Search results for "Authentic"

showing 10 items of 203 documents

Supervisors’ relational transparency moderates effects among employees’ illegitimate tasks and job dissatisfaction: a four-wave panel study

2019

Despite repeated calls for the inclusion of leadership in research on illegitimate tasks, little is known about what supervisors can actually do to mitigate negative effects of illegitimate tasks. ...

Organizational Behavior and Human Resource ManagementComputingMilieux_THECOMPUTINGPROFESSION05 social sciencesComputerApplications_COMPUTERSINOTHERSYSTEMS050109 social psychologyTransparency (behavior)Authentic leadership0502 economics and business0501 psychology and cognitive sciencesJob satisfactionJob dissatisfactionPsychologyInclusion (education)Social psychology050203 business & managementApplied PsychologyEuropean Journal of Work and Organizational Psychology
researchProduct

How they walk the talk : Responsible management education in Finnish business schools

2022

Responsible management education (RME) has become a common initiative in the educational discourse of business schools worldwide. However, little is known about how (non-)engagement with RME in the past influenced the way RME is organised today. We examine this in one of the pioneering countries of RME, Finland, using extensive qualitative research materials. Our results suggest that RME has been embedded with authenticity-driven change (local context and research) since the 1990s. In the late 2000s after the legal educational reforms implemented in Finland, the prestige-driven change (accreditations) began to shape the embedding of RME. In the 2020s, both the authenticity- and prestige-dri…

Organizational Behavior and Human Resource ManagementEconomics and Econometricsjohtaminenkauppakorkeakoulutvastuullisuusqualitative studyresponsible management educationManagement Monitoring Policy and LawsustainabilityaccreditationPhilosophyauthenticitykoulutusNordic countryakkreditointiBusiness and International Managementkvalitatiivinen tutkimus
researchProduct

Leadership Team Tool for better meaning making

2016

Purpose– The purpose of this paper is to present a Leadership Team Tool for developing reflexivity in the context of leadership teams.Design/methodology/approach– The Leadership Team Tool is based on the theoretical premises of seeing communication as meaning making, and therefore placing discourse and conversation in the center of developing leadership teams.Findings– The paper illustrates how reflexivity can be facilitated through a structured process of using the Leadership Team Tool. An empirical investigation of using the tool in an authentic leadership team setting is warranted to further develop the Leadership Team Tool.Originality/value– The paper makes a practical contribution to s…

Organizational Behavior and Human Resource ManagementLeadership development05 social sciencesNeuroleadershipGeneral Engineering050801 communication & media studiesPsychological safetyShared leadershipManagementAuthentic leadership0508 media and communicationsLeadership studiesTransactional leadership0502 economics and businessBusiness Management and Accounting (miscellaneous)Leadership styleEngineering ethicsSociology050203 business & managementJournal of Management Development
researchProduct

Authentic leadership and team climate: testing cross-lagged relationships

2016

Purpose – The purpose of this paper is to examine the relationships between authentic leadership and team climate across 22 months. More specifically, three alternative causation models (normal, reversed, reciprocal) were tested. Design/methodology/approach – The longitudinal study was conducted among 265 Finnish municipal employees (87.5 per cent women, mean age 48.4 years). The participants completed a questionnaire three times: at baseline (T1), about 14 months after baseline (T2) and about eight months after the second questionnaire (T3). Findings – The cross-lagged analyses based on structural equation modelling lent support to the reversed causation model more than the normal causati…

Organizational Behavior and Human Resource ManagementLongitudinal studySocial PsychologyTeam climate05 social sciencesManagement Science and Operations Research030210 environmental & occupational healthStructural equation modelingDevelopmental psychologyAuthentic leadership03 medical and health sciences0302 clinical medicineCross lagged0502 economics and businessCausationTask orientationBaseline (configuration management)PsychologySocial psychology050203 business & managementApplied PsychologyJournal of Managerial Psychology
researchProduct

Agritourism, between legislation and marketing: A leading sector for local development the case of the province of Palermo

2018

This work stems from a desire to understand the dynamics of a sector that is of particular interest for the economy and regional development of Sicily. Due to its geographical position, rich history, and natural beauty, Sicily is a year-round attraction for large numbers of tourists from all over the world. In this respect, it is vital to invest in the local area, to try to maintain and increase the potential that the territory itself can offer. With this work, we consider the agritourism sector to specifically assess its potential interest for business people and consumers, both actual and potential. Indeed, if on one side modern tourism was born from a desire to visit faraway places, it i…

Organizational Behavior and Human Resource ManagementPublic AdministrationStrategy and ManagementLocal DevelopmentLegislationGrowth010501 environmental sciencesSupply side01 natural sciencesTourism0502 economics and businessSettore AGR/01 - Economia Ed Estimo RuraleSocio-culturalSettore IUS/01 - Diritto PrivatoMarketingLocal tradiction0105 earth and related environmental sciencesAuthenticbusiness.industry05 social sciencesAgricultureStrategy and Management1409 Tourism Leisure and Hospitality ManagementWork (electrical)AgriculturePosition (finance)Food economyBusiness050203 business & managementTourismNatural beauty
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

2020

Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…

PasswordAuthenticationPassword policyGeneral Computer Scienceinformation securitybusiness.industryComputer scienceInternet privacytietoturvapolitiikka020206 networking & telecommunicationsContext (language use)02 engineering and technologyInformation securityneutralizationsalasanatpasswordsAuthentication (law)Password strengthinformation security policy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingtietoturvabusinesshenkilöstökoulutusLawComputers & Security
researchProduct

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Teksta autentiskums lasīšanas pārbaudes darbos

2016

Diplomdarbā ir iztirzāts valsts eksāmena 12. klasēm angļu valodā lasīšanas daļas tekstu autentiskums. Pētījuma mērķis ir izpētīt lasīšanas daļas tekstus un apkopot pierādījumus gan situatīvajam autentiskumam, gan interaktīvajam autentiskumam. Tēmas aktualitāti nosaka tas fakts, ka autentiskums ir viena no svarīgākajām komunikatīvo valodas pārbaudes darbu īpatnībām. Diplomdarbā ir apskatīts autentiskums un tā svarīgums lasīšanas pārbaudes darbos. Tā kā tekstu autentiskums ir cieši saistīts ar uzdevumu autentiskumu un kārtotāju autentiskumu, visiem šiem veidiem tika pievērsta uzmanība sakopojot pierādījumus gan situatīvajam, gan interaktīvajam autentiskumam. Teorētiskās pamatotības pierādījum…

Pedagoģijareading test of year 12 English examinationsituational authenticityinteractioanal authenticitytext authenticity
researchProduct