scholarly journals Power to the Network: The Concept of Social Business and Its Relevance for IC

Author(s):  
Christian Zinke-Wehlmann ◽  
Julia Friedrich ◽  
Vanita Römer

AbstractThe concept of IC puts the employee, in its potential role as crowdsource, Campaign Owner or initiator into focus. This reflects the emancipatory and participatory principle that goes hand in hand with the concept of Social Business. The basic idea of Social Business is not to link the business success of a company exclusively to its management capabilities or the business plan, but to understand and value the individual stakeholder as part of a successful enterprise network. For Social Business, value is not exclusively understood as business value; rather, the perspective is expanded to include social added value, in the sense that the value of the work for the employee, society or the environment is considered as an indirect corporate goal. Thus, Social Business is defined as a framework or strategy that uses digital social networks (enterprise social networks) with the primary goal of generating social, ecological and economic benefits. This article introduces the Social Business reference model, which supports the adoption and implementation of the outlined strategy and contrasts it to the ICU Model in order to identify the strengths as well as weaknesses of both models.

2018 ◽  
Author(s):  
Rhea M Howard ◽  
Annie C. Spokes ◽  
Samuel A Mehr ◽  
Max Krasnow

Making decisions in a social context often requires weighing one's own wants against the needs and preferences of others. Adults are adept at incorporating multiple contextual features when deciding how to trade off their welfare against another. For example, they are more willing to forgo a resource to benefit friends over strangers (a feature of the individual) or when the opportunity cost of giving up the resource is low (a feature of the situation). When does this capacity emerge in development? In Experiment 1 (N = 208), we assessed the decisions of 4- to 10-year-old children in a picture-based resource tradeoff task to test two questions: (1) When making repeated decisions to either benefit themselves or benefit another person, are children’s choices internally consistent with a particular valuation of that individual? (2) Do children value friends more highly than strangers and enemies? We find that children demonstrate consistent person-specific welfare valuations and value friends more highly than strangers and enemies. In Experiment 2 (N = 200), we tested adults using the same pictorial method. The pattern of results successfully replicated, but adults’ decisions were more consistent than children’s and they expressed more extreme valuations: relative to the children, they valued friends more and valued enemies less. We conclude that despite children’s limited experience allocating resources and navigating complex social networks, they behave like adults in that they reference a stable person-specific valuation when deciding whether to benefit themselves or another and that this rule is modulated by the child’s relationship with the target.


Author(s):  
Barbara J. Risman

This is the first data chapter. In this chapter, respondents who are described as true believers in the gender structure, and essentialist gender differences are introduced and their interviews analyzed. They are true believers because, at the macro level, they believe in a gender ideology where women and men should be different and accept rules and requirements that enforce gender differentiation and even sex segregation in social life. In addition, at the interactional level, these Millennials report having been shaped by their parent’s traditional expectations and they similarly feel justified to impose gendered expectations on those in their own social networks. At the individual level, they have internalized masculinity or femininity, and embody it in how they present themselves to the world. They try hard to “do gender” traditionally.


2021 ◽  
Vol 13 (2) ◽  
pp. 718
Author(s):  
Thomas Dolmark ◽  
Osama Sohaib ◽  
Ghassan Beydoun ◽  
Kai Wu

Absorptive capacity is a common barrier to knowledge transfer at the individual level. However, technology absorptive capacity can enhance an individual’s learning behaviour. This study investigates that technology readiness, the tools for knowledge sources, social influences, and social networks influence an individual’s absorptive capacity on an adaptation of the individual learning behaviour. A quantitative approach is used to assess the presence of a causal relationship from the constructs mentioned above. Data were collected from university students in Australia to examine the hypotheses. With 199 responses, a partial least squares structural equation modelling (PLS-SEM) approach was used for the analysis. The results generated mixed findings. Individual’s technological belief in optimism and innovation and social influences had a significantly weaker effect on individual absorptive capacity, which in turn had a significantly weaker impact on their learning behaviour.


