Faculty & Research

Research Productive

Show result

Search Query :
Area :
Search Query :
743 items in total found

Journal Articles | 2018

Food waste due to retail power in suppy chains: Evidence from Sweden

Ranjan Ghosh and Mattias Eriksson

Global Food Security

Trading practices such as the take-back agreement (TBA) can become a tool for retailers to exert coercive power over suppliers when market concentration is high. We explore the implications of TBAs for the Swedish bread industry using unique company data from a premium bread supplier and find that powerful buyers over-order and, thereby, waste. This supplier faced 30% returns on total volume produced in the period 2011–2015 and had to bear the entire cost of bread rejections, collection and disposal. It received payment only for bread sold to end-customers, not the quantity supplied. To our knowledge, this is first time there is substantial evidence of the negative consequences such trading practices lead to with respect to waste. The EU has been considering banning the practices of ‘forcing the supplier to pay for wasted product’ and ‘a buyer returning unsold food products to the supplier’. However, such behaviour is very difficult to prove, given that suppliers-buyers are either tied up with bilateral confidential contracts or operate under relational norms. Yet, TBAs are common in certain food supply chains, presenting a global challenge for prevention of food waste and requiring deeper policy engagement.

Read More

Journal Articles | 2018

Exploring linkages between industrial innovation and public policy: Challenges and opportunities

Rakesh Basant

Vikalpa: The Journal for Decision Makers

It is widely understood now that innovation is critical for development and growth of an economy. World over, governments have worked with a variety of policies to encourage innovative activity. Significant research has gone into the analysis of the complex linkages between public policy and innovation. While this research has generated a lot of interesting insights, it has also identified several gaps in our understanding of these linkages. This article is an attempt to pool together some of the ideas that academic research has highlighted on the linkages between innovation and public policy and identify the current challenges as well as opportunities for meaningfully exploring these linkages further. While it draws a lot on existing studies, the article does not provide a comprehensive or rigorous review of the literature on this subject. It is, at best, a tentative attempt to provide a broad perspective on where we stand vis-à-vis our understanding on the relationship between innovation and public policy. And admittedly, it is one of the many perspectives that a researcher can potentially have on this complex relationship.

Read More

Journal Articles | 2018

Proactive vs. reactive order-fulfillment resource allocation for sea-based logistics

Seyed Shahab Mofidi, Jennifer A. Pazour, and Debjit Roy

Transportation Research Part E: Logistics and Transportation Review

We study proactive and reactive sea-based order-fulfillment decisions for a set of SKUs. In such systems, a proactive strategy may be more costly than a reactive strategy and variable marginal costs change with respect to an activity profile. We derive the optimal sets of SKUs and their quantities to handle prior (proactive strategy) or after (reactive strategy) demand materializes. Counterintuitive results show the proactive set may not necessarily include the high-demanded SKUs. This work extends the newsvendor model by analyzing negative marginal shortage costs. The model is illustrated with historical data from a sea-based logistics military application.

Read More

Journal Articles | 2018

Stitching infrastructures to facilitate telemedicine for low-resource environments

Rajesh Chandwani and Neha Kumar

Proceedings of the CHI Conference on Human Factors in Computing Systems

Telemedicine can potentially transform healthcare delivery in low-resource environments by enabling extension of medical knowledge to remote locations, thus enhancing the efficiency and effectiveness of the larger healthcare infrastructure. However, empirical studies have shown mixed results at best. We present a qualitative investigation of a long-standing telemedicine program operating from Lucknow (Uttar Pradesh, India). Invoking the lenses of human infrastructure and seamful spaces, we highlight the factors that determine the success of this telemedicine program. We identify and describe three important aspects: (1) conceptualizing telemedicine as the connectedness of two nodes rather than doctors and patients alone, (2) identifying the critical 'carrying agent' (local doctors at peripheral nodes) and engaging them in program design and implementation, and (3) ensuring co-creation by engaging patients in the process. Finally, we discuss how our lenses allowed us to recognize the seams made visible through the juxtaposition of the infrastructures at the central and peripheral nodes, and to emphasize the human elements that addressed these seams for ensuring the facilitation of a successful telemedicine program.

