48 resultados para Social Action, Responsibility and Heroism Act 2015
Resumo:
While existing literature acknowledges positive effects of satisfaction and economic switching barriers for building customer loyalty, studies analyzing interactions of these antecedents reveal mixed findings. Prior research does not consider, as antecedents of switching barriers, either habits or social ties that result from shared service-usage within a family or community. This paper contributes to the literature, first, by replicating the effects of satisfaction, economic switching barriers, and their interaction with customer loyalty and word-of-mouth of subscribers to a contractual service. Second, the study empirically tests the role of social ties as a social switching barrier. Third, the study introduces and tests the effects of habits as a precursor of economic and social switching barriers. Results reveal significant positive effects of satisfaction, economic switching barriers, and social ties on customer loyalty and word-of-mouth. Additionally, economic switching barriers and social ties interact significantly with satisfaction and habits act as a precursor of economic switching barriers and social ties.
Resumo:
Using data from 65,485 Chinese private small and medium-sized enterprises over the period 2000-2006, we examine the extent to which firms can improve access to debt by adopting strategies aimed at building social capital, namely entertaining and gift giving to others in their social network, and obtaining political affiliation. We find that although entertainment and gift-giving expenditure leads to higher levels of total and short-term debt, it does not enable firms to obtain greater long-term debt. In contrast, we demonstrate that obtaining political affiliation allows firms greater access to long-term debt.
Resumo:
In recent years, English welfare and health policy has started to include pregnancy within the foundation stage of child development. The foetus is also increasingly designated as ‘at risk’ from pregnant women. In this article, we draw on an analysis of a purposive sample of English social and welfare policies and closely related advocacy documents to trace the emergence of neuroscientific claims-making in relation to the family. In this article, we show that a specific deterministic understanding of the developing brain that only has a loose relationship with current scientific evidence is an important component in these changes. We examine the ways in which pregnancy is situated in these debates. In these debates, maternal stress is identified as a risk to the foetus; however, the selective concern with women living in disadvantage undermines biological claims. The policy claim of neurological ‘critical windows’ also seems to be influenced by social concerns. Hence, these emerging concerns over the foetus’ developing brain seem to be situated within the gendered history of policing women’s pregnant bodies rather than acting on new insights from scientific discoveries. By situating these developments within the broader framework of risk consciousness, we can link these changes to wider understandings of the ‘at risk’ child and intensified surveillance over family life.
Resumo:
In recent years, claims about children's developing brains have become central to the formation of child health and welfare policies in England. While these policies assert that they are based on neuro-scientific discoveries, their relationship to neuroscience itself has been debated. However, what is clear is that they portray a particular understanding of children and childhood, one that is marked by a lack of acknowledgment of child personhood. Using an analysis of key government-commissioned reports and additional advocacy documents, this article illustrates the ways that the mind of the child is reduced to the brain, and this brain comes to represent the child. It is argued that a highly reductionist and limiting construction of the child is produced, alongside the idea that parenting is the main factor in child development. It is concluded that this focus on children's brains, with its accompanying deterministic perspective on parenting, overlooks children's embodied lives and this has implications for the design of children's health and welfare services.
Resumo:
The period 2010–2013 was a time of far-reaching structural reforms of the National Health Service in England. Of particular interest in this paper is the way in which radical critiques of the reform process were marginalised by pragmatic concerns about how to maintain the market-competition thrust of the reforms while avoiding potential fragmentation. We draw on the Essex school of political discourse theory and develop a ‘nodal’ analytical framework to argue that widespread and repeated appeals to a narrative of choice-based integrated care served to take the fragmentation ‘sting’ out of radical critiques of the pro-competition reform process. This served to marginalise alternative visions of health and social care, and to pre-empt the contestation of a key norm in the provision of health care that is closely associated with the notions of ‘any willing provider’ and ‘any qualified provider’: provider-blind provision.
Resumo:
This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution’s Interim Guidelines.
