Search results

1 – 10 of 26
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 8 August 2016

Xiang Li, Kevin McDowell and Xiaotong Wang

This paper aims to describe librarians’ efforts in reaching out to international students through vernacular language videos at both the University of Colorado Boulder and the…

917

Abstract

Purpose

This paper aims to describe librarians’ efforts in reaching out to international students through vernacular language videos at both the University of Colorado Boulder and the University of Oregon. The videos were created to help international students familiarize themselves with the new library environment and to stimulate their interest in the future exploration of library resources and services.

Design/methodology/approach

This paper discusses the challenges of providing effective support to international students in the early stages of their academic life in the USA, explains the rationale for using vernacular language videos as a means of outreach to international students, outlines the factors considered in designing the videos that helped achieve the outreach goals and reviews promotion needs and assessment methods for evaluating the effectiveness of the videos.

Findings

Using online videos in native languages as a means to extend the reach of the libraries to international students is seen as useful and practical. Feedback from students and library colleagues shows positive reaction to the videos and provides encouragement for further outreach efforts to international students.

Practical implications

The strategies and experiences detailed here are easily adaptable to other institutions of higher education committed to developing outreach programs for international students.

Originality/value

The novelty of this case study is the librarians’ sophisticated thinking in developing vernacular language videos as a means of outreach to international students. The video project presented in the paper can function as an inspiring example for institutions preparing for the expected large influx of international students.

Details

Reference Services Review, vol. 44 no. 3
Type: Research Article
ISSN: 0090-7324

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1997

Kevin Donaghy, Una McMahon‐Beattie and David McDowell

Traditionally the hospitality industry has been slow to adopt new systems and technologies. This can be witnessed particularly in the hotel industry’s utilization of yield…

7318

Abstract

Traditionally the hospitality industry has been slow to adopt new systems and technologies. This can be witnessed particularly in the hotel industry’s utilization of yield management (YM). Based on the experiences of hotel managers, explores the problems encountered during the introduction of YM into the accommodation function and highlights possible approaches for managing the change from traditional management techniques to a YM system. Found that this transition was best achieved by developing a conceptual and/or working knowledge of YM at three levels in the company: head office, unit general managers, and staff. A team approach within the unit was considered essential involving, ideally, the yield specialists, the functional specialists and the general manager acting as a co‐ordinator. Change was more easily effected if a well‐planned, unit‐specific, and timely training programme emphasized the similarities with and not the differences between traditional management techniques and a YM approach. Considerable challenges remain for software developers to provide industry‐specific and user‐friendly packages.

Details

International Journal of Contemporary Hospitality Management, vol. 9 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Access Restricted. View access options
Article
Publication date: 27 May 2014

Kevin Wilson and Diana Woodburn

This paper aims to explore some of the contextual reasons for the failure of key or strategic account management (K/SAM) programmes. It will discuss how organisational context…

1307

Abstract

Purpose

This paper aims to explore some of the contextual reasons for the failure of key or strategic account management (K/SAM) programmes. It will discuss how organisational context impacts the implementation and effective operation of such programmes in business-to-business markets. The paper looks at the issues affecting K/SAM programmes rather than the management of individual relationships.Organisational context shapes the work environment (Rice 2005, Porter and McGloghlin, 2006): it is comprised of those elements that drive behaviour and facilitate or impede management processes (Goodman and Haisley, 2007). The literature prescribes a wide range of contextual elements conducive to K/SAM processes, but is less expansive on the subject of elements that may cause K/SAM programmes to disappoint.

Design/methodology/approach

This work in-progress paper takes an inductive approach to material provided by surveys of K/SAM communities and their discussions in LinkedIn special interest groups or similar forums to develop a model to give structure to the organisational context issues which may be responsible for K/SAM failure.

Findings

From an initial reading of the literature, two broad categories of factors were identified as elements of organizational context: what might be called the formal or “hard” elements supporting K/SAM programmes and the “soft”, more informal and partly cultural elements that “moderate” or “intervene” in implementation. A model is developed to illustrate the linkages between organizational elements in K/SAM.

Research limitations/implications

Although a pilot study, we believe that valuable insights into KAM failure are provided by the study. The next stage will include a co-operative inquiry approach based on this data, in which participants will actively validate and develop the model by exploring it within their organisations.

Practical implications

The paper draws out a number of significant implications for managers.

Originality/value

The existing context within which attempts are made to implement K/SAM have received little attention and often are ignored or remain “unspoken”. This paper addresses those important issues.

Details

Journal of Business & Industrial Marketing, vol. 29 no. 5
Type: Research Article
ISSN: 0885-8624

Keywords

Available. Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Free Access. Free Access

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Available. Content available
Article
Publication date: 12 September 2008

385

Abstract

Details

Pigment & Resin Technology, vol. 37 no. 5
Type: Research Article
ISSN: 0369-9420

Access Restricted. View access options
Article
Publication date: 1 August 2001

Stephen D. McDowell and Philip E. Steinberg

Explores a number of the debates and justification used to support and advance non‐state governance of the Internet in the USA. Reviews public reports released leading up to the…

503

Abstract

Explores a number of the debates and justification used to support and advance non‐state governance of the Internet in the USA. Reviews public reports released leading up to the formation of the Internet Corporation for Assigned Names and Numbers (ICANN). Concludes that the scope herein is restricted to the jurisdictions and reasoning stated in the policy papers leading to the formation of the ICANN.

