Search results

1 – 10 of 549
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 July 2006

Eric J. Iversen and Richard Tee

The purpose of this mainly conceptual paper is to analyze key changes in the institutional setting for standardization and to discuss what they indicate about further developments

1921

Abstract

Purpose

The purpose of this mainly conceptual paper is to analyze key changes in the institutional setting for standardization and to discuss what they indicate about further developments of the mobile sector. The intention is that this conceptual analysis will complement and contextualize the analysis of Nordic players found in the other papers of this special issue.

Design/methodology/approach

The paper is concerned with issues of industrial organization. The paper presents a treatment of industrial dynamics in them mobile telecom sector and the changing role of standards in it. We approach the substantial changes in the mobile telecom sector, focusing on the correspondence of the changes in the standards system to overall industry dynamics. Empirical information from the Symbian case is used to illustrate the hypothesis of standardization process and of the industry at large.

Findings

The paper identifies changing patters in the organization of technological standardization which represents a microcosm of the larger reorganization of the sector. Nordic actors, whose present position owes much to success in linking capabilities to sequential mobile standards. The paper draws out implications of the limits to “intergenerational leveraging” in standards.

Originality/value

The major contribution of the paper is to focus on changes in the organization of the standardization process in order to discuss the industrial dynamics of an industry which is undergoing a period of rapid change. Its reference to industrial dynamics perspective allows it to link the literature on dominant design to the field of standards research.

Details

info, vol. 8 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Access Restricted. View access options
Article
Publication date: 1 July 2006

Christopher Palmberg and Eric Bohlin

The purpose of this paper is to introduce the papers in the special issue on “Next generation mobile telecommunications networks challenges to the Nordic ICT industries”.

1234

Abstract

Purpose

The purpose of this paper is to introduce the papers in the special issue on “Next generation mobile telecommunications networks challenges to the Nordic ICT industries”.

Design/methodology/approach

This introductory paper summarises the key points of each paper.

Findings

The competitive environment of the Nordic ICT industries has changed and is far more complex now compared to the previous single‐standard environment of 2G. The avenues for influencing competition between basic technology platforms and standards are much narrower and involve interaction with a much greater number of stakeholders and technologies on a global level.

Originality/value

The six papers of this Special Issue highlight interesting viewpoints both on the possible future evolution of the mobile telecommunications industry in general, as well as on the past development and present challenges that the Nordic countries face.

Details

info, vol. 8 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Access Restricted. View access options
Article
Publication date: 15 December 2023

Karren Lee-Hwei Khaw, Hamdan Amer Ali Al-Jaifi and Rozaimah Zainudin

This study aims to revisit the relationship between Shariah-compliant firms and earnings management. Specifically, the authors examine whether Shariah-certified firms have lower…

160

Abstract

Purpose

This study aims to revisit the relationship between Shariah-compliant firms and earnings management. Specifically, the authors examine whether Shariah-certified firms have lower earnings management than non-Shariah-certified firms and how often a firm must hold its certification to observe considerably reduced earnings management. This study also explores how senior management ethnic dualism affects the association of Shariah certification and earnings management.

Design/methodology/approach

The authors analyze the hypothesized association between Shariah certification and earnings management using a panel regression model and several robustness tests, including the Heckman selection model. The sample consists of 547 nonfinancial firms listed on the Bursa Malaysia stock exchange, with 5,478 firm-year observations over the 2001–2016 sample period.

Findings

Shariah certification is found to mitigate earnings management, particularly for firms that consistently retain their Shariah status. The longer firms retain their Shariah certification continually, the lower the earnings management. Additionally, the results indicate that the negative impact of Shariah certification on earnings management is driven by ethnic duality when a specific ethnic group dominates the top management.

Research limitations/implications

Firms’ commitment to religious-based screening and continuation of certification plays a significant role in improving earnings quality. Firms are committed to abiding by the Shariah code of conduct instead of using the Shariah status for reputation purposes to attract investors.

Practical implications

For investors, the continuous compliance status is a crucial indicator of a firm’s commitment to comply with Shariah principles and to mitigate earnings management. Regarding policy implications, Shariah-compliance guidelines can constrain earnings manipulation, especially among firms lacking ethnic diversity.