Resumo:
The aim of this thesis was to investigate anticipatory identification: newcomers’ identification with an organisation prior to entry; in particular by exploring the antecedents and consequences of the construct. Although organisational identification has been frequently investigated over the past 25 years, surprisingly little is known about what causes an individual to identify with a new organisation before entry and whether this has an impact on their relationship with the organisation after formally taking up membership. Drawing on a Social Identity approach to organisational identification, it was hypothesised that newcomers would more closely identify with an organisation prior to entry when the organisation was seen as a source of positive social identity and was situationally relevant and meaningful to the newcomer, i.e. salient, during the pre-entry period. It was also hypothesised that anticipatory identification would have post-entry consequences and would predict newcomers’ post-entry identification, turnover intentions and job satisfaction. An indirect relationship between anticipatory identification and post-entry identification through post-entry social identity judgements (termed a “feedback loop” mechanism) was additionally proposed. Finally anticipatory identification was also predicted to moderate the relationship between post-entry social identity judgements and post-entry identification (termed a “buffering” mechanism). Four studies were conducted to test these hypotheses. Study One served as a pilot study, using a retrospective self-report design with s sample of 124 university students to initially test the proposed conceptual model. Studies Two and Three adopted experimental designs. Each used a unique sample of 72 staff and students from Aston University to respectively test the hypothesised positive social identity motive and salience antecedents of anticipatory identification. Study Four explored the relationship between anticipatory identification, its antecedents and consequences longitudinally, using an organisational sample of 45 employees. Overall, these studies found support for a social identity motive antecedent of anticipatory identification, as well as more limited evidence that anticipatory identification was associated with the salience of an organisation prior to entry. Support was inconsistent for a direct relationship between anticipatory identification and post-entry identification and there was no evidence that anticipatory identification was a significant direct predictor of turnover intention and job satisfaction. Anticipatory identification was however found to act as a buffer in the relationship between post-entry social identity judgements and post-entry identification in all but one of the four samples measured. A feedback loop mechanism was observed within the experimental designs of Studies Two and Three, but not within the organisational samples of Studies One and Four. Overall the findings of these four studies highlight key ways through which anticipatory identification can develop prior to entry into an organisation. Moreover, the research observed several important post-entry consequences of anticipatory identification, indicating that an understanding of post-entry identification may be enriched by attending more closely to the extent to which newcomers identify with an organisation prior to entry.
Resumo:
The main aim of this research is to demonstrate strategic supplier performance evaluation of a UK-based manufacturing organisation using an integrated analytical framework. Developing long term relationship with strategic suppliers is common in today's industry. However, monitoring suppliers' performance all through the contractual period is important in order to ensure overall supply chain performance. Therefore, client organisations need to measure suppliers' performance dynamically and inform them on improvement measures. Although there are many studies introducing innovative supplier performance evaluation frameworks and empirical researches on identifying criteria for supplier evaluation, little has been reported on detailed application of strategic supplier performance evaluation and its implication on overall performance of organisation. Additionally, majority of the prior studies emphasise on lagging factors (quality, delivery schedule and value/cost) for supplier selection and evaluation. This research proposes both leading (organisational practices, risk management, environmental and social practices) and lagging factors for supplier evaluation and demonstrates a systematic method for identifying those factors with the involvement of relevant stakeholders and process mapping. The contribution of this article is a real-life case-based action research utilising an integrated analytical model that combines quality function deployment and the analytic hierarchy process method for suppliers' performance evaluation. The effectiveness of the method has been demonstrated through number of validations (e.g. focus group, business results, and statistical analysis). Additionally, the study reveals that enhanced supplier performance results positive impact on operational and business performance of client organisation.
Resumo:
Microfinance has been developed as alternative solution for global poverty alleviation effort in the last 30 years. Microfinance institution (MFI) has unique characteristic wherein they face double bottom line objectives of outreach to the poor and financial sustainability. This study proposes a two-stage analysis to measure Islamic Microfinance institutions (IMFIs) performance by comparing them to conventional MFIs. First, we develop a Data Envelopment Analysis (DEA) framework to measure MFIs' efficiency in its double bottom line objectives, i.e. in terms of social and financial efficiency. In the second stage non-parametric tests are used to compare the performance and identify factors that contribute to the efficiency of IMFIs and MFIs.
