Search results

1 – 10 of over 40000
Article
Publication date: 21 August 2009

Mary Barrett

Changing language ideology and the decreased popularity of overt feminism suggest that aspiring female managers may be less influenced than senior women managers by the…

1351

Abstract

Purpose

Changing language ideology and the decreased popularity of overt feminism suggest that aspiring female managers may be less influenced than senior women managers by the gender of the speaker in evaluating whether specific communication strategies are effective and probable. The purpose of this paper is to investigate this issue.

Design/methodology/approach

A total of 255 second‐year female management students evaluate strategies for the same workplace dilemmas as senior women managers (Barrett).

Findings

For short‐ and medium‐term dilemmas students, like senior women managers, regard masculine communication strategies with a feminine element as effective. They are less influenced by the speaker's gender than senior women managers in evaluating the strategies' probability. But when seeking promotion, students avoid some strategies they consider effective, and believe men would use. Students' confidence as communicators affects their personal choice of strategy.

Research limitations/implications

The paper investigates a limited number of dilemmas and sought information about a limited number of demographic factors, limiting the results' generalizability. Nevertheless, it suggests future women managers could learn from their senior counterparts if they want to advance at work. Future research should investigate whether future male managers' reactions to these dilemmas are similar to women students and senior managers, and whether scenarios using female dyads yield similar results. Cross‐cultural extensions of the research are also possible.

Originality/value

This is the first study comparing aspiring and senior women managers' reactions to classic workplace communication problems. The findings show similarities between aspiring managers and their senior sisters, but also differences which could affect aspiring managers' career success.

Details

Gender in Management: An International Journal, vol. 24 no. 6
Type: Research Article
ISSN: 1754-2413

Keywords

Article
Publication date: 1 December 2004

Mary Barrett

The paper discusses some gender debates in linguistic behaviour and suggests how scenario‐based research techniques may contribute. It then presents a survey‐based study…

3107

Abstract

The paper discusses some gender debates in linguistic behaviour and suggests how scenario‐based research techniques may contribute. It then presents a survey‐based study of 157 Australian female, organisationally senior, managers. For each of three workplace communication dilemmas, participants evaluated a series of strategic responses, indicating both how effective and how probable they thought the responses were. Despite the participants’ seniority and confidence as communicators, their evaluation of the strategies often varied with whether they believed the communication strategist in the scenario was male or female. This suggests that even confident, organisationally senior women still maintain some traditional gender‐based ideas about good communication. Despite this, the participants’ own preferred communication strategies did not vary with their seniority or their confidence in expressing opinions. The study's theoretical and practical implications and some limitations are discussed, together with topics for further research.

Details

Women in Management Review, vol. 19 no. 8
Type: Research Article
ISSN: 0964-9425

Keywords

Article
Publication date: 23 October 2007

B. McCarthy, C. Edwards and M. Dunmore

This paper aims to discuss network transparency in a mountain rescue domain and aims to introduce the relatively new research concept of MANEMO (MANET + NEMO) and the…

Abstract

Purpose

This paper aims to discuss network transparency in a mountain rescue domain and aims to introduce the relatively new research concept of MANEMO (MANET + NEMO) and the mountain rescue IP network model developed at Lancaster University.

Design/methodology/approach

An analysis of IP mobility techniques that have been designed for use in the Internet today is provided as background, as well as an overview of the whole MANEMO domain. Highlights the importance of the MANEMO concept by working with real scenarios and developing practical implementations (as opposed to simulation).

Findings

During the research it was found that combining the localised multi‐hop behaviour of MANET techniques and the global reachability of NEMO can be a mutually beneficial process. The benefits afforded by using MANET techniques can bring advantages to NEMO scenarios and vice‐versa. Identifying this fact has given rise to the development of two distinct MANEMO scenarios, MANET‐Centric and NEMO‐Centric MANEMO. Finally, the Unified MANEMO Architecture (UMA) implementation, which attempts to support both of these scenarios in an efficient and feasible manner.

Research limitations/implications

Regarding UMA, research continues into addressing the security implications of this approach and the benefits that multi‐homing can provide.

Originality/value

The paper illustrates how MANEMO can conceivably provide powerful solutions to many important scenarios.

