The merger of Baltimore Hebrew University with Towson University: three leadership models converge

2020 ◽  
Vol 34 (10) ◽  
pp. 1595-1613
Author(s):  
Hana Bor ◽  
Rebecca Shargel

PurposeThe study aims to learn how a small private university dedicated to Judaic studies successfully merged with a large public university? Our study investigates how Baltimore Hebrew University (BHU) successfully integrated into the much larger Towson University (TU), while maintaining its unique Jewish identity.Design/methodology/approachHow did leadership facilitate a successful merging of a small private university with a large public university? Our case study investigates how BHU successfully integrated into the much larger TU. Given that past research has focused primarily on the financial aspects, the purpose of the present study is to analyze how leaders successfully navigated the complex processes of integrating the two institutions through envisioning, communicating and planning effectively. This research uniquely investigates the role of leadership as the driving force in moving the merger forward and facilitating the process. The authors analyzed the circumstances that facilitated the merger and discovered that leadership pushed this merger forward, particularly the confluence of three approaches—visionary, transformational and servant leadership. This research has implications for guiding future mergers of smaller colleges with larger universities. This case study is particularly timely, during this uncertain age of COVID-19, when many universities are considering creative solutions, including potential mergers with other institutions, in the face of increasing financial difficulties.FindingsImplications of this research can help illuminate future mergers of smaller colleges with larger universities in cases where the smaller institution desires to retain its strong cultural or historical identity. The authors found that the “right leadership on the ground” is a crucial component needed for a successful merger, particularly in a higher education setting.Research limitations/implicationsOur research provides a concrete example that can be used help campus administrators assess whether they have the leadership structure in place to successfully navigate a merger as a path forward.Originality/valueThis case study is particularly timely, during this uncertain age of COVID-19, when many universities are considering creative solutions, including potential mergers with other institutions, in the face of increasing financial difficulties.

2017 ◽  
Vol 16 (5) ◽  
pp. 216-221 ◽  
Author(s):  
Victoria Silverman

Purpose The purpose of this case study is to demonstrate how you can generate employee enthusiasm through creative thinking and a campaign that drives engagement from the bottom up. Design/methodology/approach Creative solutions, engagement through early careers network, inclusion for all and democratizing the process. Findings Employees want to be engaged and feel like a part of the larger organization. If given the right opportunity, they will rise to the challenge and create a new momentum to drive innovation forward. Originality/value The campaign described was designed and implemented in-house.


2014 ◽  
Vol 35 (3) ◽  
pp. 150-163 ◽  
Author(s):  
Aubrey Harvey Chaputula

Purpose – The aim of this research was to study collection development practices in some selected private university libraries in Malawi with special focus on University of Livingstonia and Adventist University Libraries. Design/methodology/approach – This research employed a case study approach that made use of both quantitative and qualitative methods. Data were collected using interview guides and coding schedules. Interviews were conducted with university librarians of the two institutions. Self-administered questionnaires were administered to the Finance Officers and University Librarians of the institutions covered by the study to collect financial statistics and data relating to collection development. Qualitative data were analysed thematically while quantitative data were analysed using Ms Excel. Findings – Findings of the study indicated that private university libraries in this study are funded mainly by parent institutions. Funding is not adequate as is the case with public university libraries in the country. This had adversely affected collection development practices that include purchase of materials and staff training. The two institutions, however, differed in terms of the other collection development activities they undertook, and magnitude of the challenges they faced, something that was attributed to slight difference in terms of funding they got from parent institutions. Practical implications – The study sheds light on the collection development practices of University of Livingstonia Library and Adventist University Library, and challenges facing them. Some of these findings mirror those of other libraries not only in this sector, but also public university libraries in the country. Suggestions on how the collection development challenges facing the two libraries could be tackled have been made. It is hoped that the suggestions made could benefit other libraries who find themselves in a similar situation, if implemented. The study findings could also inform future researchers venturing in the same field. Originality/value – Very little is known about the collection development practices of private university libraries not only in Malawi but the world at large owing to lack of significant research undertaken on the topic. This study is, therefore, significant because its findings fill up the existing knowledge gap. If acted on, recommendations made could also help solve some of the challenges that are being faced.


