Search results

1 – 10 of 453
Article
Publication date: 26 October 2021

Mariam Krikorian Atkinson, James C. Benneyan, Russell S. Phillips, Gordon D. Schiff, Lindsay S. Hunt and Sara J. Singer

Studies demonstrate how patient roles in system redesign teams reflect a continuum of involvement and influence. This research shows the process by which patients move through…

Abstract

Purpose

Studies demonstrate how patient roles in system redesign teams reflect a continuum of involvement and influence. This research shows the process by which patients move through this continuum and effectively engage within redesign projects.

Design/methodology/approach

The authors studied members of redesign teams, consisting of 5–10 members: clinicians, systems engineers, health system staff and patient(s), from three health systems working on separate projects in a patient safety learning lab. Weekly team meetings were observed, January 2016–April 2018, 17 semi-structured interviews were conducted and findings through a patient focus group were refined. Grounded theory was used to analyze field notes and transcripts.

Findings

Results show how the social identity process enables patients to move through stages in a patient engagement continuum (informant, partner and active change agent). Initially, patient and team member perceptions of the patient's role influence their respective behaviors (activating, directing, framing and sharing). Subsequently, patient and team member behaviors influence patient contributions on the team, which can redefine patient and team member perceptions of the patient's role.

Originality/value

As health systems grow increasingly complex and become more interested in responding to patient expectations, understanding how to effectively engage patients on redesign teams gains importance. This research investigates how and why patient engagement on redesign teams changes over time and what makes different types of patient roles valuable for team objectives. Findings have implications for how redesign teams can better prepare, anticipate and support the changing role of engaged patients.

Details

Journal of Health Organization and Management, vol. 36 no. 3
Type: Research Article
ISSN: 1477-7266

Keywords

Article
Publication date: 1 March 1984

Roberta Lumek

This work was originally commissioned during 1982, the year that was designated Information Technology Year; the year that the personal computer replaced the space invader machine…

Abstract

This work was originally commissioned during 1982, the year that was designated Information Technology Year; the year that the personal computer replaced the space invader machine as a focus for teenage obsession; the year of the library symbol, the Hunt Report on cable TV; the year the US Post Office issued two stamps celebrating American libraries, and the British Post Office issued a stamp for IT year suggesting that libraries were a thing of the past. The work was intended to look at “the background to the IT revolution, the benefits of applying technology to library services and the reasons for its relatively slow progress”. It was envisaged at the time that what would have been effectively a state‐of‐the‐art report on the technology available to libraries, and who was doing what with it, would be a useful tool for library managers introducing or extending library technical services. It might usefully have complemented the LA publication, The impact of new technology on libraries and information centres (LA, 1982). However, for a variety of reasons it was not possible to produce the publication in 1983 as intended; the person commissioned to write it was unable to do so; and eventually, in 1984, it was realised that the speed of development and availability of technology was such that any such work would be useless as a practical guide within months of publication. The growth, during the period, of journals on the subject of library applications of IT of all kinds; the appearance of regular updates in the generalist professional press; the formation of, for example, the Library Association IT Group: all these developments clearly offered better opportunities of current awareness to the library manager than could be achieved by a single monograph.

Details

Library Management, vol. 5 no. 3
Type: Research Article
ISSN: 0143-5124

Book part
Publication date: 14 November 2017

Rick Colbourne

Indigenous entrepreneurship and hybrid venture creation represents a significant opportunity for Indigenous peoples to build vibrant Indigenous-led economies that support…

Abstract

Indigenous entrepreneurship and hybrid venture creation represents a significant opportunity for Indigenous peoples to build vibrant Indigenous-led economies that support sustainable economic development and well-being. It is a means by which they can assert their rights to design, develop and maintain Indigenous-centric political, economic and social systems and institutions. In order to develop an integrated and comprehensive understanding of the intersection between Indigenous entrepreneurship and hybrid ventures, this chapter adopts a case study approach to examining Indigenous entrepreneurship and the underlying global trends that have influenced the design, structure and mission of Indigenous hybrid ventures. The cases present how Indigenous entrepreneurial ventures are, first and foremost, hybrid ventures that are responsive to community needs, values, cultures and traditions. They demonstrate that Indigenous entrepreneurship and hybrid ventures are more successful when the rights of Indigenous peoples are addressed and when these initiatives are led by or engage Indigenous communities. The chapter concludes with a conceptual model that can be applied to generate insights into the complex interrelationships and interdependencies that influence the formation of Indigenous hybrid ventures and value creation strategies according to three dimensions: (i) the overarching dimension of indigeneity and Indigenous rights; (ii) indigenous community orientations and (iii) indigenous hybrid venture creation considerations.

