Search results

1 – 10 of over 6000
Book part
Publication date: 16 August 2021

Shea X. Fan and Anne-Wil Harzing

Employing expatriates who share an ethnicity with host country employees (HCEs) is a widespread expatriate selection strategy. However, little research has compared how…

Abstract

Employing expatriates who share an ethnicity with host country employees (HCEs) is a widespread expatriate selection strategy. However, little research has compared how expatriates and HCEs perceive this shared ethnicity. Drawing upon an identity perspective, we propose HCEs' ethnic identity confirmation, the level of agreement between how an HCE views the importance of his/her own ethnic identity and how expatriates view the importance of the HCE's ethnic identity, affects HCEs' attitudes toward ethnically similar expatriates. Results of two experiments show that HCEs' ethnic identity confirmation is related to HCEs' perception of expatriates' trustworthiness and knowledge-sharing intention.

Details

Intercultural Management in Practice
Type: Book
ISBN: 978-1-83982-827-0

Keywords

Article
Publication date: 3 April 2017

Kathy Ning Shen, Fang Zhao and Mohamed Khalifa

Unlike the earlier research that examines gender impact at the individual level, the purpose of this paper is to examine whether and how gender composition of virtual communities…

Abstract

Purpose

Unlike the earlier research that examines gender impact at the individual level, the purpose of this paper is to examine whether and how gender composition of virtual communities (VCs) interact with identity-related needs, namely identification and identity confirmation in affecting VC participation.

Design/methodology/approach

Drawing on the theories and previous research of social identity and organizational identification, the study developed and tested a new research model through an online survey involving three male dominant VCs and one female-dominant VC.

Findings

The results show that identification and identity confirmation are two independent antecedents for VC participation. Identification is a significant and stable determinant for members’ VC participation regardless of gender composition, but the effect of identity confirmation on VC participation is only significant for those in a female-dominant VC.

Research limitations/implications

The results of the study represent the first attempt to empirically examine the dual identity processes for VC participation. The results also imply that gender composition shapes, to some extent, VC members’ communication strategies, contents, and social interaction norms. Gender composition also affects the expectations for VC participation in terms of identification and identity confirmation.

Practical implications

The results of the study offer practical value for VC design and management, marketing through social media, as well as online education such as virtual team learning and teaching.

Originality/value

This study extends and advances the existing research in several ways. To the best of the authors knowledge, the study is the first of its kind to address the interplays among identification, identity confirmation, and VC participation from a gender composition perspective.

Details

Internet Research, vol. 27 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Book part
Publication date: 28 June 2017

Kajsa Asplund, Pernilla Bolander and Andreas Werr

Performance management can play an important role in the implementation of strategic change, by aligning employees’ mindsets and behavior with organizational goals. However, the…

Abstract

Performance management can play an important role in the implementation of strategic change, by aligning employees’ mindsets and behavior with organizational goals. However, the ways in which employees react to change efforts aided by performance management practices are far from straight-forward. In this chapter, we develop a conceptual framework for understanding employees’ reactions to strategic change as a consequence of their occupational identities and their performance management outcome. We further apply the framework to an empirical study of a strategic change initiative in a school organization that was supported by a new performance management practice. We show how variations in perceived identity threat translate into four distinct patterns of emotional and behavioral reactions, where only one represents whole-hearted change acceptance. The study contributes to our understanding of individual- and group-level heterogeneity in reactions to strategic change, and also to a more nuanced conception of identity threat.

Details

Research in Organizational Change and Development
Type: Book
ISBN: 978-1-78714-436-1

Keywords

Article
Publication date: 24 March 2020

Pavel M. Shust and Victor Dostov

The purpose of this paper is to present the identification-verification-confirmation of identity (IVCid) model that can be used to retroactively analyze the existing customer…

Abstract

Purpose

The purpose of this paper is to present the identification-verification-confirmation of identity (IVCid) model that can be used to retroactively analyze the existing customer identification programs and devise new ones that can be used in face-to-face or non-face-to-face environment.

