Search results

1 – 10 of over 34000
To view the access options for this content please click here
Article
Publication date: 21 August 2009

Mary Barrett

Changing language ideology and the decreased popularity of overt feminism suggest that aspiring female managers may be less influenced than senior women managers by the…

Abstract

Purpose

Changing language ideology and the decreased popularity of overt feminism suggest that aspiring female managers may be less influenced than senior women managers by the gender of the speaker in evaluating whether specific communication strategies are effective and probable. The purpose of this paper is to investigate this issue.

Design/methodology/approach

A total of 255 second‐year female management students evaluate strategies for the same workplace dilemmas as senior women managers (Barrett).

Findings

For short‐ and medium‐term dilemmas students, like senior women managers, regard masculine communication strategies with a feminine element as effective. They are less influenced by the speaker's gender than senior women managers in evaluating the strategies' probability. But when seeking promotion, students avoid some strategies they consider effective, and believe men would use. Students' confidence as communicators affects their personal choice of strategy.

Research limitations/implications

The paper investigates a limited number of dilemmas and sought information about a limited number of demographic factors, limiting the results' generalizability. Nevertheless, it suggests future women managers could learn from their senior counterparts if they want to advance at work. Future research should investigate whether future male managers' reactions to these dilemmas are similar to women students and senior managers, and whether scenarios using female dyads yield similar results. Cross‐cultural extensions of the research are also possible.

Originality/value

This is the first study comparing aspiring and senior women managers' reactions to classic workplace communication problems. The findings show similarities between aspiring managers and their senior sisters, but also differences which could affect aspiring managers' career success.

Details

Gender in Management: An International Journal, vol. 24 no. 6
Type: Research Article
ISSN: 1754-2413

Keywords

To view the access options for this content please click here
Article
Publication date: 1 December 2004

Mary Barrett

The paper discusses some gender debates in linguistic behaviour and suggests how scenario‐based research techniques may contribute. It then presents a survey‐based study…

Abstract

The paper discusses some gender debates in linguistic behaviour and suggests how scenario‐based research techniques may contribute. It then presents a survey‐based study of 157 Australian female, organisationally senior, managers. For each of three workplace communication dilemmas, participants evaluated a series of strategic responses, indicating both how effective and how probable they thought the responses were. Despite the participants’ seniority and confidence as communicators, their evaluation of the strategies often varied with whether they believed the communication strategist in the scenario was male or female. This suggests that even confident, organisationally senior women still maintain some traditional gender‐based ideas about good communication. Despite this, the participants’ own preferred communication strategies did not vary with their seniority or their confidence in expressing opinions. The study's theoretical and practical implications and some limitations are discussed, together with topics for further research.

Details

Women in Management Review, vol. 19 no. 8
Type: Research Article
ISSN: 0964-9425

Keywords

To view the access options for this content please click here
Article
Publication date: 23 October 2007

B. McCarthy, C. Edwards and M. Dunmore

This paper aims to discuss network transparency in a mountain rescue domain and aims to introduce the relatively new research concept of MANEMO (MANET + NEMO) and the…

Abstract

Purpose

This paper aims to discuss network transparency in a mountain rescue domain and aims to introduce the relatively new research concept of MANEMO (MANET + NEMO) and the mountain rescue IP network model developed at Lancaster University.

Design/methodology/approach

An analysis of IP mobility techniques that have been designed for use in the Internet today is provided as background, as well as an overview of the whole MANEMO domain. Highlights the importance of the MANEMO concept by working with real scenarios and developing practical implementations (as opposed to simulation).

Findings

During the research it was found that combining the localised multi‐hop behaviour of MANET techniques and the global reachability of NEMO can be a mutually beneficial process. The benefits afforded by using MANET techniques can bring advantages to NEMO scenarios and vice‐versa. Identifying this fact has given rise to the development of two distinct MANEMO scenarios, MANET‐Centric and NEMO‐Centric MANEMO. Finally, the Unified MANEMO Architecture (UMA) implementation, which attempts to support both of these scenarios in an efficient and feasible manner.

Research limitations/implications

Regarding UMA, research continues into addressing the security implications of this approach and the benefits that multi‐homing can provide.

Originality/value

The paper illustrates how MANEMO can conceivably provide powerful solutions to many important scenarios.

Details

Internet Research, vol. 17 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 14 March 2016

Adrian W. Müller and Jan Oliver Shwarz

– The purpose of this paper is to address a central question in foresight exercises: how to communicate derived results?

Abstract

Purpose

The purpose of this paper is to address a central question in foresight exercises: how to communicate derived results?

Design/methodology/approach

By drawing on an empirical study, this paper presents a framework for using visualizations in foresight and illustrates its application by referring to a case study.

Findings

The argument is made that by using a dimensional framework, the effects of visualization can be leveraged for communicating foresight results and creating stronger buy-in.

Originality/value

Although visualizations appear to be a central means of communication and engagement, little is known in the context of foresight on the functions and dimension of visualizations.