Article
Publication date: 13 August 2020

Emma Fletcher-Barnes

This paper explores the life cycle of a captive bred lion in South Africa, focusing on the distinction between captive bred and wild individuals. Lions are bred in captive…

Abstract

Purpose

This paper explores the life cycle of a captive bred lion in South Africa, focusing on the distinction between captive bred and wild individuals. Lions are bred in captive breeding facilities across the country to provide cubs and teenagers for ecotourism, and following this, hunting “trophies.” A distinction is made between the “wild” and “captive” lion, a categorization that I argue legitimizes violent and unethical treatment toward those bred specifically to be cuddled and killed. This analysis explores how the lion is remade or modified from wild to commodity and the repercussions this has had throughout the wildlife security assemblage.

Design/methodology/approach

The paper is based on ethnographic research carried out in South Africa during 2016 that involved conducting informal and semi-structured interviews with activists, breeders, wildlife security personnel and conservationists drawing out the interspecies relations that influenced the encounters between humans and wildlife.

Findings

Dominant conservation narratives continue to understand and interpret wildlife solely as a commodity or profitable resource, which has led to the normalization of unethical and cruel practices that implicate wildlife in their own security and sustenance through their role in ecotourism, hunting and more recently, the lion bone trade. Captive bred lions are treated as products that undergo a series of translations through which they are exposed to violence and exploitation operationalized through practices linked to conservation and ecotourism.

Originality/value

Through posthuman thinking, this paper contributes to debates on the interspecies dimensions of politics through challenging the dominant assumptions that govern conservation and the interspecies encounter.

Details

International Journal of Sociology and Social Policy, vol. 41 no. 3/4
Type: Research Article
ISSN: 0144-333X

Keywords

Article
Publication date: 30 July 2014

Lindsay M. Andiola

This paper synthesizes the extant feedback literature, focusing on how feedback affects an auditor’s learning, performance, and motivation. Performance feedback is an important…

6082

Abstract

This paper synthesizes the extant feedback literature, focusing on how feedback affects an auditor’s learning, performance, and motivation. Performance feedback is an important component in the auditing environment for ensuring quality control and for developing and coaching staff auditors. However, the literature on feedback in the audit environment is fragmented and limited making it difficult to assess its behavioral effects on auditors. This paper has three main objectives. The first is to review some of the influential research in psychology and management to identify key variables and issues that appear to be critical in the study of behavioral consequences of feedback in organizational settings. The second is to review performance feedback research specifically in auditing to identify the areas previously examined and synthesize the findings. The third is to suggest a variety of future research opportunities that may assist in developing an understanding and knowledge of the behavioral effects of feedback on auditors. The literature analysis has significant implications for audit research and practice. In particular, the analysis provides important insights into understanding who, how, and when performance feedback should be given to improve its effectiveness in the audit environment.

Details

Journal of Accounting Literature, vol. 33 no. 1-2
Type: Research Article
ISSN: 0737-4607

Keywords

Article
Publication date: 6 June 2019

Daniel William Mackenzie Wright

This paper aims to address the potential of hunting humans as sport tourism activity in the twenty-second century. The paper explores past and current trends related to sport…

Abstract

Purpose

This paper aims to address the potential of hunting humans as sport tourism activity in the twenty-second century. The paper explores past and current trends related to sport hunting, animal extinction, human violence and the normalisation of violence via fictional media. This paper paints a provocative picture of society with the aim of encouraging dialogue across the wider community regarding the challenges facing society in relation to practices related to sport hunting and tourism.

Design/methodology/approach

This paper takes a scenario narrative approach in presenting potential discussion on the future of sport hunting as a tourism activity. The importance of narrative writing as a method to research is its ability in telling a story to the reader. By embracing diverse philosophical methods, this research draws on past and current trends via secondary data sources to justify the future scenario narrative.

