Search results for "Authentic"
showing 10 items of 203 documents
Supervisors’ relational transparency moderates effects among employees’ illegitimate tasks and job dissatisfaction: a four-wave panel study
2019
Despite repeated calls for the inclusion of leadership in research on illegitimate tasks, little is known about what supervisors can actually do to mitigate negative effects of illegitimate tasks. ...
How they walk the talk : Responsible management education in Finnish business schools
2022
Responsible management education (RME) has become a common initiative in the educational discourse of business schools worldwide. However, little is known about how (non-)engagement with RME in the past influenced the way RME is organised today. We examine this in one of the pioneering countries of RME, Finland, using extensive qualitative research materials. Our results suggest that RME has been embedded with authenticity-driven change (local context and research) since the 1990s. In the late 2000s after the legal educational reforms implemented in Finland, the prestige-driven change (accreditations) began to shape the embedding of RME. In the 2020s, both the authenticity- and prestige-dri…
Leadership Team Tool for better meaning making
2016
Purpose– The purpose of this paper is to present a Leadership Team Tool for developing reflexivity in the context of leadership teams.Design/methodology/approach– The Leadership Team Tool is based on the theoretical premises of seeing communication as meaning making, and therefore placing discourse and conversation in the center of developing leadership teams.Findings– The paper illustrates how reflexivity can be facilitated through a structured process of using the Leadership Team Tool. An empirical investigation of using the tool in an authentic leadership team setting is warranted to further develop the Leadership Team Tool.Originality/value– The paper makes a practical contribution to s…
Authentic leadership and team climate: testing cross-lagged relationships
2016
Purpose – The purpose of this paper is to examine the relationships between authentic leadership and team climate across 22 months. More specifically, three alternative causation models (normal, reversed, reciprocal) were tested. Design/methodology/approach – The longitudinal study was conducted among 265 Finnish municipal employees (87.5 per cent women, mean age 48.4 years). The participants completed a questionnaire three times: at baseline (T1), about 14 months after baseline (T2) and about eight months after the second questionnaire (T3). Findings – The cross-lagged analyses based on structural equation modelling lent support to the reversed causation model more than the normal causati…
Agritourism, between legislation and marketing: A leading sector for local development the case of the province of Palermo
2018
This work stems from a desire to understand the dynamics of a sector that is of particular interest for the economy and regional development of Sicily. Due to its geographical position, rich history, and natural beauty, Sicily is a year-round attraction for large numbers of tourists from all over the world. In this respect, it is vital to invest in the local area, to try to maintain and increase the potential that the territory itself can offer. With this work, we consider the agritourism sector to specifically assess its potential interest for business people and consumers, both actual and potential. Indeed, if on one side modern tourism was born from a desire to visit faraway places, it i…
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Embedded access points for trusted data and resources access in HPC systems
2010
Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
2020
Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…
An Embedded Biometric Sensor for Ubiquitous Authentication
2013
Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…
Teksta autentiskums lasīšanas pārbaudes darbos
2016
Diplomdarbā ir iztirzāts valsts eksāmena 12. klasēm angļu valodā lasīšanas daļas tekstu autentiskums. Pētījuma mērķis ir izpētīt lasīšanas daļas tekstus un apkopot pierādījumus gan situatīvajam autentiskumam, gan interaktīvajam autentiskumam. Tēmas aktualitāti nosaka tas fakts, ka autentiskums ir viena no svarīgākajām komunikatīvo valodas pārbaudes darbu īpatnībām. Diplomdarbā ir apskatīts autentiskums un tā svarīgums lasīšanas pārbaudes darbos. Tā kā tekstu autentiskums ir cieši saistīts ar uzdevumu autentiskumu un kārtotāju autentiskumu, visiem šiem veidiem tika pievērsta uzmanība sakopojot pierādījumus gan situatīvajam, gan interaktīvajam autentiskumam. Teorētiskās pamatotības pierādījum…