Search results

1 – 7 of 7
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 December 2001

Tim Kilby

Reviews the fulfilled and unfulfilled promises of Web‐based training since its inception. Explores current influences that establish benchmarks of quality, and forthcoming…

1480

Abstract

Reviews the fulfilled and unfulfilled promises of Web‐based training since its inception. Explores current influences that establish benchmarks of quality, and forthcoming technologies that will shape online learning in the next decade. Contends that distance learning now has a broader interpretation as online learning applications and the underlying technologies have matured. Asserts that instructional design now considers all enabling technologies and learning constructs. Argues that processes that apply user‐centered design, knowledge object structures, usability engineering, and formal evaluation ensure that the full needs of both learners and provider organizations are met. States that industry standards for accessibility and reusability influence design and alter engineering. Maintains that emerging technologies like XML, true speech recognition, and wireless impact Web‐based training; however, knowledge management, peer‐to‐peer learning, and personal learning appliances will dramatically transform the way humans learn.

Details

The Learning Organization, vol. 8 no. 5
Type: Research Article
ISSN: 0969-6474

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 2002

E‐learning is about seven years old and like a seven‐year‐old child, it is immature, but offers considerable promise. Organizations like it because it promises to save them money…

1211

Abstract

E‐learning is about seven years old and like a seven‐year‐old child, it is immature, but offers considerable promise. Organizations like it because it promises to save them money on training. Employees like it because they have greater control over when they do the training. But as with the dotcom craze, e‐learning is now entering a period of reassessment, where the poor examples will probably disappear and the survivors will hopefully improve their offerings.

Details

Training Strategies for Tomorrow, vol. 16 no. 1
Type: Research Article
ISSN: 1369-7234

Keywords

Access Restricted. View access options
Article
Publication date: 1 August 2002

As businesses continue to seek less expensive and more effective ways to train employees, the use of online learning via the Internet would appear to offer great promise. But this…

857

Abstract

As businesses continue to seek less expensive and more effective ways to train employees, the use of online learning via the Internet would appear to offer great promise. But this potential has been largely untapped.

Details

Training Strategies for Tomorrow, vol. 16 no. 4
Type: Research Article
ISSN: 1369-7234

Keywords

Access Restricted. View access options
Article
Publication date: 10 February 2012

Jillian C. Sweeney, Geoffrey N. Soutar and Tim Mazzarol

Word‐of‐mouth (WOM) marketing has become a key focus for many organisations. However, little research has sought to identify the dimensionality of WOM. The present research…

19626

Abstract

Purpose

Word‐of‐mouth (WOM) marketing has become a key focus for many organisations. However, little research has sought to identify the dimensionality of WOM. The present research project aims to describe the development of a 12‐item measure that can be used to assess WOM at an individual message level for positive and negative WOM and among givers and receivers of WOM.

Design/methodology/approach

The research includes four studies, a qualitative focus group phase and quantitative phases involving surveys of over 2,000 consumers representing givers and receivers of positive and negative WOM.

Findings

Three distinct dimensions emerged. Two (cognitive content and richness of content) reflect the composition of the message, while the third, termed strength of delivery, reflects the manner of delivery. The scale has strong psychometric properties and was found to be generalisable in the four contexts – sending positive/negative messages and receiving positive/negative messages.

Research limitations/implications

The authors addressed consumers' WOM messages solely in a one‐to one‐context. The results cannot automatically be extended to a variety of other media, which requires future research. Further, the authors did not test the measure in a goods context.

Practical implications

The scale has a variety of potential applications and can serve as a framework for further empirical research in this important area.

Originality/value

While much previous research on WOM relates to the sending of positive WOM, this scale has applicability across four WOM contexts, positive and negative giving and positive and negative receiving.

Details

European Journal of Marketing, vol. 46 no. 1/2
Type: Research Article
ISSN: 0309-0566

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 2005

Anna Marie Johnson and Sarah Jent

Sets out to provide a selected bibliography or recent resources on library instruction and information literacy.

8705

Abstract

Purpose

Sets out to provide a selected bibliography or recent resources on library instruction and information literacy.

Design/methodology/approach

Introduces and annotates periodical articles, monographs, and exhibition catalogues examining library instruction and information literacy.

Findings

Provides information about each source, discusses the characteristics of current scholarship, and describes sources that contain unique scholarly contributions and quality reproductions.

Originality/value

The information may be used by librarians and interested parties as a quick reference to literature on library instruction and information literacy.

Details

Reference Services Review, vol. 33 no. 4
Type: Research Article
ISSN: 0090-7324

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…

4289

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Access Restricted. View access options
Article
Publication date: 28 October 2019

Jaideep Roy and Prabal Roy Chowdhury

In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible…

126

Abstract

Purpose

In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible contract designed by the target nation that involves joint counter-terror tasks with costly participation by each country. The counter-terror operations are however subject to ex post moral hazard, so that to incentivise counter-terror, the rich country supplies developmental aid. Development aid also helps avoid unrest arising from counter-terror activities in the target nation. However, aid itself can be diverted to non-developmental projects, generating a novel interlinked moral hazard problem spanning both tasks and rewards.

Design/methodology/approach

The authors use a dynamic model where the aid giving countries and aid receiving countries behave strategically. Then they solve for the sub game perfect Nash equilibrium of this game.

Findings

The authors characterise the optimal contract, showing that the dynamic structure of counter-terror resembles the shock-and-awe discussed by military strategists. The authors then prove that it is not necessarily the case that a more hawkish (resp. altruistic) donor is less pro-development (resp. softer on terror). In addition, the authors show that it may be easier to contract for higher counter-terror inputs when the recipient is more sympathetic to terrorists. The authors also discuss other problems faced by developing nations where this model can be readily adopted and the results can endorse appealing policy implications.

Originality/value

The authors characterise the optimal contract, showing that the dynamic structure of counter-terror resembles the shock-and-awe discussed by military strategists. It is proved that it is not necessarily the case that a more hawkish (resp. altruistic) donor is less pro-development (resp. softer on terror). In addition, the authors show that it may be easier to contract for higher counter-terror inputs when the recipient is more sympathetic to terrorists. Other problems faced by developing nations are also discussed where this model can be readily adopted, and the results can endorse appealing policy implications. These results have important policy implications, in particular in today’s world.

Details

Indian Growth and Development Review, vol. 13 no. 2
Type: Research Article
ISSN: 1753-8254

Keywords

1 – 7 of 7
Per page
102050