Search results

1 – 10 of over 3000
Article
Publication date: 29 December 2023

Hao Chen and Shuangkang Hao

Addressing the significant differences between referral programs and traditional promotional marketing, this paper aims to investigate and examine the impact of how reward-related…

Abstract

Purpose

Addressing the significant differences between referral programs and traditional promotional marketing, this paper aims to investigate and examine the impact of how reward-related information is presented within referral programs and how it interacts with reward size and reward allocation.

Design/methodology/approach

This study adopts framing effect and equity theory to build the relationship between reward presentation, reward size and reward allocation. Then, two scenario-based experimental studies are designed and conducted on Amazon Mechanical Turk.

Findings

The results show that there is no direct impact of reward presentation on referral likelihood, while the effect relies on reward size. As the levels of reward size increase, the referral likelihood gradually shifts from percentage form to dollar form as perceived size mediates the interaction effect on referral likelihood. Further, adding information about reward allocation also indicate the different impacts of equity and inequity on influencing the above findings.

Originality/value

The study contributes to the literature by introducing reward presentation and emphasizes its impact on individual’s behavior decisions in the context of referral programs. This study extends and broadens the scope and effectiveness of the framing effect on traditional promotional marketing strategies, while also bridging the gap in the literature by examining the combined role of information about rewards.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 2 January 2018

Wenju Yan, Hao Chen, Lei Chen and Kai Wang

This paper aims to establish a modified variable coefficient calculation model to analyse the control parameter effect on the iron loss of switched reluctance motor under pulse…

Abstract

Purpose

This paper aims to establish a modified variable coefficient calculation model to analyse the control parameter effect on the iron loss of switched reluctance motor under pulse width modulation (PWM) mode.

Design/methodology/approach

The finite element model is solved to get the flux density by python language. Due to non-sinusoidal flux density feature and the effect of PWM excitation, the Fourier transform is applied in consideration of harmonic components. To improve the accuracy of iron loss computation, the effect of minor loops is considered by using the rain-flow counting method.

Findings

When the speed fluctuates around the set speed and the fluctuations are relatively small, it is useful to reduce the iron loss with smaller duty ratio and turn-on angle or greater duty ratio and smaller turn-off angle. The iron loss is less affected by chopping frequency, while the iron loss increases obviously with higher conduction angles. The iron loss under non-energy-returnable-voltage-chop mode is greater than energy-returnable-voltage-chop mode.

Originality/value

The modified variable coefficient MIEM5 iron loss model is proposed to improve the accuracy of iron loss calculation. Then the control parameters such as duty ratio, chopping frequency, turn on angle and turn off angle are analysed under PWM mode.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 37 no. 1
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 4 December 2018

Wenju Yan, Hao Chen, Tong Xu and Kai Wang

An improved simulation model of switched reluctance motor (SRM) for steady-state operation that considers the core losses in the stator and rotor is established to obtain the…

Abstract

Purpose

An improved simulation model of switched reluctance motor (SRM) for steady-state operation that considers the core losses in the stator and rotor is established to obtain the steady performance of the high-speed SRM during the design, analysis and control of SRM driving system more accurately.

Design/methodology/approach

The transient core loss model for the material and SRM is presented. Then a new method for calculating the flux density of the motor in real time is introduced, and a steady-state simulation model of the SRM including real-time transient core losses calculation model is established according to the transient flux density. Because the transient core losses calculated by above method are the total core losses of the motor, a core losses distribution method is proposed and the steady-state simulation model of the SRM including the distributed core losses’ effect on the phase winding is established.

Findings

The comparison results show that the proposed model has higher accuracy than the traditional model, excluding core losses, especially at the moments when phase voltage is turn-on and turn-off. The proportion of the core losses to the motor losses increases with the increase in speed. So, the core losses’ effect on the steady-state performance of the high-speed SRM cannot be ignored.

Originality/value

The method to obtain flux density in the real time is presented and the improved steady-state simulation model of SRM that considering transient core losses is proposed.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 38 no. 1
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 30 April 2024

Hao Chen, Jiaying Bao, Jiajia Wang and Liang Wang

Based on the moral licensing theory, this study aims to reveal the mechanism of self-sacrificial leadership inducing abusive supervision from two paths of leader moral credit and…

Abstract

Purpose

Based on the moral licensing theory, this study aims to reveal the mechanism of self-sacrificial leadership inducing abusive supervision from two paths of leader moral credit and leader moral credential. At the same time, it also discusses the moderating effect of leader behavioral integrity on the two paths.

Design/methodology/approach

In this study, 434 employees and their direct leaders from six Chinese companies were investigated in a paired survey at three time points, and the empirical data was analyzed using Mplus 7.4 software.

Findings

Self-sacrificial leadership has a positive effect on leader abusive supervision through the mediating role of leader moral credit and leader moral credential. In addition, this study also finds that leader behavioral integrity is the “gate” for self-sacrificial leadership to promote abusive supervision, and the leader behavioral integrity has a moderating effect on the process of self-sacrificial leadership influencing on leader moral credit and leader moral credential.

