Eric J. Iversen and Richard Tee
The purpose of this mainly conceptual paper is to analyze key changes in the institutional setting for standardization and to discuss what they indicate about further developments…
Abstract
Purpose
The purpose of this mainly conceptual paper is to analyze key changes in the institutional setting for standardization and to discuss what they indicate about further developments of the mobile sector. The intention is that this conceptual analysis will complement and contextualize the analysis of Nordic players found in the other papers of this special issue.
Design/methodology/approach
The paper is concerned with issues of industrial organization. The paper presents a treatment of industrial dynamics in them mobile telecom sector and the changing role of standards in it. We approach the substantial changes in the mobile telecom sector, focusing on the correspondence of the changes in the standards system to overall industry dynamics. Empirical information from the Symbian case is used to illustrate the hypothesis of standardization process and of the industry at large.
Findings
The paper identifies changing patters in the organization of technological standardization which represents a microcosm of the larger reorganization of the sector. Nordic actors, whose present position owes much to success in linking capabilities to sequential mobile standards. The paper draws out implications of the limits to “intergenerational leveraging” in standards.
Originality/value
The major contribution of the paper is to focus on changes in the organization of the standardization process in order to discuss the industrial dynamics of an industry which is undergoing a period of rapid change. Its reference to industrial dynamics perspective allows it to link the literature on dominant design to the field of standards research.
Details
Keywords
Christopher Palmberg and Eric Bohlin
The purpose of this paper is to introduce the papers in the special issue on “Next generation mobile telecommunications networks challenges to the Nordic ICT industries”.
Abstract
Purpose
The purpose of this paper is to introduce the papers in the special issue on “Next generation mobile telecommunications networks challenges to the Nordic ICT industries”.
Design/methodology/approach
This introductory paper summarises the key points of each paper.
Findings
The competitive environment of the Nordic ICT industries has changed and is far more complex now compared to the previous single‐standard environment of 2G. The avenues for influencing competition between basic technology platforms and standards are much narrower and involve interaction with a much greater number of stakeholders and technologies on a global level.
Originality/value
The six papers of this Special Issue highlight interesting viewpoints both on the possible future evolution of the mobile telecommunications industry in general, as well as on the past development and present challenges that the Nordic countries face.
Details
Keywords
Karren Lee-Hwei Khaw, Hamdan Amer Ali Al-Jaifi and Rozaimah Zainudin
This study aims to revisit the relationship between Shariah-compliant firms and earnings management. Specifically, the authors examine whether Shariah-certified firms have lower…
Abstract
Purpose
This study aims to revisit the relationship between Shariah-compliant firms and earnings management. Specifically, the authors examine whether Shariah-certified firms have lower earnings management than non-Shariah-certified firms and how often a firm must hold its certification to observe considerably reduced earnings management. This study also explores how senior management ethnic dualism affects the association of Shariah certification and earnings management.
Design/methodology/approach
The authors analyze the hypothesized association between Shariah certification and earnings management using a panel regression model and several robustness tests, including the Heckman selection model. The sample consists of 547 nonfinancial firms listed on the Bursa Malaysia stock exchange, with 5,478 firm-year observations over the 2001–2016 sample period.
Findings
Shariah certification is found to mitigate earnings management, particularly for firms that consistently retain their Shariah status. The longer firms retain their Shariah certification continually, the lower the earnings management. Additionally, the results indicate that the negative impact of Shariah certification on earnings management is driven by ethnic duality when a specific ethnic group dominates the top management.
Research limitations/implications
Firms’ commitment to religious-based screening and continuation of certification plays a significant role in improving earnings quality. Firms are committed to abiding by the Shariah code of conduct instead of using the Shariah status for reputation purposes to attract investors.
Practical implications
For investors, the continuous compliance status is a crucial indicator of a firm’s commitment to comply with Shariah principles and to mitigate earnings management. Regarding policy implications, Shariah-compliance guidelines can constrain earnings manipulation, especially among firms lacking ethnic diversity.
Originality/value
The study shows that Shariah certification must be maintained consecutively to reduce earnings management. Shariah certification’s governance function is crucial in ethnically homogeneous firms, primarily when one ethnic group dominates the senior management.
Details
Keywords
Martijn Poel, Andrea Renda and Pieter Ballon
This paper aims to explain and demonstrate how business model frameworks can be used to understand market developments and to assess the role of policy in (multi‐sided) ICT…
Abstract
Purpose
This paper aims to explain and demonstrate how business model frameworks can be used to understand market developments and to assess the role of policy in (multi‐sided) ICT markets.
Design/methodology/approach
The research approach in the paper builds on integrated business model frameworks, which cover (much) more than the financial decisions of one single firm. A case study approach is implemented and tested in two studies on digital content platforms.
Findings
Relevant policy instruments are identified and explored. To some extent, the findings are complementary or contradictory to the findings of existing studies on digital content platforms. The paper includes policy recommendations related to mobile and fixed content platforms.
Research limitations/implications
Limitations of the study are due to the explorative and qualitative approach, and are to be complemented by other approaches. Policy makers and researchers can use the approach to analyse digital content platform developments and the impact of policy. Stakeholders in innovation processes can use the approach to address business models as well as policy issues for emerging platforms and services.
Originality/value
The use of business model analysis in the context of policy analysis is a relatively new approach that is inspired by research findings on information communication technology (ICT) platforms and multi‐sided networks, progress in business model studies, challenges in the policy mix for ICT, and the importance of case study methods for impact assessment.
