Reviews the fulfilled and unfulfilled promises of Web‐based training since its inception. Explores current influences that establish benchmarks of quality, and forthcoming…
Abstract
Reviews the fulfilled and unfulfilled promises of Web‐based training since its inception. Explores current influences that establish benchmarks of quality, and forthcoming technologies that will shape online learning in the next decade. Contends that distance learning now has a broader interpretation as online learning applications and the underlying technologies have matured. Asserts that instructional design now considers all enabling technologies and learning constructs. Argues that processes that apply user‐centered design, knowledge object structures, usability engineering, and formal evaluation ensure that the full needs of both learners and provider organizations are met. States that industry standards for accessibility and reusability influence design and alter engineering. Maintains that emerging technologies like XML, true speech recognition, and wireless impact Web‐based training; however, knowledge management, peer‐to‐peer learning, and personal learning appliances will dramatically transform the way humans learn.
Details
Keywords
E‐learning is about seven years old and like a seven‐year‐old child, it is immature, but offers considerable promise. Organizations like it because it promises to save them money…
Abstract
E‐learning is about seven years old and like a seven‐year‐old child, it is immature, but offers considerable promise. Organizations like it because it promises to save them money on training. Employees like it because they have greater control over when they do the training. But as with the dotcom craze, e‐learning is now entering a period of reassessment, where the poor examples will probably disappear and the survivors will hopefully improve their offerings.
Details
Keywords
As businesses continue to seek less expensive and more effective ways to train employees, the use of online learning via the Internet would appear to offer great promise. But this…
Abstract
As businesses continue to seek less expensive and more effective ways to train employees, the use of online learning via the Internet would appear to offer great promise. But this potential has been largely untapped.
Details
Keywords
Jillian C. Sweeney, Geoffrey N. Soutar and Tim Mazzarol
Word‐of‐mouth (WOM) marketing has become a key focus for many organisations. However, little research has sought to identify the dimensionality of WOM. The present research…
Abstract
Purpose
Word‐of‐mouth (WOM) marketing has become a key focus for many organisations. However, little research has sought to identify the dimensionality of WOM. The present research project aims to describe the development of a 12‐item measure that can be used to assess WOM at an individual message level for positive and negative WOM and among givers and receivers of WOM.
Design/methodology/approach
The research includes four studies, a qualitative focus group phase and quantitative phases involving surveys of over 2,000 consumers representing givers and receivers of positive and negative WOM.
Findings
Three distinct dimensions emerged. Two (cognitive content and richness of content) reflect the composition of the message, while the third, termed strength of delivery, reflects the manner of delivery. The scale has strong psychometric properties and was found to be generalisable in the four contexts – sending positive/negative messages and receiving positive/negative messages.
Research limitations/implications
The authors addressed consumers' WOM messages solely in a one‐to one‐context. The results cannot automatically be extended to a variety of other media, which requires future research. Further, the authors did not test the measure in a goods context.
Practical implications
The scale has a variety of potential applications and can serve as a framework for further empirical research in this important area.
Originality/value
While much previous research on WOM relates to the sending of positive WOM, this scale has applicability across four WOM contexts, positive and negative giving and positive and negative receiving.
Details
Keywords
Anna Marie Johnson and Sarah Jent
Sets out to provide a selected bibliography or recent resources on library instruction and information literacy.
Abstract
Purpose
Sets out to provide a selected bibliography or recent resources on library instruction and information literacy.
Design/methodology/approach
Introduces and annotates periodical articles, monographs, and exhibition catalogues examining library instruction and information literacy.
Findings
Provides information about each source, discusses the characteristics of current scholarship, and describes sources that contain unique scholarly contributions and quality reproductions.
Originality/value
The information may be used by librarians and interested parties as a quick reference to literature on library instruction and information literacy.
Details
Keywords
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…
Abstract
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.
Details
Keywords
Jaideep Roy and Prabal Roy Chowdhury
In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible…
Abstract
Purpose
In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible contract designed by the target nation that involves joint counter-terror tasks with costly participation by each country. The counter-terror operations are however subject to ex post moral hazard, so that to incentivise counter-terror, the rich country supplies developmental aid. Development aid also helps avoid unrest arising from counter-terror activities in the target nation. However, aid itself can be diverted to non-developmental projects, generating a novel interlinked moral hazard problem spanning both tasks and rewards.
Design/methodology/approach
The authors use a dynamic model where the aid giving countries and aid receiving countries behave strategically. Then they solve for the sub game perfect Nash equilibrium of this game.
Findings
The authors characterise the optimal contract, showing that the dynamic structure of counter-terror resembles the shock-and-awe discussed by military strategists. The authors then prove that it is not necessarily the case that a more hawkish (resp. altruistic) donor is less pro-development (resp. softer on terror). In addition, the authors show that it may be easier to contract for higher counter-terror inputs when the recipient is more sympathetic to terrorists. The authors also discuss other problems faced by developing nations where this model can be readily adopted and the results can endorse appealing policy implications.
Originality/value
The authors characterise the optimal contract, showing that the dynamic structure of counter-terror resembles the shock-and-awe discussed by military strategists. It is proved that it is not necessarily the case that a more hawkish (resp. altruistic) donor is less pro-development (resp. softer on terror). In addition, the authors show that it may be easier to contract for higher counter-terror inputs when the recipient is more sympathetic to terrorists. Other problems faced by developing nations are also discussed where this model can be readily adopted, and the results can endorse appealing policy implications. These results have important policy implications, in particular in today’s world.