110,351 research outputs found
Enhancing Inter functional coordination and marketing performance: utilization of the motivation/ability/opportunity framework
This paper integrates a large literature on intra-organisational relationships with the aim to understand how to enhance coordination between different functional units inside an organisation and to empirically examine the impact of inter functional coordination on marketing performance. By drawing on the Motivation/Ability/Opportunity (MAO) theoretical framework, this research attempts to examine factors to enhance employees? motivation/ability/opportunity to coordinate on improving inter functional coordination. The research also empirically examined the impact of inter functional coordination on marketing performance in terms of adaptiveness, effectiveness, efficiency and creativity of marketing programmes. The research conceptual model was tested with data collected from 274 structured surveys in medium to large Egyptian firms. Regression analysis was employed as a tool for testing the research hypotheses. The research findings suggest that the use of cross functional teams, resource dependency, joint reward systems, management support, positively affect the level of inter functional coordination. The research also showed that some factors, for example employees? interpersonal skills, might hinder coordination between functional units and these issues should be resolved in order to establish an effective inter functional coordination. The research provides empirical evidence of the direct positive impact of inter functional coordination on marketing performance
Sustainability management : insights from the viable system model
A review of current literature on sustainability standards reveals a significant gap between their adoption and the implementation of sustainability into every level of the organisation. In this paper, it is argued that in order to overcome this challenge, an appropriate model of an organisation is needed. The Viable System Model (VSM) is proposed as such a model and, in order to illustrate this argument, it is used to interpret the ISO 26000 standard on Social Responsibility (SR). First, the VSM theory is introduced and presented by modelling the hypothetical company Widget Co. Then, the clauses of ISO 26000 are mapped on the Widget Co. model, together with detailed descriptions and examples on the organisational and managerial implications of its adopting the standard's guidelines. The result is the identification of generic SR functions that need to be performed by the various organisational governance systems, as well as their dynamic interrelations, thus clarifying implementation issues. Moreover, by identifying different SR management layers, VSM is suggested as a way forward to develop an integration model for SR issues and respective sustainability tools. Finally, a discussion is given on the implications of using this approach to integrate sustainability standards and the way this research contributes to recent developments in sustainability research
Moving from a "human-as-problem" to a "human-as-solution" cybersecurity mindset
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking attacks and data breaches reaching the news over the last few years. The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change.To consider this question, we applied a "problematization" approach to assess current conceptualisations of the cybersecurity problem by government, industry and hackers. Our analysis revealed that individual human actors, in a variety of roles, are generally considered to be "a problem". We also discovered that deployed solutions primarily focus on preventing adverse events by building resistance: i.e. implementing new security layers and policies that control humans and constrain their problematic behaviours. In essence, this treats all humans in the system as if they might well be malicious actors, and the solutions are designed to prevent their ill-advised behaviours. Given the continuing incidences of data breaches and successful hacks, it seems wise to rethink the status quo approach, which we refer to as "Cybersecurity, Currently". In particular, we suggest that there is a need to reconsider the core assumptions and characterisations of the well-intentioned human's role in the cybersecurity socio-technical system. Treating everyone as a problem does not seem to work, given the current cyber security landscape.Benefiting from research in other fields, we propose a new mindset i.e. "Cybersecurity, Differently". This approach rests on recognition of the fact that the problem is actually the high complexity, interconnectedness and emergent qualities of socio-technical systems. The "differently" mindset acknowledges the well-intentioned human's ability to be an important contributor to organisational cybersecurity, as well as their potential to be "part of the solution" rather than "the problem". In essence, this new approach initially treats all humans in the system as if they are well-intentioned. The focus is on enhancing factors that contribute to positive outcomes and resilience. We conclude by proposing a set of key principles and, with the help of a prototypical fictional organisation, consider how this mindset could enhance and improve cybersecurity across the socio-technical system
Recommended from our members
Investigating design features of a computer-mediated communication system
Computer-mediated communication (CMC) is increasingly used in higher education, but it is not without problems. The effectiveness of CMC depends on many factors, including the characteristics of CMC systems themselves. The research reported here therefore aimed to investigate how an educational CMC system might be improved, in order to support learning more effectively.
The main context for the research was distance learning at the UK Open University (OU). A two-stage, mixed methods research approach was adopted. In the first stage, interviews and observations were carried out to explore the benefits and problems experienced by users. This revealed two major issues: information overload and lack of social presence. Information overload relates to users’ problems dealing with large numbers of messages. Social presence relates to the need for users to feel connected with each other.
The second stage investigated system features aimed at addressing these issues, implemented in a prototype computer conferencing system. Features to address overload included branched message threading and user recommendations. Features to address social presence were ‘résumés’ and instant messaging. These features were evaluated using questionnaires, with several cohorts of students in an OU course.
Students expressed approval of the features, although some features were not widely used. Students preferred branched threading to chronological threading because branching helped them to follow ‘conversations’. Students were uncomfortable recommending messages, feeling that the value of a message would vary between people. They were also uncomfortable using instant messaging to contact others whom they did not know. However, the awareness aspect of instant messaging provided a sense of solidarity.
The research demonstrated that the problems of overload and lack of social presence are significant, and each has social aspects which must be addressed. Students’ relationships with each other affect whether and how they use the features of CMC systems. We can conclude that particular attention must be paid to the social aspects of online communication, both when designing educational CMC systems and when considering how they are used. To maximise the benefits for learning, students need to feel comfortable with each other online, and there are few short cuts to achieving this
Enhancing security incident response follow-up efforts with lightweight agile retrospectives
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents. The final phase within many security incident response approaches is the feedback/follow-up phase. It is within this phase that an organization is expected to use information collected during an investigation in order to learn from an incident, improve its security incident response process and positively impact the wider security environment. However, recent research and security incident reports argue that organizations find it difficult to learn from incidents.
A contributing factor to this learning deficiency is that industry focused security incident response approaches, typically, provide very little practical information about tools or techniques that can be used to extract lessons learned from an investigation. As a result, organizations focus on improving technical security controls and not examining or reassessing the effectiveness or efficiency of internal policies and procedures. An additional hindrance, to encouraging improvement assessments, is the absence of tools and/or techniques that organizations can implement to evaluate the impact of implemented enhancements in the wider organization. Hence, this research investigates the integration of lightweight agile retrospectives and meta-retrospectives, in a security incident response process, to enhance feedback and/or follow-up efforts. The research contribution of this paper is twofold. First, it presents an approach based on lightweight retrospectives as a means of enhancing security incident response follow-up efforts. Second, it presents an empirical evaluation of this lightweight approach in a Fortune 500 Financial organization's security incident response team
- …