Finding frugal patent candidates: testing a thesaurus-based process model in the field of small household appliances

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lena L. Kronemeyer ◽  
Raik Draeger ◽  
Martin G. Moehrle

Purpose Identifying ideas for frugal innovations could substantially support engineers and managers in their work. Patents may be a promising source of ideas for frugal innovations. The purpose of this paper is to show how patents of this kind can be identified. Design/methodology/approach Prior work has developed a generic process model to identify frugal patent candidates. They use semantic analysis and a frugal thesaurus for searching and characterizing frugal patent candidates. The question is, whether and how this process model can be applied to a different industry successfully? The field of small household appliances is selected as a testbed because it is known for including frugal innovations while having a different business model than the industrial field in which the thesaurus was developed. Findings Applying the process model leads to a number of 22 strongly frugal patent candidates, which are manually evaluated based on three frugal characteristics. Due to this analysis, a high fraction of the candidates could be identified as frugal patents, which validates the process model. In addition, this paper outlines several options for enhancing the process model, e.g. by separating between a frugal search and a frugal evaluation thesaurus. Originality/value The process model to identify frugal patent candidates can be used by engineers and technology managers to find ideas for frugal innovations. This paper not only shows its applicability in the industry of small household appliances but gives the basis for its successful transfer to other industries.

2019 ◽  
Vol 27 (2) ◽  
pp. 233-272 ◽  
Author(s):  
Masike Malatji ◽  
Sune Von Solms ◽  
Annlizé Marnewick

Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal emphasis of both the social, technical and environmental factors affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecurity frameworks. The outcome of this exercise culminated in the design of a socio-technical systems cybersecurity framework that can be applied to any new or existing information and cybersecurity solutions in the organisation. A framework parameter to help continuously monitor the mutual alignment of the social, technical and environmental dimensions of the socio-technical systems cybersecurity framework was also introduced. Findings The results indicate a positive application of the socio-technical systems theory to the information and cybersecurity domain. In particular, the application of the conceptual process model is able to successfully categorise the selected information and cybersecurity practices into either social, technical or environmental practices. However, the validation of the socio-technical systems cybersecurity framework requires time and continuous monitoring in a real-life environment. Practical implications This research is beneficial to chief security officers, risk managers, information technology managers, security professionals and academics. They will gain more knowledge and understanding about the need to highlight the equal importance of both the social, technical and environmental dimensions of information and cybersecurity. Further, the less emphasised dimension is posited to open an equal but mutual security vulnerability gap as the more emphasised dimension. Both dimensions must, therefore, equally and jointly be emphasised for optimal security performance in the organisation. Originality/value The application of socio-technical systems theory to the information and cybersecurity domain has not received much attention. In this regard, the research adds value to the information and cybersecurity studies where too much emphasis is placed on security software and hardware capabilities.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Edward C. Tomlinson ◽  
Christopher A. Nelson ◽  
Luke A. Langlinais

Purpose This paper aims to investigate how the reparative efforts of extensive apologies, compensation and structural change affect trust after a violation has occurred. Specifically, this paper presents a cognitive process model positing that voluntary reparative efforts will shape the victim’s stability attributions for the cause of the violation such that it will be deemed less stable (i.e. unlikely to recur); as a result, the victim is more likely to perceive the transgressor as being fair, and hence extend subsequent trust. Design/methodology/approach Two experiments were conducted to test the cognitive process model. Findings The results of both experiments supported this predicted sequence for extensive apologies. Support for the predicted sequence was also found when compensation and structural change are invoked as reparative efforts. Originality/value This research has theoretical and practical implications for a more nuanced understanding of how causal attribution theory and organizational justice theory can be integrated within the context of trust repair.


