Search results

1 – 10 of over 1000
Content available
Article
Publication date: 1 March 2014

Paula Alexander Becker

Kiobel v. Royal Dutch Petroleum Co. involves an action under the Alien Tort Statute (ATS). The case was brought in the United States, Southern District of New York, by the widow…

1920

Abstract

Kiobel v. Royal Dutch Petroleum Co. involves an action under the Alien Tort Statute (ATS). The case was brought in the United States, Southern District of New York, by the widow of Dr. Barinem Kiobel, a Nigerian activist and member of the Ogoni tribe, and others for human rights violations committed in the Niger River Delta. Defendants include Royal Dutch Petroleum, Shell Transport and Trading Co., and Shell Petroleum Development Company of Nigeria. Although the human rights violations including murder and torture were allegedly committed by the Nigerian military government, it is claimed that the Royal Dutch Petroleum defendants aided and abetted the Nigerian military in the human rights violations. The plaintiffs had engaged in protests about the environmental damage caused by the Royal Dutch Petroleum defendants in the area of the Niger Delta and the plight of the Ogoni people in Ogoniland. At the trial level, the court decided that certain claims involving violations of the Law of Nations could be heard by the court. However, the case was appealed to the U.S. Supreme Court, which decided that there is a presumption against extraterritoriality in the application of the ATS, and that “mere presence” of a defendant corporation in the United States is insufficient for a court to assume jurisdiction. However, the question remains: What corporate presence would serve as a sufficient basis for a court to assume jurisdiction under the ATS? Given the possibility that corporations could, and perhaps in the future will, be found liable for human rights violations occurring in foreign locales even after Kiobel, prudent risk management behooves corporations and their counsel to monitor whether human rights violations are occurring in connection with their operations, even when those human rights violations are committed by foreign governments or their agents.

Details

New England Journal of Entrepreneurship, vol. 17 no. 1
Type: Research Article
ISSN: 2574-8904

Keywords

Open Access
Article
Publication date: 29 April 2021

Anthony Macari and Grace Chun Guo

This conceptual paper focuses on a common observation in the implementation stage of reward-based crowdfunding (RBC) – entrepreneurs' failures and delays in delivery of rewards to…

1127

Abstract

Purpose

This conceptual paper focuses on a common observation in the implementation stage of reward-based crowdfunding (RBC) – entrepreneurs' failures and delays in delivery of rewards to investors, which, in turn, may be perceived as violations of reward delivery obligations.

Design/methodology/approach

Drawing on entrepreneurial personality theory and psychological contract theory, this paper develops propositions and identifies factors related to both entrepreneurs (overconfidence and narcissism) and factors related to investors (types of motivators and psychological contracts) that may explain the perceived violations of reward delivery obligations. Implications for theory and practice are also discussed.

Findings

The theoretical analysis, by wielding two independently developed literatures, has demonstrated that it is important to investigate factors that are related to both investors and entrepreneurs in understanding issues and challenges at different stages of the RBC model. The authors believe that the current analysis provides an integrated understanding and a solid foundation for researchers to further examine these issues by empirically testing these propositions.

Originality/value

The authors examined two previously understudied psychological factors in the context of RBC – entrepreneurial traits, mainly overconfidence and narcissism, and the type of psychological contracts formed between investors and entrepreneurs, both of which, according to McKenny et al. (2017), need greater attention from researchers studying crowdfunding.

Open Access
Article
Publication date: 2 August 2021

Botong Xue, Feng Xu, Xin Luo and Merrill Warkentin

A growing number of studies have investigated the effect of ethical leadership on behavioral outcome of employees. However, considering the important role of ethics in IS…

2653

Abstract

Purpose

A growing number of studies have investigated the effect of ethical leadership on behavioral outcome of employees. However, considering the important role of ethics in IS security, the security literature lacks a theoretical and empirical investigation of the relationship between ethical leadership and employees' security behavior, such as information security policy (ISP) violation. Drawing on social learning and social exchange theories, this paper empirically tests the impact of ethical leadership on employees' ISP violation intention through both information security climate (i.e. from a moral manager's perspective) and affective commitment (i.e. from a moral person's perspective).

Design/methodology/approach

The research was developed based on social learning theory and social exchange theory. To measure the variables in the model, the authors used and adapted measurement items from previous studies. The authors conducted a scenario-based survey with 339 valid responses to test and validate the research model.

Findings

Results indicated that information security climate fully mediates the relationship between ethical leadership and ISP violation intention. The authors also found that information security climate enhances the negative effect of affective commitment on ISP violation intention.

