Search results

1 – 10 of 634
Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond to

Abstract

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond to comparable self-reported acts of bullying or sexual discrimination slightly more often than men with the self-labeling as “bullied” or “sexually discriminated and/or harassed.” This study tests this hypothesis for women and men in the scientific workplace and explores patterns of gender-related differences in self-reporting behavior.

Basic design: The hypotheses on the connection between gender and the threshold for self-labeling as having been bullied or sexually discriminated against were tested based on a sample from a large German research organization. The sample includes 5,831 responses on bullying and 6,987 on sexual discrimination (coverage of 24.5 resp. 29.4 percentage of all employees). Due to a large number of cases and the associated high statistical power, this sample for the first time allows a detailed analysis of the “gender-related measurement gap.” The research questions formulated in this study were addressed using two hierarchical regression models to predict the mean values of persons who self-labeled as having been bullied or sexually discriminated against. The status of the respondents as scientific or non-scientific employees was included as a control variable.

Results: According to a self-labeling approach, women reported both bullying and sexual discrimination more frequently. This difference between women and men disappeared for sexual discrimination when, in addition to the gender of a person, self-reported behavioral items were considered in the prediction of self-labeling. For bullying, the difference between the two genders remained even in this extended prediction. No statistically significant relationship was found between the frequency of self-reported items and the effect size of their interaction with gender for either bullying or sexual discrimination. When comparing bullying and sexual discrimination, it should be emphasized that, on average, women report experiencing a larger number of different behavioral items than men.

Interpretation and relevance: The results of the study support the current state of research. However, they also show how volatile the measurement instruments for bullying and sexual discrimination are. For example, the gender-related measurement gap is considerably influenced by single items in the Negative Acts Questionnaire and Sexual Experience Questionnaire. The results suggest that women are generally more likely than men to report having experienced bullying and sexual discrimination. While an unexplained “gender gap” in the understanding of bullying was found for bullying, this was not the case for sexual discrimination.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Open Access
Article
Publication date: 9 March 2023

Katja Hutter, Ferry-Michael Brendgens, Sebastian Peter Gauster and Kurt Matzler

This paper aims to examine the key challenges experienced and lessons learned when organizations undergo large-scale agile transformations and seeks to answer the question of how…

4214

Abstract

Purpose

This paper aims to examine the key challenges experienced and lessons learned when organizations undergo large-scale agile transformations and seeks to answer the question of how incumbent firms achieve agility at scale.

Design/methodology/approach

Building on a case study of a multinational corporation seeking to scale up agility, the authors combined 36 semistructured interviews with secondary data from the organization to analyze its transformation since the early planning period.

Findings

The results show how incumbent firms develop and successfully integrate agility-enhancing capabilities to sense, seize and transform in times of digital transformation and rapid change. The findings highlight how agility can be established initially at the divisional level, namely with a key accelerator in the form of a center of competence, and later prepared to be scaled up across the organization. Moreover, the authors abstract and organize the findings according to the dynamic capabilities framework and offer propositions of how companies can achieve organizational agility by scaling up agility from a divisional to an organizational level.

Practical implications

Along with in-depth insights into agile transformations, this article provides practitioners with guidance for developing agility-enhancing capabilities within incumbent organizations and creating, scaling and managing agility across them.

Originality/value

Examining the case of a multinational corporation's exceptional, pioneering effort to scale agility, this article addresses the strategic importance of agility and explains how organizational agility can serve incumbent firms in industries characterized by uncertainty and intense competition.

Details

Management Decision, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0025-1747

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Open Access
Article
Publication date: 17 March 2020

Edward W. Miles, Jeff Schatten and Elizabeth Chapman

Face threat sensitivity (FTS) has been found to influence objective negotiated outcomes when the threat to face is activated. The purpose of this study is to extend that research…

4329

Abstract

Purpose

Face threat sensitivity (FTS) has been found to influence objective negotiated outcomes when the threat to face is activated. The purpose of this study is to extend that research by testing whether FTS – which is defined as a propensity to act – is associated with the outcomes of negotiators when the threat has not been specifically activated. Face theory specifies that face threats can cause individuals to take proactive steps to avoid threats before they might occur.

Design/methodology/approach

Drawing on face theory and social role theory, the authors conduct a negotiation experiment and use hierarchical regression to test hypotheses concerning the relationship between FTS for sellers and buyers on negotiated outcomes in both distributive and integrative negotiations. The authors also use moderated regression to test if gender moderates the relationship between buyer and seller FTS and negotiation outcomes.

Findings

Results show that, when the threat is not activated, high FTS buyers pay more than low FTS buyers. Consistent with face theory and social role theory, this effect is moderated by gender, with the association being stronger for women buyers than for men buyers.