2014 ◽  
Vol 21 (2) ◽  
pp. 83-97
Author(s):  
Arne Lindseth Bygdås

Purpose – The literature on knowledge transfer is dominated by a one-way transmission model logic where knowledge is captured and transferred from one source to another, assuming the source and receiver resemble each other and have some common knowledge. The social learning processes, what is learned and the phases and sequences of the developmental processes by which learning take place are more or less black boxed in the literature. This paper investigates the social dynamics of the formation and shaping of organizational practice from scratch in a greenfield organizational setting where no prior organizational practice exist. Design/methodology/approach – The paper builds on a case study approach applied in two greenfield organizational settings. A descriptive process model is developed to analyze the translocation and sociogenesis of organizational practices. Findings – A transfer-approach provides a too simplistic and narrow understanding of the process of “moving” organizational practices. Establishing an organizational practice can be described as a community of knowing “in the making” following various modes of cultural learning characterised by mutual adjustments, joint interactions, and alignment of shared understandings, and as such is more learned than transferred. Practical implications – The process model developed in the paper provides a platform for better understanding, planning and execution of intra-firm knowledge transfer and regeneration. Originality/value – The paper provides an in-depth empirical analysis of organizational practice generation from scratch emphasizing the social dynamics and co-construction of meaning when a collective capability is being acquired and built up.


2016 ◽  
Vol 22 (2) ◽  
pp. 146-170 ◽  
Author(s):  
John H. Humphreys ◽  
Milorad M. Novicevic ◽  
Mario Hayek ◽  
Jane Whitney Gibson ◽  
Stephanie S. Pane Haden ◽  
...  

Purpose The purpose of this study is to narratively explore the influence of leader narcissism on leader/follower social exchange. Moreover, while researchers acknowledge that narcissistic personality is a dimensional construct, the preponderance of extant literature approaches the concept of narcissistic leadership categorically by focusing on the reactive or constructive narcissistic extremes. This bimodal emphasis ignores self-deceptive forms of narcissistic leadership, where vision orientation and communication could differ from leaders with more reactive or constructive narcissistic personalities. Design/methodology/approach The authors argue that they encountered a compelling example of a communal, self-deceiving narcissist during archival research of Robert Owen’s collective experiment at New Harmony, Indiana. To explore Owen’s narcissistic leadership, they utilize an analytically structured history approach to interpret his leadership, as he conveyed his vision of social reform in America. Findings Approaching data from a ‘history to theory’ perspective and via a communicative lens, the authors use insights from their abductive analysis to advance a cross-paradigm, communication-centered process model of narcissistic leadership that accounts for the full dimensional nature of leader narcissism and the relational aspects of narcissistic leadership. Research limitations/implications Scholars maintaining a positivist stance might consider this method a limitation, as historical case-based research places greater emphasis on reflexivity than replication. However, from a constructionist perspective, a focus on generalization might be considered inappropriate or premature, potentially hampering the revelation of insights. Originality/value Through a multi-paradigmatic analysis of the historical case of Robert Owen and his visionary communal experiment at New Harmony, the authors contribute to the extant literature by elaborating a comprehensive, dimensional and relational process framework of narcissistic leadership. In doing so, the authors have heeded calls to better delineate leader narcissism, embrace process and relational aspects of leadership and consider leader communication as constitutive of leadership.


2017 ◽  
Vol 12 (1) ◽  
pp. 33-45 ◽  
Author(s):  
Abhigyan Sarkar ◽  
Juhi Gahlot Sarkar

Purpose Extant research shows that individual’s relationship with brand can be structurally similar to both interpersonal love relationship and religious relationship. A stream of consumer research states that individual can love a brand like a person loves another person. Another stream of consumer research postulates that individual can perceive brand equivalent to religion, and even substitute religion with brand. Research is scarce connecting these two different paradigms of brand relationship, given that interpersonal relationship is not necessarily as devotional as religious relationship. The purpose of this paper is to conceptualize the psychological process through which an individual can substitute his/her religion with brand. The basic theoretical premise of this substitution behaviour is the proposition that brand meanings can be perceived as equivalent to religious meanings. Design/methodology/approach This paper has conducted an integrative review of selected extant research related to individual-brand relationships, interpersonal relationships and religiosity. Findings This paper develops a consumer response hierarchy model showing the inter-related psychological processes through which an individual can substitute his/her religion with brand. The model forms the basis for the discussion of theoretical contributions and managerial implications. Originality/value The value of this conceptual paper lies in developing a process model for the first time in the area of consumer-brand relationship domain explaining the stage-wise psychological processes through which individual can move from mere cognitive brand satisfaction towards perceiving brand as substitute of religion.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Subimal Chatterjee ◽  
Debi P. Mishra ◽  
Jennifer JooYeon Lee ◽  
Sirajul A. Shibly

