scholarly journals Spatial and Temporal Dilemmas of Managers and Entrepreneurs. The Reconstruction of Neutralization Techniques

2020 ◽  
Vol 16 (4) ◽  
pp. 36-51
Author(s):  
Waldemar Dymarczyk

It is often assumed (in line with social expectations) that being a business manager and/or owner implies the feeling of omnipotence. Not only do organizational leaders run businesses, but they are also qualified to do so and are well-organized to physically and mentally cope with their duties. Thus, permanent (external and internal) pressure forces key organizational actors to use self-presentation strategies that meet social expectations. Narratives of organizational leaders show that other aspects of their lives are subdued to the sphere of business activities or are even incorporated by it. One of the most dominant strategies is to present oneself as an inner-directed individual in control of one’s career (a “self-made man” or “self-made woman”). At the same time, such an attitude results in “tensions” between irreconcilable roles or activities undertaken in various spheres of life. These tensions are depicted in the paper. The author shows different types of neutralization techniques used by organizational leaders to overcome or mitigate these tensions. Eleven neutralization practices have been outlined. These techniques have been identified in the course of the nearly decade-long research into spatial and temporal dimensions of careers of managers and entrepreneurs.

2018 ◽  
Vol 6 (2) ◽  
Author(s):  
Nikolay Zhilkov

The current article presents some of the theoretical aspects of self-presentation describing different points of view on the issue. The ideas of Erving Goffman, Edward Jones, Barry Schlenker, Roy Baumeister and others are being explored. Concepts related to to self-presentation are presented. Different types and functions of self-expression are identified.


2001 ◽  
Vol 101 (1) ◽  
pp. 19-31 ◽  
Author(s):  
Gerard Goggin ◽  
Catherine Griff

Much of the present debate about content on the internet revolves around how to control the distribution of different sorts of harmful or undesirable material. Yet there are considerable issues about whether sufficient sorts of desired cultural content will be available, such as ‘national’, ‘Australian’ content. In traditional broadcasting, regulation has been devised to encourage or mandate different types of content, where it is believed that the market will not do so by itself. At present, such regulatory arrangements are under threat in television, as the Productivity Commission Broadcasting Inquiry final report has noted. But what of the future for certain types of content on the internet? Do we need specific regulation and policy to promote the availability of content on the internet? Or is such a project simply irrelevant in the context of gradual but inexorable media convergence? Is regulating for content just as quixotic and fraught with peril as regulating of content from a censorship perspective often appears to be? In this article, we consider the case of Australian content for broadband technologies, especially in relation to film and video, and make some preliminary observations on the promotion and regulation of internet content.


2015 ◽  
Vol 8 (2/3) ◽  
pp. 262-283 ◽  
Author(s):  
Alona Mykhaylenko ◽  
Ágnes Motika ◽  
Brian Vejrum Waehrens ◽  
Dmitrij Slepniov

Purpose – The purpose of this paper is to advance the understanding of factors that affect offshoring performance results. To do so, this paper focuses on the access to location-specific advantages, rather than solely on the properties of the offshoring company, its strategy or environment. Assuming that different levels of synergy may exist between particular offshoring strategic decisions (choosing offshore outsourcing or captive offshoring and the type of function) and different offshoring advantages, this work advocates that the actual fact of realization of certain offshoring advantages (getting or not getting access to them) is a more reliable predictor of offshoring success. Design/methodology/approach – A set of hypotheses derived from the extant literature is tested on the data from a quantitative survey of 1,143 Scandinavian firms. Findings – The paper demonstrates that different governance modes and types of offshored function indeed provide different levels of access to different types of location-specific offshoring advantages. This difference may help to explain the ambiguity of offshoring initiatives performance results. Research limitations/implications – Limitations of the work include using only the offshoring strategy elements and only their limited variety as factors potentially influencing access to offshoring advantages. Also, the findings are limited to Scandinavian companies. Originality/value – The paper introduces a new concept of access, which can help to more reliably predict performance outcomes of offshoring initiatives. Recommendations are also provided to practitioners dealing with offshoring initiatives.