Read More

Journal Articles | 2018

Networks of information exchange: Are link formation decisions strategic?

Pritha Dev

Economic Letters

This paper presents an empirical investigation into whether the decision to form a link with a node takes into account how well connected that node is. Given data in the form of a random sample from a network, this paper proposes a novel way to measure the degree of a node to adjust for mismeasurement and also controls for the endogeneity of this variable. It is shown that in fact the probability of forming a link with a node is increasing in the links received by that node but decreasing or unaffected by the links made by that node.

Read More

Journal Articles | 2018

Group identity in a network formation game with cost sharing

Pritha Dev

Journal of Public Economic Theory

This paper introduces the choice of group identity, which is comprised of characteristics and commitments to these characteristics, in a network formation model where links costs are shared. Players want to link to the largest group given that linking costs for players of the same (different) characteristic are decreasing (increasing) in their commitments. The equilibrium concepts used are Nash equilibrium as well as one that looks for stability allowing for bilateral negotiations. Conditions are shown under which the endogenous choice of characteristics and commitments allow for multiple groups with segregated or connected networks. When group identity is partly endogenous, such that characteristics are fixed and players only choose commitment, it is shown that the equilibrium population commitment profile dictates whether the resulting network is segregated or connected. When group identity is fully endogenous, it is shown that multiple groups and segregated networks are possible equilibrium outcomes but such outcomes are not stable unless the group size additionally affects the costs of link formation.

Read More

Journal Articles | 2018

Power, subjectivity and context in workplace bullying, emotional abuse and harassment: insights from postpositivism

Premilla D’Cruz, Ernesto Noronha, and Pamela Lutgen-Sandvik

Qualitative Research in Organizations and Management: An International Journal

Workplace bullying encompasses subtle and/or obvious negative behaviours embodying aggression, hostility, intimidation and harm. Generally characterized by persistence, these unwelcome acts are displayed by an individual and/or group to another individual and/or group at work, privately and/or publicly, in real and/or virtual forms (D’Cruz, 2015). Alternatively known as workplace emotional abuse or workplace harassment (and referred to as such henceforth), workplace bullying falls under the rubric of dysfunctional and counterproductive workplace behaviours (Fox and Spector, 2005) and is captured by metaphors of nightmares, demons, slaves and heart-brokenness (Tracy et al., 2006) which underscore its unbelievable, demoralizing, humiliating and damaging nature (Lutgen-Sandvik, 2005). It is not surprising, then, that workplace bullying is described as unethical behaviour which goes against universal social rules of acceptability (Ramsay et al., 2011).

Read More

Journal Articles | 2018

Target experiences of workplace bullying on online labour markets: Uncovering the nuances of resilience

Premilla D’Cruz and Ernesto Noronha

Employee Relations

Purpose

The purpose of this paper is to report a study of bullying on online labour markets (OLMs), highlighting how abuse unfolds in digital workplaces and depicting the trajectory of target resilience.

Design/methodology/approach

Adopting van Manen’s hermeneutic phenomenology, targets’ lived experiences of bullying on OLMs was explored. Data gathered from Indian freelancers located on Upwork via conversational telephonic interviews were subjected to sententious and selective thematic analyses.

Findings

The core theme of “pursuing long-term and holistic well-being” showed how targets tapped into yet augmented their resilience while navigating the features of OLMs as they coped with their experiences of bullying. The interface between targets’ internal and external resources, including platform support, vis-à-vis the concreteness and permanence of the site as targets asserted agency, sought control and realized positive outcomes while preserving their reputation, relationality, success and continuity was captured. It may be noted that bullying in digital workplaces is exclusively virtual in form.

Research limitations/implications

Alongside theoretical generalizability, statistical generalizability of the findings should be established.

Practical implications

Recommendations for action for platforms and targets are forwarded. In particular, the critical role of formal workplace support in influencing employee resilience is emphasized.