Originality/value

This research contributes to the literature of information security by introducing the role of ethical leadership and integrating two theories into our research model. This study also calls attention to how information security climate and affective commitment mediate the relationship between ethical leadership and employees' ISP violation intention. The theory-driven study provides important pragmatic guidance for enhancing the understanding of the importance of ethical leadership in information systems security research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 19 July 2023

Magnus Söderlund

Service robots are expected to become increasingly common, but the ways in which they can move around in an environment with humans, collect and store data about humans and share…

1184

Abstract

Purpose

Service robots are expected to become increasingly common, but the ways in which they can move around in an environment with humans, collect and store data about humans and share such data produce a potential for privacy violations. In human-to-human contexts, such violations are transgression of norms to which humans typically react negatively. This study examines if similar reactions occur when the transgressor is a robot. The main dependent variable was the overall evaluation of the robot.

Design/methodology/approach

Service robot privacy violations were manipulated in a between-subjects experiment in which a human user interacted with an embodied humanoid robot in an office environment.

Findings

The results show that the robot's violations of human privacy attenuated the overall evaluation of the robot and that this effect was sequentially mediated by perceived robot morality and perceived robot humanness. Given that a similar reaction pattern would be expected when humans violate other humans' privacy, the present study offers evidence in support of the notion that humanlike non-humans can elicit responses similar to those elicited by real humans.

Practical implications

The results imply that designers of service robots and managers in firms using such robots for providing service to employees should be concerned with restricting the potential for robots' privacy violation activities if the goal is to increase the acceptance of service robots in the habitat of humans.

Originality/value

To date, few empirical studies have examined reactions to service robots that violate privacy norms.

Details

Journal of Service Theory and Practice, vol. 33 no. 7
Type: Research Article
ISSN: 2055-6225

Keywords

Open Access
Article
Publication date: 13 September 2022

Dagmara Lewicka

The importance of trust in student–university relations is relevant not only for the quality of the educational process and the satisfaction with studying achieved by students…

1742

Abstract

Purpose

The importance of trust in student–university relations is relevant not only for the quality of the educational process and the satisfaction with studying achieved by students, but also for the importance of positive evaluation of HEIs to others. Therefore, the aim of this study is to identify the stages and mechanisms that build trust in student–university relations, the causes of trust violation and trust repair practices.

Design/methodology/approach

Public university students from Poland (16) and Germany (12) took part in the study based on semi-structured interviews. The research procedure followed an inductive approach. In addition, the critical events technique was used to identify trust violation and trust repair practices.

Findings

The study identifies the stages of the HEIs trust building process and the mechanisms upon which it is built. It attempts to catalogue trust violations, distinguishing three groups of “perpetrators” and categories of their differentiation in terms of their impact on trust. The study indicates ad hoc, informal methods of trust repair applied at HEIs and their conditions.

Practical implications

This study provides useful guidance for managers on how to build and maintain trust in HEIs.

Originality/value

The issue of trust building in HEIs is relatively new and therefore has not been sufficiently recognised to date. This study is the first to the author's knowledge to comprehensively address the problem of trust building, pointing out the mechanisms on which the formation of trust in HEIs is based. This study provides a novel contribution to the limited literature on trust violation and trust repair in HEIs.

Details

Journal of Organizational Change Management, vol. 35 no. 6
Type: Research Article
ISSN: 0953-4814

Keywords

Content available
Article
Publication date: 10 June 2021

Mohammed R.M. Elshobake

The purpose of this paper is to explore the most prominent human rights violations during the COVID-19 pandemic in accordance with international human rights law.

3082

Abstract

Purpose

The purpose of this paper is to explore the most prominent human rights violations during the COVID-19 pandemic in accordance with international human rights law.

Design/methodology/approach

Through doctrinal and legal study and content analysis, this paper analyses the important relevant legal provisions under International human rights law and applies these provisions to the reality of managing the COVID-19 crisis to identify the most prominent human rights violations during the COVID-19 outbreak. This research paper considered as a review paper in that it provides a review of the most prominent measures taken during the COVID-19 crisis, which constitutes violations of international human rights law.

Findings

It is concluded that some measures that have been taken by countries to confront the COVID-19 pandemic have constituted violations of human rights and did not comply with the legal conditions to restrict human rights. Indeed, the COVID-19 pandemic has shown the ugly fractures in health-care systems, health inequities, racism and discrimination, Undermining the right to freedom of expression and the right to access information, gross negligence in protecting detainees from COVID-19 infection, all of these constitute clear violations of the principles of international human rights law.

Research limitations/implications

The spread of COVID-19 has not stopped, and its effects still continue, including human rights violations. Therefore, this paper cannot enumerate all human rights violations that occur during the spread of COVID-19.