2013 ◽  
Vol 3 (1) ◽  
pp. 1-11
Author(s):  
Victor Jun Zeng

Subject area Business strategy. Study level/applicability This case study is appropriate for MBA and EMBA courses, especially for courses oriented to emerging markets such as China. It can be used in Business Strategic Management or similar courses, combined with the methodology lectures of Managing Entry Modes and Competitive Strategy. This case study provides material for understanding/studying the development of a large Chinese software enterprise. Case overview As a result of Chinese ITO and BPO market in the face of re-structuring in 2012, Huawei invested in ChinaSoft in May and Vance info merged with HiSoft in August, both of which make ChinaSoft the third largest market-share owner. However, ChinaSoft has a dilemma in its strategic planning for the next three years. If it cannot break through the suppression from the first and the second placed companies, it may lag behind very soon. If it strives for the No. 2 position in market share, is organic growth or M&A strategy the right approach to adopt? Thus, ChinaSoft is now in need of strategic reform and restructuring. The case study analyzes the approaches that Chinese enterprises can adopt in order to sustain overall cost leadership strategies and avoid the related risks in the ITO and BPO industry. Expected learning outcomes This case study intends to encourage students to learn and use methodologies such as Porter's competitive strategy framework; Rugman and Collinson's theory, selecting and managing entry modes; four basic global strategies, by Hill and Jones. Supplementary materials Teaching notes are available for educators only. Please contact your library to gain login details or email [email protected] to request teaching notes.


Author(s):  
Renata Maria de Almeida Bastos Gomes ◽  
Fabio de Oliveira Paula ◽  
T. Diana L. van Aduard de Macedo-Soares

Purpose The shopping center (SC) industry in emerging countries has grown fast over the past decade; however, recently, it is showing signs of slowing down. Nevertheless, some SC-companies perform well. As those firms operate in alliance networks, relational opportunities and risks should be considered in their strategic analyses. Although there is a significant amount of research on SC from a marketing perspective, there is a dearth of research on strategic alliances from an SC management perspective. This paper aims at answering the following question: How do characteristics of the alliance networks of leading SC-companies contribute to their success by mitigating the structural threats the SC-industry in Brazil is facing? Design The case study method was adopted for analyzing two leading Brazilian SC-companies. Several data sources were used to allow for data triangulation. The lack of literature on strategic alliances and the SC-industry, as well as the research’s exploratory nature, justified this choice. Findings The research made evident that the SC-companies’ alliance network characteristics not only mitigate some of the structural industry threats but also enhance opportunities. It illustrated how firms can conduct a strategic analysis from a network perspective with the right tools. It also made evident how much more accurate the results of a comprehensive relational analysis are compared with traditional analyses that do not consider the strategic implications of relational factors. Practical implications The research contributed to SC management by highlighting the importance of taking into account the network characteristics of their relationships with key partners and of considering these as alliances and not merely contractual arrangements. Originality/value There is a dearth of research on the strategic implications of alliances of firms that own and manage a portfolio of SCs, as well as of their relationships with other actors in the industry, such as retailers and real estate owners, from a network perspective.


2016 ◽  
Vol 28 (5) ◽  
pp. 898-922 ◽  
Author(s):  
Denni Arli ◽  
Fandy Tjiptono

Purpose The purpose of this paper is to examine the antecedents of consumers’ attitude towards, and intention to commit, digital piracy in Indonesia, a country with the world’s fourth largest population and one of the highest digital piracy rates. This study explored the effects of six variables derived from the theory of planned behaviour, ethics theory, and deterrence theory on young consumers in Indonesia. Design/methodology/approach Using a convenience sampling approach, researchers hand delivered 400 questionnaires to undergraduate students at one large private university and one major public university in Yogyakarta, Indonesia. Findings The results showed that consumers’ intention to pirate digital products was strongly influenced by consumers’ attitude towards digital piracy. Interestingly, fear of legal consequences and perceived likelihood of punishment were not significant predictors of consumers’ attitude towards digital piracy. This suggests that the principles of deterrence theory have a limited impact on consumers’ attitudes in Indonesia. Originality/value The results of this study will provide some insights to government and digital industries on how to reduce the prevalence of digital piracy.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yuri Basile Tukoff-Guimarães ◽  
Claudia Terezinha Kniess ◽  
Renato Penha ◽  
Mauro Silva Ruiz

Purpose The purpose of this paper is to assess how technology transfer offices (TTOs) of a public university of the state of São Paulo use patent valuation methods in the process of using developed technology value and transferring technology to industry. Design/methodology/approach This study is an exploratory qualitative investigation based on a case study conducted in a public university in the state of São Paulo. The university has a TTO and an internal structure for technology transfer. In-depth interviews were conducted with the TTO manager about patent valuation and the answers given were analysed. Findings The results on how TTOs use patent valuation methods in the process of assigning value to technology indicate which factors facilitate and which factors hinder the valuation of patents in technologies developed at universities. Research limitations/implications The possible lack of data disclosure due to confidentiality regarding royalties and trading fees makes further comparisons between Brazilian public universities difficult. Therefore, this study recommends that further studies on patent valuation and technology transfer process at private universities, research institutes and public and private companies should be performed. Practical implications In the practice, this study contributes to companies and TTOs by increasing their synergies in licensing negotiations, as well as by reducing the gap of information, between the business parties for assignment and transfer of technologies. With regard to theoretical contribution, this study can cite advances in the methods to measure the financial benefits arising from the valuation of technologies embedded in the patents. Originality/value Owing to the lack of research on the methods of valuation used by TTOs of Brazilian universities, the present study can be useful in serving as a theoretical source for future research and in supporting future TTO negotiations in the process of transferring technologies to productive industry.