Details

Foresight, vol. 18 no. 1
Type: Research Article
ISSN: 1463-6689

Keywords

To view the access options for this content please click here
Article
Publication date: 20 November 2009

Daniel Kraft, Marc Bechler, Hans‐Joachim Hof, Frank Pählke and Lars Wolf

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication…

Abstract

Purpose

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues.

Design/methodology/approach

In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network‐signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates.

Findings

The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log‐on times, availability, and communication overhead.

Originality/value

The paper introduces a cluster‐based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 28 September 2007

Jörg Nitzsche, Tammo van Lessen, Dimka Karastoyanova and Frank Leymann

Service‐oriented architecture (SOA) is an architecture paradigm targeting integration of applications within and across enterprise boundaries. It has gathered research and…

Abstract

Purpose

Service‐oriented architecture (SOA) is an architecture paradigm targeting integration of applications within and across enterprise boundaries. It has gathered research and industry acceptance and has given an enormous impetus to the business process management technology. Web service (WS) technology is one implementation of the SOA paradigm. It enables seamless integration of new and legacy applications through a stack of standardized composable specifications. WS orchestration is facilitated by the Business Process Execution Language which provides a recursive service composition model. While the programming model the WS technology provides is very flexible, a major deficiency is the need to discover services implementing a particular abstract interface, whereas functional similarities of services are disregarded. The Semantic Web Service technologies, like Web Service Modelling Ontology (WSMO) and Web Ontology Language for Services have been developed with the purpose of eliminating these deficiencies by enabling service discovery based on functional and non‐functional properties. The paper aims to focus on these issues.

Design/methodology/approach

This paper presents a list of requirements that business processes impose on SOA applications. It analyzes the support that WSMO/Web Service Model eXecution environment (WSMX) provides to address these requirements and compares it with the support enabled by the WS specification stack.

Findings

The paper identifies major flaws in the WSMO model and its reference implementation with respect to business process support.

Originality/value

The paper recommends possible solutions for eliminating the lack of needed features on behalf of WSMO/WSMX. It presents in detail how to enable asynchronous stateful communication among WSMO WS and partner‐based WS discovery by extending the WSMO model. Additionally, it extends the API of the reference implementation to facilitate the execution of services communicating asynchronously.

Details

International Journal of Web Information Systems, vol. 3 no. 1/2
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 13 June 2019

Alessandro Fergnani

The purpose of this paper is to formally introduce the future persona, a futures method to let scenarios come to life. A future persona is a scenario-specific fictional…

Abstract

Purpose

The purpose of this paper is to formally introduce the future persona, a futures method to let scenarios come to life. A future persona is a scenario-specific fictional individual living in the future scenario (s)he is meant to depict. The paper provides a formal, systematic and clear step-by-step guide on how to create engaging and effective future personas after a scenario planning exercise.

Design/methodology/approach

After having introduced the future persona method, tracing it back to the customer persona method in user centered design (UCD) and differentiating it from previous uses of futures characters in the futures studies literature and in other domains, an example of the creation process of four future personas based on four scenario archetypes of the futures of work is provided, illustrated with pictures and discussed.

Findings

Future personas, with their narratives and graphical illustrations, are found to be particularly useful to convey scenarios to a target audience.

Practical implications

Futures personas can be used in a scenario planning exercise to increase the clarity of scenarios in the mind of scenario planners and to let scenarios be known inside an organization.

Originality/value

Future personas can substantially enrich scenarios, increasing their liveliness, playfulness and empathy.

Details

foresight, vol. 21 no. 4
Type: Research Article
ISSN: 1463-6689

Keywords

To view the access options for this content please click here
Article
Publication date: 12 March 2018

Oksana Doherty

The purpose of this paper is to review recent contributions to the theoretical and empirical literature on informational cascades.

Abstract

Purpose

The purpose of this paper is to review recent contributions to the theoretical and empirical literature on informational cascades.

Design/methodology/approach

This paper reviews and synthesises the existing literature, methodologies and evidence on informational cascades.

Findings

Many financial settings foster situations where informational cascades and herding are likely. Cascades remain mainly an area of experimental research, leaving the empirical evidence inconclusive. Existing measures have limitations that do not allow for a direct test of cascading behaviour. More accurate models and methods for empirical testing of informational cascades could provide more conclusive evidence on the matter.

Practical implications

Outlined findings have implications for designing policies and regulatory requirements, as well as for the design of collective decisions processes.

Originality/value

The paper reviews and critiques existing theory; it summarises the recent laboratory and empirical evidence and identifies issues for future research. Most of other theoretical work reviews informational cascades as a subsection of herding. This paper focusses on informational cascades specifically. It distinguishes between informational cascade and herding. The paper also reviews most recent empirical evidence on cascades, presents review and synthesis of the theoretical and empirical development on information cascades up to date, and reviews the model of informational cascades with model criticism.