Practical implications

Based on the results in this paper, governments need to be more prepared to face any health crisis at all levels including health care, which would reduce human rights violations.

Social implications

This research paper reflects positively on the social reality, as the adoption of its recommendations leads to the provision of adequate health care to all members of society in accordance with the principles of human rights, granting them the right to access information, protecting their right to freedom of expression, reducing the phenomenon of racism and discrimination and providing adequate health care to all detainees.

Originality/value

This paper studies an up-to-date topic that we are still living and seeing its effects. The benefit of this paper is to provide recommendations that protect human rights during the COVID-19 pandemic.

Details

International Journal of Human Rights in Healthcare, vol. 15 no. 4
Type: Research Article
ISSN: 2056-4902

Keywords

Content available
Article
Publication date: 2 April 2019

Dimitra Topali and Harilaos N. Psaraftis

The International Maritime Organization has decided that as of 1.1.2020, SOx content in a ship’s emissions should be no more than 0.5 per cent. The purpose of this paper is to…

2202

Abstract

Purpose

The International Maritime Organization has decided that as of 1.1.2020, SOx content in a ship’s emissions should be no more than 0.5 per cent. The purpose of this paper is to address the various challenges expected to arise from the enforcement of the global cap sulfur regulation.

Design/methodology/approach

The authors outline various enforcement options and present a model that calculates the profits from noncompliance in the high seas, so as to help determine the level of fines that could be imposed in case of violation.

Findings

The main finding is that a harmonized system of fines, which are more than potential savings from cheating, would be a strong deterrent for compliance.

Originality/value

To the authors’ knowledge, no paper in the maritime literature on sulfur regulations has focused on enforcement as of yet.

Details

Maritime Business Review, vol. 4 no. 2
Type: Research Article
ISSN: 2397-3757

Keywords

Open Access
Article
Publication date: 20 April 2023

Tiina Kähkönen, Mika Vanhala and Kirsimarja Blomqvist

In this paper, the authors describe the step-by-step approach used to develop a trust-repair construct and a valid measurement scale for assessing employee perceptions of the most…

Abstract

Purpose

In this paper, the authors describe the step-by-step approach used to develop a trust-repair construct and a valid measurement scale for assessing employee perceptions of the most effective employee trust-repair practices.

Design/methodology/approach

The initial employee trust-repair scale (ETRS) was completed by 282 employees of a non-profit organization and validated by 101 employees of the administrative unit of the Finnish Army.

Findings

The 14-item seven-factor model was found to be reliable, valid and stable across the samples.

Research limitations/implications

This study contributes to the current literature on trust repair by presenting the first validated measure for employee trust repair.

Practical implications

The findings provide a valuable instrument for practitioners to assess the state of employee trust-repair practices.

Originality/value

To the best of the authors’ knowledge, this is the first study in an organizational context demonstrating an operationally valid and comprehensive measure for employee trust-repair practices.

Details

Journal of Advances in Management Research, vol. 20 no. 3
Type: Research Article
ISSN: 0972-7981

Keywords

Open Access
Article
Publication date: 17 December 2021

Alexandre Cappellozza, Gustavo Hermínio Salati Marcondes de Moraes, Gilberto Perez and Alessandra Lourenço Simões

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established…

Abstract

Purpose

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules.

Design/methodology/approach

The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems.

Findings

The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention.

Research limitations/implications

This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches.

Practical implications

The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior.

Social implications

Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies.

Originality/value

The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.

Open Access
Article
Publication date: 13 May 2021

Tiina Kähkönen

This study examines trust-repair practices at the team level after organizational change.

4751

Abstract

Purpose

This study examines trust-repair practices at the team level after organizational change.

Design/methodology/approach

A qualitative research approach was adopted, and data were collected from key informants through focus group discussions and interviews. The data analysis involved thematic coding and followed the structured procedure.

Findings

This study found that after organization change, trust can be repaired at the team level by improving team leaders' information sharing and knowledge in change management, and by enforcing communication, collaboration and ethical behaviour among team members.

Research limitations/implications

This paper makes three key contributions by (1) identifying trust violations in teams, (2) proposing trust-repair mechanisms and (3) extending the understanding of trust-repair and preservation at the team level following organizational change.

Practical implications

This paper provides practical information from a real-work context and can improve managers' understanding of active trust-repair.

Originality/value

This paper outlines active trust-repair mechanisms in an organizational change context and expands the current theory by presenting novel insights into organizational trust-repair at the team level. This study contributes to trust literature by proposing promising avenues for future trust-repair research.

Details

Journal of Organizational Change Management, vol. 34 no. 5
Type: Research Article
ISSN: 0953-4814

Keywords

1 – 10 of over 1000