• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • Tagged with
  • 35
  • 35
  • 35
  • 23
  • 16
  • 16
  • 11
  • 10
  • 10
  • 10
  • 9
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Appreciative Inquiry summits and organizational knowledge creation: A social systems perspective

Makino, Emi 01 January 2013 (has links)
The purpose of this exploratory study is to develop alternative models for analyzing the systems dynamics of a large group conference format called appreciative inquiry (AI) summits. I apply Luhmann’s social systems theory to the strategizing activities of AI summits to examine how this particular format is capable of generating organizational knowledge. An AI summit is a strategic planning conference in which hundreds of internal and external stakeholders collectively design the future of the organization through structured activities. It applies the principles of AI, a consulting method used in organizational development that attends to the positive aspects of an organization as opposed to its problems. Critics challenge this unconditional focus on the positive, questioning the validity of its methods and techniques. Indeed, very few rigorous evaluations of AI methods including AI summits exist. I propose a new approach for assessing the effectiveness of AI summits. I focus on knowledge creation as the dependent variable. Previous studies have shown that successful AI interventions generate new knowledge, not just transformational change. I conceptualize an AI summit as a strategic episode that allows an organization to temporarily suspend its routines and structures for strategic reflection. According to social systems theory, organizations are autopoietic (self-reproducing) systems that maintain their identity through an ongoing production of decision communications. An AI summit consists of three different types of systems that co-evolve and are structurally coupled: an organization system, interaction system and the individual participants’ psychological systems. I propose a typology for analyzing episodes during an AI summit as a starting point for determining the structural dynamics inherent in an AI summit system. Using illustrative examples from a case study, I identify five structural features of an AI summit that facilitate organizational knowledge creation, including reduced communication barriers and the production of decisions during the conference. The study contributes to the existing literature by identifying the important but understudied role of self-organizing project teams in the knowledge creation process at an AI summit. Limitations and implications are discussed.
22

Social-cognitive Antecedents of Ambidextrous Orientation in Family-owned Startups: The Role of Family Ties, Achievement Motivation, and Internal Locus of Control

Mori, Patricio R 17 May 2013 (has links)
Regulatory Focus Theory predicts that the motivation to self-regulate goal-directed thought and behavior depends on two distinct regulation strategies: a promotion focus based on attaining gains and a prevention focus based on avoiding losses. This study took a social-cognitive approach predicting that regulatory focus has an impact on how family startups (several family related founders) explore “new ideas”, exploit “old certainties” and achieve the balance of both (ambidexterity), compared to lone founder startups (only one founder present). It was proposed that the social context of family ties among founders leads them to a prevention focus concerned with avoiding the loss of the socio-emotional benefits of those ties. In order to avoid such a loss, family founders were expected to increase their risk perceptions and thus, explore less than lone founders, who lack such socio-emotional ties. It was also proposed that two commonly used psychological traits in entrepreneurship research --achievement motivation and internal locus of control, predispose entrepreneurs to a promotion focus. Founders with a promotion focus, in turn, were hypothesized to lead startups to more risk-seeking behaviors and to more explorative orientation. The previous argument was used as a springboard to derive hypotheses about ambidexterity (the ability to exploit and explore simultaneously) and survival hazards. Using Regulatory Focus Theory, exploitative orientation, conceptualized as the motivational strength to continue on previous paths of action, was hypothesized to be not significantly different from that of lone founder startups. Taking previous arguments together, lone founder startups were hypothesized to be more ambidextrous than family startups. Finally, ambidexterity and internal locus of control were hypothesized to reduce survival hazards in family startups. The findings suggested that family startups explore less than lone founder startups even after controlling for group effects. Interesting but contradictory findings revealed that internal locus of control have both a positive direct effect and a positive interaction that increases the explorative and ambidextrous orientation gap of family startups over lone founder startups. As expected, ambidexterity and internal locus of control reduced survival hazards on family startups. Implications for practitioners were derived based on a sample of 470 nascent entrepreneurs.
23

Regional Diversification and Performance: Conceptualization and Competing Strategic Objectives

