The internet and potentialities of emancipatory change

2008 ◽  
Vol 4 (1) ◽  
pp. 75-83 ◽  
Author(s):  
Prem Sikka

PurposeThe purpose of this paper is to encourage the academic community to disseminate and communicate information and knowledge beyond the academy and engage wider audiences.Design/methodology/approachTo use new mediums of communication to inform, galvanise and infuriate audiences and possibly try to render the familiar unfamiliar or show that even the technical and complex issues have social relevance and consequences.FindingsThe two blogs reproduced in this paper sought to communicate some aspects of accounting to a wider audience. In trying to reach a wider audience and communicate inconvenient facts some purity of ideas may be diluted, but the alternative is silence and vacation of public spaces to organised interests.Originality/valueThe article reproduces real life newspaper blogs to show that communication with a wider audience is possible.

2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 45 (1) ◽  
pp. 29-50 ◽  
Author(s):  
Aristides Isidoro Ferreira ◽  
Joana Diniz Esteves

Purpose – Activities such as making personal phone calls, surfing on the internet, booking personal appointments or chatting with colleagues may or may not deviate attentions from work. With this in mind, the purpose of this paper is to examine gender differences and motivations behind personal activities employees do at work, as well as individuals’ perception of the time they spend doing these activities. Design/methodology/approach – Data were obtained from 35 individuals (M age=37.06 years; SD=7.80) from a Portuguese information technology company through an ethnographic method including a five-day non-participant direct observation (n=175 observations) and a questionnaire with open-ended questions. Findings – Results revealed that during a five-working-day period of eight hours per day, individuals spent around 58 minutes doing personal activities. During this time, individuals engaged mainly in socializing through conversation, internet use, smoking and taking coffee breaks. Results revealed that employees did not perceive the time they spent on non-work realted activities accurately, as the values of these perceptions were lower than the actual time. Moreover, through HLM, the findings showed that the time spent on conversation and internet use was moderated by the relationship between gender and the leisure vs home-related motivations associated with each personal activity developed at work. Originality/value – This study contributes to the literature on human resource management because it reveals how employees often perceive the time they spend on non-work related activities performed at work inaccurately. This study highlights the importance of including individual motivations when studying gender differences and personal activities performed at work. The current research discusses implications for practitioners and outlines suggestions for future studies.


2014 ◽  
Vol 10 (1/2) ◽  
pp. 51-64 ◽  
Author(s):  
Snejina Michailova ◽  
Janne Tienari

Purpose – This paper aims to outline different views on international business (IB) as an academic discipline and looks into how IB scholars can cope with challenges to their disciplinary identity when stand-alone IB departments are merged with other departments such as management, marketing or strategy in business schools and universities. Design/methodology/approach – The article offers a critical reflection on the development and future of IB as a discipline. The two authors are an IB and a Management scholar, both of whom were engaged in recent departmental mergers at their respective business schools. While the authors do not analyze these particular mergers, their experiences are inevitably interwoven in the views they express. Findings – Mergers of stand-alone IB departments with other departments bring to light the nature of the IB discipline as a contested terrain. The article discusses how these structural changes challenge the disciplinary identity of IB scholars. It contributes, first, to discussions on the development of IB as a discipline and, second, to understanding identities and identification during major organizational change events in academia. Research limitations/implications – The authors suggest that the threat of marginalization of IB in the context of business schools and universities necessitates a move beyond the “big questions” debate to a critical self-examination and reflection on IB as a discipline and as a global scholarly community. Originality/value – The article offers a critical view on current processes and challenges related to IB as a discipline and an academic community.


2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2018 ◽  
Vol 25 (4) ◽  
pp. 940-950
Author(s):  
Thomas Ren

Purpose The purpose of this paper is to examine whether there is a meaningful difference, viewed from a financial perspective, in distinguishing between organised crime and terrorist organisations, with regard to the control and mitigation of the threats that they pose to society. Design/methodology/approach The paper uses conceptual models obtained from enterprise theory and economics, as well as criminology, and makes use of case studies through the application of these models. Findings The paper finds that when viewed from a financial perspective, there is no meaningful difference in distinguishing between the groups because many have undergone processes of convergence and transformation, such that they assume each other’s operational and motivational characteristics. However, the answer also depends on how precisely one defines each type of illicit group as well as the transitions they undergo. Originality/value The value of this paper is that it applies two separate models on interactions between organised crime and terrorist organisations, the terror–crime continuum and interaction spectrum, to real life situations. After assessing their validity for more recent examples of such illicit groups, it then provides a balanced argument as to distinguishing between organised crime and terrorism. One limitation towards the paper’s originality, however, is that it draws mainly from pre-existing literature.


