Relative exploration orientation and real options reasoning: survey evidence from Denmark

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Claus Højmark Jensen ◽  
Thomas Borup Kristensen

Purpose This paper aims to extend the understanding of how real options reasoning (ROR) is associated with downside risk and how a firm’s portfolio (explore and exploit) of investment activities affects managers’ ability to effectively apply ROR in relation to downside risk. Design/methodology/approach The survey method is used. It is applied to a population of Danish firms, which in 2018 had more than 100 employees. The chief financial officer was the target respondent. Findings This study finds that a higher level of ROR is associated with lower levels of downside risk. ROR’s association with lower levels of the downside risk is also moderated by the level of relative exploration orientation in a negative direction. Originality/value The field of ROR research on downside risk and portfolio subadditivity has been dominated by research focused on multinationality. This paper extends extant literature on ROR by studying ROR as a multidimensional construct of firm action, which is associated with lower levels of downside risk, also when studied outside of a multinationality setting. This is the case when ROR is implemented as a complete system. This paper also applies a framework of exploitation and exploration to show that findings on subadditivity in options portfolios caused by asset correlations extend outside the scope of multinationality and into one of product/service innovation.

2019 ◽  
Vol 35 (10) ◽  
pp. 15-17

Purpose This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings This research paper concentrates on factors that determine the propensity of large and small European companies to adopt cloud computing services. The results demonstrate that companies of all sizes can benefit from CC as a strategic vehicle for reducing ICT costs, for achieving product/service innovation, and to save costs on their sophisticated administrative systems. Furthermore some additional factors apply only to small companies. Originality/value The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2014 ◽  
Vol 26 (6) ◽  
pp. 639-649 ◽  
Author(s):  
Petter Stenmark ◽  
Johan Lilja

Purpose – The purpose of this paper is to introduce a methodology that can support the process of understanding and designing for the satisfaction of high-level needs in practice. The satisfaction of high-level needs has seldom been in focus when it comes to customer satisfaction surveys or the process of new product or service development. However, needs do occur on various levels, and the satisfaction of high-level needs actually appears to have the greatest potential for the creation of loyalty among customers and customer satisfaction. The satisfaction of high-level needs has furthermore been pointed out as a strategy for the creation of attractive quality. Design/methodology/approach – The paper is based on literature studies and the application of the Ideation Need Mapping (INM) methodology in a specific case. Findings – The paper presents the INM methodology that could be used for guiding product and service innovation in practice. More specifically, the methodology supports the process of understanding and designing for the satisfaction of high-level needs. Originality/value – This paper aims to contribute to envisioning and demonstrating how the understanding of, and design for, satisfaction of high-level needs can be done in practice.


2018 ◽  
Vol 38 (1) ◽  
pp. 67-77 ◽  
Author(s):  
Xueling Liang

Purpose Internet of Things (IoT) is an emerging paradigm that draws academia and industry attention in the past few years. The purpose of this paper is to review the current research on IoT in library operation, and report the future trends and research challenges as well. Design/methodology/approach To conduct this research, the literature on IoT and its application in libraries was retrieved from major databases such as Web of Science, IEEE Xplore, Scopus and Inspec for the period between 2010 and 2018. Findings This study identifies IoT potential impact on libraries, and excavates some valuable literature on IoT and its application in libraries from managerial perspective, especially focuses on library service innovation in IoT era. Originality/value The IoT application in libraries is a new subject. This study provides an overview of IoT application in libraries. The findings of this study contribute to the research on IoT and its role in library management.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Chung Heon Oh