Kelley, Keith James 26 June 2013 (has links)
This dissertation comprised of three essays provides justification for the need to pursue research on multinationality and performance with a more fine-grained approach. Essay one is a conceptual response to an article written by Jean-Francois Hennart in 2011 which questions the need and approach toward future research in this domain. I argue that internalization theory does not render multinationality and performance research meaningless and identify key areas where methodological enhancements can be made to strengthen our research findings with regard to Hennart’s call for more content validity. Essay two responds to the need for more-fine grained research on the consequences of multinationality by introducing non-traditional measures of performance such as social and environmental performance and adopting a more theoretically relevant construct of regionalization to capture international diversification levels of the firm. Using data from the world’s largest 600 firms (based on sales) derived from Bloomberg and the Directory of Corporate Affiliates; I employ general estimating equation analysis to account for the auto-correlated nature of the panel data alongside multivariate regression techniques. Results indicate that regionalization has a positive relationship with economic performance while it has a negative relationship with environmental and social performance outcomes, often referred to as the “Triple Bottom-Line” performance. Essay three builds upon the work in the previous essays by linking the aforementioned performance variables and sample to corporate reputation which has been shown to be a beneficial strategic asset. Using Structural Equation Modeling I explore economic, environmental and social signals as mediators on relationship between regionalization and firm reputation. Results indicate that these variables partially mediate a positive relationship between regionalization and firm reputation. While regionalization positively affects the reputation building signal of economic performance, it aids in reputation building by reducing environmental and social disclosure effects which interestingly impact reputation negatively. In conclusion, the dissertation submits opportunities for future research and contributes to research by demonstrating that regionalization affects performance, but the effect varies in accordance with the performance criterion and context. In some cases, regional diversification may produce competing or conflicting outcomes among the potential strategic objectives of the firm.
24

Bridging the Missing Link between "Top-down" and "Bottom-up": A Strategic Policy Model for International Collaboration in Science and Technology

Suntharasaj, Pattharaporn 06 June 2013 (has links)
Success in International Collaboration in Science and Technology (ICST) depends on various factors, different players have different perspectives. Governments participate in collaboration in order to meet their country's policy goals. Scientists and researchers establish their contacts through their personal channels or scientific networks in order to pursue their own academic interest. There are two significant approaches in ICST Policy making which are "top-down" and "bottom-up" approaches. Both approaches are important. One approach can not fit all. Each approach has its own advantages and disadvantages. A balance between these two approaches is necessary. The objective of this research is to develop a strategic policy model for international collaboration in science and technology to bridge the gap between "top-down" and "bottom-up" approaches. A strategic policy model was developed in which the characteristics of ICST proposals and expert judgments are quantified to determine the relative importance the country's international S&T vision and objectives and specific sectors, and to evaluate the proposals accordingly. Four international evaluation criteria are proposed in this research: strategic importance (SI), potential impact (PI), human resource development (HRD), and matching fund from international partners (MF). Each proposal is evaluated with respect to each criterion and related sub-criteria. The value of each ICST proposal is then calculated by incorporating all of the elements at each level of the model. The output of this model is the ranking of the ICST proposals coming from the "bottom-up" approach that satisfy the national priorities and organizational requirements represented by the "top-down" approach. The model facilitates the national policymakers to make better decisions about participating in ICST research, and the researchers to have a better understanding of the entire international scientific collaboration system by identifying research opportunities to fit in.
25

DYNAMIC IT CAPABILITIES: THEORY DEVELOPMENT AND EMPIRICAL EXAMINATION

Pittaway, Jeffrey J. 04 1900 (has links)
<p>This thesis examines <em>dynamic IT capabilities:</em> firms’ abilities to integrate, build, and reconfigure information technology resources concurrently with organizational business process and managerial processes in pursuit of performance advantages in a changing or uncertain environment. Research in dynamic IT capabilities has increased with the recognition that organizational survival and growth requires organizational change to resolve a range of management challenges that emerge over time. In prior research, specific constructs of dynamic IT capabilities have been the subject of independent empirical investigation. This has resulted in conflicting conceptualizations of dynamic capabilities that obfuscate theoretical definition, empirical grounding and measurement. We seek to contribute conceptual coherence to the discourse on dynamic IT capabilities in three respects. First, we advance a theoretical framework to tease apart the common versus idiosyncratic elements of firms’ dynamic capabilities to <em>exploit</em> IT in practice. Our empirical findings serve to integrate conflicting (common versus idiosyncratic) conceptualizations of dynamic IT capabilities. Second, we advance a theoretical framework of firms’ dynamic capabilities to <em>explore</em> for IT innovations that are likely to improve firm performance. To that end we examine CIOs’ use of external advice networks to mindfully identify rewarding IT innovations. In so doing we clarify the concept of mindfulness. We find mindful external advice seeking is atypical in practice, contrary to assumptions of the technology diffusion and institutional literatures. Our empirical findings elucidate the significance of IT governance in motivating mindful search for rewarding IT innovations. Third, we demonstrate the importance of qualitative and configurational methodologies in investigating such complex phenomena as dynamic IT capabilities. We also propose promising future research directions, theoretical grounding and analytical techniques that, by building on the concepts advanced in this study, can further advance our understanding of how firms acquire and realize dynamic IT capabilities in support of sustained performance advantages.</p> / Doctor of Philosophy (PhD)
26

Designing an effective information security policy for exceptional situations in an organization: An experimental study

