Search results

1 – 3 of 3
Open Access
Article
Publication date: 15 October 2016

Kevan W. Lamm, Hannah S. Carter and Alexa J. Lamm

Although the term interpersonal leadership has been well established within the literature, there remains a dearth of theoretically derived models that specifically address the…

Abstract

Although the term interpersonal leadership has been well established within the literature, there remains a dearth of theoretically derived models that specifically address the comprehensive nature of the underlying leader behaviors and activities. The intent of the present article is to attempt to synthesize the existent leadership models, behaviors, and factors to arrive at a coherent conceptual model of interpersonal leadership that can inform efficient and effective leadership education programs. The resulting model included 13 primary factors integrated within a hierarchical framework. Leadership educators are recommended to adopt or adapt the proposed model while developing educational curriculum and interventions.

Details

Journal of Leadership Education, vol. 15 no. 4
Type: Research Article
ISSN: 1552-9045

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Open Access
Article
Publication date: 4 August 2022

Mohd Hanafi Azman Ong, Norazlina Mohd Yasin and Nur Syafikah Ibrahim

Measuring internal response of online learning is seen as fundamental to absorptive capacity which stimulates knowledge assimilation. However, the evaluation of practice and…

Abstract

Purpose

Measuring internal response of online learning is seen as fundamental to absorptive capacity which stimulates knowledge assimilation. However, the evaluation of practice and research of validated instruments that could effectively measure online learning response behavior is limited. Thus, in this study, a new instrument was designed based on literature to determine the structural variables that exist in the online learning response behavior.

Design/methodology/approach

A structured survey was designed and distributed to 410 Malaysian students enrolled in higher-education institutions. The questionnaire has 38 items, all of which were scored using a seven-point likert scale. To begin with, exploratory factor analysis with three types of extraction methods (i.e. principal component, principal axis factoring and maximum likelihood) was used as the method for comparing the outcomes of each extraction method's grouping variables by constantly using a varimax rotation method. In the second phase, reliability analysis was performed to determine the reliability level of the grouping variables, and finally, correlation analysis was performed to determine the discriminant nomological validity of the grouping variables.

Findings

The findings revealed that nine grouping variables were retrieved, with all items having a good value of factor loading and communalities, as well as an adequate degree of reliability. These extracted variables have good discriminant and nomological validity, as evidenced by correlation analysis, which confirmed that the directions of relationships among the extracted dimensions follow the expected theory (i.e. positive direction) and the correlation coefficient is less than 0.70.

Research limitations/implications

This study proposes a comprehensive set of questionnaires that measure the student's online learning response behavior. These questionnaires have been developed on the basis of an extensive literature review and have undergone a rigorous process of validity and reliability for the purpose of enhancing students' online learning response behavior.

Originality/value

This study's findings will aid academic practitioners in assessing the online learning response behavior of students, as well as enhancing the questionnaire's boost factor when administered in an online learning environment.

Details

Asian Association of Open Universities Journal, vol. 17 no. 2
Type: Research Article
ISSN: 1858-3431

Keywords

Access

Only Open Access

Year

Content type

1 – 3 of 3