2018 ◽  
Vol 17 (4) ◽  
pp. 186-192
Author(s):  
Wendy Silver

Purpose Organizations will need HR departments that take bold new approaches if they are to weather the uncertainty and changes on the horizon. This paper aims to discuss what makes an organization or a leader BRAVE, and examples of HR professionals and organizations leading the way are provided to help readers bravely shape their own organizations. Design/methodology/approach This paper draws upon various real-life examples of organizations whose HR departments are leading the way. Findings Organizations need BRAVE HR professionals and leaders to create, implement and communicate key initiatives to ensure companies make decisions that support workplace cultures that people choose to join and remain a part of. Originality/value No amount of technology can replace the forward-thinking thought, communication and action that being BRAVE requires. This paper will help HR professionals gain a braver perspective.


2019 ◽  
Vol 35 (1) ◽  
pp. 19-21

Purpose This paper reviews the latest management developments across the globe and pinpoints practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings If you search images of the word “strategy” on the internet, three of the first seven images to appear on Google (other search engines are available) include chess pieces, while two of the top ten hits involve light bulbs. Aside from the obvious conclusions that any strategic discussion should either involve chess grand masters or well-lit rooms, it is clear that most people assume winning games with lots of moves are possible is the key to a successful strategy. But is this a valid analogy, even at a high level? Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2016 ◽  
Vol 15 (3) ◽  
pp. 134-135 ◽  
Author(s):  
Marc Bush

Purpose The No Harm Done films provide hope and give support to those affected by self-harm. The accompanying digital packs dispel myths, answer frequently asked questions, provide practical advice and signpost to further help and support. The paper aims to discuss these issues. Design/methodology/approach YoungMinds employed its sector-leading expertise in youth and parent engagement. Both the films and digital packs were co-created with young people, parents and professionals, reflecting their real-life experiences of self-harm. Findings The project responded to young people who self-harm telling us they feel isolated, alone, in need of hope and help to counteract the negative and frightening messages widely available online. Parents confided they also feel isolated and that it is their fault their child is harming themselves. Teachers told us they see the signs but cannot bring themselves to say anything, and even if they want to, they cannot find the words to reach out to young people. Originality/value Quote from a professional “I personally found the No Harm Done short films to be incredibly valuable resources for my practice with young people. The way the films have been produced will make it a lot harder for young people that I work with to judge the action of self-harm given that there are no graphic harming words/stories and the films themselves do not come across as triggering. I feel enthusiastic that these films will encourage understanding and empathy from peers and spark conversation enabling those who have no knowledge around self-harm to be more accepting, open and supportive of those who have issues with self-harm.”


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ke Wang ◽  
Zheming Yang ◽  
Bing Liang ◽  
Wen Ji

Purpose The rapid development of 5G technology brings the expansion of the internet of things (IoT). A large number of devices in the IoT work independently, leading to difficulties in management. This study aims to optimize the member structure of the IoT so the members in it can work more efficiently. Design/methodology/approach In this paper, the authors consider from the perspective of crowd science, combining genetic algorithms and crowd intelligence together to optimize the total intelligence of the IoT. Computing, caching and communication capacity are used as the basis of the intelligence according to the related work, and the device correlation and distance factors are used to measure the improvement level of the intelligence. Finally, they use genetic algorithm to select a collaborative state for the IoT devices. Findings Experimental results demonstrate that the intelligence optimization method in this paper can improve the IoT intelligence level up to ten times than original level. Originality/value This paper is the first study that solves the problem of device collaboration in the IoT scenario based on the scientific background of crowd intelligence. The intelligence optimization method works well in the IoT scenario, and it also has potential in other scenarios of crowd network.


Sign in / Sign up

Export Citation Format

Share Document