Search results

1 – 10 of 15
Article
Publication date: 11 January 2022

Steven Pattinson, James Cunningham, David Preece and Mark A. P. Davies

This paper identifies exigent factors that enable and constrain trust building in a science-based innovation ecosystem.

Abstract

Purpose

This paper identifies exigent factors that enable and constrain trust building in a science-based innovation ecosystem.

Design/methodology/approach

Set in the Northeast England, this study adopts a processual sensemaking approach to thematically analyse interviews with a diverse range of participants in six science-based SMEs.

Findings

The findings provide a unique exposition of trust building in an innovation ecosystem across geographic and platform relationships. In doing so, the findings highlight factors outside of contractual agreements that enable or constrain trust building in an innovation ecosystem.

Research limitations/implications

Limitations centred on subjectivity in the use of thematic analysis, sample bias and size. Sampling limitations were mitigated through the research design and analysis.

Practical implications

The findings provide unique insights into understanding the exigent factors that enable or constrain trust building in a science-based innovation ecosystem.

Originality/value

The study identifies five exigent factors that constrain or enable trust building in science-based SMEs' innovation ecosystem at a micro-level – building network relationships, degree of novelty, protection of innovations, propensity for adding value, propensity for risk.

Details

Journal of Small Business and Enterprise Development, vol. 29 no. 6
Type: Research Article
ISSN: 1462-6004

Keywords

Article
Publication date: 30 November 2023

Kristiina Niemi-Kaija and Steven Pattinson

The purpose of this systematic narrative review is to discourse on vision and organizational performance. By analysing work-life and organization studies journals, the authors…

Abstract

Purpose

The purpose of this systematic narrative review is to discourse on vision and organizational performance. By analysing work-life and organization studies journals, the authors respond to a call to view the process of visioning more holistically.

Design/methodology/approach

The methodological approach is a discourse-oriented qualitative content analysis. The authors explore visioning through an epistemological lens, which emphasizes both the connections and differences between “traditional” philosophical approaches.

Findings

The findings show how the different interpretations of vision and related concepts are tied to the following themes: clarity, causality, embodiment and sensory experiences and actionability.

Originality/value

Through the frameworks of scientific realism and relativism, the authors illustrate novel insights into the ways in which visioning occupies a place in knowledge management.

Details

Management Research Review, vol. 47 no. 5
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 4 February 2014

Steven Pattinson and David Preece

Recent research into communities of practice (CoPs) has focused on large organizations, suggesting they can be constructed for the purposes of knowledge acquisition and

2344

Abstract

Purpose

Recent research into communities of practice (CoPs) has focused on large organizations, suggesting they can be constructed for the purposes of knowledge acquisition and innovation. The present study found that, for science-based SMEs, CoPs are more likely to emerge unplanned to support incremental innovation in the form of problem-solving activities. This paper aims to discuss these points.

Design/methodology/approach

Deploying a social constructionist research methodology, thematic template analysis was used to analyze 25 in-depth interviews conducted with a range of employees in six science-based SMEs.

Findings

Both intra and inter-organizational CoPs were leveraged for a variety of purposes, including knowledge acquisition and the enhancement of the organizations' ability to generate innovative solutions.

Research limitations/implications

Whilst there is no claim for the representativeness of the sample in relation to the wider population of science-based firms, the paper offers new material and theorizing in a domain which has been dominated to date by a focus upon large organizations and a managerialist orientation.

Practical implications

A contextualized framework for the construction of CoPs in science-based SMEs has been developed from the findings of this study.

Originality/value

The role of CoPs in science-based SMEs and the factors that influence their success or failure have been neglected to date, and thus have received little attention in the literature. Yet CoPs, as we found, can contribute to knowledge acquisition and innovation.

Details

Journal of Knowledge Management, vol. 18 no. 1
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 16 March 2012

Malcolm Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac and Marcus Butavicius

The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how…

3414

Abstract

Purpose

The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings.

Design/methodology/approach

This study was a scenario‐based role‐play experiment that involved the development of a web‐based questionnaire that was only accessible by invited participants when they attended a one‐hour, facilitated session in a computer laboratory.

Findings

The findings indicate that overall, genuine e‐mails were managed better than phishing e‐mails. However, informed participants managed phishing e‐mails better than not‐informed participants. Other findings show how familiarity with computers, cognitive impulsivity and personality traits affect behavioural responses to both types of e‐mail.

Research limitations/implications

This study does not claim to evaluate actual susceptibility to phishing emails. The subjects were University students and therefore the conclusions are not necessarily representative of the general population of e‐mail users.

Practical implications

The outcomes of this research would assist management in their endeavours to improve computer user behaviour and, as a result, help to mitigate risks to their organisational information systems.

Originality/value

The literature review indicates that this paper addresses a genuine gap in the research.

Abstract

Details

Journal of Business & Industrial Marketing, vol. 38 no. 5
Type: Research Article
ISSN: 0885-8624

Article
Publication date: 16 October 2007

Malcolm R. Pattinson and Grantley Anderson

The aim of this paper is, first, to discuss how the risk perceptions of computer end‐users may be influenced by improving the process of risk communication by embedding symbols…

1993

Abstract

Purpose

The aim of this paper is, first, to discuss how the risk perceptions of computer end‐users may be influenced by improving the process of risk communication by embedding symbols and graphics within information security messages. The second aim is to describe some pilot study research that the authors have conducted in an attempt to ascertain whether the embedding of symbols and graphics within information security messages achieves a shift in the risk perceptions of computer end‐users.

