Simplifying Causal Complexity: How Interactions Between Modes of Causal Induction and Information Availability Lead to Heuristic-Driven Reasoning

2014 ◽  
Vol 8 (3) ◽  
pp. 97-114 ◽  
Author(s):  
Tina A. Grotzer ◽  
M. Shane Tutwiler
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhixiu Wang ◽  
Junying Liu ◽  
Xinya Guan

PurposeAlthough the global construction industry has made great contributions to economic development, industry corruption is a challenge for governments all over the world. This paper aims to investigate the causal complexity of organizational corruption by exploring the configuration effect of multiple induced conditions of corruption in the construction sector.Design/methodology/approachThis study is focused on bribery, a specific form of corrupt behavior through a scenario-based survey role-playing game in which participants encounter bribery. A total of 400 Chinese construction sector participants were randomly recruited to complete this survey.FindingsCompared with studies that have identified a number of factors associated with corruption in the construction sector, this study found asymmetry and complexity in the causality of organizational corruption. That is, when a variable causing corruption changes from one condition to its opposite – for example, from fierce to mild competition – the degree of corruption is not necessarily reduced as one may expect.Practical implicationsAnti-corruption measures should not rely solely on the net effects of discrete conditions and the interactions between multiple factors should not be ignored. In other words, anti-corruption strategies should not be implemented in isolation of their context, and pairing control measures with configurations is critical in controlling corruption. Finally, multiple configuration paths should be reconsidered when considering the degree of corruption reduction.Originality/valueThis study proposes a comprehensive analysis framework for addressing organizational corruption in the construction sector by investigating configuration effects of multiple induced conditions and offers a useful method for addressing corruption.


2016 ◽  
Vol 9 (8) ◽  
pp. 1 ◽  
Author(s):  
Yu-Li Lin ◽  
Hsiu-Wen Liu ◽  
Fengzeng Xu ◽  
Hao Wang

<p>This study addresses the important question of causal complexity as it relates to the influence of social capital, entrepreneurial alertness and the entrepreneurship environment on business performance. Using a relatively new methodological approach, namely fuzzy-set qualitative comparative analysis (fsQCA), this paper aims to investigate alternative complex antecedent conditions (or causal recipes) that lead to high performance. Based on a survey of 194 entrepreneurs in China, this paper shows that business performance is likely to be the result of a combination of causal factors. This study finds that: (1) four different configurations of social capital, entrepreneurial alertness and entrepreneurship environment were “equifinal” causes of high performance, and (2) market openness should fit other environmental conditions to achieve high performance. This study contributes to research on entrepreneurship by applying the ideas of “equifinality” and “fit” to entrepreneurial characteristics and environment theory.</p>


2011 ◽  
Vol 1 (2) ◽  
Author(s):  
Alpana Kakkar ◽  
Ritu Punhani

Information security has been more prominently considered under product approach in which this is considered as a framework of products providing different functionalities or features of information security like information availability, authenticity, non-repudiation, etc. But there is another important view point of information security. This is the Process View of information security in which the information security is considered as a process rather than a product. The process approach provides the benefits of repetitiveness, simplicity, and also statistically measureable and controllable. One can statistically manage the process for its maturity and capability. This white paper talks about understanding the information security as a process and then understanding the concepts of process maturity and capability for Information Security in organizations.


Sign in / Sign up

Export Citation Format

Share Document