Details

Internet Research, vol. 17 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 14 March 2016

Adrian W. Müller and Jan Oliver Shwarz

– The purpose of this paper is to address a central question in foresight exercises: how to communicate derived results?

Abstract

Purpose

The purpose of this paper is to address a central question in foresight exercises: how to communicate derived results?

Design/methodology/approach

By drawing on an empirical study, this paper presents a framework for using visualizations in foresight and illustrates its application by referring to a case study.

Findings

The argument is made that by using a dimensional framework, the effects of visualization can be leveraged for communicating foresight results and creating stronger buy-in.

Originality/value

Although visualizations appear to be a central means of communication and engagement, little is known in the context of foresight on the functions and dimension of visualizations.

Details

Foresight, vol. 18 no. 1
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 13 July 2022

Benno Viererbl, Nora Denner and Thomas Koch

This study aims to analyze the structures, forms and functions of informal communication in telecommuting settings. Previous research on telecommuting has not considered…

Abstract

Purpose

This study aims to analyze the structures, forms and functions of informal communication in telecommuting settings. Previous research on telecommuting has not considered the influence of telecommuting settings on informal communication, and research on informal communication has mainly focused on face-to-face communication while working in a physical office. This article aims to bring these two research strands together by analyzing the informal communication behavior of employees working from home.

Design/methodology/approach

The authors conducted qualitative interviews with 21 employees who were working from home. The participants were recruited using quota sampling and the data were analyzed following the procedure for examining qualitative data proposed by Mayring (2014).

Findings

The findings reveal similarities as well as differences between those working in an office and those working from home in terms of informal communication with co-workers: Informal communication fulfills similar functions in both cases, but remote work leads to less informal communication and hinders incidental exposure to other employees. Informal talks need to be planned in advance or strategically initiated. The authors identified five informal communication scenarios in telecommuting settings that partly, but not fully, overlap with scenarios in regular office settings.

Originality/value

The present study is one of the first to examine informal communication in telecommuting settings. Previous studies have either excluded the aspect of informal communication or the situation for employees working in telecommuting settings. The results provide new insights into informal communication behavior in remote work.

Details

Journal of Communication Management, vol. 26 no. 3
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 20 November 2009

Daniel Kraft, Marc Bechler, Hans‐Joachim Hof, Frank Pählke and Lars Wolf

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication…

Abstract

Purpose

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues.

Design/methodology/approach

In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network‐signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates.

Findings

The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log‐on times, availability, and communication overhead.

Originality/value

The paper introduces a cluster‐based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 September 2007

Jörg Nitzsche, Tammo van Lessen, Dimka Karastoyanova and Frank Leymann

Service‐oriented architecture (SOA) is an architecture paradigm targeting integration of applications within and across enterprise boundaries. It has gathered research and…

Abstract

Purpose

Service‐oriented architecture (SOA) is an architecture paradigm targeting integration of applications within and across enterprise boundaries. It has gathered research and industry acceptance and has given an enormous impetus to the business process management technology. Web service (WS) technology is one implementation of the SOA paradigm. It enables seamless integration of new and legacy applications through a stack of standardized composable specifications. WS orchestration is facilitated by the Business Process Execution Language which provides a recursive service composition model. While the programming model the WS technology provides is very flexible, a major deficiency is the need to discover services implementing a particular abstract interface, whereas functional similarities of services are disregarded. The Semantic Web Service technologies, like Web Service Modelling Ontology (WSMO) and Web Ontology Language for Services have been developed with the purpose of eliminating these deficiencies by enabling service discovery based on functional and non‐functional properties. The paper aims to focus on these issues.

Design/methodology/approach

This paper presents a list of requirements that business processes impose on SOA applications. It analyzes the support that WSMO/Web Service Model eXecution environment (WSMX) provides to address these requirements and compares it with the support enabled by the WS specification stack.

Findings

The paper identifies major flaws in the WSMO model and its reference implementation with respect to business process support.

Originality/value

The paper recommends possible solutions for eliminating the lack of needed features on behalf of WSMO/WSMX. It presents in detail how to enable asynchronous stateful communication among WSMO WS and partner‐based WS discovery by extending the WSMO model. Additionally, it extends the API of the reference implementation to facilitate the execution of services communicating asynchronously.