Resumo:
Recent research has investigated the capability of the Diagnostic and Statistical Manual for Mental Disorders (DSM-5) descriptions to identify individuals who should receive a diagnosis of Autism Spectrum Disorder (ASD) using standardised diagnostic instruments. Building on previous research investigating behaviours essential for the diagnosis of DSM-5 ASD, the current study investigated the sensitivity and specificity of a set of 14 items derived from the Diagnostic Interview for Social and Communication Disorders (DISCO Signposting set) that have potential for signposting the diagnosis of autism according to both the new DSM-5 criteria for ASD and ICD-10 criteria for Childhood Autism. An algorithm threshold for the Signposting set was calculated in Sample 1 (n = 67), tested in an independent validation sample (Sample 2; n = 78), and applied across age and ability sub-groups in Sample 3 (n = 190). The algorithm had excellent predictive validity according to best estimate clinical diagnosis (Samples 1 and 2) and excellent agreement with established algorithms for both DSM-5 and ICD-10 (all samples). The signposting set has potential to inform our understanding of the profile of ASD in relation to other neurodevelopmental disorders and to form the basis of a Signposting Interview for use in clinical practice.
Resumo:
Social media influence analysis, sometimes also called authority detection, aims to rank users based on their influence scores in social media. Existing approaches of social influence analysis usually focus on how to develop effective algorithms to quantize users’ influence scores. They rarely consider a person’s expertise levels which are arguably important to influence measures. In this paper, we propose a computational approach to measuring the correlation between expertise and social media influence, and we take a new perspective to understand social media influence by incorporating expertise into influence analysis. We carefully constructed a large dataset of 13,684 Chinese celebrities from Sina Weibo (literally ”Sina microblogging”). We found that there is a strong correlation between expertise levels and social media influence scores. Our analysis gave a good explanation of the phenomenon of “top across-domain influencers”. In addition, different expertise levels showed influence variation patterns: e.g., (1) high-expertise celebrities have stronger influence on the “audience” in their expertise domains; (2) expertise seems to be more important than relevance and participation for social media influence; (3) the audiences of top expertise celebrities are more likely to forward tweets on topics outside the expertise domains from high-expertise celebrities.
Resumo:
Purpose – Traditionally, most studies focus on institutionalized management-driven actors to understand technology management innovation. The purpose of this paper is to argue that there is a need for research to study the nature and role of dissident non-institutionalized actors’ (i.e. outsourced web designers and rapid application software developers). The authors propose that through online social knowledge sharing, non-institutionalized actors’ solution-finding tensions enable technology management innovation. Design/methodology/approach – A synthesis of the literature and an analysis of the data (21 interviews) provided insights in three areas of solution-finding tensions enabling management innovation. The authors frame the analysis on the peripherally deviant work and the nature of the ways that dissident non-institutionalized actors deviate from their clients (understood as the firm) original contracted objectives. Findings – The findings provide insights into the productive role of solution-finding tensions in enabling opportunities for management service innovation. Furthermore, deviant practices that leverage non-institutionalized actors’ online social knowledge to fulfill customers’ requirements are not interpreted negatively, but as a positive willingness to proactively explore alternative paths. Research limitations/implications – The findings demonstrate the importance of dissident non-institutionalized actors in technology management innovation. However, this work is based on a single country (USA) and additional research is needed to validate and generalize the findings in other cultural and institutional settings. Originality/value – This paper provides new insights into the perceptions of dissident non-institutionalized actors in the practice of IT managerial decision making. The work departs from, but also extends, the previous literature, demonstrating that peripherally deviant work in solution-finding practice creates tensions, enabling management innovation between IT providers and users.
Resumo:
The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.
Resumo:
In recent years, claims about children's developing brains have become central to the formation of child health and welfare policies in England. While these policies assert that they are based on neuro-scientific discoveries, their relationship to neuroscience itself has been debated. However what is clear is that they portray a particular understanding of children and childhood, one that is marked by a lack of acknowledgment of child personhood. Using an analysis of key government-commissioned reports and additional advocacy documents, this chapter illustrates the ways that the mind of the child is reduced to the brain, and this brain comes to represent the child. It is argued that a highly reductionist and limiting construction of the child is produced, alongside the idea that parenting is the main factor in child development. It is concluded that this focus on children's brains, with its accompanying deterministic perspective on parenting, overlooks children's embodied lives and this has implications for the design of children's health and welfare services.