Design/methodology/approach

Two pilot studies were undertaken. The objective of each study was to establish whether the embedding of a relevant graphic relating to some known aspect of information security, when placed inside an information security message, would have any influence on the information security risk perceptions of any individual to whom the message was being communicated. In both studies, the method of eliciting a response from each participant involved the use of a type of semantic differential (SD) grid.

Findings

On completing an analysis of the responses to the SD grid survey for both studies, no statistically significant differences were detected between the groups with respect to any of the six relevant scales. Nevertheless, it seems that the differences were large enough for the present authors to be convinced that the SD measures used are an appropriate survey technique for future studies in a workplace environment.

Research limitations/implications

The research subjects (i.e. survey participants) for both pilot studies were students of the University of South Australia. There are many ways in which information risk communication could be made more effective and this paper only attempts to show how graphics and symbols could be used to convey risk messages more effectively. This paper does not in any way attempt to provide any “silver‐bullet” solutions for management in terms of what they can do towards managing information risk.

Practical implications

The ultimate objective of this research is to subsequently advise management on how they can communicate information risk simply and more effectively to achieve the final outcome, i.e. the mitigation of actual risks.

Originality/value

It is believed that, if the effectiveness of the various forms of risk communication within an organisation can be increased, then the general perception of the risks to the information systems will be more realistic.

Details

Information Management & Computer Security, vol. 15 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 13 June 2016

Steven Furnell and Nathan Clarke

510

Abstract

Details

Information & Computer Security, vol. 24 no. 2
Type: Research Article
ISSN: 2056-4961

Content available
Article
Publication date: 16 October 2007

Steven Furnell and Nathan Clarke

317

Abstract

Details

Information Management & Computer Security, vol. 15 no. 5
Type: Research Article
ISSN: 0968-5227

Article
Publication date: 9 July 2018

Manal Alohali, Nathan Clarke, Fudong Li and Steven Furnell

The end-user has frequently been identified as the weakest link; however, motivated by the fact that different users react differently to the same stimuli, identifying the reasons…

1017

Abstract

Purpose

The end-user has frequently been identified as the weakest link; however, motivated by the fact that different users react differently to the same stimuli, identifying the reasons behind variations in security behavior and why certain users could be “at risk” more than others is a step toward protecting and defending users against security attacks. This paper aims to explore the effect of personality trait variations (through the Big Five Inventory [BFI]) on users’ risk level of their intended security behaviors. In addition, age, gender, service usage and information technology (IT) proficiency are analyzed to identify what role and impact they have on behavior.

Design/methodology/approach

The authors developed a quantitative-oriented survey that was implemented online. The bi-variate Pearson two-tailed correlation was used to analyze survey responses.

Findings

The results obtained by analyzing 538 survey responses suggest that personality traits do play a significant role in affecting users’ security behavior risk levels. Furthermore, the results suggest that BFI score of a trait has a significant effect as users’ online personality is linked to their offline personality, especially in the conscientiousness personality trait. Additionally, this effect was stronger when personality was correlated with the factors of IT proficiency, gender, age and online activity.

Originality/value

The contributions of this paper are two-fold. First, with the aid of a large population sample, end-users’ security practice is assessed from multiple domains, and relationships were found between end-users’ risk-taking behavior and nine user-centric factors. Second, based upon these findings, the predictive ability for these user-centric factors were evaluated to determine the level of risk a user is subject to from an individual behavior perspective. Of 28 behaviors, 11 were found to have a 60 per cent or greater predictive ability, with the highest classification of 92 per cent for several behaviors. This provides a basis for organizations to use behavioral intent alongside personality traits and demographics to understand and, therefore, manage the human aspects of risk.

Details

Information & Computer Security, vol. 26 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 January 2021

Steven Tam and David E. Gray

This study examines employees' learning preferences in small and medium-sized enterprises (SMEs) at different life-cycle stages.

Abstract

Purpose

This study examines employees' learning preferences in small and medium-sized enterprises (SMEs) at different life-cycle stages.

Design/methodology/approach

The study has two phases. Phase I classified a sample of 30 Hong Kong SMEs into three different life-cycle stages (inception, high growth or maturity). Phase II then explored/compared their employees' learning practices in terms of importance using a mixed-method design through an online learning questionnaire followed by face-to-face semi-structured interviews.

Findings

Based on a list of 32 learning practices common to SME workplaces, the study identified how SME employees perceive the importance of a learning practice. The top 5 and the bottom 5 learning practices in SMEs across life-cycle stages are presented to promote best interests for SME executives.

Research limitations/implications

While SME learning is highly varied, this study sheds light on some traceable context about it as an SME grows. Similar studies with additional SMEs, including SMEs in other locations, are encouraged to strengthen the findings.

Practical implications

The findings help SME executives understand what learning practices are most important (or least important) for their employees, given the life-cycle stage of the firm. Aligning a business with employees' learning preferences in a timely fashion is a managerial decision to be made for driving organizational effectiveness.

Originality/value

It is among the first studies connecting employee learning in SMEs and organizational life cycle to address a critical but missing inquiry.

Details

Journal of Strategy and Management, vol. 14 no. 4
Type: Research Article
ISSN: 1755-425X

Keywords

1 – 10 of 15