Originality/value

The study shows that Shariah certification must be maintained consecutively to reduce earnings management. Shariah certification’s governance function is crucial in ethnically homogeneous firms, primarily when one ethnic group dominates the senior management.

Details

Journal of Islamic Accounting and Business Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0817

Keywords

Available. Content available
Article
Publication date: 21 August 2007

Pieter Ballon

535

Abstract

Details

info, vol. 9 no. 5
Type: Research Article
ISSN: 1463-6697

Available. Content available
Article
Publication date: 9 September 2019

Anders Örtenblad

199

Abstract

Details

The Learning Organization, vol. 26 no. 6
Type: Research Article
ISSN: 0969-6474

Access Restricted. View access options
Article
Publication date: 21 August 2007

Martijn Poel, Andrea Renda and Pieter Ballon

This paper aims to explain and demonstrate how business model frameworks can be used to understand market developments and to assess the role of policy in (multi‐sided) ICT

4599

Abstract

Purpose

This paper aims to explain and demonstrate how business model frameworks can be used to understand market developments and to assess the role of policy in (multi‐sided) ICT markets.

Design/methodology/approach

The research approach in the paper builds on integrated business model frameworks, which cover (much) more than the financial decisions of one single firm. A case study approach is implemented and tested in two studies on digital content platforms.

Findings

Relevant policy instruments are identified and explored. To some extent, the findings are complementary or contradictory to the findings of existing studies on digital content platforms. The paper includes policy recommendations related to mobile and fixed content platforms.

Research limitations/implications

Limitations of the study are due to the explorative and qualitative approach, and are to be complemented by other approaches. Policy makers and researchers can use the approach to analyse digital content platform developments and the impact of policy. Stakeholders in innovation processes can use the approach to address business models as well as policy issues for emerging platforms and services.

Originality/value

The use of business model analysis in the context of policy analysis is a relatively new approach that is inspired by research findings on information communication technology (ICT) platforms and multi‐sided networks, progress in business model studies, challenges in the policy mix for ICT, and the importance of case study methods for impact assessment.

Access Restricted. View access options
Article
Publication date: 9 March 2015

Phil Brooke and Richard Paige

This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for…

683

Abstract

Purpose

This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users.

Design/methodology/approach

The authors review the existing literature, and then identify user stories typical to their users of interest. They analyse the risks, mitigations of risks and the limits of those mitigations in the user stories.

Findings

The scenarios identified suggest that background, opportunistic encryption has value, but more explicit, user-visible cryptographic mechanisms do not provide any further mitigation. Other mechanisms beyond technological mitigations provide the required mitigation for the users.

Research limitations/implications

Further work should be carried out on the trust issues with trusted third parties, as they are intrinsic to global, automated cryptographic mechanisms. The authors suggest that deployed systems should rely on automation rather than explicit user involvement; further work on how best to involve users effectively remains valuable.

Practical implications

Deployed systems should rely on automation rather than explicit user dialogues. This follows from recognised aspects of user behaviour, such as ignoring dialogues and unconsciously making a holistic assessment of risk that is mostly mitigated by social factors.

Social implications

The user populations concerned rely significantly on the existing legal and social infrastructure to mitigate some risks, such as those associated with e-commerce. Guarantees from third parties and the existence of fallback procedures improve user confidence.

Originality/value

This work uses user stories as a basis for a holistic review of the issues surrounding the use of cryptography. The authors concentrate on a relatively large population (non-expert IT users) carrying out typical tasks (web and email).

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 4 March 2014

Jonathan Matthew Scott, Richard T. Harrison, Javed Hussain and Cindy Millman

This exploratory study aims to examine how knowledge acquired via guanxi (networks and connections) is enabling women in China to overcome a number of significant barriers and…

682

Abstract

Purpose

This exploratory study aims to examine how knowledge acquired via guanxi (networks and connections) is enabling women in China to overcome a number of significant barriers and challenges in order to start and grow successful businesses.