Details

International Journal of Web Information Systems, vol. 3 no. 1/2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 13 June 2019

Alessandro Fergnani

The purpose of this paper is to formally introduce the future persona, a futures method to let scenarios come to life. A future persona is a scenario-specific fictional…

1449

Abstract

Purpose

The purpose of this paper is to formally introduce the future persona, a futures method to let scenarios come to life. A future persona is a scenario-specific fictional individual living in the future scenario (s)he is meant to depict. The paper provides a formal, systematic and clear step-by-step guide on how to create engaging and effective future personas after a scenario planning exercise.

Design/methodology/approach

After having introduced the future persona method, tracing it back to the customer persona method in user centered design (UCD) and differentiating it from previous uses of futures characters in the futures studies literature and in other domains, an example of the creation process of four future personas based on four scenario archetypes of the futures of work is provided, illustrated with pictures and discussed.

Findings

Future personas, with their narratives and graphical illustrations, are found to be particularly useful to convey scenarios to a target audience.

Practical implications

Futures personas can be used in a scenario planning exercise to increase the clarity of scenarios in the mind of scenario planners and to let scenarios be known inside an organization.

Originality/value

Future personas can substantially enrich scenarios, increasing their liveliness, playfulness and empathy.

Details

foresight, vol. 21 no. 4
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 12 March 2018

Oksana Doherty

The purpose of this paper is to review recent contributions to the theoretical and empirical literature on informational cascades.

Abstract

Purpose

The purpose of this paper is to review recent contributions to the theoretical and empirical literature on informational cascades.

Design/methodology/approach

This paper reviews and synthesises the existing literature, methodologies and evidence on informational cascades.

Findings

Many financial settings foster situations where informational cascades and herding are likely. Cascades remain mainly an area of experimental research, leaving the empirical evidence inconclusive. Existing measures have limitations that do not allow for a direct test of cascading behaviour. More accurate models and methods for empirical testing of informational cascades could provide more conclusive evidence on the matter.

Practical implications

Outlined findings have implications for designing policies and regulatory requirements, as well as for the design of collective decisions processes.

Originality/value

The paper reviews and critiques existing theory; it summarises the recent laboratory and empirical evidence and identifies issues for future research. Most of other theoretical work reviews informational cascades as a subsection of herding. This paper focusses on informational cascades specifically. It distinguishes between informational cascade and herding. The paper also reviews most recent empirical evidence on cascades, presents review and synthesis of the theoretical and empirical development on information cascades up to date, and reviews the model of informational cascades with model criticism.

Details

Review of Behavioral Finance, vol. 10 no. 1
Type: Research Article
ISSN: 1940-5979

Keywords

Open Access
Article
Publication date: 18 January 2023

Gregor Polančič and Boštjan Orban

Despite corporate communications having an immense impact on corporate success, there is a lack of dedicated techniques for their management and visualization. A potential…

Abstract

Purpose

Despite corporate communications having an immense impact on corporate success, there is a lack of dedicated techniques for their management and visualization. A potential strategy is to apply business process management (BPM) approach with business process model and notation (BPMN) modeling techniques.

Design/methodology/approach

The goal of this study was to gain empirical insights into the cognitive effectiveness of BPMN-based corporate communications modeling. To this end, experimental research was performed in which subjects tested two modeling notations – standardized BPMN conversation diagrams and a BPMN extension with corporate communications-specific concepts.

Findings

Standard conversation diagrams were demonstrated to be more time-efficient for designing and interpreting diagrams. However, the subjects made significantly fewer mistakes when interpreting the diagrams modeled in the BPMN extension. Subjects also evolved positive perceptions toward the proposed extension.

Practical implications

BPMN-based corporate communications modeling may be applied to organizations to depict how formal communications are or should be performed consistently, effectively and transparently by following and integrating with BPM approaches and modeling techniques.

Originality/value

The paper provides empirical insights into the cognitive effectiveness of corporate communications modeling based on BPMN and positions the corresponding models into typical process architecture.

Details

Business Process Management Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 40000