Originality/value

This paper exhibits that FTS can influence negotiator behavior even when FTS is not activated. This is valuable to negotiation scholars and practitioners who are interested in the role that individual characteristics play in negotiation behavior.

Details

Organization Management Journal, vol. 17 no. 1
Type: Research Article
ISSN: 1541-6518

Keywords

Open Access
Article
Publication date: 12 November 2018

Stefan Fenz and Thomas Neubauer

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and…

3622

Abstract

Purpose

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and, therefore, the cost efficiency of the information security compliance checking process. The authors advanced the state-of-the-art by developing and applying the method to ISO 27002 information security controls and by developing a semantic decision support system.

Design/methodology/approach

The research has been conducted under design science principles. The formalized information security controls were used in a compliance/risk management decision support system which has been evaluated with experts and end-users in real-world environments.

Findings

There are different ways of obtaining compliance to information security standards. For example, by implementing countermeasures of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential.

Originality/value

Formalizing and mapping the ISO 27002 controls to the security ontology enabled the authors to automatically determine the compliance status and organization-wide risk-level based on the formal control descriptions and the modelled environment, including organizational structures, IT infrastructure, available countermeasures, etc. Furthermore, it allowed them to automatically determine which countermeasures are missing to ensure compliance and to decrease the risk to an acceptable level.

Details

Information & Computer Security, vol. 26 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 16 April 2024

Daria Arkhipova, Marco Montemari, Chiara Mio and Stefano Marasca

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The…

Abstract

Purpose

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The changes the authors are interested in are linked to technology-driven innovations in managerial decision-making and in organizational structures. In addition, the paper highlights research gaps and opportunities for future research.

Design/methodology/approach

The authors adopted a grounded theory literature review method (Wolfswinkel et al., 2013) to achieve the study’s aims.

Findings

The authors identified four research themes that describe the changes in the management accounting profession due to technology-driven innovations: structured vs unstructured data, human vs algorithm-driven decision-making, delineated vs blurred functional boundaries and hierarchical vs platform-based organizations. The authors also identified tensions mentioned in the literature for each research theme.

Originality/value

Previous studies display a rather narrow focus on the role of digital technologies in accounting work and new competences that management accountants require in the digital era. By contrast, the authors focus on the broader technology-driven shifts in organizational processes and structures, which vastly change how accounting information is collected, processed and analyzed internally to support managerial decision-making. Hence, the paper focuses on how management accountants can adapt and evolve as their organizations transition toward a digital environment.

Details

Meditari Accountancy Research, vol. 32 no. 7
Type: Research Article
ISSN: 2049-372X

Keywords

Content available
Article
Publication date: 21 November 2023

Josef Schindler, Andreas Kallmuenzer and Marco Valeri

The aim of this paper is to improve the understanding of strategies for how established companies can respond to disruptive innovation, handle increasing complexity, facilitate…

Abstract

Purpose

The aim of this paper is to improve the understanding of strategies for how established companies can respond to disruptive innovation, handle increasing complexity, facilitate entrepreneurial culture and processes and successfully manage organizational ambidexterity.

Design/methodology/approach

A qualitative multiple-case study was conducted to explore successful practices of innovation ambidexterity (IA) and their organizational design, entrepreneurial culture and mindset, processes and leadership. Two internationally established firms that have launched and established IA programs provided deep insight, revealing their strategy and learning on the path toward effective IA.

Findings

The findings show that accepting and managing the inherent complexity increases within an ambidextrous organization strategy is a decisive factor in achieving effective IA. As a result, segmenting small organizational units and granting them extensive autonomy is proposed for managing the complexity of an organization while increasing its effectiveness. Furthermore, it is shown that this helps foster entrepreneurial culture, mindsets and processes as additional mediators for achieving effective IA. Coaching, empowerment and trust were identified as key factors of ambidextrous leadership values that encourage entrepreneurial behavior and decision-making.

Originality/value

To the best of the authors knowledge the first study connecting the research fields of complexity management, organizational ambidexterity theory and entrepreneurial culture while applying the fundamentals of systems theory to propose a practical management framework for successfully responding to disruptive innovation.

Open Access
Article
Publication date: 11 November 2022

Allen C. Johnston

In identifying both the topics of interest and key limitations of the extant organizational security research, both opportunities for future research as well as some underlying…

1211

Abstract

Purpose

In identifying both the topics of interest and key limitations of the extant organizational security research, both opportunities for future research as well as some underlying challenges for conducting this research may be revealed.

Design/methodology/approach

To identify the leading organizational cybersecurity research topics of interest and their key limitations, the author conducted a topic modeling analysis of the organizational level studies published in the Association for Information Systems (AIS) senior scholars' “basket of eight journals” (Association for Information Systems, 2022) over the past five years.