Originality/value

This study explores the evolution of self-sacrificial leadership from “good” to “bad” from the perspective of moral licensing and broadens the research on the mechanism and boundary conditions of self-sacrificial leadership. At the same time, it also provides important reference value for preventing the negative effects of self-sacrificial leadership in organizations.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 23 January 2024

Hao Chen and Yuge Hai

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…

Abstract

Purpose

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for critical influencing factors to discuss the combined influence mechanism of multiple factors on ISM performance (ISMP). This study aims to explore the critical success factors and understand how these factors contribute to ISMP.

Design/methodology/approach

This study used a mixed-method approach to achieve this study’s research goals. In Study 1, the authors conducted a qualitative analysis to take a series of International Organization for Standardization/International Electrotechnical Commission standard documents as the basis to refine the critical factors that may influence organizations’ ISMP. In Study 2, the authors built a research model based on the organizational control perspective and used the survey-based partial least squares-based structural equation modeling (PLS-SEM) approach to understand the relationships between these factors in promoting ISMP. In Study 3, the authors used the fuzzy set qualitative comparative analysis (fsQCA) method to empirically analyze the complex mechanisms of how the combinations of the factors affect ISMP.

Findings

The following three research findings are obtained. First, based on the text-based qualitative analysis, the authors refined the critical success factors that may increase ISMP, including information security policies (ISP), top management support (TMS), alignment (ALI), information security risk assessment (IRA), information security awareness (ISA) and information security culture (ISC). Second, the PLS-SEM testing results confirmed TMS is the antecedent variable motivating organization’s formation (ISP) and information control (ISC) approaches; these two types of organization control approaches increase IRA, ISA and ALI and then promote ISMP directly and indirectly. Third, the fsQCA testing results found two configurations that can achieve high ISMP and one driving path that leads to non-high ISMP.

Originality/value

This study extends knowledge by exploring configuration factors to improve or impede the performances of organizations’ ISM. To the best of the authors’ knowledge, this study is one of the first to explore the use of the fsQCA approach in information security studies, and the results not only revealed causal associations between single factors but also highlighted the critical role of configuration factors in developing organizational ISMP. This study calls attention to information security managers of an organization should highlight the combined effect between the factors and reasonably allocate organizational resources to achieve high ISMP.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 28 February 2023

Yiming Zhan, Hao Chen, Mengyu Hua, Jinfu Liu, Hao He, Patrick Wheeler, Xiaodong Li and Vitor Fernao Pires

The purpose of this paper is to achieve the multi-objective optimization design of novel tubular switched reluctance motor (TSRM).

Abstract

Purpose

The purpose of this paper is to achieve the multi-objective optimization design of novel tubular switched reluctance motor (TSRM).

Design/methodology/approach

First, the structure and initial dimensions of TSRM are obtained based on design criteria and requirements. Second, the sensitivity analysis rules, process and results of TSRM are performed. Third, three optimization objectives are determined by the average electromagnetic force, smoothing coefficient and copper loss ratio. The analytic hierarchy process-entropy method-a technique for order preference by similarity to an ideal solution-grey relation analysis comprehensive evaluation algorithm is used to optimize TSRM. Finally, a prototype is manufactured, a hardware platform is built and static and dynamic experimental validations are carried out.

Findings

The sensitivity analysis reveals that parameters significantly impact the performance of TSRM. The results of multi-objective optimization show that the average electromagnetic force and smoothing coefficient after optimization are better than before, and the copper loss ratio reduces slightly. The experimental and simulated results of TSRM are consistent, which verifies the accuracy of TSRM.

Research limitations/implications

In this paper, only three optimization objectives are selected in the multi-objective optimization process. To improve the performance of TSRM, the heating characteristics, such as iron loss, can be considered as the optimization objective for a more comprehensive analysis of TSRM performance.

Originality/value

A novel motor structure is designed, combining the advantages of the TSRM and the linear motor. The established sensitivity analysis rules are scientific and suitable for the effects of various parameters on motor performance. The proposed multi-objective optimization algorithm is a comprehensive evaluation algorithm. It considers subjective weight and objective weight and fully uses the original data and the relational degree between the optimization objectives.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 42 no. 6
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 6 June 2020

Hao Chen, Ying Li, Lirong Chen and Jin Yin

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide…

1686

Abstract

Purpose

While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict.

Design/methodology/approach

Using survey data from 235 employees of Chinese enterprises and applying partial least squares based structural equation modeling (PLS-SEM), we test a series of hypotheses.

Findings

The results suggest that information security–related conflict elicits information security fatigue among employees. As their information security fatigue increases, employees become less likely to adopt BYOD practices. In addition, information security–related conflict has an indirect effect on employee's BYOD adoption through the full mediation of information security fatigue.

Practical implications

This study provides practical implications to adopt BYOD in the workplace through conflict management measures and emotion management strategies. Conflict management measures focused on the reducing of four facets of information security–related conflict, such as improve organization's privacy policies and help employees to build security habits. Emotion management strategies highlighted the solutions to reduce fatigue through easing conflict, such as involving employees in the development or update of information security policies to voice their demands of privacy and other rights.

