Michael J. Keeney, Andrea F. Snell, Steven J. Robison, Daniel V. Svyantek and Jennifer Bott
Measures of personality and organizational climate were subjected to three different analytical methods that extract patterns from data: Discriminant, Classification and…
Abstract
Measures of personality and organizational climate were subjected to three different analytical methods that extract patterns from data: Discriminant, Classification and Regression Trees, and neural network classification analysis. Risk, openness, rewards, and neuroticism (rather than conscientiousness) emerged as key variables in differentiating among three similar work groups. Results of the analyses support the central hypothesis of ASA theory of greater variance in personality across compared to within organizations and an interactionist paradigm between person and environment. Implications for ASA theory and for personnel selection are discussed.
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…
Abstract
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.
Details
Keywords
Michael A. Rosen, Molly Kilcullen, Sarah Davis, Tiffany Bisbey and Eduardo Salas
The practical need for understanding and improving team resilience has increased, and more research is needed to provide an evidence-base for guiding organizational practices and…
Abstract
The practical need for understanding and improving team resilience has increased, and more research is needed to provide an evidence-base for guiding organizational practices and policies. In this chapter, the authors highlight what we see as critical challenges and opportunities for advancing the science of team resilience. We focus on conceptual and methodological challenges involved in conducting field-based research on team resilience, as the authors believe field-based research is a particularly critical approach for advancing the science of team resilience. The authors first provide a brief review of recent theoretical work in defining team resilience. Then the authors describe key challenges that must be managed in field studies seeking to refine and capitalize on this critical area of research to provide solutions capable of supporting individual, team, and organizational outcomes. These challenges include defining trajectories of resilient team performance, understanding the consequences of repeated episodes of team resilience, formal specifications of events precipitating resilient team performance, measuring the event appraisal and communication process, and adopting measurement methods with high temporal resolution. Finally, the authors provide directions for future research to address these gaps.
Details
Keywords
Michael Noble and Patrick T. Hester
This chapter examines why U.S. offshore wind farms do not exist and identifies sites most suitable for development based on European offshore wind farms. A survey of current…
Abstract
This chapter examines why U.S. offshore wind farms do not exist and identifies sites most suitable for development based on European offshore wind farms. A survey of current literature indicates that U.S. development is stalled due to a lack of government and financial support. The literature identifies common attributes associated with the successful deployment of European offshore farms and provides a basis for a multi-criteria decision analysis of potential U.S offshore wind farm sites. A review of European wind farms indicates that a small, 10–50 MW farm located in shallow waters of less than 20 m might be more successful than previous U.S. development efforts. The review also identifies common European attributes deemed critical for success. These attributes are modified, taking into account unique U.S. factors, and a set of nine critical attributes are derived for use in a multi-criteria decision analysis model of suitable U.S. locations. The nine critical attributes (wind quality, water depth, shore distance, state support, public support, industrial support, population density, weather, and energy costs), along with associated utility function values, are applied to 23 past and current proposed U.S. sites. The model identified three sites, in Galveston Island, TX, Port Isabel, TX, and Block Island, RI, as being most favorable for a small wind farm.
Details
Keywords
Malicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat…
Abstract
Purpose
Malicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat is known as an “Insider IT Sabotage” threat. This involves employees misusing their access rights to harm the organization. Events leading up to the attack are not technical but rather behavioural. The problem is that owing to the high volume and complexity of emails, the risk of insider IT sabotage cannot be diminished with rule-based approaches.
Design/methodology/approach
Malicious human behaviours that insiders within the insider IT sabotage category would possess are studied and mapped to phrases that would appear in email communications. A large email data set is classified according to behavioural characteristics of these employees. Machine learning algorithms are used to identify occurrences of this insider threat type. The accuracy of these approaches is measured.
Findings
It is shown in this paper that suspicious behaviour of disgruntled employees can be discovered, by means of machine intelligence techniques. The output of the machine learning classifier depends mainly on the depth and quality of the phrases and behaviour analysis, cleansing and number of email attributes examined. This process of labelling content in isolation could be improved if other attributes of the email data are included, such that a confidence score can be computed for each user.
Originality/value
This research presents a novel approach to show that the creation of a prototype that can automate the detection of insider IT sabotage within email systems to mitigate the risk within organizations.
Details
Keywords
David E. Booth, Moutaz Khouja and Michael Hu
Industrial robots are increasingly used by many manufacturingfirms. The number of robot manufacturers has also increased, with manyof these firms now offering a wide range of…
Abstract
Industrial robots are increasingly used by many manufacturing firms. The number of robot manufacturers has also increased, with many of these firms now offering a wide range of robots. A potential user is thus faced with many options in both performance and cost. Proposes a decision model for the robot selection problem using both a robustified Mahalanobis distance analysis, i.e. a multivariate distance measure, and principal‐components analysis. Unlike most other models for robot selection, this model takes into consideration the fact that a robot′s performance, as specified by the manufacturer, is often unobtainable in reality. The robots selected by the proposed model become candidates for factory testing to verify manufacturers′ specifications. Tests the proposed model on a real data set and presents an example.
Details
Keywords
LIBRARIES in War have, alas, been too often the theme of this and other library magazines owing to the times in which men and women of middle age have had to live. To‐day, even…
Abstract
LIBRARIES in War have, alas, been too often the theme of this and other library magazines owing to the times in which men and women of middle age have had to live. To‐day, even younger ones can see some reflection of the atmosphere, because they have been brought up in a pervading spirit of threats and preparations; insomuch—and this is the tragedy of i t—they ask “What is the good of preparing for life in this world when we are likely to be bombed out of it at any moment?” There is much good, because, even if the ultimate tragedy came, England and the majority of us would survive; and the world must go on. It is a descent from this perhaps grand attitude to the thought that less money may be available for libraries for the time being. We know that rates are rising in many places, owing to unemployment relief needs and A.R.P. demands, but there is the consolation that last year many new libraries were opened. It may be a result of the truth that never are libraries more needed than in hours of stress.