Search results

1 – 7 of 7
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 2 August 2021

Michael Santucci

This paper aims to describe an integration of the media naturalness theory, the continuum model of impression formation and the social identity model of deindividuation effects…

394

Abstract

Purpose

This paper aims to describe an integration of the media naturalness theory, the continuum model of impression formation and the social identity model of deindividuation effects. The goal is to determine the compatibility of the central tenets and propositions of the two theories and reconcile their effects under a unified model that can be used to explain and predict changes in perceptions, attitudes and behaviors arising in computer-mediated interaction.

Design/methodology/approach

A review of the literature was used to determine whether the two theories were compatible. The reconciliation comes by way of a third theory, the motivated tactician theory, which focuses on the effects of cognitive effort on schema use, particularly on those schemas used in social categorization processes.

Findings

It was determined that the two models of focus could be combined via the tenets of the third. The combined model is expected to provide explanatory and predictive capabilities that exceed those of the individual theories and should prove to be relevant in the study of computed-supported collaboration, in the design of collaborative environments and in the analysis of individual and group behaviors in computer-mediated communication.

Research limitations/implications

The current effort describes the main effects derived from the integration and offers four propositions that describe moderating factors that are derived from each of the three theories. The main effects must be tested and validated and, given support, must be extended to determine the validity of the moderating effects predicted by the propositions. Additionally, media naturalness theory is a relatively recent addition to theories of technology and so needs further empirical support for its propositions. As to the behavioral implications, the social identity model of deindividuation effects has yet to be tested with the specific intention of discovering how media characteristics affect self-concept.

Practical implications

The model can be used to inform information system designs that favor desirable behavioral outcomes or to prevent undesirable effects from occurring. For example, emphasis can place on media attributes and system features that individuate decision-makers within group decision support environments when consensus is a primary goal as a means to avoid group thinks and polarization. Conversely, attributes and features that are supportive of social categorization processes and deindividuation effects might be used to emphasize group membership, shared effort and to minimize social loafing or the frequency and intensity of inappropriate disparagement of ideas and contributions.

Social implications

The combined model is principally useful in explaining and predicting human behavior in relation to computer-supported collaborative work such as distributed workgroups and online learning environments. For example, the explanatory elements of the combined theory can be used by managers as a diagnostic tool in problem situations within virtual teams. A specific instance would be to determine why a change to existing systems created a change in work habits. In a more proactive move, managers might use the predicted social categorization effects and subsequent depersonalization, to instill a group identity in an otherwise diverse workgroup.

Originality/value

The combined model is expected to provide explanatory and predictive capabilities that exceed those of the individual theories and should prove to be relevant in the study of computed-supported collaboration, in the design of collaborative environments and in the analysis of individual and group behaviors in computer-mediated communication.

Details

Team Performance Management: An International Journal, vol. 27 no. 5/6
Type: Research Article
ISSN: 1352-7592

Keywords

Access Restricted. View access options
Article
Publication date: 1 May 1993

The use of competitor analysis is a rapidly growing area of business activity, especially among major corporations, across the world. The old military stratagem “know your enemy;…

1521

Abstract

The use of competitor analysis is a rapidly growing area of business activity, especially among major corporations, across the world. The old military stratagem “know your enemy; through knowing your enemy you can beat him/her”, has found new life in the contemporary business environment. Surveys carried out in Europe and the USA in 1989 found that two‐thirds of competitor analysis departments were less than three years old. Competitor analysis is becoming increasingly seen as a key component in strategy formulation, in particular, in forming marketing strategy.

Details

Marketing Intelligence & Planning, vol. 11 no. 5
Type: Research Article
ISSN: 0263-4503

Access Restricted. View access options
Article
Publication date: 27 November 2018

Rajat Kumar Mudgal, Rajdeep Niyogi, Alfredo Milani and Valentina Franzoni

The purpose of this paper is to propose and experiment a framework for analysing the tweets to find the basis of popularity of a person and extract the reasons supporting the…

155

Abstract

Purpose

The purpose of this paper is to propose and experiment a framework for analysing the tweets to find the basis of popularity of a person and extract the reasons supporting the popularity. Although the problem of analysing tweets to detect popular events and trends has recently attracted extensive research efforts, not much emphasis has been given to find out the reasons behind the popularity of a person based on tweets.