Design/methodology/approach

This paper outlines the main elements of the customer due diligence (CDD) process and identifies those which may present a barrier to the customers. It then outlines the IVCid model. The model is used to analyze existing CDD approaches in physical presence, using reliable databases, biometrics and electronic signatures.

Findings

The IVCid model suggests that any customer identification program contains three elements: identification (collection of information), verification (checking the veracity of information) and confirmation of identity (linking the information to the individual). The accuracy of this model is confirmed by the analysis of the existing CDD procedures in some countries.

Research limitations/implications

This paper looks at a limited number of practical cases of CDD implementation. Further research might be needed to assess the strengths and weaknesses of biometric-based or e-signature-based solutions. Research might be needed to establish links between the IVCid model and financial inclusion.

Practical implications

The IVCid model allows for “modular” approach for the CDD procedures. It also underlines some risks associated with current CDD models.

Social implications

The IVCid model can be used to devise the CDD procedures that more effectively contribute to financial inclusion.

Originality/value

This paper proposes the first universal model for the CDD procedures that works for both face-to-face and remote scenarios while also being technology- and business-neutral.

Details

Journal of Money Laundering Control, vol. 23 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 9 March 2015

Philip Lewin

This paper examines how young people develop meaningful self-concepts in the postmodern social world. Drawing from an ethnographic investigation of punk subculture, I explore how…

Abstract

This paper examines how young people develop meaningful self-concepts in the postmodern social world. Drawing from an ethnographic investigation of punk subculture, I explore how identity work is performed when young people are saturated with competing self-definitions and encouraged to engage in reflexive self-doubt. Focusing on the ecstatic qualities of concerts, I describe a complex process of identity formation wherein youth emotionally experience their identities through ritual performance rather than constructing them through institutional affiliation or narrative. My analysis draws heavily from Bourdieu’s practice theory and the existential phenomenology of Merleau-Ponty, emphasizing the centrality of embodiment and performativity to postmodern identity. I conclude with a discussion of how postmodern theories of the nonself exaggerate the insecurity of contemporary identity, and I outline a new theoretical framework regarding identity formation that bridges the literatures on subjectivity and embodiment with classical work in symbolic interactionism.

Details

Contributions from European Symbolic Interactionists: Reflections on Methods
Type: Book
ISBN: 978-1-78441-854-0

Keywords

Book part
Publication date: 17 February 2022

Nicholas M. Baxter

In this chapter, I utilize insights from symbolic interaction to analyze the identity work processes of larp subculture participants to construct and perform their in-game…

Abstract

In this chapter, I utilize insights from symbolic interaction to analyze the identity work processes of larp subculture participants to construct and perform their in-game identities. I extend the research on larp subcultures in two ways. First, I place larping within the larger context of leisure subcultures and society by arguing that larping is representative of changes in leisure and subcultures in postmodern society. Second, I draw upon ethnographic data collected among the New England Role-playing Organization (NERO) to analyze larpers character identity performances. RPG and Larp researchers have developed several theories about the relationship between larp participants and their character performances. While these concepts provide a helpful framework for understanding the participant-character relationship, they undertheorize the in-game constructed performance of identity. Using symbolic interaction theory, I analyze the identity work processes larpers use to construct and perform their larp identities extending our understanding of the similarities between everyday identity and larpers' character identity performances.

Book part
Publication date: 6 July 2005

Jan E. Stets and Peter J. Burke

Identity control theory has long posited that there are positive emotional consequences to identity verification and negative emotional consequences to the lack of identity

Abstract

Identity control theory has long posited that there are positive emotional consequences to identity verification and negative emotional consequences to the lack of identity verification. While some of the positive consequences of identity verification have been discussed, little work has been done to elaborate the variety of negative emotions that result for a discrepancy between meanings held in the identity standard and meanings perceived in the situation. This paper elaborates the nature of this discrepancy and hypothesizes the variety of negative emotions that arise depending upon the source of the discrepancy, the source of the identity standard, and the relative power and status of the actor and others in the situation. In this way, the emotional consequences of identity non-verification are shown to depend upon the context of the social structure in which the non-verification occurs.