Details

info, vol. 3 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Access Restricted. View access options
Article
Publication date: 19 March 2020

Furkan Amil Gur, Joshua S. Bendickson, Laura Madden and William C. McDowell

Disasters drastically affect regional industries; consequently, the study of regional resilience is of much interest to organizational researchers. To that end, this study…

916

Abstract

Purpose

Disasters drastically affect regional industries; consequently, the study of regional resilience is of much interest to organizational researchers. To that end, this study examines the role of entrepreneurial opportunity recognition, stakeholder engagement, and elements of psychological recovery in the US Gulf Coast following the Deepwater Horizon oil spill of 2010.

Design/methodology/approach

Through a qualitative content analysis of 183 industry-relevant articles published during and after the disaster, this study unpacks the most significant themes at work in the recovery process, including the psychological elements of the oil spill and its aftermath, the role of various internal and external stakeholders, and emerging opportunities for entrepreneurial activity in the region for regional resilience and recovery.

Findings

The nine themes that emerged from the data were captured in three categories mapped over time. Category one, psychogical states during and after the oil spill, include denial, coping, and recovery. Category two, regional recovery efforts and the role of stakeholders, includes the themes distractions, bargains, and material support. Category three, emerging opportunities, includes financial support, new markets, and reparations.

Originality/value

By mapping these themes over distinct time periods, this study identifies and explores patterns in the recovery period and use them to draw theoretical and practical implications.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 26 no. 4
Type: Research Article
ISSN: 1355-2554

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2013

Máirtín Mac Con Iomaire

The aim of this paper is to provide an overview of the changing food culture of Ireland focusing particularly on the evolution of commercial public dining in Dublin 1700‐1900…

1688

Abstract

Purpose

The aim of this paper is to provide an overview of the changing food culture of Ireland focusing particularly on the evolution of commercial public dining in Dublin 1700‐1900, from taverns, coffeehouses and clubs to the proliferation of hotels and restaurants particularly during the latter half of the nineteenth century.

Design/methodology/approach

Using a historical research approach, the paper draws principally on documentary and archival sources, but also uses material culture. Data are analysed using a combination of hermeneutics (Denzin and Lincoln, O'Gorman) and textual analysis (Howell and Prevenier).

Findings

The paper traces the various locations of public dining in Dublin 1700‐1900 and reveals that Dublin gentlemen's clubs preceded their London counterparts in owning their own premises, but that the popularity of clubs in both cities resulted in a slower growth of restaurants than in Paris. Competition for clubs appeared in the form of good hotels. The Refreshment Houses and Wine Licences (Ireland) Act 1860 created a more congenial environment for the opening of restaurants, with separate ladies coffee or dining rooms appearing from around 1870 onwards.

Originality/value

There is a dearth of research on the history of Irish food and commercial food provision in particular. This paper provides the most comprehensive discussion to date on the development of commercial dining in Dublin 1700‐1900 and suggests that the 1860 legislation might be further explored as a catalyst for the growth of restaurants in London and other British cities.

Details

International Journal of Contemporary Hospitality Management, vol. 25 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Access Restricted. View access options
Book part
Publication date: 16 April 2020

Devanathan Sudharshan

Abstract

Details

Marketing in Customer Technology Environments
Type: Book
ISBN: 978-1-83909-601-3

Access Restricted. View access options
Article
Publication date: 9 October 2017

Jeremiah D. Still, Ashley Cain and David Schuster

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been…

910

Abstract

Purpose

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human-centered guidelines for developing usable authentication schemes.

Design/methodology/approach

The guidelines stem from research findings within the fields of psychology, human–computer interaction and information/computer science.

Findings

Instead of viewing users as the inevitable weak point in the authentication process, this study proposes that authentication interfaces be designed to take advantage of users’ natural abilities. This approach requires that one understands how interactions with authentication interfaces can be improved and what human capabilities can be exploited. A list of six guidelines that designers ought to consider when developing a new usable authentication scheme has been presented.

Research limitations/implications

This consolidated list of usable authentication guidelines provides system developers with immediate access to common design issues impacting usability. These guidelines ought to assist designers in producing more secure products in fewer costly development cycles.

Originality/value

Cybersecurity research and development has mainly focused on technical solutions to increase security. However, the greatest weakness of many systems is the user. It is argued that authentication schemes with poor usability are inherently insecure, as users will inadvertently weaken the security in their efforts to use the system. The study proposes that designers need to consider the human factors that impact end-user behavior. Development from this perspective will address the greatest weakness in most security systems by increasing end-user compliance.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 26
Per page
102050