Search results
1 – 10 of over 3000
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…
Abstract
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.
Details
Keywords
T. Oron-Gilad, J.Y.C. Chen and P.A. Hancock
When we take a top-down approach to understanding issues surrounding ROV implementation, we can employ the metaphor either literally or as a form of abstraction hierarchy …
Abstract
When we take a top-down approach to understanding issues surrounding ROV implementation, we can employ the metaphor either literally or as a form of abstraction hierarchy (Rasmussen, 1986). Literally, the military's necessity for moment-to-moment information mandates a suite of context-specific technological capabilities for sensor and effector systems. This suite includes but is not limited to systems in outer space (such as geo-synchronized orbiting platforms), high altitude atmospheric systems (such as Global Hawk) and other craft which operate less than hundreds of feet from earth down to almost ground level itself.
Hayley Ness, Peter J.B. Hancock, Leslie Bowie, Vicki Bruce and Graham Pike
The introduction of a three-quarter-view database in the PRO-fit facial-composite system has enabled an investigation into the effects of image view in face construction. The…
Abstract
Purpose
The introduction of a three-quarter-view database in the PRO-fit facial-composite system has enabled an investigation into the effects of image view in face construction. The purpose of this paper is to examine the impact of constructing full-face and three-quarter-view composites under different encoding conditions. It also examines the potential value of three-quarter-view composites that can be generated automatically from a front-view composite. The authors also investigate whether there is an identification benefit for presenting full-face and three-quarter composites together.
Design/methodology/approach
Three experiments examine the impact of encoding conditions on composite construction and presentation of composites at the evaluation stage.
Findings
The work revealed that while standard full-face composites perform well when all views of the face have been encoded, care should be taken when a person has only seen one view. When a witness has seen a side view of a suspect, a three-quarter-view composite should be constructed. Also, it would be beneficial for a witness to construct two composites of a suspect, one in full-face view and one in a three-quarter-view, particularly when the witness has only encoded one view. No benefit emerged for use of three-quarter-view composites generated automatically.
Research limitations/implications
This is the first study to examine viewpoint in facial composite construction. While a great deal of research has examined viewpoint dependency in face recognition tasks, composite construction is a reconstruction task involving both recall and recognition. The results indicate that there is a viewpoint effect that is similar to that described in the recognition literature. However, more research is needed in this area.
Practical implications
The practical implications of this research are that it is extremely important for facial composite operators in the field (police operators) to know who will make a good likeness of the target. Research such as this which examines real-life issues is incredibly important. This research shows that if a witness has seen all views of a perpetrator’s face then standard composite construction using a full-face view will work well. However, if they have only seen a single view then it will not.
Social implications
There are obvious wider societal implications for any research which deals with eyewitness memory and the potential identification of perpetrators.
Originality/value
No research to date has formally examined the impact of viewpoint in facial-composite construction.
Details
Keywords
Peter J. Jordan, Neal M. Ashkanasy and Sandra A. Lawrence
Purpose: During turbulent social and economic times, perceptions of job insecurity can be expected to increase. In this chapter, we outline a theoretical model that links…
Abstract
Purpose: During turbulent social and economic times, perceptions of job insecurity can be expected to increase. In this chapter, we outline a theoretical model that links perceptions of job insecurity to lower affective commitment and high work-related stress, resulting in employees' engaging in poor decision-making behavior. We argue further that employees who possess individual skills of being aware of emotions and managing emotions are less susceptible to such behavior. Study Design/Methodology/Approach: We tested our model in two studies. The first study was conducted using an online sample of 217 respondents. The second study used a split administration design conducted in a single organization and used a sample of 579 employees. Findings: Our data revealed that job insecurity is linked to negative decision-making behaviors and that better emotional awareness and management skills may reduce negative decision-making behaviors. Originality/Value: Our findings support the notion of threat rigidity theory where we found that job insecurity affects how individuals make decisions. Our analysis suggests that the individual's level of emotional skills can act as a form of behavioral control that can ameliorate the effects of job insecurity on decision-making behavior. Research Limitations: Both studies had a female gender bias in our sampling frames. There is a possibility of common method variance affecting the results of Study 1, and both studies involved the use of a self-report measure of emotional skills.
