Search results
1 – 10 of 12
Abstract
Details
Keywords
Kevan W. Lamm, Hannah S. Carter and Alexa J. Lamm
Although the term interpersonal leadership has been well established within the literature, there remains a dearth of theoretically derived models that specifically address the…
Abstract
Although the term interpersonal leadership has been well established within the literature, there remains a dearth of theoretically derived models that specifically address the comprehensive nature of the underlying leader behaviors and activities. The intent of the present article is to attempt to synthesize the existent leadership models, behaviors, and factors to arrive at a coherent conceptual model of interpersonal leadership that can inform efficient and effective leadership education programs. The resulting model included 13 primary factors integrated within a hierarchical framework. Leadership educators are recommended to adopt or adapt the proposed model while developing educational curriculum and interventions.
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details