Purpose Channel conflicts between initial providers (IPs) and independent middlemen (IMM) can hinder the market penetration of IPs, especially for small- and medium-sized enterprises with low brand awareness. Design/methodology/approach A case study is used to describe the introduction of an agent-friendly graphic user interface (AFGUI) as a compromise for the basic needs of the IP and IMM, both for the successful market entry of IPs and to encourage the IMM to accept original brand manufacturing (OBM), which can maximize the benefits of IPs after a successful product/service launch. Findings This case study shows that the AFGUI significantly contributes to increasing the IMM’s OBM selection. Comparing the “before AFGUI introduction” group to the group of IMMs who have been SeaHerb’s – a manufacturer of brown seaweed extract – IMM for fewer than three years shows that the latter group’s OBM selection can positively affect the order amount. Originality/value The AFGUI can integrate traditional offline distribution channel systems into online distribution systems. Regarding the AFGUI’s functional effectiveness for preventing fake sellers and fake products, further research on its adoption by online platform providers (e.g. Amazon and eBay) is recommended.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Gülçin Polat

PurposeAlthough it has been implicitly or explicitly assumed that family business professionalization is indeed a multidimensional construct, there has been a tendency to confine it to the employment of nonfamily managers and delegating authority in academic research. Dekker et al. (2013) have made an impressive work in untangling the multidimensional structure of family business professionalization. This paper aims to introduce a more comprehensive multidimensional approach and a framework to understand and study family business professionalization by identifying additional dimensions.Design/methodology/approachThe conceptual framework relies on insights derived from the literature on family business professionalization, occupational professionalism and organizational professionalism to reveal the broader multidimensionality of family business professionalization.FindingsThe proposed framework extends the definition of family business professionalization and offers additional dimensions which were grouped under five overarching headings: professionalization of management, professionalization of organizational structure, processes and operations, professionalization of family's relationship with business, professionalization of employees and professionalization of work environment and culture.Originality/valueThis paper contributes to the literature by providing a wider approach for the understanding of family business professionalization. It presents a new way of thinking about family business professionalization, underlining the importance of employees and organizational culture for the professionalization process in family firms.


2020 ◽  
Vol 35 (12) ◽  
pp. 2051-2065 ◽  
Author(s):  
Lisa Melander ◽  
Ala Pazirandeh Arvidsson

Purpose The purpose of this paper is to discuss how a seller can use interactions to respond to public procurement needs for innovation when the buying side is restricted by public procurement regulations. Design/methodology/approach The authors collected data using qualitative semi-structured interviews of different empirical examples, in which private–public interactions of four different high-technological products are studied. Two products belong to the defence industry and two to the civil industry. Findings The findings point to three types of innovations in public procurement: product, service and business model. The empirical examples further indicate, as suggested in previous studies, that innovation is hindered by regulations that limit interaction between suppliers and the public. In addition, the empirical examples indicate that firms mobilize actors in their network when the buyer is restricted in regard to interaction. The findings also add to the IMP literature by comparing interactions in the three types of innovations in the public procurement context. Originality/value Public procurement is an area where innovations are lagging behind, compared with private procurement. Research points to limited interaction between actors as an obstacle to innovation in public sector collaborations. This paper extends the literature on how organizations interact in the setting of public procurement. The authors identify demand and supply triggers for three types of innovations: product, service and business model innovation.


2018 ◽  
Vol 120 (5) ◽  
pp. 1106-1119 ◽  
Author(s):  
Hiram Ting ◽  
Wee Ming Lau ◽  
Jun-Hwa Cheah ◽  
Yusman Yacob ◽  
Mumtaz Ali Memon ◽  
...  

Purpose The purpose of this paper is to examine the effect of perceived quality on intention to revisit coffee concept shops among regular and irregular consumers. Specifically, the framework developed by Pine and Gilmore (2000) is adopted to look into the effect of product, service and experience qualities on intention to revisit. Design/methodology/approach The explanatory sequential mixed-methods design was used to articulate the intention of consumers to revisit coffee concept shops. A preliminary study was conducted to define regular and irregular consumers. Self-administered questionnaire was first administered before using interview to elicit more insights and triangulate the findings. Findings The combination of both quantitative and qualitative findings show that the experiences of regular consumers at coffee concept shops include personal routine activities, while the experiences of irregular customers are composed of occasions with specific and collective purposes. While the intention to revisit of the former is related to the product and service quality, the intention of the latter is largely affected by its service and experience quality. Originality/value Given the rapid rise of coffee concept shops in the developing markets, the use of a mixed-methods design provides more insights into the intention to revisit of the regular and irregular consumers. It underscores the importance for the organisations to know what really matters to the diverse consumers.


