8,944 research outputs found

    Central-provincial Politics and Industrial Policy-making in the Electric Power Sector in China

    Get PDF
    In addition to the studies that provide meaningful insights into the complexity of technical and economic issues, increasing studies have focused on the political process of market transition in network industries such as the electric power sector. This dissertation studies the central–provincial interactions in industrial policy-making and implementation, and attempts to evaluate the roles of Chinese provinces in the market reform process of the electric power sector. Market reforms of this sector are used as an illustrative case because the new round of market reforms had achieved some significant breakthroughs in areas such as pricing reform and wholesale market trading. Other policy measures, such as the liberalization of the distribution market and cross-regional market-building, are still at a nascent stage and have only scored moderate progress. It is important to investigate why some policy areas make greater progress in market reforms than others. It is also interesting to examine the impacts of Chinese central-provincial politics on producing the different market reform outcomes. Guangdong and Xinjiang are two provinces being analyzed in this dissertation. The progress of market reforms in these two provinces showed similarities although the provinces are very different in terms of local conditions such as the stages of their economic development and energy structures. The actual reform can be understood as the outcomes of certain modes of interactions between the central and provincial actors in the context of their particular capabilities and preferences in different policy areas. This dissertation argues that market reform is more successful in policy areas where the central and provincial authorities are able to engage mainly in integrative negotiations than in areas where they engage mainly in distributive negotiations

    The determinants of value addition: a crtitical analysis of global software engineering industry in Sri Lanka

    Get PDF
    It was evident through the literature that the perceived value delivery of the global software engineering industry is low due to various facts. Therefore, this research concerns global software product companies in Sri Lanka to explore the software engineering methods and practices in increasing the value addition. The overall aim of the study is to identify the key determinants for value addition in the global software engineering industry and critically evaluate the impact of them for the software product companies to help maximise the value addition to ultimately assure the sustainability of the industry. An exploratory research approach was used initially since findings would emerge while the study unfolds. Mixed method was employed as the literature itself was inadequate to investigate the problem effectively to formulate the research framework. Twenty-three face-to-face online interviews were conducted with the subject matter experts covering all the disciplines from the targeted organisations which was combined with the literature findings as well as the outcomes of the market research outcomes conducted by both government and nongovernment institutes. Data from the interviews were analysed using NVivo 12. The findings of the existing literature were verified through the exploratory study and the outcomes were used to formulate the questionnaire for the public survey. 371 responses were considered after cleansing the total responses received for the data analysis through SPSS 21 with alpha level 0.05. Internal consistency test was done before the descriptive analysis. After assuring the reliability of the dataset, the correlation test, multiple regression test and analysis of variance (ANOVA) test were carried out to fulfil the requirements of meeting the research objectives. Five determinants for value addition were identified along with the key themes for each area. They are staffing, delivery process, use of tools, governance, and technology infrastructure. The cross-functional and self-organised teams built around the value streams, employing a properly interconnected software delivery process with the right governance in the delivery pipelines, selection of tools and providing the right infrastructure increases the value delivery. Moreover, the constraints for value addition are poor interconnection in the internal processes, rigid functional hierarchies, inaccurate selections and uses of tools, inflexible team arrangements and inadequate focus for the technology infrastructure. The findings add to the existing body of knowledge on increasing the value addition by employing effective processes, practices and tools and the impacts of inaccurate applications the same in the global software engineering industry

    From wallet to mobile: exploring how mobile payments create customer value in the service experience

    Get PDF
    This study explores how mobile proximity payments (MPP) (e.g., Apple Pay) create customer value in the service experience compared to traditional payment methods (e.g. cash and card). The main objectives were firstly to understand how customer value manifests as an outcome in the MPP service experience, and secondly to understand how the customer activities in the process of using MPP create customer value. To achieve these objectives a conceptual framework is built upon the Grönroos-Voima Value Model (Grönroos and Voima, 2013), and uses the Theory of Consumption Value (Sheth et al., 1991) to determine the customer value constructs for MPP, which is complimented with Script theory (Abelson, 1981) to determine the value creating activities the consumer does in the process of paying with MPP. The study uses a sequential exploratory mixed methods design, wherein the first qualitative stage uses two methods, self-observations (n=200) and semi-structured interviews (n=18). The subsequent second quantitative stage uses an online survey (n=441) and Structural Equation Modelling analysis to further examine the relationships and effect between the value creating activities and customer value constructs identified in stage one. The academic contributions include the development of a model of mobile payment services value creation in the service experience, introducing the concept of in-use barriers which occur after adoption and constrains the consumers existing use of MPP, and revealing the importance of the mobile in-hand momentary condition as an antecedent state. Additionally, the customer value perspective of this thesis demonstrates an alternative to the dominant Information Technology approaches to researching mobile payments and broadens the view of technology from purely an object a user interacts with to an object that is immersed in consumers’ daily life