Details
Keywords
Chien Wen (Tina) Yuan and Nanyi Bi
In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The…
Abstract
Purpose
In a world where different communication technologies support social connection, managing unavailability is as important as, if not more important than, managing availability. The need to manage unavailability becomes increasingly critical when users employ several communication tools to interact with various ties. A person's availability information disclosure may depend on different social relationships and the technologies used by the person. The study contributes to the literature by drawing on privacy management theory to investigate how users practice availability management and use its deceptive form, which is sometimes called a butler lie, with various ties across different messaging applications (apps) as part of their online privacy. Relevant factors in mediated communication, including facework, common ground, and interpersonal trust, are included in the developed model.
Design/methodology/approach
The authors conducted an online survey (n = 475) to explore the relationship between one's contact with different interactants (significant others, family members, close friends, acquaintances, groups of friends, and groups of acquaintances) and one's practice of availability management and use of butler lies with these interactants at different size levels on various messaging apps.
Findings
Factors such as facework, privacy related to technology, and privacy related to social relationships affect the practice of availability management and the use of butler lies. Notably, butler lies are used most frequently with acquaintances and groups of acquaintances and least frequently with significant others. Moreover, the practice of availability management and the use of butler lies are negatively moderated by people's conversational grounding and trust.
Originality/value
The study examined the practice of cross-app availability management with diverse social ties on mobile technologies, which is a socio-informatic practice that is widely adopted in the contemporary digital landscape but on which limited scientific and theoretic research has been conducted. No research has directly investigated users' availability management across multiple apps from a relational perspective. Building on the theoretical framework of privacy management, the paper aims to bridge the gap in the relevant literature. The results of this study can serve as a reference for library professionals to develop information literacy programs according to users' availability management needs. The results also provide insights to system designers for developing messaging tools.
Details
Keywords
J.C.Y. How, C.S. Teo and H.Y. Izan
Since Ball and Brown's (1968) seminal paper on the association between unexpected changes in earnings and share prices, there have been an abundance of empirical studies that…
Abstract
Since Ball and Brown's (1968) seminal paper on the association between unexpected changes in earnings and share prices, there have been an abundance of empirical studies that suggest that announcements of earnings and dividends do indeed convey new and useful information to capital market participants. Most of these studies, however, have examined the information effects of only earnings OR dividend announcements. They did not examine whether the share market evaluates each announcement with respect to the information contained in the other.
THE Electronic Computer Exhibition and the B.I.M. conference have provided material for serious contemplation. Sir Harold Gillett, Lord Mayor of London, opening the Exhibition…
Abstract
THE Electronic Computer Exhibition and the B.I.M. conference have provided material for serious contemplation. Sir Harold Gillett, Lord Mayor of London, opening the Exhibition suggested that we are living in the age of the second industrial revolution. There are some who share the Lord Mayor's view and others who take the whole matter in their stride. One thing is certain, we shall be able to do more—and do it more efficiently.
Charlie D. Frowd, William B. Erickson, James M. Lampinen, Faye C. Skelton, Alex H. McIntyre and Peter J.B. Hancock
The purpose of this paper is to assess the impact of seven variables that emerge from forensic research on facial-composite construction and naming using contemporary police…
Abstract
Purpose
The purpose of this paper is to assess the impact of seven variables that emerge from forensic research on facial-composite construction and naming using contemporary police systems: EvoFIT, Feature and Sketch.
Design/methodology/approach
The paper involves regression- and meta-analyses on composite-naming data from 23 studies that have followed procedures used by police practitioners for forensic face construction. The corpus for analyses contains 6,464 individual naming responses from 1,069 participants in 41 experimental conditions.
Findings
The analyses reveal that composites constructed from the holistic EvoFIT system were over four-times more identifiable than composites from “Feature” (E-FIT and PRO-fit) and Sketch systems; Sketch was somewhat more effective than Feature systems. EvoFIT was more effective when internal features were created before rather than after selecting hair and the other (blurred) external features. Adding questions about the global appearance of the face (as part of the holistic-cognitive interview (H-CI)) gives a valuable improvement in naming over the standard face-recall cognitive interview (CI) for all three system types tested. The analysis also confirmed that composites were considerably less effective when constructed from a long (one to two days) compared with a short (0-3.5 hours) retention interval.
Practical implications
Variables were assessed that are of importance to forensic practitioners who construct composites with witnesses and victims of crime.
Originality/value
Using a large corpus of forensically-relevant data, the main result is that EvoFIT using the internal-features method of construction is superior; an H-CI administered prior to face construction is also advantageous (cf. face-recall CI) for EvoFIT as well as for two further contrasting production systems.
Details