Findings

This paper presents interesting insights into the future of sport hunting and its potential relationship to tourism. However, considering the following quote, “Yet another uncertainty is that predictions themselves can alter the future – which, of course, is part of the motivation behind futurism” (Larson, 2002, p. 5), this paper concludes with a sobering message, if previous research as well as the ideas presented here are to become a future reality, one where humans hunt each other for sport, are we content to allow this to happen? Or do we want to encourage debate to ensure we create better futures?

Originality/value

This paper offers original and novel research within the sport-tourism literature by taking a futures perspective and applying a scenario narrative approach. The paper offers original insight into attitudes towards sport hunting and its future potential, moving away from its traditions of hunting animals to hunting humans. This paper encourages debate around a taboo-subject, by drawing on a popular past-time, sport. Death is also universal, and by aligning the topic with sport and as a hunting activity, this paper is offering original approaches to addressing difficult questions that need to be asked.

Details

foresight, vol. 21 no. 3
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 11 September 2017

Jon Randall Lindsay

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…

1781

Abstract

Purpose

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.

Design/methodology/approach

This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.

Findings

Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.

Originality/value

Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 8 October 2018

Anna Marie Johnson, Amber Willenborg, Christopher Heckman, Joshua Whitacre, Latisha Reynolds, Elizabeth Alison Sterner, Lindsay Harmon, Syann Lunsford and Sarah Drerup

This paper aims to present recently published resources on information literacy and library instruction through an extensive annotated bibliography of publications covering all…

6611

Abstract

Purpose

This paper aims to present recently published resources on information literacy and library instruction through an extensive annotated bibliography of publications covering all library types.

Design/methodology/approach

This paper annotates English-language periodical articles, monographs, dissertations and other materials on library instruction and information literacy published in 2017 in over 200 journals, magazines, books and other sources.

Findings

The paper provides a brief description for all 590 sources.

Originality/value

The information may be used by librarians and interested parties as a quick reference to literature on library instruction and information literacy.

Details

Reference Services Review, vol. 46 no. 4
Type: Research Article
ISSN: 0090-7324

Keywords

Article
Publication date: 22 April 2001

Robert N. Lussier, Matthew C. Sonfield, Joel Corman and Mary McKinney

This descriptive study of 184 small firms identified strategies most frequently used by their managers. These strategies were identified using the Entrepreneurial Strategy Matrix…

736

Abstract

This descriptive study of 184 small firms identified strategies most frequently used by their managers. These strategies were identified using the Entrepreneurial Strategy Matrix, a situational model in which the identification of levels of innovation and risk lead to prescriptions of appropriate strategies. Concurrently, this model was empirically tested and its validity supported. Of the strategies used, the five most common were: “work to create a competitive advantage,” “maintain innovation,” “lower the costs of developing and/or maintaining one’s venture,” “defend product/service as it is now,” and “create a first mover advantage.” In addition, there were no differences between the use of strategies by entrepreneurs in service and manufacturing industries.

Details

American Journal of Business, vol. 16 no. 1
Type: Research Article
ISSN: 1935-5181

Keywords

Book part
Publication date: 26 November 2018

Pooja B. Vijayakumar, Michael J. Morley, Noreen Heraty, Mark E. Mendenhall and Joyce S. Osland

In this contribution, we systematically review the extant global leadership literature to identify important bibliometric and thematic patterns in evidence in this evolving field…

Abstract

In this contribution, we systematically review the extant global leadership literature to identify important bibliometric and thematic patterns in evidence in this evolving field of scholarship. Conceptualizing the phenomenon to include leaders/managers/supervisors who hold global, expatriate, or international positions, we draw out insights accumulated from a total of 327 published articles in key management and organizational behavior journals listed in Scopus. Our analysis proceeds in two sequential phases. Our bibliometric analysis first identifies the most cited articles, most published first authors, country bases of first authors, and frequently publishing journals in this field. This characterizes both the diversity and innovative nature of scholarship in the field. Our thematic content analysis, generated through Nvivo 11, isolates two dominant overarching themes that represent the wellspring for the body of literature, namely global leader development and global leader effectiveness. These themes of development and effectiveness are further explicated through six distinct lenses namely cultural, cognitive, learning, personality trait, social/relational, and political. These lenses are underpinned by a suite of theoretical perspectives encompassing individual, system, and contextual considerations. In combination, these sets of analyses bring added systematics to the field and serve as a point of departure for future inquiry.

Details

Advances in Global Leadership
Type: Book
ISBN: 978-1-78754-297-6

Keywords

1 – 10 of 453