9,076 research outputs found

    Subsidiary Entrepreneurial Alertness: Antecedents and Outcomes

    Get PDF
    This thesis brings together concepts from both international business and entrepreneurship to develop a framework of the facilitators of subsidiary innovation and performance. This study proposes that Subsidiary Entrepreneurial Alertness (SEA) facilitates the recognition of opportunities (the origin of subsidiary initiatives). First introduced by Kirzner (1979) in the context of the individual, entrepreneurial alertness (EA) is the ability to notice an opportunity without actively searching. Similarly, to entrepreneurial alertness at the individual level, this study argues that SEA enables the subsidiary to best select opportunities based on resources available. The research further develops our conceptualisation of SEA by drawing on work by Tang et al. (2012) identifying three distinct activities of EA: scanning and search (identifying opportunities unseen by others due to their awareness gaps), association and connection of information, and evaluation and judgement to interpret or anticipate future viability of opportunities. This study then hypothesises that SEA leads to opportunity recognition at the subsidiary level and further hypothesises innovation and performance as outcomes of opportunity recognition. This research brings these arguments together to develop and test a comprehensive theoretical model. The theoretical model is tested through a mail survey of the CEOs/MDs of foreign subsidiaries within the Republic of Ireland (an innovative hub for foreign subsidiaries). This method was selected as the best method to reach the targeted respondent, and due to the depth of knowledge the target respondent holds, the survey can answer the desired question more substantially. The results were examined using partial least squares structural equation modelling (PLS-SEM). The study’s findings confirm two critical aspects of subsidiary context, subsidiary brokerage and subsidiary credibility are positively related to SEA. The study establishes a positive link between SEA and both the generation of innovation and the subsidiary’s performance. This thesis makes three significant contributions to the subsidiary literature as it 1) introduces and develops the concept of SEA, 2) identifies the antecedents of SEA, and 3) demonstrates the impact of SEA on subsidiary opportunity recognition. Implications for subsidiaries, headquarters and policy makers are discussed along with the limitations of the study

    Central-provincial Politics and Industrial Policy-making in the Electric Power Sector in China

    Get PDF
    In addition to the studies that provide meaningful insights into the complexity of technical and economic issues, increasing studies have focused on the political process of market transition in network industries such as the electric power sector. This dissertation studies the central–provincial interactions in industrial policy-making and implementation, and attempts to evaluate the roles of Chinese provinces in the market reform process of the electric power sector. Market reforms of this sector are used as an illustrative case because the new round of market reforms had achieved some significant breakthroughs in areas such as pricing reform and wholesale market trading. Other policy measures, such as the liberalization of the distribution market and cross-regional market-building, are still at a nascent stage and have only scored moderate progress. It is important to investigate why some policy areas make greater progress in market reforms than others. It is also interesting to examine the impacts of Chinese central-provincial politics on producing the different market reform outcomes. Guangdong and Xinjiang are two provinces being analyzed in this dissertation. The progress of market reforms in these two provinces showed similarities although the provinces are very different in terms of local conditions such as the stages of their economic development and energy structures. The actual reform can be understood as the outcomes of certain modes of interactions between the central and provincial actors in the context of their particular capabilities and preferences in different policy areas. This dissertation argues that market reform is more successful in policy areas where the central and provincial authorities are able to engage mainly in integrative negotiations than in areas where they engage mainly in distributive negotiations