Originality/value

The paper makes several pioneering contributions. First, it reports the first empirical inquiry examining bullying in digital workplaces. Moreover, OLM research on abuse and harassment has not been undertaken so far. Second, it furthers theorization of resilience, especially with regard to workplace antecedents. Apart from identifying the new organizational antecedent of formal workplace support, it uncovers the complexities of resilience. Third, it extends knowledge on workplace cyberbullying, positive outcomes of workplace bullying and OLMs in India.

Read More

Journal Articles | 2018

Abuse on online labour markets: targets' coping, power and control

Premilla D’Cruz and Ernesto Noronha

European Journal of Operational Research

Purpose

The purpose of this paper is to report a study of targets’ experiences of cyberbullying on online labour markets (OLMs). In addition to highlighting the link between targets’ coping and power and control, the paper compares conventional and digital workplaces.

Design/methodology/approach

The method of critical hermeneutic phenomenology is used in the inquiry, bringing political and applied dimensions into the study. Targets’ lived experiences, developed as case studies, were explored via conversational interviews. Thematic analysis was undertaken ideographically, followed by ideology-critique at a nomothetic level. Adopting the psychological/behavioural lens of coping theory, ideology-critique identified micro-level schemas and macro-level ideologies that perpetuate target disenfranchisement. Critical hermeneutic phenomenology illuminates the mutuality between individual and social processes, opening new doors to address power inequities through emancipation.

Findings

Hermeneutic phenomenology uncovered the core theme of “pursuing holistic and long-term well-being”, capturing targets’ attempts at working through their experiences of bullying without jeopardising their position on the OLM. Ideology-critique went beyond highlighting problem-focussed and emotion-focussed coping strategies that empowered targets to indicate how participants’ mindsets, anchored in ongoing circumstantial discourses and long-standing social cognitions, inhibited them from questioning the status quo and exploring alternative coping strategies like legislation and collectivisation, thereby curbing their agency. The findings were theorised in terms of power and control vis-à-vis the unique attributes of workplace cyberbullying, comparing and contrasting conventional and virtual workplaces.

Research limitations/implications

The inquiry is limited to the Upwork platform. Including other OLMs will enhance theoretical generalisability.

Practical implications

The study feeds into praxis by alerting digital workers in general and targets in particular about their circumstances, setting the stage for mobilisation.

Originality/value

The study makes several pioneering contributions. First, it reports the first empirical inquiry examining bullying in digital workplaces, importantly, also extending knowledge on cyberbullying across conventional versus digital workplaces. Moreover, OLM research on abuse and harassment has not been undertaken so far. Second, methodologically, the inquiry illustrates the combination of hermeneutic phenomenology with ideology-critique, taking the rare steps of joining ontological perspectives conventionally viewed as divergent and of incorporating a largely neglected micro-level focus into ideology-critique. Third, it furthers theoretical insights into power and control in workplace bullying while drawing links with coping.

Read More

Journal Articles | 2018

Multiple allocation hub interdiction and protection problems: Model formulations and solution approaches

Prasanna Ramamoorthy, Sachin Jayaswal, Ankur Sinha, and Navneet Vidyarthi

European Journal of Operational Research

In this paper, we present computationally efficient formulations for the multiple allocation hub interdiction and hub protection problems, which are bilevel and trilevel mixed integer linear programs, respectively. In the hub interdiction problem, the aim is to identify a subset of r critical hubs from an existing set of p hubs that when interdicted results in the maximum post-interdiction cost of routing flows. We present two alternate ways of reducing the bilevel hub interdiction model to a single level optimization problem. The first approach uses the dual formulation of the lower level problem. The second approach exploits the structure of the lower level problem to replace it by a set of closest assignment constraints (CACs). We present alternate sets of CACs, study their dominance relationships, and report their computational performances. Further, we propose refinements to CACs that offer computational advantages of an order-of-magnitude compared to the one existing in the literature. Further, our proposed modifications offer structural advantages for Benders decomposition, which lead to substantial computational savings, particularly for large problem instances. Finally, we study and solve large scale instances of the trilevel hub protection problem exactly by utilizing the ideas developed for the hub interdiction problem.

Read More
IIMA