Developing management student cultural fluency for the real world

2017 ◽  
Vol 59 (4) ◽  
pp. 353-373 ◽  
Author(s):  
Yunxia Zhu ◽  
Tyler G. Okimoto ◽  
Amanda Roan ◽  
Henry Xu

Purpose To connect students with the real world of management practice, the purpose of this paper is to extend and operationalize the situated cultural learning approach (SiCuLA) through five learning processes occurring within communities of practice. These include integration of cultural contexts, authentic activities, reflections, facilitation, and the construction of a collaborative learning community. Design/methodology/approach To investigate the complex processes and principles of cultural learning, a multi-method approach is applied to an extensive comparative study of default and intervened cases within three management classes. Evidence is drawn from multiple sources of qualitative data including class observations, meeting minutes, focus groups, and group interviews with students and instructors. Findings Results indicated that in default cases, little explicit attention was given to a situated perspective of culture, or to the rich sources of cultural knowledge available among members of the classroom community. In contrast, following the intervention cases where SiCuLA was applied, there was strong evidence that much more attention was given to enhancing student contextual knowledge. Nonetheless, there were some challenges in applying these processes within the classroom context. Originality/value This is the first study to extend and operationalize SiCuLA in a classroom setting. More importantly, the evidence forms the empirical basis for deriving theoretical principles for cross-cultural management (CCM) education and training. It contributes to studying cultural contexts as sources of knowledge for learning through active co-participation. It also contributes to positive CCM learning with an emphasis on human agency that encourages students to take more responsibility and ownership of their cultural learning.

2017 ◽  
Vol 16 (4) ◽  
pp. 171-176
Author(s):  
Campbell Macpherson

Purpose This paper aims to present a case study focused on developing a change-ready culture within a large organization. Design/methodology/approach This paper is based on personal experiences gleaned while driving an organization-wide culture change program throughout a major financial advisory firm. Findings This paper details over a dozen key lessons learned while transforming the HR department from a fragmented, ineffective, reclusive and disrespected department into one that was competent, knowledgeable, enabling and a leader of change. Originality/value Drawing on the real-world culture change intervention detailed here, including results and lessons learned, other organizations can apply similar approaches in their own organizations – hopefully to similar effect.


2018 ◽  
Vol 52 (9/10) ◽  
pp. 1909-1930
Author(s):  
Jasmina Ilicic ◽  
Stacey Baxter ◽  
Alicia Kulczynski

Purpose The purpose of this study is to introduce the homophone emotional interest superiority effect in phonological, or sound-based, priming, whereby pseudohomophone brand names (i.e. non-words that are pronounced identically to English words, for example, Bie) prime brand meaning associated with the member of the homophone pair that is emotionally interesting (i.e. Bie will be prime brand avoidance (purchase) when consumers are emotionally interested in the homophone bye [buy]). Design/methodology/approach Studies 1 and 2 examine the effect of homophone emotional interest on brand judgements and behaviours. Study 3 investigates the role of boredom with the brand name in attenuating the homophone emotional interest superiority effect. Findings Findings indicate that pseudohomophone brand names prime brand judgements and behaviours associated with the word from the homophone pair that evokes emotional interest. Study 2 provides further evidence of homophone emotional interest as the process influencing brand judgements and behaviours. Study 3 establishes that the effect of pseudohomophone brand names on brand judgements weaken when boredom with the brand name is induced. Research limitations/implications This study is limited, as it focuses only on fictitious brands and methodologically creates boredom in a way in which may not be typical of what would be experienced in the real world. Practical implications This study has important implications for brand managers in the development of new brand names and in prioritising the intended homophone pair from a pseudohomophone brand name to influence consumer judgements and behaviours. Originality/value This study introduces and provides evidence of a homophone emotional interest superiority effect. This study also identifies a condition under which the homophone emotional interest superiority effect is attenuated.


2019 ◽  
Vol 36 (4) ◽  
pp. 581-586
Author(s):  
Marieke de Mooij

Purpose The purpose of this paper is to respond to the essay by Cleveland and Bartsch in this issue. The paper also aims to counter argue the various drivers of global consumer culture (GCC). Design/methodology/approach Based on many findings from the study of consumer behavior, the assumed drivers of GCC are discussed and a suggestion for new research is made. Findings Instead of globalization processes that drive GCC, the most dominant process is a local-global-local cycle of global products and brands. Originality/value It offers a different approach to the study of global vs local products and brands. It is suggested that instead of continuing abstract discussions of GCC, scholars do more service to international marketing by researching developments in the real world.


2019 ◽  
Vol 7 (1) ◽  
pp. 35-52 ◽  
Author(s):  
Balamurali Gunji ◽  
Deepak B.B.V.L. ◽  
Saraswathi M.B.L. ◽  
Umamaheswara Rao Mogili

Purpose The purpose of this paper is to obtain an optimal mobile robot path planning by the hybrid algorithm, which is developed by two nature inspired meta-heuristic algorithms, namely, cuckoo-search and bat algorithm (BA) in an unknown or partially known environment. The cuckoo-search algorithm is based on the parasitic behavior of the cuckoo, and the BA is based on the echolocation behavior of the bats. Design/methodology/approach The developed algorithm starts by sensing the obstacles in the environment using ultrasonic sensor. If there are any obstacles in the path, the authors apply the developed algorithm to find the optimal path otherwise reach the target point directly through diagonal distance. Findings The developed algorithm is implemented in MATLAB for the simulation to test the efficiency of the algorithm for different environments. The same path is considered to implement the experiment in the real-world environment. The ARDUINO microcontroller along with the ultrasonic sensor is considered to obtain the path length and time of travel of the robot to reach the goal point. Originality/value In this paper, a new hybrid algorithm has been developed to find the optimal path of the mobile robot using cuckoo search and BAs. The developed algorithm is tested with the real-world environment using the mobile robot.


