Effectuation theory invests agency -intention and purposeful enactment -for new venture creation in the entrepreneurial actor(s). Based on the results of a 15-month in-depth longitudinal case study of Amsterdam-based social enterprise Fairphone, we argue that effectual entrepreneurial agency is co-constituted by distributed agency, the proactive conferral of material resources and legitimacy to an eventual entrepreneur by heterogeneous actors external to the new venture. We show how in the context of social movement activism, an effectual network pre-committed resources to an inchoate social enterprise to produce a material artefact because it embodied the moral values of network members. We develop a model of social enterprise emergence based on these findings. We theorize the role of material artefacts in effectuation theory and suggest that, in the case, the artefact served as a boundary object, present in multiple social words and triggering commitment from actors not governed by hierarchical arrangements.
The formation of a hybrid organizational identity is a significant challenge for many social enterprises. Drawing on in-depth longitudinal data from the first three years of a successful social enterprise -Fairphone, founded in Amsterdam -we induce an empirically grounded theoretical model of how a hybrid organizational identity is formed. We identify a general process of organizational identity formation, with founders, leaders and members experimenting with different organizational characters describing 'who they are' as well as with alternative social impact strategies defining 'what they do'. As part of this experimental process, we elaborate the role of a key leadership process -'rekeying', which involves leaders re-figuring prior understandings into more dual readings -which we found facilitates ongoing adaptation and helps members of the organization to become progressively better able at combining multiple objectives and values as part of a shared hybrid identity. Our theoretical model of hybrid organizational identity formation has a number of direct implications for ongoing research on organizational identity formation and hybrid organizations.
Digital technologies pervade modern life. As a result, organizational ethnographers must contend with informants interacting in face-to-face and digitally mediated encounters (e.g., through email, Facebook Messenger, and Skype). This overlap of informants’ digital and physical interactions challenges ethnographers’ ability to demonstrate authenticity and multivocality in their accounts of contemporary organizing. Drawing on recent theorizing about the nature of digital artifacts and two cases of ethnographic fieldwork, we argue that digital artifacts afford ethnographers different modes of being co-present with research participants: digital as archive and digital as process. We offer guidelines to researchers on how to deploy these modes of co-presence in order to improve authenticity and multivocality in ethnographic studies of modern organizations. We also explore the implications for methodological concerns such as ethics, analytical choice, and reflexivity.
Thriving at work has been linked to a wide range of positive individual and organizational outcomes. However, research to date has primarily focused on its individual and work-related antecedents, overlooking family-related issues that constitute an essential part of social interactions. To advance our understanding of socio-relational sources of employee thriving at work, we investigate the differential effects of family incivility and family support on thriving at work. Integrating the work-home resources (W-HR) model with boundary theory, we develop and test a research model where family incivility and family support influence thriving at work via family-work conflict (FWC) and family-work enrichment (FWE), respectively. We further propose that employee segmentation boundary management preference moderates these mediating processes. Results from two survey data collected from employees working in Nigeria and the United Kingdom provide support for our hypothesized relationships. The findings contribute to a richer understanding of how and when thriving at work is influenced by social relationships in family life. We discuss implications for theory and practice, limitations, and avenues for future research.
Leakage through new or existing wellbores is considered a major risk for carbon dioxide (CO 2 ) geological storage. Long-term effective containment of CO 2 is required, and the presence of millions of suspended or abandoned wells exacerbates the potential risk in mature hydrocarbon provinces. Accurate estimates of risk profiles can support the acceptance of geological storage and the adoption of economically effective risk-prevention and -mitigation measures.Reliable data about long-term containment of CO 2 are almost nonexistent, so wells that exhibit a similar risk profile (such as gas storage, gas production, and steam injection) should be used as a proxy to assess failure rates and consequences for cemented wellbores.Statistical data about occurrence of leaks and their consequences are analyzed to determine the risk profile of CO 2 leaks. A smaller sample of data about leak rates is also analyzed to provide their statistical distribution. Rates and consequences are then compared to try to assess the order of magnitude of major and catastrophic leaks.Hydrothermal CO 2 leaks in natural analogs are also reviewed to compare the distribution of leak rates and the consequences upon health, safety, and environment of CO 2 releases to soil and atmosphere.Analysis of existing data will show that major leaks are likely to occur in less than two wells per 1,000, with the overwhelming majority of CO 2 leaks being small and with limited or negligible consequences.Given their risk profile, CO 2 wellbore leaks should be addressed through a routine risk-management approach. Their frequent occurrence requires effective prevention measures, such as understanding leaks and adapting and deploying practices to minimize their occurrence. On the other hand, their low impact ensures maximum effectiveness of mitigation measures, such as monitoring. Because leaks can be detected long before damage ensues, they can be observed to predict their long-term consequences and to plan the most effective intervention without unnecessary immediate operation shutdowns.In conclusion, the recommended course of action is to focus on risk prevention and early detection. This implies the evolution from a "no-leaks" attitude (even for negligible leak consequences) to one that seeks no damage and relies on tight surveillance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.