Purpose Service providers often recommend unnecessary and expensive services to unsuspecting consumers, such as recommending a new part when a simple fix to the old will do, a phenomenon known as overprovisioning. The purpose of this paper is to examine to what extent consumers tend to defer their decisions should they suspect that sellers are overproviding services to them and they cannot prevent the sellers from doing so (they lack personal control); and how proper market signals can mitigate such suspicions, restore personal control and reduce deferrals. Design/methodology/approach The paper conducts three laboratory experiments. The experiments expose the participants to hypothetical repair scenarios and measure to what extent they suspect that sellers might be overproviding services to them and they feel that they lack the personal control to prevent the sellers from doing so. Thereafter, the experiments expose them to two different market signals, one conveying that the seller is providing quality services (a repair warranty; quality signal) and the other conveying that the seller is taking away any incentives their agents (technicians) may have to overprovide services (the technicians are paid a flat salary; quantity signal). The paper examines how these quality/quantity signals are able to reduce overprovisioning suspicions, restore personal control and reduce decision deferrals. Findings The paper has two main findings. First, the paper shows a mediation process at work i.e. suspecting potential overprovisioning by sellers leads consumers to defer their decisions indirectly because they feel that they lack personal control to prevent the sellers from doing so. Second, the paper shows that the quantity signal (flat salary disclosure), but not the quality signal (warranty), is able to mitigate suspicions of overprovisioning, restore personal control and reduce decision deferrals. Practical implications The paper suggests that although buyers may rely on quality signals to assure them of superior service, these signals do not guarantee that the quantity of service they are receiving is appropriate. Therefore, sellers will have to send a credible quality signal and a credible quantity signal to the consumers if they wish to tackle suspicions about service overprovision and service quality. Originality/value The paper is original in two ways. First, the paper theorizes and tests a mediation process model whereby quality/quantity signals differentially mitigate overprovisioning suspicions, restore personal control and reduce decision deferrals. Second, the paper speaks to the necessity of expanding the traditional signaling literature, designed primarily to detect poor quality hidden in the products/services of lower-quality sellers, to include detecting/solving overprovisioning often hidden in the services provided by higher-quality sellers.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Bayu Rima Aditya ◽  
Ridi Ferdiana ◽  
Sri Suning Kusumawardani

PurposeExisting literature has reported a barrier list that could affect the implementation of digital transformation in higher education, yet the research question of how to identify barriers remained unanswered. Thus, this study intended to address this gap.Design/methodology/approachThe research design adopted a mixed-methods approach based on the problem-centered design science research (DSR) process model for the development and evaluation of framework.FindingsThis study proposed a systematic framework of three sets of components: (1) the initial set of barriers; (2) the barrier rating scheme and (3) the barrier scoring matrix. The three-component of the framework is to identify and prioritize barriers to the successful implementation of digital transformation in higher education.Research limitations/implicationsThe evaluation of the framework was only based on an expert opinion.Practical implicationsThis study provided a direction to the policymakers for designing sensible strategies to increase the chances of a successful digital transformation in higher education.Originality/valueThis study contributes to the knowledge body by offering a more systematic understanding of barriers to digital transformation in higher education.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kamal K. Mukherjee ◽  
Laura Reka ◽  
Rudina Mullahi ◽  
Keldi Jani ◽  
Jonida Taraj