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2017 ◽  
Vol 25 (4) ◽  
pp. 382-401 ◽  
Author(s):  
Argha Ray ◽  
Anjali Kaushik

Purpose Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression. Design/methodology/approach The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated. Findings This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue. Originality/value This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm


2017 ◽  
Vol 15 (4) ◽  
pp. 362-365
Author(s):  
Declan Brady

Purpose This paper aims to describe a perspective from the Council of European Professional Informatics Societies (CEPIS) on the role of ethics in IT professionalism, and what that means in a practical sense for IT practitioners. Design/methodology/approach The paper develops ideas generated in a series of micro-conferences hosted by CEPIS on the topic of ethics, in the context of establishing a professional ethics framework as part of CEPIS’ work in support of IT professionalism. Findings Professional ethics is the weakest of the four professional pillars, and development of supports and resources is required. CEPIS is taking action in this areas. Practical implications Without a framework, and without IT Practitioners themselves taking a coordinated action, there risks a fragmentation of responses to ethical questions. Originality/value This paper describes the view of the CEPIS on the need for, and role of, professional ethics, and how that might be supported.


2019 ◽  
Vol 46 (8) ◽  
pp. 960-976
Author(s):  
Christine Farias ◽  
Fabian Balardini

Purpose Teaching complex economic theories can be made relevant through everyday life experiences and current economic, social, and environmental crises can be used as vehicles for student learning. The purpose of this paper is to help students understand that the economy should be seen as a social system that evolves over time driven by conflictive and contradictory forces and enable them to develop the critical thinking skills needed to make better choices for a more equitable and sustainable future. Design/methodology/approach The paper reviews the historical role played by neoliberalism on education in general and on the teaching of economics in particular. A historical/critical/action-learning approach discusses five pedagogical teaching methods that have been implemented in undergraduate economics courses and demonstrates how teaching social economics can be made possible by bringing the real world into the classroom and taking the classroom into the real world. Findings There is an urgent need to rethink the teaching of economics and the economics curriculum from one that stresses self-interest, profit maximization and cost minimization, to one that stresses cooperation, collaboration, fairness, and ethical values rather than economic value, as ways of satisfying society’s needs and addressing systemic issues of inequality, power and greed. Bringing teachers and students together in collaborative learning environments, thereby learning from the mistakes of the past and minimizing the impacts of the present so that future generations can also participate, is the much-needed change in how social economics can be taught post-financial crisis. Originality/value This paper is a response to the special issue on the theme teaching social economics during the global financial crisis. The authors have provided insights into their teaching pedgagogy in the context of this topic.


2019 ◽  
Vol 34 (2) ◽  
pp. 296-314 ◽  
Author(s):  
Daniel Carpenter ◽  
Paul Munshower

Purpose The purpose of this paper is to explore how rural teachers provided a PLC by leveraging virtual technologies to connect educators of like subject disciplines from several schools, foreign and domestic. Design/methodology/approach A phenomenological case study-based approach was leveraged to investigate established vPLCs at schools (Creswell, 2013; Stake, 2010). Qualitative data were collected from multiple sources to obtain rural teacher perceptions on the impact vPLCs had on their practice (Creswell, 2013). Findings Teacher collaborative teams build relationships comparable to teams that met face to face as part of a similar PLC and PD experience. Participant reflections in this investigation showed that rural educators favored face-to-face meetings; however, vPLCs provided similar teacher experiences to that of the face-to-face PBL model. Results indicated that educators recognized virtual collaboration just as valuable a tool for enabling PLCs than face-to-face collaborations while still offering similarities to improved teacher practice. Research limitations/implications The research was limited to teachers in rural settings in the USA (Texas) and in the Dominican Republic. The research was limited to teacher perceptions of change, and observed changes as part of their participation in a research-based virtual PLC model. The research was limited to the school setting over an academic year. Practical implications The findings from this study have practical implications for rural teachers and school implementation of a professional learning community model. Originality/value The promise provided by this study is that vPLCs may provide opportunity for rural schools to provide a job-embedded professional development model (Croft et al., 2010) for otherwise isolated teachers (Barrett et al., 2015).


2019 ◽  
Vol 1 (2) ◽  
pp. 132-145
Author(s):  
Amira S.N. Tawadros ◽  
Sally Soliman

Purpose The purpose of this study is to examine the extent to which dynamic network analysis (DNA), text mining and natural language processing (NLP) are helpful research tools in identifying the key actors in a complex international crisis. The study uses these tools to identify the key actors in the Syrian crisis as a case study to validate the proposed algorithm. Design/methodology/approach To achieve its main purpose, the study uses a collection of three methodologies, namely, DNA, text mining and NLP. Findings The results of the analysis show four key actors in the Syrian crisis, namely, Russia, the USA, Turkey and China. The results also reveal changes in their powerful positions from 2012 to 2016, which matches the changes that occurred in the real world. The matching between the findings of the proposed algorithm and the real world events that happened in Syria validate our proposed algorithm and proves that the algorithm can be used in identifying the key actors in complex international crises. Originality/value The importance of the study lies in two main points. It proposes a new algorithm that mixes NLP, network extraction from textual unstructured data and DNA to understand and monitor changes occurring in a complex international crisis. It applies the proposed algorithm on the Syrian crisis as a case study to identify the key actors and hence validate the proposed algorithm.


Sign in / Sign up

Export Citation Format

Share Document