Findings

Leading topics include (1) organizational security research concerns governance and strategic level decision-making and their role in shaping organizational security successes and failures, (2) cybercriminals and organizations' ability to monitor and detect them from both within and outside the firm; (3) cost, liability and security negligence, (4) organizations' innovation dispositions for security products and services and (5) organizational breach response efficacy; while key limitations of this study include the following: (1) scholars' ability to propose and assess strategic and operational level threat response recommendations, (2) their understanding how influence is formed and maintained among employees and groups and (3) their measurement instruments and models.

Originality/value

Organizations remained plagued by an ever-emerging set of threats to the security of their digital and informational assets. New threats are regularly discovered and remedies to existing threats are continually proven ineffective against these new threats. Providing an orientation to the current research on organizational security can help advance their security efforts.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 28 February 2023

Onyeka John Chukwuka, Jun Ren, Jin Wang and Dimitrios Paraskevadakis

Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk…

2581

Abstract

Purpose

Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk management issues in the context of emergency supply chains, and this existing research lacks inbuilt and practical techniques that can significantly affect the reliability of risk management outcomes. Therefore, this paper aims to identify and practically analyze the specific risk factors that can most likely disrupt the normal functioning of the emergency supply chain in disaster relief operations.

Design/methodology/approach

This paper has used a three-step process to investigate and evaluate risk factors associated with the emergency supply chain. First, the study conducts a comprehensive literature review to identify the risk factors. Second, the research develops a questionnaire survey to validate and classify the identified risk factors. At the end of this step, the study develops a hierarchical structure. Finally, the research investigates the weighted priority of the validated risk factors using the fuzzy-analytical hierarchy process (FAHP) methodology. Experts were required to provide subjective judgments.

Findings

This paper identified and validated 28 specific risk factors prevalent in emergency supply chains. Based on their contextual meanings, the research classified these risk factors into two main categories: internal and external risk factors; four subcategories: demand, supply, infrastructural and environmental risk factors; and 11 risk types: forecast, inventory, procurement, supplier, quality, transportation, warehousing, systems, disruption, social and political risk factors. The most significant risk factors include war and terrorism, the absence of legislative rules that can influence and support disaster relief operations, the impact of cascading disasters, limited quality of relief supplies and sanctions and constraints that can hinder stakeholder collaboration. Therefore, emergency supply chain managers should adopt appropriate strategies to mitigate these risk factors.

Research limitations/implications

This study will contribute to the general knowledge of risk management in emergency supply chains. The identified risk factors and structural hierarchy taxonomic diagram will provide a comprehensive risk database for emergency supply chains.

Practical implications

The research findings will provide comprehensive and systemic support for respective practitioners and policymakers to obtain a firm understanding of the different risk categories and specific risk factors that can impede the effective functioning of the emergency supply chain during immediate disaster relief operations. Therefore, this will inform the need for the improvement of practices in critical aspects of the emergency supply chain through the selection of logistics and supply chain strategies that can ensure the robustness and resilience of the system.

Originality/value

This research uses empirical data to identify, categorize and validate risk factors in emergency supply chains. This study contributes to the theory of supply chain risk management. The study also adopts the fuzzy-AHP technique to evaluate and prioritize these risk factors to inform practitioners and policymakers of the most significant risk factors. Furthermore, this study serves as the first phase of managing risk in emergency supply chains since it motivates future studies to empirically identify, evaluate and select effective strategies that can eliminate or minimize the effects of these risk factors.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 29 June 2023

Shamirah Najjinda, Kasimu Sendawula, Samson Omuudu Otengei, Ahmad Walugembe and Saadat Nakyejwe Lubowa Kimuli

The purpose of this study is to establish whether dynamic capabilities mediates the association between social capital and sustainable growth of full-service restaurants in…

1461

Abstract

Purpose

The purpose of this study is to establish whether dynamic capabilities mediates the association between social capital and sustainable growth of full-service restaurants in Kampala, Uganda.

Design/methodology/approach

This study is cross-sectional and correlational in nature. A self-administered questionnaire was used to gather data from 154 full-service restaurants in Kampala. Statistical Package for the Social Sciences (SPSS.25) and Medgraph – Excel Version were used to conduct correlation, hierarchical regression and mediation analysis on the data in order to establish the mediating role of dynamic capabilities.

Findings

Study findings revealed that first, social capital and dynamic capabilities significantly predict sustainable growth of full-service restaurants, second, social capital is significantly associated with dynamic capabilities and third, dynamic capabilities significantly mediate social capital and sustainable growth of full-service restaurants.

Originality/value

The study confirmed that dynamic capabilities significantly mediate social capital and sustainable growth of full-service restaurants unlike the previous studies that focused on the direct association between the study variables in explicating sustainable growth.

Details

Journal of Work-Applied Management, vol. 15 no. 2
Type: Research Article
ISSN: 2205-2062

Keywords

1 – 10 of 634