Design/methodology/approach

The authors undertook two in-depth interviews to qualitatively investigate the use of guanxi as a means of overcoming various barriers faced by Chinese women in establishing and growing their businesses.

Findings

The findings suggest that family background (and, in particular, support from parents and spouses), experience, training, education and finance are key success factors influencing the performance of women-led firms in China. The experiences of the two entrepreneurs in the study demonstrate the importance of mentors in helping to develop a woman's business acumen and providing the right contacts to help overcome potential barriers to developing a successful business.

Research limitations/implications

While this study provides a useful first step to better understanding the role of guanxi networks in supporting women-led ventures in China, further research is needed to test the generalizability of the findings.

Originality/value

This study contributes to the limited prior research focusing on the important role of guanxi networks in assisting Chinese women to successfully launch and grow new ventures.

Details

International Journal of Gender and Entrepreneurship, vol. 6 no. 1
Type: Research Article
ISSN: 1756-6266

Keywords

Available. Open Access. Open Access
Article
Publication date: 14 March 2024

Jonathan Passmore, David Tee and Richard Gold

To date, little research has been undertaken to test the effectiveness of team coaching, with past work focusing on models, frameworks and competencies. This study aimed to…

13692

Abstract

Purpose

To date, little research has been undertaken to test the effectiveness of team coaching, with past work focusing on models, frameworks and competencies. This study aimed to examine the effectiveness of team coaching within real world organizational teams and its impact on individual perceptions of team cohesion and psychological safety.

Design/methodology/approach

A randomized control trial (RCT) using the comparable interventions: (1) team coaching (intervention) and (2) team facilitation (control) was employed with multiple teams and multiple facilitators, measuring the impact on team cohesion and psychological safety.

Findings

The data indicate participants engaging in the team coaching intervention made greater gains in terms of their individual perceptions of psychological safety and team cohesion than individuals who received the team facilitation intervention (T1–T2).

Practical implications

Facilitators should apply a team coaching approach when seeking to address issues of cohesion and psychological safety within workplace teams.

Originality/value

This study provides the first evidence, using an RCT method, of the effectiveness of team coaching as a workplace intervention for enhancing individual perceptions of psychological safety and team cohesion.

Details

Journal of Work-Applied Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2205-2062

Keywords

Access Restricted. View access options
Article
Publication date: 2 January 2018

Jon Painter, Barry Ingham, Liam Trevithick, Richard P. Hastings and Ashok Roy

The purpose of this paper is to analyse ratings data from the recently developed Learning Disability Needs Assessment Tool (LDNAT) to identify factors associated with specialist…

591

Abstract

Purpose

The purpose of this paper is to analyse ratings data from the recently developed Learning Disability Needs Assessment Tool (LDNAT) to identify factors associated with specialist intellectual disability (ID) hospital admissions.

Design/methodology/approach

Ratings from 1,692 individuals were analysed and the LDNAT items differing significantly between inpatients and non-inpatients were identified. Statistical analyses on total scores derived from these items were used to calculate an optimal cut-off. This LDNAT inpatient index score was also confirmed via an alternative statistical technique.

Findings

On average, 18 of the 23 LDNAT item ratings were significantly higher in people with ID assessed as inpatients compared to those rated in community settings. Using the total of these items, the resulting LDNAT inpatient index was analysed. A cut-off score of 22.5 was calculated to be the optimal balance between sensitivity (0.833) and specificity (0.750). This was confirmed by calculating the Youden index (j=0.583). At this level 68 per cent of inpatients and 81 per cent of non-inpatient cases were correctly identified.

Practical implications

Currently there is a national (UK) programme to radically reduce the amount of specialist inpatient care for people ID. This will necessitate early identification of individuals most at risk of admission together with investment in improved, proactive community services if admissions to a diminishing bed-base are to remain manageable.

Originality/value

This study confirms the associations between mental health difficulties, challenging behaviour and specialist hospital admissions for people with ID, extending existing research by translating these findings into a clinically usable risk index.

Details

Tizard Learning Disability Review, vol. 23 no. 1
Type: Research Article
ISSN: 1359-5474

Keywords

1 – 10 of 549
Per page
102050