    Examples of works to practice staccato technique in clarinet instrument

    Get PDF
    Klarnetin staccato tekniğini güçlendirme aşamaları eser çalışmalarıyla uygulanmıştır. Staccato geçişlerini hızlandıracak ritim ve nüans çalışmalarına yer verilmiştir. Çalışmanın en önemli amacı sadece staccato çalışması değil parmak-dilin eş zamanlı uyumunun hassasiyeti üzerinde de durulmasıdır. Staccato çalışmalarını daha verimli hale getirmek için eser çalışmasının içinde etüt çalışmasına da yer verilmiştir. Çalışmaların üzerinde titizlikle durulması staccato çalışmasının ilham verici etkisi ile müzikal kimliğe yeni bir boyut kazandırmıştır. Sekiz özgün eser çalışmasının her aşaması anlatılmıştır. Her aşamanın bir sonraki performans ve tekniği güçlendirmesi esas alınmıştır. Bu çalışmada staccato tekniğinin hangi alanlarda kullanıldığı, nasıl sonuçlar elde edildiği bilgisine yer verilmiştir. Notaların parmak ve dil uyumu ile nasıl şekilleneceği ve nasıl bir çalışma disiplini içinde gerçekleşeceği planlanmıştır. Kamış-nota-diyafram-parmak-dil-nüans ve disiplin kavramlarının staccato tekniğinde ayrılmaz bir bütün olduğu saptanmıştır. Araştırmada literatür taraması yapılarak staccato ile ilgili çalışmalar taranmıştır. Tarama sonucunda klarnet tekniğin de kullanılan staccato eser çalışmasının az olduğu tespit edilmiştir. Metot taramasında da etüt çalışmasının daha çok olduğu saptanmıştır. Böylelikle klarnetin staccato tekniğini hızlandırma ve güçlendirme çalışmaları sunulmuştur. Staccato etüt çalışmaları yapılırken, araya eser çalışmasının girmesi beyni rahatlattığı ve istekliliği daha arttırdığı gözlemlenmiştir. Staccato çalışmasını yaparken doğru bir kamış seçimi üzerinde de durulmuştur. Staccato tekniğini doğru çalışmak için doğru bir kamışın dil hızını arttırdığı saptanmıştır. Doğru bir kamış seçimi kamıştan rahat ses çıkmasına bağlıdır. Kamış, dil atma gücünü vermiyorsa daha doğru bir kamış seçiminin yapılması gerekliliği vurgulanmıştır. Staccato çalışmalarında baştan sona bir eseri yorumlamak zor olabilir. Bu açıdan çalışma, verilen müzikal nüanslara uymanın, dil atış performansını rahatlattığını ortaya koymuştur. Gelecek nesillere edinilen bilgi ve birikimlerin aktarılması ve geliştirici olması teşvik edilmiştir. Çıkacak eserlerin nasıl çözüleceği, staccato tekniğinin nasıl üstesinden gelinebileceği anlatılmıştır. Staccato tekniğinin daha kısa sürede çözüme kavuşturulması amaç edinilmiştir. Parmakların yerlerini öğrettiğimiz kadar belleğimize de çalışmaların kaydedilmesi önemlidir. Gösterilen azmin ve sabrın sonucu olarak ortaya çıkan yapıt başarıyı daha da yukarı seviyelere çıkaracaktır

    Victims' Access to Justice in Trinidad and Tobago: An exploratory study of experiences and challenges of accessing criminal justice in a post-colonial society

    Get PDF
    This thesis investigates victims' access to justice in Trinidad and Tobago, using their own narratives. It seeks to capture how their experiences affected their identities as victims and citizens, alongside their perceptions of legitimacy regarding the criminal justice system. While there have been some reforms in the administration of criminal justice in Trinidad and Tobago, such reforms have not focused on victims' accessibility to the justice system. Using grounded theory methodology, qualitative data was collected through 31 in-depth interviews with victims and victim advocates. The analysis found that victims experienced interpersonal, structural, and systemic barriers at varying levels throughout the criminal justice system, which manifested as institutionalized secondary victimization, silencing and inequality. This thesis argues that such experiences not only served to appropriate conflict but demonstrates that access is often given in a very narrow sense. Furthermore, it shows a failure to encompass access to justice as appropriated conflicts are left to stagnate in the system as there is often very little resolution. Adopting a postcolonial lens to analyse victims' experiences, the analysis identified othering practices that served to institutionalize the vulnerability and powerlessness associated with victim identities. Here, it is argued that these othering practices also affected the rights consciousness of victims, delegitimating their identities as citizens. Moreover, as a result of their experiences, victims had mixed perceptions of the justice system. It is argued that while the system is a legitimate authority victims' endorsement of the system is questionable, therefore victims' experiences suggest that there is a reinforcement of the system's legal hegemony. The findings suggest that within the legal system of Trinidad and Tobago, legacies of colonialism shape the postcolonial present as the psychology and inequalities of the past are present in the interactions and processes of justice. These findings are relevant for policymakers in Trinidad and Tobago and other regions. From this study it is recognized that, to improve access to justice for victims, there needs to be a move towards victim empowerment that promotes resilience and enhances social capital. Going forward it is noted that there is a need for further research

    AI-based Conversational Agents for Customer Service – A Study of Customer Service Representative’ Perceptions Using TAM 2