Originality/value

Our study extends knowledge by focusing on the barriers to employees' BYOD adoption when considering information security in the workplace. Specifically, this study takes a conflict perspective and builds a multi-faceted construct of information security–related conflict. Our study also extends information security behavior research by revealing an emotion-based mediation effect, that of information security fatigue, to explore the mechanism underlying the influence of information security–related conflict on employee behavior.

Details

Journal of Enterprise Information Management, vol. 34 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 28 December 2023

Hao Chen, Jiajia Wang, Jiaying Bao, Zihan Zhang and Jingya Li

Based on the Cognitive Appraisal Theory of Stress, this study aims to reveal the mechanism of peer abusive supervision on bystander proactive behavior through two different paths…

Abstract

Purpose

Based on the Cognitive Appraisal Theory of Stress, this study aims to reveal the mechanism of peer abusive supervision on bystander proactive behavior through two different paths: bystander assertive impression management motivation and bystander defensive impression management motivation. Besides, the moderating effects of bystander uncertainty tolerance on the two paths are also explored.

Design/methodology/approach

In this study, 438 employees and their direct leaders from eight Chinese companies were surveyed in a paired survey at three time points, and the empirical data was analyzed using Mplus 7.4 software.

Findings

Peer abusive supervision leads bystanders to develop assertive impression management motivation and, thus, to exhibit more proactive behaviors. At the same time, peer abusive supervision also causes bystanders to develop defensive impression management motivation, which reduces the frequency of performing proactive behaviors. In addition, this study finds that bystander uncertainty tolerance plays a moderating role in influencing bystander assertive impression management motivation and bystander defensive impression management motivation in response to peer abusive supervision.

Originality/value

Starting from the bystander perspective, this study verifies the double-edged sword effect of peer abusive supervision on bystander proactive behavior as well as the mechanism of differentiated effects through cognitive appraisal, which broadens the scope of the research on abusive supervision, and deepens the academic understanding and development of the Cognitive Appraisal Theory of Stress. At the same time, it also provides new ideas for organizations to reduce the negative effects of workplace abusive behavior.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 22 January 2024

Hao Chen, Lynda Jiwen Song, Wu Wei and Liang Wang

The purpose of this study is to test the mechanism of visionary leadership on subordinates' work withdrawal behavior through cognitive strain and psychological contract violation…

Abstract

Purpose

The purpose of this study is to test the mechanism of visionary leadership on subordinates' work withdrawal behavior through cognitive strain and psychological contract violation, and also to reveal the possible dark side of visionary leadership. The moderation effects of subordinates' facades of conformity and leader behavioral integrity in the cognition–affect dual-path process are also discussed.

Design/methodology/approach

This study conducted a three-wave longitudinal survey. The data were collected from 574 employees and their superiors in several Chinese enterprises. The authors used Mplus 7.4 and adopted a bootstrapping technique in the data analysis.

Findings

Visionary leadership has positive effects on cognitive strain and psychological contract violation; cognitive strain and psychological contract violation mediate the relationship between visionary leadership and work withdrawal behavior, respectively. Subordinates' facades of conformity and leader behavioral integrity moderate the positive effects of visionary leadership on cognitive strain and psychological contract violation, as well as the indirect effect of visionary leadership on subordinates' work withdrawal behavior through cognitive strain and psychological contract violation.

Originality/value

This study reveals the underlying mechanism of visionary leadership's negative impact on job outcome through the cognition and affective reaction of subordinates to visionary leadership, and broadens the scope of visionary leadership research. It also provides some practical suggestions on how to transmit the organizational vision effectively and reduce subordinates' work withdrawal behavior.

Article
Publication date: 3 April 2019

Zhaoqiang Wang, Jun Cheng, Hong Ji, Shan Hu and Hao Chen

The purpose of this paper is to study the effects of single parameters for temperature characteristics of oil film in port plate pair and the relationship of calculated results…

Abstract

Purpose

The purpose of this paper is to study the effects of single parameters for temperature characteristics of oil film in port plate pair and the relationship of calculated results and experimental results under different viscosity.

Design/methodology/approach

The paper established the mathematical model of oil film of port plate pair, calculated the energy equation of port plate pair, simulated for the oil film and temperature distribution and selected different kinds of lubricants to analyze the calculated value and the experimental value.

Findings

The results show: temperature rise of port plate pair is reduced with the increase of oil viscosity; temperature rise of port plate pair is decreased with rise of initial oil film thickness; temperature rise of port plate pair is increased with the rise of cylinder body speed, inclination angle and sealing belt width; and through the comparison of calculated value and experimental value, under the same viscosity and cylinder speed, experimental results are bigger.

Originality/value

This paper used the methods that the temperature of port plate pair was calculated numerically, and the results were consistent with experimental results, so it can get high precision.

Details

Industrial Lubrication and Tribology, vol. 71 no. 4
Type: Research Article
ISSN: 0036-8792

Keywords

1 – 10 of over 3000