3 resultados para Australian family businesses

em Aston University Research Archive


Relevância:

90.00% 90.00%

Publicador:

Resumo:

As the existing team literature mostly excludes context and culture, little is known about how these elements affect real-life team working (Engestrom, 2008; Salas & Wildman, 2009), and how teams work in non-Western settings, such as in Chinese firms (Phan, Zhou, & Abrahamson, 2010).This research addresses this issue by investigating how new product design (NPD) teams use team working to carry out product innovation in the context of Chinese family businesses (CFBs) via an indigenous psychology perspective. Unlike mainstream teamwork literature which mostly employs an etic design, an indigenous psychology perspective adopts an emic approach which places emphasis on understanding real-life phenomena in context through a cultural-insider perspective (Kim, 2000). Compatible with this theoretical position, a multiple qualitative case study approach was used as the research methodology. Three qualitative case studies were carried out in three longstanding family-run manufacturing firms in Taiwan, where family firms have been the pillars of high economic growth in the past five decades (W.-w. Chu, 2009). Two salient findings were established across the three case studies. First, the team processes identified across the three family firms are very similar with the exception of owners’ involvement and on-the-job training. All three family firms’ NPD teams are managed in a highly hierarchical manner, with considerable emphasis placed on hierarchical ranking, cost-effectiveness, efficiency, practicability, and interpersonal harmony. Second, new products developed by CFBNPD teams are mostly incremental innovation or copycat innovation, while radical or original products are rare. In many ways, CFBNPD teams may not be the ideal incubators for innovation. This is because several aspects of their unique context can cast constraints on how they work and innovate, and thus limit the ratio of radical innovation. A multi-level review into the facilitators and inhibitors of creativity or innovation in CFBNPD teams is provided. The theoretical and practical implications of the findings and the limitations of the study are also addressed.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mid-Sized Businesses (MSBs) are defined by the Department for Business, Innovation and Skills (BIS) as having a sales turnover of between £25 million and £500 million. A key gap in family firm/business research and literature to date is, understanding the role and importance of non-financial objectives (such as family harmony, tradition and business longevity), and the role the family plays in creating a wide set of business performance objectives (both financial and non-financial) in these businesses. This dissertation contributes to filling this knowledge gap by drawing on Family Systems Theory applied in a business context, and within an overarching Resource Based View (RBV) of the firm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.