Details

Review of Behavioral Finance, vol. 10 no. 1
Type: Research Article
ISSN: 1940-5979

Keywords

To view the access options for this content please click here
Article
Publication date: 10 March 2021

Afshan Amin Khan, Roohie Naaz Mir and Najeeb-Ud Din

This work focused on a basic building block of an allocation unit that carries out the critical job of deciding between the conflicting requests, i.e. an arbiter unit. The…

Abstract

Purpose

This work focused on a basic building block of an allocation unit that carries out the critical job of deciding between the conflicting requests, i.e. an arbiter unit. The purpose of this work is to implement an improved hybrid arbiter while harnessing the basic advantages of a matrix arbiter.

Design/methodology/approach

The basic approach of the design methodology involves the extraction of traffic information from buffer signals of each port. As the traffic arrives in the buffer of respective ports, information from these buffers acts as a source of differentiation between the ports receiving low traffic rates and ports receiving high traffic rates. A logic circuit is devised that enables an arbiter to dynamically assign priorities to different ports based on the information from buffers. For implementation and verification of the proposed design, a two-stage approach was used. Stage I comprises comparing the proposed arbiter with other arbiters in the literature using Vivado integrated design environment platform. Stage II demonstrates the implementation of the proposed design in Cadence design environment for application-specific integrated chip level implementation. By using such a strategy, this study aims to have a special focus on the feasibility of the design for very large-scale integration implementation.

Findings

According to the simulation results, the proposed hybrid arbiter maintains the advantage of a basic matrix arbiter and also possesses the additional feature of fault-tolerant traffic awareness. These features for a hybrid arbiter are achieved with a 19% increase in throughput, a 1.5% decrease in delay and a 19% area increase in comparison to a conventional matrix arbiter.

Originality/value

This paper proposes a traffic-aware mechanism that increases the throughput of an arbiter unit with some area trade-off. The key feature of this hybrid arbiter is that it can assign priorities to the requesting ports based upon the real-time traffic requirements of each port. As a result of this, the arbiter is dynamically able to make arbitration decisions. Now because buffer information is valuable in winning the priority, the presence of a fault-tolerant policy ensures that none of the priority is assigned falsely to a requesting port. By this, wastage of arbitration cycles is avoided and an increase in throughput is also achieved.

To view the access options for this content please click here
Article
Publication date: 15 October 2018

Ferdy Novianto, Sumartono , Irwan Noor and Lely Indah Mindarti

This paper aims to examine the effect of communication, resources, disposition and bureaucratic structure to the success of energy subsidy policy, to examine the effect of…

Abstract

Purpose

This paper aims to examine the effect of communication, resources, disposition and bureaucratic structure to the success of energy subsidy policy, to examine the effect of moderation of variable scenario of renewable energy policy on the influence of communication, resources, disposition and bureaucracy structure on the success of energy subsidy policy.

Design/methodology/approach

This study was purposively (based on specific objectives) conducted in Jakarta, which is associated with the implementation and subsidy policy scenario, the study focused on the center of government, namely, the capital city, Jakarta. Collection of data in this research survey was conducted in June-August 2017. The sampling technique was proportional stratified random sampling that took up most of the 770 members of Masyarakat Peduli Energi dan Lingkungan and Masyarakat Energi Terbarukan Indonesia using a representative sample of results that have the ability to be generalized. Based on the formula Slovin (Solimun and Fernandes, 2017), a sample of 145 respondents was obtained. The research approach used was a quantitative with the analysis tool called the generalized structure component analysis.

Findings

This paper exhibited that all relationships between variables have a p-value of 0.05 except the third moderation and fourth moderation relationship. So it can be said that all relationships between variables are significant except the relationship between the variables of moderation to the relationship between the disposition variable (X3) on the successful implementation of subsidy policy (Y) and the relationship between the moderation variable to the relationship between bureaucracy structure variable (X4) to the successful implementation of subsidy policy.

Originality/value

The originality of the research refers to the following: The Policy Theory described by Edwards III (1980), and reinforced by the findings of Ratminto and Winarsih (2005), and Bloom et al. (2009), that communication, resources, dispositions and bureaucratic structures affect the success of the energy subsidy policy. This becomes the formulation of a hypothesized research problem whether communication, resources, disposition and bureaucratic structure affect the success of the energy subsidy policy. In fact, the conditions in Indonesia are quite different from the Western world, and the system in Indonesia has embraced subsidies. Therefore, this study also examines the moderating effects of renewable energy policy scenarios in the relationship between communication, resources, dispositions and bureaucratic structures on the success of the subsidy policy energy. Given that there is no strong theory that examines the effects of moderation of these four factors on the success of the energy subsidy policy. Therefore, as the development of Edward III Theory, this study examines the proposition of whether renewable energy policy scenarios reinforce or weaken (moderation effects) on the effects of communication, resources, dispositions and bureaucratic structures on the success of energy subsidy policies.

Details

foresight, vol. 20 no. 5
Type: Research Article
ISSN: 1463-6689

Keywords

1 – 10 of over 34000