, and in this respect Smith shares more with Augustine and Calvin than he does with the early modern theodicists. Smith’s approach to evil is simple and ameliorative. Smith’s approach contrasts with early nineteenth century English political economists, from Malthus onwards, for whom theodicy was important. Whatever view we take of the theodicists project of justifying an all-powerful and good God in the face of evil may, we still struggle to make sense of economic suffering and evil.

Details

Research in the History of Economic Thought and Methodology: Including a Symposium on Religion, the Scottish Enlightenment, and the Rise of Liberalism
Type: Book
ISBN: 978-1-83549-517-9

Keywords

Article
Publication date: 14 September 2023

Richard Noel Canevez, Jenifer Sunrise Winter and Joseph G. Bock

This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local…

Abstract

Purpose

This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local violence prevention actors to potentially violent situations during demonstrations.

Design/methodology/approach

Using a distributed cognition lens, the authors explore the information processing of monitors within peace organizations. The authors adopt a qualitative thematic analysis methodology composed of interviews with monitors and documents from their shared communication and discussion channels. The authors’ analysis seeks to highlight how information is transformed between social and technical actors through the process of monitoring.

Findings

The authors’ analysis identifies that the technologization of monitoring for violence prevention to assist nonviolent activists produces two principal and related forms of transformation: appropriation and hidden attributes. Monitors “appropriate” information from sources to fit new ends and modes of representation throughout the process of detection, verification and dissemination. The verification and dissemination processes likewise render latent supporting informational elements, hiding the aggregative nature of information flow in monitoring. The authors connect the ideas of appropriation and hidden attributes to broader discourses in surveillance and trust that challenge monitoring and its place in peace work going forward.

Originality/value

To the best of the authors’ knowledge, this study is the first to focus on the communicative and information processes of remote support monitors. The authors demonstrate that adoption of social and digital media information of incipient violence and response processes for its mitigation suggests both a social and technical precarity for the role of monitoring.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 26 December 2023

Eyyub Can Odacioglu, Lihong Zhang, Richard Allmendinger and Azar Shahgholian

There is a growing need for methodological plurality in advancing operations management (OM), especially with the emergence of machine learning (ML) techniques for analysing…

278

Abstract

Purpose

There is a growing need for methodological plurality in advancing operations management (OM), especially with the emergence of machine learning (ML) techniques for analysing extensive textual data. To bridge this knowledge gap, this paper introduces a new methodology that combines ML techniques with traditional qualitative approaches, aiming to reconstruct knowledge from existing publications.

Design/methodology/approach

In this pragmatist-rooted abductive method where human-machine interactions analyse big data, the authors employ topic modelling (TM), an ML technique, to enable constructivist grounded theory (CGT). A four-step coding process (Raw coding, expert coding, focused coding and theory building) is deployed to strive for procedural and interpretive rigour. To demonstrate the approach, the authors collected data from an open-source professional project management (PM) website and illustrated their research design and data analysis leading to theory development.

Findings

The results show that TM significantly improves the ability of researchers to systematically investigate and interpret codes generated from large textual data, thus contributing to theory building.

Originality/value

This paper presents a novel approach that integrates an ML-based technique with human hermeneutic methods for empirical studies in OM. Using grounded theory, this method reconstructs latent knowledge from massive textual data and uncovers management phenomena hidden from published data, offering a new way for academics to develop potential theories for business and management studies.

Details

International Journal of Operations & Production Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 12 December 2022

Hsien-Chun Chen, Szu-Yin Lin and I-Heng Chen

Based on the theory of reasoned action, this study aims to illustrate how employees’ safety behavior can be enhanced in the workplace by specifically examining how anticipated…

Abstract

Purpose

Based on the theory of reasoned action, this study aims to illustrate how employees’ safety behavior can be enhanced in the workplace by specifically examining how anticipated regret leads to workplace safety behavior and the contextual factor of organizational ethical climate.

Design/methodology/approach

The authors adopted a quantitative approach and designed their survey from validated scales in prior studies. Data were obtained from two different sources, including 149 employees and 31 immediate supervisors. Hierarchical linear modeling techniques were applied to test the hypotheses.