Details
Keywords
This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for…
Abstract
Purpose
This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users.
Design/methodology/approach
The authors review the existing literature, and then identify user stories typical to their users of interest. They analyse the risks, mitigations of risks and the limits of those mitigations in the user stories.
Findings
The scenarios identified suggest that background, opportunistic encryption has value, but more explicit, user-visible cryptographic mechanisms do not provide any further mitigation. Other mechanisms beyond technological mitigations provide the required mitigation for the users.
Research limitations/implications
Further work should be carried out on the trust issues with trusted third parties, as they are intrinsic to global, automated cryptographic mechanisms. The authors suggest that deployed systems should rely on automation rather than explicit user involvement; further work on how best to involve users effectively remains valuable.
Practical implications
Deployed systems should rely on automation rather than explicit user dialogues. This follows from recognised aspects of user behaviour, such as ignoring dialogues and unconsciously making a holistic assessment of risk that is mostly mitigated by social factors.
Social implications
The user populations concerned rely significantly on the existing legal and social infrastructure to mitigate some risks, such as those associated with e-commerce. Guarantees from third parties and the existence of fallback procedures improve user confidence.
Originality/value
This work uses user stories as a basis for a holistic review of the issues surrounding the use of cryptography. The authors concentrate on a relatively large population (non-expert IT users) carrying out typical tasks (web and email).
Details
Keywords
Jonathan Matthew Scott, Richard T. Harrison, Javed Hussain and Cindy Millman
This exploratory study aims to examine how knowledge acquired via guanxi (networks and connections) is enabling women in China to overcome a number of significant barriers and…
Abstract
Purpose
This exploratory study aims to examine how knowledge acquired via guanxi (networks and connections) is enabling women in China to overcome a number of significant barriers and challenges in order to start and grow successful businesses.
Design/methodology/approach
The authors undertook two in-depth interviews to qualitatively investigate the use of guanxi as a means of overcoming various barriers faced by Chinese women in establishing and growing their businesses.
Findings
The findings suggest that family background (and, in particular, support from parents and spouses), experience, training, education and finance are key success factors influencing the performance of women-led firms in China. The experiences of the two entrepreneurs in the study demonstrate the importance of mentors in helping to develop a woman's business acumen and providing the right contacts to help overcome potential barriers to developing a successful business.
Research limitations/implications
While this study provides a useful first step to better understanding the role of guanxi networks in supporting women-led ventures in China, further research is needed to test the generalizability of the findings.
Originality/value
This study contributes to the limited prior research focusing on the important role of guanxi networks in assisting Chinese women to successfully launch and grow new ventures.
Details
Keywords
Jonathan Passmore, David Tee and Richard Gold
To date, little research has been undertaken to test the effectiveness of team coaching, with past work focusing on models, frameworks and competencies. This study aimed to…
Abstract
Purpose
To date, little research has been undertaken to test the effectiveness of team coaching, with past work focusing on models, frameworks and competencies. This study aimed to examine the effectiveness of team coaching within real world organizational teams and its impact on individual perceptions of team cohesion and psychological safety.
Design/methodology/approach
A randomized control trial (RCT) using the comparable interventions: (1) team coaching (intervention) and (2) team facilitation (control) was employed with multiple teams and multiple facilitators, measuring the impact on team cohesion and psychological safety.
Findings
The data indicate participants engaging in the team coaching intervention made greater gains in terms of their individual perceptions of psychological safety and team cohesion than individuals who received the team facilitation intervention (T1–T2).
Practical implications
Facilitators should apply a team coaching approach when seeking to address issues of cohesion and psychological safety within workplace teams.
Originality/value
This study provides the first evidence, using an RCT method, of the effectiveness of team coaching as a workplace intervention for enhancing individual perceptions of psychological safety and team cohesion.
Details
Keywords
Jon Painter, Barry Ingham, Liam Trevithick, Richard P. Hastings and Ashok Roy
The purpose of this paper is to analyse ratings data from the recently developed Learning Disability Needs Assessment Tool (LDNAT) to identify factors associated with specialist…
Abstract
Purpose
The purpose of this paper is to analyse ratings data from the recently developed Learning Disability Needs Assessment Tool (LDNAT) to identify factors associated with specialist intellectual disability (ID) hospital admissions.
Design/methodology/approach
Ratings from 1,692 individuals were analysed and the LDNAT items differing significantly between inpatients and non-inpatients were identified. Statistical analyses on total scores derived from these items were used to calculate an optimal cut-off. This LDNAT inpatient index score was also confirmed via an alternative statistical technique.
Findings
On average, 18 of the 23 LDNAT item ratings were significantly higher in people with ID assessed as inpatients compared to those rated in community settings. Using the total of these items, the resulting LDNAT inpatient index was analysed. A cut-off score of 22.5 was calculated to be the optimal balance between sensitivity (0.833) and specificity (0.750). This was confirmed by calculating the Youden index (j=0.583). At this level 68 per cent of inpatients and 81 per cent of non-inpatient cases were correctly identified.
Practical implications
Currently there is a national (UK) programme to radically reduce the amount of specialist inpatient care for people ID. This will necessitate early identification of individuals most at risk of admission together with investment in improved, proactive community services if admissions to a diminishing bed-base are to remain manageable.
Originality/value
This study confirms the associations between mental health difficulties, challenging behaviour and specialist hospital admissions for people with ID, extending existing research by translating these findings into a clinically usable risk index.