Design/methodology/approach

In this paper, the authors introduce a framework to find out the reasons behind the popularity of a person based on the analysis of events and the evaluation of a Web-based semantic set similarity measure applied to tweets. The methodology uses the semantic similarity measure to group similar tweets in events. Although the tweets cannot contain identical hashtags, they can refer to a unique topic with equivalent or related terminology. A special data structure maintains event information, related keywords and statistics to extract the reasons supporting popularity.

Findings

An implementation of the algorithms has been experimented on a data set of 218,490 tweets from five different countries for popularity detection and reasons extraction. The experimental results are quite encouraging and consistent in determining the reasons behind popularity. The use of Web-based semantic similarity measure is based on statistics extracted from search engines, it allows to dynamically adapt the similarity values to the variation on the correlation of words depending on current social trends.

Originality/value

To the best of the authors’ knowledge, the proposed method for finding the reason of popularity in short messages is original. The semantic set similarity presented in the paper is an original asymmetric variant of a similarity scheme developed in the context of semantic image recognition.

Details

International Journal of Web Information Systems, vol. 14 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Available. Open Access. Open Access
Article
Publication date: 14 March 2016

Glenn C Parry, Saara A. Brax, Roger S. Maull and Irene C. L. Ng

Improvement of reverse supply chains requires accurate and timely information about the patterns of consumption. In the consumer context, the ways to generate and access such…

9927

Abstract

Purpose

Improvement of reverse supply chains requires accurate and timely information about the patterns of consumption. In the consumer context, the ways to generate and access such use-visibility data are in their infancy. The purpose of this study is to demonstrate how the Internet of Things (IoT) may be operationalised in the domestic setting to capture data on a consumer’s use of products and the implications for reverse supply chains.

Design/methodology/approach

This study uses an explorative case approach drawing on data from studies of six UK households. “Horizontal” data, which reveals patterns in consumers’ use processes, is generated by combining “vertical” data from multiple sources. Use processes in the homes are mapped using IDEF0 and illustrated with the data. The quantitative data are generated using wireless sensors in the home, and qualitative data are drawn from online calendars, social media, interviews and ethnography.

Findings

The study proposes four generic measurement categories for operationalising the concept of use-visibility: experience, consumption, interaction and depletion, which together address the use of different household resources. The explorative case demonstrates how these measures can be operationalised to achieve visibility of the context of use in the home. The potential of such use-visibility for reverse supply chains is discussed.

Research limitations/implications

This explorative case study is based on an in-depth study of the bathroom which illustrates the application of use-visibility measures (UVMs) but provides a limited use context. Further research is needed from a wider set of homes and a wider set of use processes and contexts.

Practical implications

The case demonstrates the operationalisation of the combination of data from different sources and helps answer questions of “why?”, “how?”, “when?” and “how much?”, which can inform reverse supply chains. The four UVMs can be operationalised in a way that can contribute to supply chain visibility, providing accurate and timely information of consumption, optimising resource use and eliminating waste.

Originality/value

IDEF0 framework and case analysis is used to identify and validate four UVMs available through IoT data – that of experience, consumption, interaction and depletion. The UVMs characterise IoT data generated from a given process and inform the primary reverse flow in the future supply chain. They provide the basis for future data collection and development of theory around their effect on reverse supply chain efficiency.

Details

Supply Chain Management: An International Journal, vol. 21 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Access Restricted. View access options
Article
Publication date: 24 February 2012

Michael Rader

The paper shows that current research systems are not geared to organise and evaluate research involving several scientific disciplines. A consequence is exaggerated promises and…

279

Abstract

Purpose

The paper shows that current research systems are not geared to organise and evaluate research involving several scientific disciplines. A consequence is exaggerated promises and expectations based on “speculative interdisciplinarity”. These expectations are one cause of “speculative ethics”. Evaluators of interdisciplinary research proposals should be aware of the pitfalls existing in this kind of research. The purpose of this paper is to highlight “speculative interdisciplinarity” as a cause of exaggerated expectations with the result that ethical analysis and similar activities focus on unlikely impacts.