PurposeDespite widespread adoption of business process reengineering (BPR) for better delivery efficiency of public services, a structured approach continues to elude the most value-adding phase of BPR: business process redesign. From another viewpoint, the rising currency of Whole-of-Government (WoG) and “shared services” initiatives signal an unmissable trend toward resource reuse across public service agencies (PSAs) through business process standardization (BPS). This research invokes BPS into process redesign to produce a process redesign framework (PRF) and deploys the same to build a standard process model (SPM) for services of the government of Albania (GoA).Design/methodology/approachThe methodology follows the design science research (DSR) paradigm, wherein best practices extracted from literature are synthesized with stakeholder inputs to design the PRF and SPM, both of which are then evaluated with case study research.FindingsAdoption of PRF/SPM on a WoG basis will not only reduce service lead time but also enable a variety of public services to share the same process, thereby further saving costs for GoA. The research outputs will accelerate reengineering and subsequent digitalization of public service operations.Research limitations/implicationsImplementing SPM will maximize resource reuse and help offer uniform and integrated public services to GoA's customers. It will also enable demand-driven staff mobilization across GoA agencies. The proposed PRF/SPM have limitations in that they consider only flow aspects of service processes with aspects of conversion being ignored.Originality/valueThis research fulfills the need for a systematic approach to process redesign and prepares GoA for a WoG treatment to its BPR efforts.


2019 ◽  
Vol 25 (5) ◽  
pp. 908-922 ◽  
Author(s):  
Remco Dijkman ◽  
Oktay Turetken ◽  
Geoffrey Robert van IJzendoorn ◽  
Meint de Vries

Purpose Business process models describe the way of working in an organization. Typically, business process models distinguish between the normal flow of work and exceptions to that normal flow. However, they often present an idealized view. This means that unexpected exceptions – exceptions that are not modeled in the business process model – can also occur in practice. This has an effect on the efficiency of the organization, because information systems are not developed to handle unexpected exceptions. The purpose of this paper is to study the relation between the occurrence of exceptions and operational performance. Design/methodology/approach The paper does this by analyzing the execution logs of business processes from five organizations, classifying execution paths as normal or exceptional. Subsequently, it analyzes the differences between normal and exceptional paths. Findings The results show that exceptions are related to worse operational performance in terms of a longer throughput time and that unexpected exceptions relate to a stronger increase in throughput time than expected exceptions. Practical implications These findings lead to practical implications on policies that can be followed with respect to exceptions. Most importantly, unexpected exceptions should be avoided by incorporating them into the process – and thus transforming them into expected exceptions – as much as possible. Also, as not all exceptions lead to longer throughput times, continuous improvement should be employed to continuously monitor the occurrence of exceptions and make decisions on their desirability in the process. Originality/value While work exists on analyzing the occurrence of exceptions in business processes, especially in the context of process conformance analysis, to the best of the authors’ knowledge this is the first work that analyzes the possible consequences of such exceptions.


2019 ◽  
Vol 25 (5) ◽  
pp. 972-994 ◽  
Author(s):  
Michael Fellmann ◽  
Agnes Koschmider ◽  
Ralf Laue ◽  
Andreas Schoknecht ◽  
Arthur Vetter

Purpose Patterns have proven to be useful for documenting general reusable solutions to a commonly occurring problem. In recent years, several different business process management (BPM)-related patterns have been published. Despite the large number of publications on this subject, there is no work that provides a comprehensive overview and categorization of the published business process model patterns. The purpose of this paper is to close this gap by providing a taxonomy of patterns as well as a classification of 89 research works. Design/methodology/approach The authors analyzed 280 research articles following a structured iterative procedure inspired by the method for taxonomy development from Nickerson et al. (2013). Using deductive and inductive reasoning processes embedded in concurrent as well as joint research activities, the authors created a taxonomy of patterns as well as a classification of 89 research works. Findings In general, the findings extend the current understanding of BPM patterns. The authors identify pattern categories that are highly populated with research works as well as categories that have received far less attention such as risk and security, the ecological perspective and process architecture. Further, the analysis shows that there is not yet an overarching pattern language for business process model patterns. The insights can be used as starting point for developing such a pattern language. Originality/value Up to now, no comprehensive pattern taxonomy and research classification exists. The taxonomy and classification are useful for searching pattern works which is also supported by an accompanying website complementing the work. In regard to future research and publications on patterns, the authors derive recommendations regarding the content and structure of pattern publications.


Sign in / Sign up

Export Citation Format

Share Document