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance

    Freelance subtitlers in a subtitle production network in the OTT industry in Thailand: a longitudinal study

    Get PDF
    The present study sets out to investigate a subtitle production network in the over-the-top (OTT) industry in Thailand through the perspective of freelance subtitlers. A qualitative longitudinal research design was adopted to gain insights into (1) the way the work practices of freelance subtitlers are influenced by both human and non-human actors in the network, (2) the evolution of the network, and (3) how the freelance subtitlers’ perception of quality is influenced by changes occurring in the network. Eleven subtitlers were interviewed every six months over a period of two years, contributing to over 60 hours of interview data. The data analysis was informed by selected concepts from Actor-Network Theory (ANT) (Law 1992, 2009; Latour 1996, 2005; Mol 2010), and complemented by the three-dimensional quality model proposed by Abdallah (2016, 2017). Reflexive thematic analysis (Braun and Clarke 2019a, 2020b) was used to generate themes and sub-themes which address the research questions and tell compelling stories about the actor-network. It was found that from July 2017 to September 2019, the subtitle production network, which was sustained by complex interrelationships between actors, underwent a number of changes. The changes affected the work practices of freelance subtitlers in a more negative than positive way, demonstrating their precarious position in an industry that has widely adopted the vendor model (Moorkens 2017). Moreover, as perceived by the research participants, under increasingly undesirable working conditions, it became more challenging to maintain a quality process and to produce quality subtitles. Finally, translation technology and tools, including machine translation, were found to be key non-human actors that catalyse the changes in the network under study

    Evaluating the readiness of three States in the Northeastern United States to adapt important natural resources systems to climate change: practical and theoretical considerations

    Get PDF
    In the last decade, governments have made advances in the development and adoption of climate adaptation programs. With the rise of these programs, scholarly efforts have emerged to assess and evaluate their effectiveness and quality. Thus, researchers have developed and applied a range of climate adaptation evaluation approaches to gauge adaptation progress. In this thesis, a climate adaptation evaluation approach developed by Ford and King (2015) — the adaptation readiness framework — was applied to assess the readiness of three Northeastern US States – Massachusetts, New Hampshire, and Maine – to adapt the natural resources systems located within their boundaries to climate change. To enable the adaptation readiness evaluation, the indicators in the adaptation readiness framework were revised to fit the context of this study shaped by scale and governmental system. Systematic reviews of the scholarly and grey literature were pursued. The revised indicators were used for the coding of documents. Indicators were then scored based on ordinal rankings. Results demonstrated that Massachusetts had the highest level of climate adaptation readiness, New Hampshire the second highest and Maine the lowest climate adaptation readiness. It was found that political leadership – one of the factors in the framework – strongly correlates with climate adaptation readiness, and that high levels of climate adaptation readiness are associated with government centralization. The conceptual strengths of the framework include its ability to illuminate adaptation deficits, and adaptation policy patterns and structures. Its weaknesses stem from the vagueness of the underlying definition of adaptation. Rather than measuring adaptation progress, the adaptation readiness framework measures the extent to which governments have established programs that fall under the category of adaptation as “adjustments”