2021 ◽  
Vol 13 (14) ◽  
pp. 7619
Author(s):  
Run-Ze Wu ◽  
Xiu-Fu Tian

Due to the outbreak of COVID-19, many people have to accept remote working. However, as COVID-19 has been effectively controlled in China, remote office services provided by enterprise social networks (ESNs) is no longer a necessary choice of users. There has not yet been any referential research for ESN enterprises concerning how to encourage users willing to use ESNs continuously. Therefore, the purpose of this research is to identify the critical factors of ESN continuous usage intention to make up the research gap of ESN continuous usage intention and to help enterprises address the issue of sustained growth. This research combines elements of the task technology fit (TTF) model and D&M information systems success (ISS) model, explaining the continuous usage intention of ESN users. The empirical analysis results are based on the sample data of 668 Chinese respondents with experience in ESNs use and analyzed using structural equation modeling (SEM). Results show that task technology fit, performance expectancy and the satisfaction degree have a significant influence on continuous usage intention of ESNs. The research findings can provide the theoretical basis for sustained development and follow-up research of the ESN industry.


2021 ◽  
pp. 147447402110036
Author(s):  
Dai O’Brien

In the field of Deaf Geographies, one neglected area is that of the individual deaf body and how individual deaf bodies can produce deaf space in isolation from one another. Much of the work published in the field talks about collectively or socially produced deaf spaces through interaction between two or more deaf people. However, with deaf children increasingly being educated in mainstream schools with individual provisions, and the old social networks and institutions of deaf communities coming under threat by the closure of deaf clubs and changing work practices, more research on the way in which individuals can produce their own deaf spaces and navigate those spaces is needed. In this paper, I outline two possible theoretical approaches, that of Lefebvre’s productive gestures to produce social space, and Bourdieu’s habitus, capital and hexis. I suggest that these theories can be productively utilised to better understand the individual basis of the production of deaf spaces.


2021 ◽  
Author(s):  
Andrew Imrie ◽  
Maciej Kozlowski ◽  
Omar Torky ◽  
Aditya Arie Wijaya

AbstractMonitoring pipe corrosion is one of the critical aspects in the well intervention. Such analysis is used to evaluate and justify any remedial actions, to prolong the longevity of the well. Typical corrosion evaluation methods of tubulars consist of multifinger caliper tools that provide high-resolution measurements of the internal condition of the pipe. Routinely, this data is then analyzed and interpreted with respect to the manufacture's nominal specification for each tubular. However, this requires assumptions on the outer diameter of the tubular may add uncertainty, and incorrectly calculate the true metal thicknesses. This paper will highlight cases where the integration of such tool and electromagnetic (EM) thickness data adds value in discovering the true condition of both the first tubular and outer casings.These case studies demonstrate the use of a multireceiver, multitransmitter electromagnetic (EM) metal thickness tool operating at multiple simultaneous frequencies. It is used to measure the individual wall thickness across multiple strings (up to five) and operates continuously, making measurements in the frequency domain. This tool was combined with a multifinger caliper to provide a complete and efficient single-trip diagnosis of the tubing and casing integrity. The combination of multifinger caliper and EM metal thickness tool results gives both internal and external corrosion as well as metal thickness of first and outer tubular strings.The paper highlights multiple case studies including; i) successfully detecting several areas of metal loss (up to greater than 32%) on the outer string, which correlated to areas of the mobile salt formation, ii) overlapping defects in two tubulars and, iii) cases where a multifinger caliper alone doesn't provide an accurate indication of the true wall thickness. The final case highlights the advantages of integrating multiple tubular integrity tools when determining the condition of the casing wall.Metal thickness tools operating on EM principles benefit from a slim outer diameter design that allows the tools to pass through restrictions which typically would prevent ultrasonic scanning thickness tools. Additionally, EM tools are unaffected by the type of fluid in the wellbore and not affected by any non-ferrous scale buildup that may present in the inside of the tubular wall. Combinability between complementary multifinger caliper technology and EM thickness results in two independent sensors to provide a complete assessment of the well architecture.


Author(s):  
Amanda Cox ◽  
Yeslam Al-Saggaf ◽  
Kate McLean

Social networking users are presented with a plethora of profile and privacy settings; most of which are left defaulted. As a result, there is little understanding of the fields that make up the user profile, the privacy settings available to safeguard the user, and the ramifications of not changing the same. Concerns relating to the unprecedented quantities of Personally Identifiable Information being stored need to be addressed. By employing a risk matrix to a social media profile, a user could be alerted to the potential dangers of the information being contained within the profile. By adapting this tool, the risks to the individual user of a social media profile will be minimised.


1992 ◽  
pp. 171-201
Author(s):  
Robert C. Williamson ◽  
Alice Duffy Rinehart ◽  
Thomas O. Blank

Sign in / Sign up

Export Citation Format

Share Document