2018 ◽  
Vol 119 (7/8) ◽  
pp. 444-455 ◽  
Author(s):  
Shohana Nowrin ◽  
David Bawden

Purpose The purpose of this study is to understand the information security behaviour of the students of the University of Dhaka, Bangladesh in the use of smartphones. Bangladesh is well-known as one of the largest and fastest growing mobile phone market of the world, and the University of Dhaka is also the largest student’s assembly in the country in terms of using smartphones. Besides, the rising use of smartphones is also likely to be typical of other sub-continent countries. Design/methodology/approach To gain an understanding of the information security behaviours of the students of University of Dhaka, Bangladesh, a quantitative survey method was deployed in revealing the approaches of the students towards avoidance of various security risks. A total of 356 students participated in the study, although eight of the participants did not carry out the full survey because they do not use smartphones. The collected data were analysed with suitable statistical methods. Findings The findings of the study reveal that students of University of Dhaka possess a moderately secure behaviour in terms of avoiding harmful behaviours, using useful phone settings and add-on utilities and disaster recovery. This study also shows that the students do not behave securely in all aspects of using different security features in the same way, and it also varies somewhat according to gender, and between faculties and institutions. The university library is recommended as the focus for instruction and guidance on the best practice in smartphone use by students. Research limitations/implications The study does not include any other universities of Bangladesh except University of Dhaka due to the shortage of time. A further study can be conducted to gain an understanding in a greater extent by including students of the other universities and perhaps also other countries. Originality/value This is the first paper in Bangladesh related to the study of information security behaviour regarding the use of smartphone among the student of University of Dhaka. This study will help to raise information security awareness among the students and encourage the authorities to adopt appropriate strategies and policies to resolve information security risks in the use of smartphones. Specially, the university library can take some initiatives in this case, such as providing advice, seminars, workshops and lectures to make the students aware about security issues.


2015 ◽  
Vol 71 (1) ◽  
pp. 116-142 ◽  
Author(s):  
Hong Huang

Purpose – The purpose of this paper is to understand genomics scientists’ perceptions in data quality assurances based on their domain knowledge. Design/methodology/approach – The study used a survey method to collect responses from 149 genomics scientists grouped by domain knowledge. They ranked the top-five quality criteria based on hypothetical curation scenarios. The results were compared using χ2 test. Findings – Scientists with domain knowledge of biology, bioinformatics, and computational science did not reach a consensus in ranking data quality criteria. Findings showed that biologists cared more about curated data that can be concise and traceable. They were also concerned about skills dealing with information overloading. Computational scientists on the other hand value making curation understandable. They paid more attention to the specific skills for data wrangling. Originality/value – This study takes a new approach in comparing the data quality perceptions for scientists across different domains of knowledge. Few studies have been able to synthesize models to interpret data quality perception across domains. The findings may help develop data quality assurance policies, training seminars, and maximize the efficiency of genome data management.


2015 ◽  
Vol 31 (9) ◽  
pp. 21-24

Purpose – This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach – This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings – The authors identified eight consumer trends, i.e. always on the go, always logged-in, quality information faster, nowism, look at me now, privacy, sustainable living and return on time (RoT), present across the three life-stage segments, i.e. young free and simple, chaos in my life and got my life back. Practical implications – The paper provides strategic insights and practical thinking that have influenced some of the world’s leading organizations. Originality/value – The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


Sign in / Sign up

Export Citation Format

Share Document