i-Perception ◽  
2018 ◽  
Vol 9 (1) ◽  
pp. 204166951875580 ◽  
Author(s):  
Jasmine Boshyan ◽  
Lisa Feldman Barrett ◽  
Nicole Betz ◽  
Reginald B. Adams ◽  
Kestutis Kveraga

Previous work using color photographic scenes has shown that human observers are keenly sensitive to different types of threatening and negative stimuli and reliably classify them by the presence, and spatial and temporal directions of threat. To test whether such distinctions can be extracted from impoverished visual information, we used 500 line drawings made by hand-tracing the original set of photographic scenes. Sixty participants rated the scenes on spatial and temporal dimensions of threat. Based on these ratings, trend analysis revealed five scene categories that were comparable to those identified for the matching color photographic scenes. Another 61 participants were randomly assigned to rate the valence or arousal evoked by the line drawings. The line drawings perceived to be the most negative were also perceived to be the most arousing, replicating the finding for color photographic scenes. We demonstrate here that humans are very sensitive to the spatial and temporal directions of threat even when they must extract this information from simple line drawings, and rate the line drawings very similarly to matched color photographs. The set of 500 hand-traced line-drawing scenes has been made freely available to the research community: http://www.kveragalab.org/threat.html .


Author(s):  
Robert Volpicelli

Transatlantic Modernism and the US Lecture Tour examines how the US lecture tour served as a vital infrastructure for bringing regional audiences from all across America into direct contact with international modernists. In doing so, the book reroutes scholarly understandings of modernism away from the magazines and other mass media that have so far characterized its circulation and toward the unique form of cultural distribution that coalesced around public lecturing. More specifically, it highlights the role the lecture circuit played in the formation of transatlantic modernism by following a diverse group of international authors—Oscar Wilde, W. B. Yeats, Rabindranath Tagore, Gertrude Stein, and W. H. Auden—on their wide-ranging tours through the American landscape. By analyzing these tours, this study illuminates how this extremely physical form of literary circulation transformed authors into commodities to be sold in a variety of performance venues. Moreover, it shows how these writers responded to such broad distribution by stretching their own ideas about modernist authorship. In this way, Transatlantic Modernism and the US Lecture Tour adds to a critical tradition of revealing the popular dimensions of modernism by demonstrating how the tour’s social diversity forced modernists to take on new, more flexible forms of self-presentation that would allow them to appeal to many different types of audiences.


Author(s):  
Jose María Alvarez-Rodríguez ◽  
Roy Mendieta ◽  
Valentín Moreno ◽  
Miguel Sánchez-Puebla ◽  
Juan Llorens

This paper introduces a mechanism to recover traceability links between the requirements and logical models in the context of critical systems development. Currently, lifecycle processes are covered by a good number of tools that are used to generate different types of artifacts. One of the cornerstone capabilities in the development of critical systems lies in the possibility of automatically recovery traceability links between system artifacts generated in different lifecycle stages. To do so, it is necessary to establish to what extent two or more of these work products are similar, dependent or should be explicitly linked together. However, the different types of artifacts and their internal representation depict a major challenge to unify how system artifacts are represented and, then, linked together. That is why, in this work, a concept-based representation is introduced to provide a semantic and unified description of any system artifact. Furthermore, a traceability function is defined and implemented to exploit this new semantic representation and to support the recovery of traceability links between different types of system artifacts. In order to evaluate the traceability function, a case study in the railway domain is conducted to compare the precision and recall of recovery traceability links between text-based requirements and logical model elements. As the main outcome of this work, the use of a concept-based paradigm to represent that system artifacts are demonstrated as a building block to automatically recover traceability links within the development lifecycle of critical systems.