2018 ◽  
Vol 26 (1) ◽  
pp. 91-108 ◽  
Author(s):  
Khaled A. Alshare ◽  
Peggy L. Lane ◽  
Michael R. Lane

Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mohita Gangwar Sharma

PurposeMany commodity supply chains suffer from an unfair value distribution across the supply chain like “Coffee Paradox.” This study explores the coffee supply chain to determine how the country of origin–geographical indicator can be used as a method of fair distribution of value and provenance across the supply chain effectuated by the blockchain technology. By looking at an exemplar case study for India, this study provides insights into diverse research streams and practice.Design/methodology/approachBased on the case method, analyzing the implementation of blockchain in the coffee industry by a leading Indian software implementation of the logic, dynamics and forces for a provenance model has been devised. It further adopts a stakeholder cum institutional theory framework to understand the logical implementation of a blockchain project embedded in a territorial logic for a commodity supply chain.FindingsThis study specifically looks at coffee which is representative of a commodity supply chain. It also explores how the malaise of unfair value distribution gets addressed by bringing farmers and the consumers on a common platform facilitated by blockchain technology. This study contributes to the literature on blockchain, territory, commodity and supply chain. Using stakeholder cum institutional theory, this study helps to explore how the implementation is successful by different actors in the supply chain through collaboration.Research limitations/implicationsThis study provides a new stream of multi-disciplinary study at the interface of supply chain, technology, international trade and geography.Practical implicationsBlockchains are embedded in the supply chain, and supply chains are embedded in territories. This linkage is paramount and the ability to make these blockchain projects successful requires the deep study of the interaction of territory, technology and actors from the provenance angle. De-commodification of coffee can be actualized through blockchain.Social implicationsThe coffee paradox and skewed value distribution is also a social problem wherein the farmers do not get the right price of their produce and are exploited. This case also highlights how this social malaise can be addressed and rightful and equitable distribution of value happens across the value chain.Originality/valueThis linkage between territory, blockchain, commodity supply chain and institutions has not been discussed in the literature. Adopting the territorial design approach, this study is an attempt to stimulate inter-disciplinary conversations and thereby create a provenance framework for commodity and research questions for scholars from different disciplines and divergent disciplinary perspectives.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lee Edson P. Yarcia ◽  
Jan Michael Alexandre C. Bernadas

Purpose This paper aims to examine key obligations of states to persons deprived of liberty (PDLs) under the right to health framework in the context of COVID-19. As a case study, it also describes the state of health in places of detention in the Philippines during the pandemic, with an end view of providing granular recommendations for prison policy reforms. Design/methodology/approach Relevant rules under international human rights law related to places of detention were thematically analyzed to articulate the scope of the right to health of PDLs. To describe the state of places of detention in the Philippines, this paper relied on archival research of news from selected local mainstream and specialized media. Findings The right to health framework provides a foundation for the response to COVID-19 in places of detention. Key concerns include increase in the number of infections, vulnerabilities in physical and mental health, and the spread of infection among correctional staff. Long-standing structural constraints and limited health information compound the threat of COVID-19. The Philippines must comply with its human rights obligations to PDLs to effectively address COVID-19-related concerns. Practical implications Policy reforms in Philippine places of detention must include application of community standards on physical and mental health, implementation of emergency release and application of non-custodial measures for long-term prison decongestion. Originality/value This is one of the few papers to analyze human rights in health care in places of detention during a pandemic, as nuanced in the context of the Philippines.


2020 ◽  
Vol 27 (2) ◽  
pp. 561-571
Author(s):  
Todor Kolarov

Purpose Using Bulgarian legislation on civil confiscation and analysing the nature of the substantive authority to confiscate unexplained wealth, as well as evaluating research in common and continental law, this paper aims to seek historic parallels for non-punitive civil confiscation of unexplained wealth. Design/methodology/approach The design of this paper is centred on determining whether the substantive authority of the state to confiscate unexplained wealth has a Roman law equivalent. Conducting a review of key elements of the substantive authority for the action in Bulgaria, the research examines the validity of the hypothesis that the right to confiscate has a Roman law equivalent. Findings The research supports the position that the substantive authority to seek civil confiscation relief in Bulgaria has its origin in the overarching principle of unjustified enrichment in Roman law. Considering needed adjustments related to the developed demarcation between public and private law in contemporary law, the action to confiscate unexplained wealth in civil proceedings in the case study jurisdiction has its equivalent in the Roman condictio furtiva. Originality/value This paper sheds light on the theoretical basis for civil asset confiscation of unexplained wealth in one continental law jurisdiction, thus contributing to the on-going debate on the compatibility of civil confiscation of unexplained wealth with the continental law tradition.


Sign in / Sign up

Export Citation Format

Share Document