Antoniou, George S. 01 January 2015 (has links)
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to lose revenue, reputability or some other business advantage. To address this issue, this research study investigated how to design an effective information security policy for exceptional situations in an organization. In order to achieve this goal, this study explored how an information security policy should be designed with the critical components of clarity, comprehensiveness, ease of use and flexibility, in addition to including provisions for the work contingencies of employees. The aim of this proposed study was to demonstrate how the application principles of the prima-facie, utilitarian and universalizability design theories can aid in designing an information security policy that includes these essential elements. The research study explored the effectiveness of the policy's design and the effect it had on employee compliance with the policy in exceptional situations. A survey questionnaire was administered to a control group and an experimental group consisting of full-time and part-time employees who worked in various departments of a single organization. The survey employed a five-point Likert-type scale. The data gathered from the questionnaire was analyzed. Inferential statistics used the general linear model (GLM), including the t-test, analysis of covariance (ANCOVA), regression analysis, and factor analysis with the latest SPSS version computer statistical analysis program. This study built to develop a model for designing an effective information security policy for exceptional situations in an organization. Based on the analysis of fit the model for designing an effective information security policy for exceptional situations in an organization was determine to be a success model. This study should provide many opportunities for future research, as well as providing information security practitioners and academics a solid roadmap for designing effective information security policies within an organization to apply during exceptional situations.
27

Is Silence The Answer?

Adams, Gator 01 January 2017 (has links)
This study examines the relationship between company management guidance, and ex-ante crash risk over the duration of 2008(Jan 2006-Dec 2009) financial crisis using the implied volatility skew, which is based upon ex-ante volatility implied by the pricing model developed by Black-Scholes (1973). The study finds that over the duration of this crisis period, management guidance decreases with a rise in ex-ante crash risk. Further, the study provides evidence on the relationship of management guidance and earnings volatility, and how that is affected by a firm's industry product concentration based on the Herfindahl-Hirschman Index (HHI) score.
28

Organizational Information Security: Strategies to Minimize Workplace Cyberloafing for Increased Productivity

Al Abbasi, Hawazin 01 January 2018 (has links)
Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How can managers minimize wasted work time by limiting the personal Internet activity of employees who use personal mobile devices while on the job. Data collection involved gathering information from interviews with 20 frontline supervisors, human resource managers, and information technology managers and specialists in 2 U.S. industries: education and telecommunications. Data analysis included examining word frequencies, keyword coding, and identifying themes. Four management themes emerged: create mobile device usage policy, enforce monitoring technology, create a deterrence strategy, and customize monitoring and tracking technology. This study may be important because the analysis revealed effective ways to prevent or minimize employees from Internet surfing and wasting time at work. The findings could lead to positive social change through increased employee productivity and responsibility by providing managers with information to control or limit cyberloafing activities and by fostering an increased commitment to comply with an organization's Internet use policy.
29

Developing a Cyberterrorism Policy: Incorporating Individual Values

Rabie, Osama Bassam J. 01 January 2018 (has links)
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
30

Generational Perceptions of Productive/Unproductive Information Received from Management through Different Communication Channels

Cowell, Eva Lynn 01 May 2010 (has links)
This exploratory study identified generational preferences for receiving information from management through different communication channels and determined if age predicted productivity for productive and unproductive information received through different communication channels. This is the first study to empirically examine the relationship between age cohorts, communication channel preferences, information categories, and productivity. Sample participants worked as Extension agents at a major land-grant university. The four generations represented in the sample utilized multiple communication channels and were geographically dispersed throughout the state. The survey was administered electronically and completed by 204 (74%) of the eligible 275 employees in the organization. Independent Samples t-tests, General Linear Modeling, ANOVA’s, means analysis and linear regressions were employed to analyze the data to test the hypotheses. Regarding channel preference, the findings determined that face-to-face communication was preferred by both generations for receiving private and confidential information and for training. Media was preferred by both generations for routine and procedural and time-sensitive information. Lastly, the analysis revealed that written documents were the preferred method of both generational cohorts for compensation and benefits. Regarding productivity, the findings determined that age predicted a perceived increase in productivity tasks for production information received face-to-face from management, but did not predict a perceived increase in productivity tasks for the other communication channels. Both generational cohorts perceived productive information received face-to-face from management to increase morale and decrease stress. The cohorts, however, differed on the increase of trust as a result of receiving productive information face-to-face. Both generational cohorts perceived unproductive information received from management through all communication channels to negatively impact productivity tasks. Finally, both cohorts perceived unproductive information received face-to-face from management to negatively impact morale, trust and stress. Empirical examination of generational workforce issues is relatively new to Human Resources and research is needed to further examine generational perceptions. The study begins to open dialogue that the supposed differences inherent in the multigenerational workforce are not as much a factor of the generation as the information. The development of the new instrument in this study provides a new tool to examine organizations preferences and productivity.

Page generated in 0.0821 seconds