Findings

The results showed that anticipated regret was significantly related to safety compliance and safety participation; egoistic ethical climate was negatively correlated with safety compliance and safety participation, while benevolent ethical climate was only positively correlated with safety participation. For cross-level moderating effects, both benevolent and principle ethical climate moderate the relationship between anticipated regret and safety participation, whereas all three ethical climates did not moderate the relationship between anticipated regret and safety compliance.

Research limitations/implications

It contributes to current literature by identifying critical determinants of employees’ safety behavior, which would enable practitioners to manage safety in the workplace and foster a safe working environment. Specifically, fostering benevolent ethical climate can better promote employees’ perceptions of the importance of discretionary safety behavior.

Originality/value

This study suggests that organizational practitioners could use the salience of anticipated regret to promote the safety behavioral intentions of employees in the workplace. Further, the authors examined a multilevel framework, which elaborates individual- and organizational-level antecedents of employee safety behavior as well as the impact of cross-level interactions on employee safety behavior.

Details

Chinese Management Studies, vol. 18 no. 1
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 29 February 2024

Tim Gocher, Wen Li Chan, Jayalakshmy Ramachandran and Angelina Seow Voon Yee

This study aims to explore the effects of responsible international investment in a least developed country (LDC) on ethics and corruption in the local industry. While investment…

Abstract

Purpose

This study aims to explore the effects of responsible international investment in a least developed country (LDC) on ethics and corruption in the local industry. While investment growth in least developed countries (LDCs) is essential to meet the United Nations Sustainable Development Goals, international investment in LDCs poses challenges, including corruption. The authors explore perspectives from relevant stakeholders on the influence, if any, on an LDC’s banking sector, of investment in the LDC by a multinational bank with an environmental, social and governance focus – using a case study of Standard Chartered Bank (SCB) in Nepal.

Design/methodology/approach

The authors conducted thematic analysis on: focus groups with current and former SCB Nepal management; semi-structured interviews with Nepal banking regulator representatives; senior staff from SCB global divisions; and management of other commercial banks in Nepal.

Findings

Knowledge transfer, organisational enablers and constructive international competition contributed to the dissemination of best practices within the Nepal banking sector, supporting the notion of beneficial spill-over effects of multinationals on LDC host countries.

Practical implications

Practical insights will aid LDC governments, international businesses, investment funds and donor organisations seeking to invest in/assist LDCs with economic development.

Originality/value

To the best of the authors’ knowledge, this may be the first case study on ethics and anti-corruption practices of a multinational bank in a LDC. Through a practice-driven focus, the authors provide “on-the-ground” insights to better understand the complex nature of corruption.

Details

Journal of Financial Regulation and Compliance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1358-1988

Keywords

Book part
Publication date: 5 February 2024

David Nichol, William McGovern and Ruth McGovern

Any topic can be sensitive, and every subject area will have sensitive issues and topics that academics in higher education and further education settings will be expected to…

Abstract

Any topic can be sensitive, and every subject area will have sensitive issues and topics that academics in higher education and further education settings will be expected to negotiate. Your ability to negotiate sensitive topics is important because the ways in which you engage and teach about sensitive topics will affect your ability to provide a positive learning experience and teaching alliance with students. In practice, you will face enormous pressure to ‘deliver’ on teaching, which will only be mirrored by similar freedoms in deciding on how and what needs to be done to get students to where they need to be. Negotiating, identifying, preparing for and delivering teaching on sensitive subjects and topics can be difficult in individual academics. This chapter, seeks to prepare you for developing a deeper understanding of some of the philosophical, theoretical, and practical-based concerns and issues related to teaching sensitive topics and subjects. This chapter begins with providing a rationale for what follows, and it explores some of the key themes, positionality, identity, transformational learning and lived experience, that are explored in greater depth in the collection. This chapter also contains a detailed breakdown of the structure and the content of this edited collection, and it concludes with some reflective comments about the implications of the collection for you as an individual and your career.

Details

Developing and Implementing Teaching in Sensitive Subject and Topic Areas: A Comprehensive Guide for Professionals in FE and HE Settings
Type: Book
ISBN: 978-1-83753-126-4

Keywords

Abstract

Details

ANTi-History: Theorization, Application, Critique and Dispersion
Type: Book
ISBN: 978-1-80455-242-1

1 – 10 of 64