Design/methodology/approach

The paper confronts documented statements of champions of emerging technologies with assessments by specialists from the scientific disciplines involved in the development of the technologies and examines the extent to which differences are due to problems with interdisciplinary work.

Findings

The paper identifies the causes of exaggerated expectations related to the impact of emerging technologies based on interdisciplinary research. Lack of experience with interdisciplinary research is shown to be a major cause.

Research limitations/implications

This is basically a case study for a spectacular individual example. There is a need to show that the same problems exist for less spectacular scientific endeavours.

Practical implications

Review process organisers and reviewers should be aware that exaggerated expectations can arise as a result of insufficient attention to the organisation of interdisciplinary research. There is a need for studies to confront expectations with the genuine state of research.

Originality/value

The paper highlights a need to pay attention to the organisation of interdisciplinary research.

Details

Journal of Information, Communication and Ethics in Society, vol. 10 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Access Restricted. View access options
Case study
Publication date: 1 May 2014

Cherie Ann Sherman and Philip M. Anderson

This case discusses the best-selling security system for preventing shoplifting and the dilemma its startup manufacturer faced when it learned there was a very remote possibility…

Abstract

Case description

This case discusses the best-selling security system for preventing shoplifting and the dilemma its startup manufacturer faced when it learned there was a very remote possibility that the system might interfere with heart pacemakers. The theme of the case is that when health is involved, a company must carefully consider any level of preventable risk a product poses, even if that level of risk is extremely low.

Details

The CASE Journal, vol. 10 no. 1
Type: Case Study
ISSN: 1544-9106

Keywords

Access Restricted. View access options
Case study
Publication date: 27 May 2022

George L. De Feis and Donald Grunewald

Later in the discussion, the options for long run strategy in dealing with a possible takeover offer and other strategic options can be discussed by the class. Lack of familiarity…

Abstract

Theoretical basis

Later in the discussion, the options for long run strategy in dealing with a possible takeover offer and other strategic options can be discussed by the class. Lack of familiarity by students with the role of the outside potential acquirer of the camp (in this case, a hotel chain) and the lack of familiarity with the role of an investor who is a family investor, who may wish to sell stock and use the proceeds for another purpose, or a small investor who invests because he or she uses the camp and takes advantage of the stockholder’s discount will probably preclude role playing, except in executive MBA classes where students have sufficient experience in possible takeover situations or in investment management, Emphasis should probably be placed on discussing the major issues, such as social and cultural issues and on marketing and public relations issues and on financial issues, including the options available in the event of a possible takeover effort. All of these issues are impacted fully by the COVID-19 pandemic.

Research methodology

Instructors will need to play an active role in teaching this case. It is recommended that the instructor give a short lecture or discussion at the beginning as to how a camp such as Camp Teddy functions. The authors recommend that the instructor then begin the case discussion by asking students questions about such issues as social and cultural issues and marketing and public relations issues.

Case overview/synopsis

Camp Teddy is a seasonal camp for families in rural Connecticut adjacent to New York City and suburbs in New York and Connecticut. It is technically a for-profit organization but operates more like a nonprofit organization because many of the campers own shares and have used the camp sometimes for several generations. The camp has traditions that are liked by many of the shareholders and campers. Although net income has increased in the past year, there does not seem to be enough funds to support necessary capital expenditures to improve facilities for the future. The largest stockholder has recently died. His immediate heirs’ control 300 of the 1,000 shares and other family members control 400 shares with the remaining 300 shares in the hands of small shareholders, many of whom use the camp each summer. A large hotel chain is interested in possibly acquiring the camp through a buyout or perhaps a hostile takeover, with a potential large gain to shareholders. The board of directors must consider a number of issues to insure good occupancy of the camp in the future and must decide what to do about a potential takeover attempt.

Complexity academic level

This case can be used in several courses, including investment management, hospitality management, corporate finance and business strategy. There are ethical and societal issues in the case, so that the case might also be used in courses looking at business, environment or business ethics. The case is best used at the graduate level, but it might be suitable for some advanced undergraduate courses.

Details

The CASE Journal, vol. 18 no. 5
Type: Case Study
ISSN:

Keywords

1 – 7 of 7
Per page
102050