Search results

1 – 10 of 12
Content available
Article
Publication date: 19 June 2007

Beverly D. Metcalfe and Sandra L. Fielden

372

Abstract

Details

Women in Management Review, vol. 22 no. 4
Type: Research Article
ISSN: 0964-9425

Content available
Article
Publication date: 22 August 2008

Lesley Patterson

3777

Abstract

Details

Gender in Management: An International Journal, vol. 23 no. 6
Type: Research Article
ISSN: 1754-2413

Content available
Article
Publication date: 19 June 2007

Anne de Bruin

1180

Abstract

Details

Women in Management Review, vol. 22 no. 4
Type: Research Article
ISSN: 0964-9425

Keywords

Content available
Article
Publication date: 1 September 2005

Beverly Dawn Metcalfe and Marianne Afanassieva

1118

Abstract

Details

Women in Management Review, vol. 20 no. 6
Type: Research Article
ISSN: 0964-9425

Open Access
Article
Publication date: 15 October 2016

Kevan W. Lamm, Hannah S. Carter and Alexa J. Lamm

Although the term interpersonal leadership has been well established within the literature, there remains a dearth of theoretically derived models that specifically address the…

Abstract

Although the term interpersonal leadership has been well established within the literature, there remains a dearth of theoretically derived models that specifically address the comprehensive nature of the underlying leader behaviors and activities. The intent of the present article is to attempt to synthesize the existent leadership models, behaviors, and factors to arrive at a coherent conceptual model of interpersonal leadership that can inform efficient and effective leadership education programs. The resulting model included 13 primary factors integrated within a hierarchical framework. Leadership educators are recommended to adopt or adapt the proposed model while developing educational curriculum and interventions.

Details

Journal of Leadership Education, vol. 15 no. 4
Type: Research Article
ISSN: 1552-9045

Abstract

Details

Women in Management Review, vol. 20 no. 5
Type: Research Article
ISSN: 0964-9425

Content available
Article
Publication date: 1 January 2013

Edited by Beverly Dawn Metcalfe

1002

Abstract

Details

Development and Learning in Organizations: An International Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1477-7282

Content available
Book part
Publication date: 17 August 2011

Abstract

Details

Governance, Development and Conflict
Type: Book
ISBN: 978-0-85724-896-1

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Content available
Article
Publication date: 4 November 2013

175

Abstract

Details

Gender in Management: An International Journal, vol. 28 no. 8
Type: Research Article
ISSN: 1754-2413

Access

Only content I have access to

Year

Content type

1 – 10 of 12