Search results
1 – 5 of 5Miquel Centelles and Núria Ferran-Ferrer
Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific…
Abstract
Purpose
Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific focus on enhancing management and retrieval with a gender nonbinary perspective.
Design/methodology/approach
This study employs heuristic and inspection methods to assess Wikipedia’s KOS, ensuring compliance with international standards. It evaluates the efficiency of retrieving non-masculine gender-related articles using the Catalan Wikipedian category scheme, identifying limitations. Additionally, a novel assessment of Wikidata ontologies examines their structure and coverage of gender-related properties, comparing them to Wikipedia’s taxonomy for advantages and enhancements.
Findings
This study evaluates Wikipedia’s taxonomy and Wikidata’s ontologies, establishing evaluation criteria for gender-based categorization and exploring their structural effectiveness. The evaluation process suggests that Wikidata ontologies may offer a viable solution to address Wikipedia’s categorization challenges.
Originality/value
The assessment of Wikipedia categories (taxonomy) based on KOS standards leads to the conclusion that there is ample room for improvement, not only in matters concerning gender identity but also in the overall KOS to enhance search and retrieval for users. These findings bear relevance for the design of tools to support information retrieval on knowledge-rich websites, as they assist users in exploring topics and concepts.
Details
Keywords
Kimberly A. Whitler, Graham D. Wells and Gerry Yemen
Few cases allow the student to understand the relationship between brand strategy, marketing strategy, implementation, and analysis. While some conceive of the process as being…
Abstract
Few cases allow the student to understand the relationship between brand strategy, marketing strategy, implementation, and analysis. While some conceive of the process as being sequential, this case demonstrates that in fact, this process is more fluid, and that implementation and analysis impact subsequent strategy.
This field-based case provides a rare glimpse into the turnaround of a brand that was all but dead. After Buick suffered more than five decades of declining business results and an inferior brand image versus all rivals, few thought that the brand could be resuscitated. This case provides a valuable under-the-hood look at how the Buick team, over time, progresses through a series of marketing improvements all anchored on an evolved strategy. Specifically, Buick introduced a shift in brand strategy behind an evolved brand essence statement (i.e., brand positioning), improved product lineup, new-to-the-world innovation, enhanced dealership service, and more compelling advertising. The results led to a record number of product awards, significantly improved advertising measures, improved service ratings, and better business results.
Despite significant improvement across multiple dimensions of the business, Buick still trailed key competitors on one of the most important measures Buick tracked—the brand momentum rating—suggesting that there was still more work needed to complete the brand turnaround. The case introduces Molly Peck, the new marketing director on Buick, who is wondering what more, if anything, Buick should do. The material allows for instruction around marketing strategy and the process of converting it into implementation through the use of a creative brief.
Details
Keywords
Peter Dornheim and Ruediger Zarnekow
The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…
Abstract
Purpose
The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.
Design/methodology/approach
Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.
Findings
Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.
Originality/value
This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.
Details
Keywords
Jared D. Harris, Samuel L. Slover, Bradley R. Agle, George W. Romney, Jenny Mead and Jimmy Scoville
In early 2014, recent Stanford University graduate Tyler Shultz was in a quandary. He had been working at Theranos, a blood-diagnostic company founded by Elizabeth Holmes, a…
Abstract
In early 2014, recent Stanford University graduate Tyler Shultz was in a quandary. He had been working at Theranos, a blood-diagnostic company founded by Elizabeth Holmes, a Stanford-dropout wunderkind, for almost a year. Shultz had learned enough about the company to realize that its practices and the efficacy of its much-touted finger-prick blood-testing technology were questionable and that the company was going to great lengths to hide this fact from the public and from regulators.
Theranos and Holmes were Silicon Valley darlings, enjoying positive press and lavish attention from potential investors and technology titans alike. Just as companies like PayPal had revolutionized the stagnant payments industry and Uber had upended the for-hire transportation sector, Theranos had been positioned as the latest technology firm to substantially disrupt yet another mature sector: the medical laboratory business. By the start of 2014, the company had raised more than $400 million in funding, and had an estimated market valuation of $9 billion.
Shultz's situation was exacerbated by the fact that his grandfather, the highly respected former US Secretary of State George Shultz, was on the Theranos board and was one of Elizabeth Holmes's biggest supporters.
But Tyler Shultz worried about the customers he was convinced were receiving highly unreliable and often inaccurate blood-test results. With so much at stake, Shultz wondered how he should proceed. Should he raise his concerns with the firm's investors? Blow the whistle externally? Report to industry regulators? Go away quietly?
This case and its subsequent four brief follow-up cases are based largely on interviews with Tyler Shultz, and outline the dilemma he faced and the various steps he would take both to extricate himself from his unsavory position and let the public know the full extent of the deception at Theranos.
Five optional handouts are available to instructors to further discussion after the case has been debriefed. The handouts serve as additional decision points for the students if your class time permits.
Details
Keywords
Vishwanatha S.R. and Durga Prasad M.
The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry…
Abstract
Research methodology
The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry reports, company websites, stock exchange websites and databases such as Bloomberg and CMIE Prowess.
Case overview/synopsis
Increasing competition in product and capital markets has put tremendous pressure on managers to become more cost competitive. To address their firms' uncompetitive cost structures, managers may have to consider dramatic restructuring of their businesses. During 2014–2017, Tata Steel Ltd (TSL) UK considered a series of divestitures and a merger plan to nurse the company back to health. The case considers the economics of the restructuring plan. The case is designed to help students analyze a corporate downsizing program undertaken by a large Indian company in the UK and to highlight the dynamic role of the CFO and governance issues in family firms. It introduces students to issues surrounding a typical restructuring and provides students a platform to practice the estimation of value creation in a restructuring exercise. While some cases on corporate restructuring in the context of developed economies are available, there are very few cases written in an emerging market context. This case bridges that gap. TSL presents a unique opportunity to study corporate restructuring necessitated by a failed cross-border acquisition. It illustrates the potential for value loss in large, cross-border acquisitions. It shows how managerial hubris can prompt family firm owners to overbid in acquisitions and create legacy hot spots. In addition, the case can be used to discuss the causes of governance failures such as weak institutional monitoring and poor legal enforcement in emerging markets that could potentially harm minority shareholders.
Complexity academic level
The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry reports, company websites, stock exchange websites and databases such as Bloomberg and CMIE Prowess.
Details