92 research outputs found

    How and When Socially Entrepreneurial Nonprofit Organizations Benefit From Adopting Social Alliance Management Routines to Manage Social Alliances?

    Get PDF
    Social alliance is defined as the collaboration between for-profit and nonprofit organizations. Building on the insights derived from the resource-based theory, we develop a conceptual framework to explain how socially entrepreneurial nonprofit organizations (SENPOs) can improve their social alliance performance by adopting strategic alliance management routines. We test our framework using the data collected from 203 UK-based SENPOs in the context of cause-related marketing campaign-derived social alliances. Our results confirm a positive relationship between social alliance management routines and social alliance performance. We also find that relational mechanisms, such as mutual trust, relational embeddedness, and relational commitment, mediate the relationship between social alliance management routines and social alliance performance. Moreover, our findings suggest that different types of social alliance motivation can influence the impact of social alliance management routines on different types of the relational mechanisms. In general, we demonstrate that SENPOs can benefit from adopting social alliance management routines and, in addition, highlight how and when the social alliance management routines–social alliance performance relationship might be shaped. Our study offers important academic and managerial implications, and points out future research directions

    What does security culture look like for small organizations?

    No full text
    The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and for whom the culture of the organization exerts a strong influence. A review of multiple definitions and descriptions of security culture was made to assess and analyse the drivers and influences that exist for security culture in small organizations. An initial representation of the factors that should drive security culture, together with those that should only influence it, was constructed. At a fundamental level these drivers are related to a formulated response to security issues rather than a reaction to it, and should reflect the responsibility allocated in a secure environment. In contrast, the influences on security culture can be grouped by communities of practice, individual awareness and organizational management. The encapsulation of potential driving and influencing factors couched in information security terms rather than behavioural science terms, will allow security researchers to investigate how a security culture can be fostered to improve information security in small organizations

    Two-way communication with neural networks in vivo using focused light

    Get PDF
    Neuronal networks process information in a distributed, spatially heterogeneous manner that transcends the layout of electrodes. In contrast, directed and steerable light offers the potential to engage specific cells on demand. We present a unified framework for adapting microscopes to use light for simultaneous in vivo stimulation and recording of cells at fine spatiotemporal resolutions. We use straightforward optics to lock onto networks in vivo, to steer light to activate circuit elements and to simultaneously record from other cells. We then actualize this 'free' augmentation on both an 'open' two-photon microscope and a leading commercial one. By following this protocol, setup of the system takes a few days, and the result is a noninvasive interface to brain dynamics based on directed light, at a network resolution that was not previously possible and which will further improve with the rapid advance in development of optical reporters and effectors. This protocol is for physiologists who are competent with computers and wish to extend hardware and software to interface more fluidly with neuronal networks.National Institutes of Health (U.S.) (Postdoctoral Fellowship)Simons Foundation (Postdoctoral Fellowship)National Institutes of Health (U.S.) (Predoctoral Fellowship)National Institutes of Health (U.S.)Simons Foundatio

    Fast Coding of Orientation in Primary Visual Cortex

    Get PDF
    Understanding how populations of neurons encode sensory information is a major goal of systems neuroscience. Attempts to answer this question have focused on responses measured over several hundred milliseconds, a duration much longer than that frequently used by animals to make decisions about the environment. How reliably sensory information is encoded on briefer time scales, and how best to extract this information, is unknown. Although it has been proposed that neuronal response latency provides a major cue for fast decisions in the visual system, this hypothesis has not been tested systematically and in a quantitative manner. Here we use a simple ‘race to threshold’ readout mechanism to quantify the information content of spike time latency of primary visual (V1) cortical cells to stimulus orientation. We find that many V1 cells show pronounced tuning of their spike latency to stimulus orientation and that almost as much information can be extracted from spike latencies as from firing rates measured over much longer durations. To extract this information, stimulus onset must be estimated accurately. We show that the responses of cells with weak tuning of spike latency can provide a reliable onset detector. We find that spike latency information can be pooled from a large neuronal population, provided that the decision threshold is scaled linearly with the population size, yielding a processing time of the order of a few tens of milliseconds. Our results provide a novel mechanism for extracting information from neuronal populations over the very brief time scales in which behavioral judgments must sometimes be made

    The non-immunosuppressive management of childhood nephrotic syndrome

    Get PDF
    corecore