    Investigating illicit drug use in adolescent students in England

    Get PDF
    Abstract The Smoking Drinking Drug Use Survey of adolescents aged 11 to 15 years living in England shows that lifetime drug use by adolescents aged 11 to 15 years has increased (15% to 24%) from 2014 to 2018 (NHS Digital, 2017, 2021b). This upward trend is despite the implementation of drug policies focused on reducing supply, possession, and manufacture of illicit drugs. Based on the premise that drug use is a socially learnt behaviour, the main objective of this research is to investigate whether social learning factors (imitation, parental reinforcement, peer association and attitudes to drug use) mediate drug use in adolescents aged 11 to 15 years living in England. The second objective is to identify which social learning factors mediate drug use by ages, region, and gender. Using the Social Structure Social Learning (SSSL) theory as a framework for the research, this study contributes to the literature by identifying a) the strongest social learning behaviour for each age, gender and region in England and b) the mechanism (mediation) by which social learning affects drug use. This research employs rich data on drug use drawn from the Smoking Drinking Drug Use Survey 2016, a cross-sectional survey of adolescents aged 11-15 years across England (as of October 2021 the data for the most recent survey 2018 was not available for analysis). Mediation analysis was used to evaluate which social learning factors mediate the association between age, gender, region and drug use. The results showed that there were differences in learning behaviours that were specific to age, gender and region. For example, the most significant social learning behaviour for drug use among boys was “imitation of friends”, whilst for females, it was “peer association” among females (i.e. having a perception that peers are using drugs). In addition, having “positive attitudes to glue” (i.e. “it is ok to try glue”) was the strongest learning behaviour for drug use among younger individuals (i.e. at ages 11 to 13). Furthermore, whilst in Northern England, the strongest learning behaviour was having “positive attitudes to cannabis”, in London peer association was found to be the strongest learning pathway to drug use. Family disapproval of drug use (“persuade me not to take drugs”) was found to be a protective factor against drug use for all ages except for age 11 and 12 years and those living in the East Midlands and London. In these cases, more authoritarian parenting –– strong parental disapproval (“stop me from taking drugs”) was found to be a protective factor. This research offers two main contributions to the literature. First, it shows empirical linkages between constructs built using SSSL theory that have not been previously explored within a population of young adolescents in England. Second, it identifies the effects and degree to which social learning affects the relationship between drug use and social structure. Overall, this research also contributes to an improved theoretical rationale for existing SSSL associations; that is, social learning can behave as a mediator or a moderator depending on the context. The evidence produced by this thesis could also have potentially relevant policy implications. More specifically, the differences in the social learning behaviours may suggest the need to implement more targeted prevention policies aimed by age, gender and regional groups of young adolescents

    Managing global virtual teams in the London FinTech industry

    Get PDF
    Today, the number of organisations that are adopting virtual working arrangements has exploded, and the London FinTech industry is no exception. During recent years, FinTech companies have increasingly developed virtual teams as a means of connecting and engaging geographically dispersed workers, lowering costs, and enabling greater speed and adaptability. As the first study in the United Kingdom regarding global virtual team management in the FinTech industry, this DBA research seeks answers to the question, “What makes for the successful management of a global virtual team in the London FinTech industry?”. Straussian grounded-theory method was chosen as this qualitative approach lets participants have their own voice and offers some flexibility. It also allows the researcher to have preconceived ideas about the research undertaking. The research work makes the case for appreciating the voice of people with lived experiences. Ten London-based FinTech Managers with considerable experience running virtual teams agreed to take part in this study. These Managers had spent time working at large, household-name firms with significant global reach, and one had recently become founder and CEO of his own firm, taking on clients and hiring contract staff from around the world. At least eight of the other participants were senior ‘Heads’ of various technology teams and one was a Managing Director working at a ‘Big Four’ consultancy. They had all (and many still did) spent years running geographically distributed teams with members as far away as Pacific Asia and they were all keen to discuss that breadth of experience and the challenges they faced. Results from these in-depth interviews suggested that there are myriad reasons for a global virtual team, from providing 24 hour, follow-the-sun service to locating the most cost-effective resources with the highest skills. It also confirmed that there are unique challenges to virtual management and new techniques are required to help navigate virtual managers through them. Managing a global virtual team requires much more than the traditional management competencies. Based on discussion with the respondents, a set of practical recommendations for global virtual team management was developed and covered a wide range of issues related to recruitment and selection, team building, developing standard operating procedures, communication, motivation, performance management, and building trust
    • 

    corecore