2020 ◽  
Vol 20 (2) ◽  
pp. 214-241
Author(s):  
Erin A Hogg ◽  
John R Welch

Archaeological evidence has been used to assess pre-contact occupation and use of land since the first modern Aboriginal title claim in Canada. Archaeology’s ability to alternately challenge, support, and add substantive spatial and temporal dimensions to oral histories and documentary histories makes it a crucial tool in the resolution of Aboriginal rights and title. This article assesses how archaeological evidence has been considered in Aboriginal rights and title litigation in Canada, both over time and in different types of cases. The examination indicates that archaeological data have been judged to be sufficient evidence of pre-contact occupation and use. However, some limitations inherent in archaeological data, especially challenges in archaeology’s capacities to demonstrate continuous occupation and exclude possibilities for co-occupation, mean that it is best used in conjunction with ethnographies, oral histories, and historical documents. So long as courts affirm that it is the sole material evidence of pre-contact occupation, archaeological data will continue to be considered in future litigation.


1973 ◽  
Vol 40 (1) ◽  
pp. 117-129 ◽  
Author(s):  
C. C. Thiel ◽  
Carol L. Cousins ◽  
D. R. Westgarth ◽  
F. K. Neave

SummaryLarge differences in new infection rates occurred with half-udder milking machines in which one half of the cluster operated substantially free from vacuum fluctuations while the other half was subjected to various combinations of different types of fluctuation in vacuum. To increase the rate of new infection all teats were contaminated before and after each milking by immersion in a suspension of Streptococcus agalactiae and Str. dysgalactiae. A series of short-duration trials indicated that neither irregular nor cyclic fluctuations in vacuum acting alone were able to increase new infection rate. However, either the Nyhan and Cowhig irregular fluctuation, or a variant of it in combination with cyclic fluctuations in vacuum, was able to do so under the particular experimental conditions used.


2019 ◽  
Vol 36 (1) ◽  
pp. 206-217 ◽  
Author(s):  
Mira Lee ◽  
Jieun Lee ◽  
Elizabeth Quilliam

Purpose This study examined both American and Korean consumers’ motivation to share marketer-generated content (MGC) on Facebook and how these motives are related to the frequency of various types of sharing activities and the frequency of sharing various types of MGC. Design/methodology/approach An online survey was conducted in the US and Korea. Findings The findings demonstrated that both American and Korean consumers share MGC for several reasons: liking/helping the brand, self-presentation/social interaction, economic rewards, and entertainment. In addition to these four motivations, Korean consumers also share MGC with others to offer information that may be of use to them. These different types of motivations were associated with the frequency of sharing MGC directly from Facebook brand pages, of re-sharing what Facebook friends shared first, of adding comments when sharing, and of sharing different types of MGC differently. We found similarities and differences in the patterns of these relationships between the US and Korea. Originality/value Although many studies on electronic word of mouth (eWOM) have examined consumers’ motivations for providing consumer-generated content, research on consumer motivations to forward marketer-generated content is scarce. Additionally, earlier work examined the influences of motivation on sharing in general and on a certain type of MGC. Our findings that focused on various types of motivations to share MGC, and their influences on various types of MGC and specific types of sharing activities can provide a more complete picture than what was previously available in the eWOM literature. Further, by comparing American consumers’ motivations to share MGC on SNSs and their influences on sharing activities with those of Korean consumers, this study contributes to building a body of cross-cultural studies on consumer sharing of MGC.


2011 ◽  
Vol 26 (1) ◽  
pp. 3-15 ◽  
Author(s):  
Marijke Malsch ◽  
Jan W. de Keijser ◽  
Sofia E. C. Debets

Stalking is an obsessive behavior. Legal definitions generally characterize stalking as repetitive conduct. It may therefore be expected that recidivism by stalkers is high. We investigated court statistics of stalking cases to establish which proportion relapses in stalking behavior after a conviction and what other types of new crimes they commit. Case files of stalking cases have been investigated to find out whether and which neutralization techniques are used by stalkers to justify harassing behaviors. Stalkers who do recidivate do so quickly after a conviction. They appear to make use of various neutralization techniques. There is a small group of highly obsessive stalkers that seems not to be stopped by any of the measures, sanctions, or interventions that are imposed.


Sign in / Sign up

Export Citation Format

Share Document