    Get PDF
    This study aimed to identify the various factors that may influence customer service representatives’ perceptions of artificial intelligence (AI)-based conversational agents (CAs) for customer service. By analyzing 180 publications, a conceptual research model is developed for identifying the factors that may influence customer service representatives’ perceptions of AI-based CAs for customer service. The underlying conceptual research model comprises ten factors. The study is grounded in the application of the Technology Acceptance Model 2 (TAM 2) approach. The research model is empirically evaluated with survey data from 128 participants. Our results show that the direct positive effect of subjective norm on customer service representatives’ perception of using AIbased CAs in customer service decreases with increasing experience. Moreover, our results reveal new insights regarding trust. The results of this study provide an overview of the predominant characteristics of the influencing factors of customer service representatives’ perceptions of AI-based CAs for customer service

    Epilepsy Mortality: Leading Causes of Death, Co-morbidities, Cardiovascular Risk and Prevention

    Get PDF
    a reuptake inhibitor selectively prevents seizure-induced sudden death in the DBA/1 mouse model of sudden unexpected ... Bilateral lesions of the fastigial nucleus prevent the recovery of blood pressure following hypotension induced by ..

    From wallet to mobile: exploring how mobile payments create customer value in the service experience

    Get PDF
    This study explores how mobile proximity payments (MPP) (e.g., Apple Pay) create customer value in the service experience compared to traditional payment methods (e.g. cash and card). The main objectives were firstly to understand how customer value manifests as an outcome in the MPP service experience, and secondly to understand how the customer activities in the process of using MPP create customer value. To achieve these objectives a conceptual framework is built upon the Grönroos-Voima Value Model (Grönroos and Voima, 2013), and uses the Theory of Consumption Value (Sheth et al., 1991) to determine the customer value constructs for MPP, which is complimented with Script theory (Abelson, 1981) to determine the value creating activities the consumer does in the process of paying with MPP. The study uses a sequential exploratory mixed methods design, wherein the first qualitative stage uses two methods, self-observations (n=200) and semi-structured interviews (n=18). The subsequent second quantitative stage uses an online survey (n=441) and Structural Equation Modelling analysis to further examine the relationships and effect between the value creating activities and customer value constructs identified in stage one. The academic contributions include the development of a model of mobile payment services value creation in the service experience, introducing the concept of in-use barriers which occur after adoption and constrains the consumers existing use of MPP, and revealing the importance of the mobile in-hand momentary condition as an antecedent state. Additionally, the customer value perspective of this thesis demonstrates an alternative to the dominant Information Technology approaches to researching mobile payments and broadens the view of technology from purely an object a user interacts with to an object that is immersed in consumers’ daily life

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance

    BECOMEBECOME - A TRANSDISCIPLINARY METHODOLOGY BASED ON INFORMATION ABOUT THE OBSERVER

    Get PDF
    ABSTRACT Andrea T. R. Traldi BECOMEBECOME A Transdisciplinary Methodology Based on Information about the Observer The present research dissertation has been developed with the intention to provide practical strategies and discover new intellectual operations which can be used to generate Transdisciplinary insight. For this reason, this thesis creates access to new knowledge at different scales. Firstly, as it pertains to the scale of new knowledge generated by those who attend Becomebecome events. The open-source nature of the Becomebecome methodology makes it possible for participants in Becomebecome workshops, training programmes and residencies to generate new insight about the specific project they are working on, which then reinforce and expand the foundational principles of the theoretical background. Secondly, as it pertains to the scale of the Becomebecome framework, which remains independent of location and moment in time. The method proposed to access Transdisciplinary knowledge constitutes new knowledge in itself because the sequence of activities, described as physical and mental procedures and listed as essential criteria, have never been found organised 6 in such a specific order before. It is indeed the order in time, i.e. the sequence of the ideas and activities proposed, which allows one to transform Disciplinary knowledge via a new Transdisciplinary frame of reference. Lastly, new knowledge about Transdisciplinarity as a field of study is created as a consequence of the heretofore listed two processes. The first part of the thesis is designated ‘Becomebecome Theory’ and focuses on the theoretical background and the intellectual operations necessary to support the creation of new Transdisciplinary knowledge. The second part of the thesis is designated ‘Becomebecome Practice’ and provides practical examples of the application of such operations. Crucially, the theoretical model described as the foundation for the Becomebecome methodology (Becomebecome Theory) is process-based and constantly checked against the insight generated through Becomebecome Practice. To this effect, ‘information about the observer’ is proposed as a key notion which binds together Transdisciplinary resources from several studies in the hard sciences and humanities. It is a concept that enables understanding about why and how information that is generated through Becomebecome Practice is considered of paramount importance for establishing the reference parameters necessary to access Transdisciplinary insight which is meaningful to a specific project, a specific person, or a specific moment in time
    corecore