Paul D. Clarke, Edward P.M. Gardener, Paul Feeney and Phil Molyneux
The British retail banking market has changed markedly since the beginning of the 1970s, and important trends and developments have increased the competitive pressures facing…
Abstract
The British retail banking market has changed markedly since the beginning of the 1970s, and important trends and developments have increased the competitive pressures facing banks. The whole nature of competition in British retail banking has altered. New competitors and new forms of competition have appeared with increasing rapidity. These changes and the associated pressures on banks have intensified during the 1980s. At the same time, banks have increased the comparative importance of retail banking within their strategies. These pressures and their associated implications for British retail banking strategy are explored. It is emphasised that marketing will need increasingly to dominate bank strategies in retail banking. This orientation towards marketing has important strategic and managerial consequences for banks.
Details
Keywords
Sameer Kumar and Jorgen Ellingson
The Chinese market presents numerous challenges to companies from industrialized nations, none of which is as daunting as protecting intellectual property (IP). It is necessary to…
Abstract
Purpose
The Chinese market presents numerous challenges to companies from industrialized nations, none of which is as daunting as protecting intellectual property (IP). It is necessary to develop a fresh approach for the US, EU and Japanese governments and companies to take advantage of China's growing domestic market while not exposing their IP to continued losses. This paper seeks to discuss this issue.
Design/methodology/approach
The research is based on review of existing literature on IP rights infringements in China, application of theory of sustainable competitive advantage as a prescription to discourage imitation and promote early‐mover advantages, and SWOT analysis of the contrasting US and Japanese IP strategies.
Findings
Both US and Japanese IP strategies have advantages and disadvantages, but the question remains who can be the most creative and adaptive in their ultimate goal of preserving their IP rights while prospering in the world's largest marketplace.
Practical implications
Apart from internal use, IP may also be commercialized through a joint venture, outright sales, franchising, or licensing. Using creative but proven methods to protect IP is another way to equalize the playing field. Companies can operate in regions where IP laws are strictly enforced and they should work with, and not against, their counterparts in China.
Originality/value
IP strategies of US and Japan in China provide a number of valuable insights on distinctive approaches used. A prescriptive approach is outlined for companies from the industrialized world to manage their efforts in protecting IP in an emerging market with a vastly different social and economic structure.
Details
Keywords
Stephanie A. Andel, Derek M. Hutchinson and Paul E. Spector
The modern workplace contains many physical and interpersonal hazards to employee physical and psychological health/well-being. This chapter integrates the literatures on…
Abstract
The modern workplace contains many physical and interpersonal hazards to employee physical and psychological health/well-being. This chapter integrates the literatures on occupational safety (i.e., accidents and injuries) and mistreatment (physical violence and psychological abuse). A model is provided linking environmental (climate and leadership), individual differences (demographics and personality), motivation, behavior, and outcomes. It notes that some of the same variables have been linked to both safety and mistreatment, such as safety climate, mistreatment climate, conscientiousness, and emotional stability.
Details
Keywords
Looks at the 2000 Employment Research Unit Annual Conference held at the University of Cardiff in Wales on 6/7 September 2000. Spotlights the 76 or so presentations within and…
Abstract
Looks at the 2000 Employment Research Unit Annual Conference held at the University of Cardiff in Wales on 6/7 September 2000. Spotlights the 76 or so presentations within and shows that these are in many, differing, areas across management research from: retail finance; precarious jobs and decisions; methodological lessons from feminism; call centre experience and disability discrimination. These and all points east and west are covered and laid out in a simple, abstract style, including, where applicable, references, endnotes and bibliography in an easy‐to‐follow manner. Summarizes each paper and also gives conclusions where needed, in a comfortable modern format.
Details
Keywords
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details
Keywords
In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still…
Abstract
In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still be covered by the Act if she were employed on like work in succession to the man? This is the question which had to be solved in Macarthys Ltd v. Smith. Unfortunately it was not. Their Lordships interpreted the relevant section in different ways and since Article 119 of the Treaty of Rome was also subject to different interpretations, the case has been referred to the European Court of Justice.
Barrie O. Pettman and Richard Dobbins
This issue is a selected bibliography covering the subject of leadership.
Abstract
This issue is a selected bibliography covering the subject of leadership.