Details

Social Identification in Groups
Type: Book
ISBN: 978-0-76231-223-8

Book part
Publication date: 7 June 2016

Laura Upenieks and William Magee

The malicious impulse is a phenomenon that lies in the theoretical and ontological space between emotion and action. In this chapter, we probe this space. In the empirical part of…

Abstract

Purpose

The malicious impulse is a phenomenon that lies in the theoretical and ontological space between emotion and action. In this chapter, we probe this space. In the empirical part of this work, we evaluate the hypothesis that middle-level supervisors will be more likely than non-supervisory workers and top-level supervisors to report an impulse to “hurt someone you work with” (i.e., maliciousness).

Methodology/approach

Data are from a cross-sectional survey of a representative sample of employed Toronto residents in 2004–2005.

Findings

Results from logistic regression analyses show that when job characteristics are controlled, the estimated difference between middle-level supervisors and workers in other hierarchical positions reporting the impulse to harm a coworker is statistically significant. Moreover, the difference between middle-level supervisors and other workers persist after controls for anger about work and job-related stress.

Social Implications

In discussing our results, we focus on factors that might generate the observed associations, and on how Bourdieusian theory may be used to interpret the social patterning of impulses in general, and malicious impulses in particular. We also discuss the implications of our findings for emotional intelligence in the workplace.

Details

Emotions and Organizational Governance
Type: Book
ISBN: 978-1-78560-998-5

Keywords

Book part
Publication date: 29 November 2018

Antonella Capriello

This chapter discusses emerging issues in event management with a focus on small-scale events. The author reflects on managerial approaches to stakeholder involvement and…

Abstract

This chapter discusses emerging issues in event management with a focus on small-scale events. The author reflects on managerial approaches to stakeholder involvement and engagement, and underlines the complexity of strategy formulation for destination development planning. This contribution also provides advanced conceptual instruments for event marketing as guiding principles that permeate destination-marketing strategies. In addition, the author investigates the role and nature of sponsorship linked to enhancing the value of small-scale events and highlights fundamental issues in developing a marketing management model for place marketing and the key drivers of event management strategies involving sponsors and event participants.

Article
Publication date: 14 November 2017

Robert E. Kleine, Susan Schultz Kleine and Douglas R. Ewing

This paper aims to provide evidence that theory-based effects of role-identity cultivation stages on self-symbolizing consumption activities do exist.

1062

Abstract

Purpose

This paper aims to provide evidence that theory-based effects of role-identity cultivation stages on self-symbolizing consumption activities do exist.

Design/methodology/approach

Specific focus is placed upon differing motives between rookie versus veteran role-identity actors and how these differences lead to symbolic self-completion and self-retention behaviors. Effects of these motives are examined in the context of college student identity transitions.

Findings

Evidence is found for a pattern, whereby role-identity rookies with fewer role-identity-related possessions are more likely to self-symbolize the role-identity outwardly than veteran consumers having more role-identity-related resources, such as possessions. Self-retention via possessions is also more evident with rookies making the transition from one role-identity to the next, replacement role-identity. Findings are replicated for both readily available and favorite possessions related to a role-identity.

Research limitations/implications

Future role-identity research in marketing may miss unique and important insights without accounting for role-identity cultivation stage.

Practical implications

Current evidence highlights the importance of identity cultivation stage, symbolic self-completion and self-retention as factors to consider in understanding market segments associated with respective role-identities.

Originality/value

Extant research does not yet account for how consumption activities serving both symbolic and functional purposes support role-identity transitions. This inquiry is directed at contributing to this need.

Details

European Journal of Marketing, vol. 51 no. 11/12
Type: Research Article
ISSN: 0309-0566

Keywords

1 – 10 of over 6000