Search results

1 – 10 of 835
Article
Publication date: 30 March 2023

Zhiyun Zhang, Ziqiong Zhang and Zili Zhang

Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews…

Abstract

Purpose

Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews and focal reviews affect reviewers' preference for anonymity. The purpose of this paper is to investigate why reviewers seek anonymity in terms of prior anonymous reviews and focal reviews.

Design/methodology/approach

Based on restaurant reviews collected from meituan.com, one of the largest group-buying ecommerce platforms in China, this study employed logistic regression to examine how prior anonymous reviews and focal reviews are associated with reviewers' preference for anonymity.

Findings

Results show that the volume and sequence of prior anonymous review are positively associated with the likelihood of reviewers' preference for anonymity, whereas focal review valence is negatively correlated with this preference. Focal review length is positively correlated with reviewers' preference for anonymity but negatively moderates the roles of review valence and prior anonymous reviews on this preference.

Originality/value

This study expands the information disclosure literature by exploring determinants of user identity disclosure from a reviewer perspective. This research also offers a methodological contribution by employing a more accurate measure to calculate reviewers' preference for anonymity, enhancing the empirical results. Lastly, this work supplements the online review literature on how prior anonymous reviews and focal reviews are associated with reviewers' identity disclosure.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 16 April 2024

Berit Greulich, Cornelius J. König and Ramona Mohr

The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due…

Abstract

Purpose

The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due to fear of negative consequences from their supervisors or management. This study aims to better understand the factors that influence this behavior and to develop a scale to measure it.

Design/methodology/approach

The study used an online survey of 200 employees to investigate the factors influencing defensive biasing behavior. The researchers developed a scale for defensive biasing with the help of subject matter experts and derived possible factors from the literature. Participants were presented with a hypothetical scenario in which they imagined a work stress survey in their organization and were asked to answer related items. The data were analyzed using regression analysis.

Findings

The study found that defensive biasing behavior was significantly predicted by perceived anonymity and neuroticism. Participants who felt less anonymous and had higher levels of neuroticism were more likely to engage in defensive biasing. Job insecurity and trust in supervisors were not found to be significant predictors of defensive biasing.

Originality/value

This study contributes to the literature on work stress surveys by developing a scale for defensive biasing and investigating the factors that influence this behavior. The study highlights the importance of making the survey process more transparent to reduce defensive biasing and obtain trustworthy results.

Details

International Journal of Workplace Health Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8351

Keywords

Article
Publication date: 12 March 2024

Bai Liu, Tao Ju, Jiarui Lu and Hing Kai Chan

This research investigates whether focal firms employ strategic supply chain information disclosure, focusing on the concealment of supplier and customer identities, as part of…

Abstract

Purpose

This research investigates whether focal firms employ strategic supply chain information disclosure, focusing on the concealment of supplier and customer identities, as part of their supply chain environmental risk management strategies (supplier sustainability risk and customer loss risk, respectively).

Design/methodology/approach

Using a panel dataset of Chinese listed firms from 2009 to 2019 and utilizing the suppliers’ environmental punishment of peer firms (peer events) as an exogenous shock and employing ordinary least squares (OLS) estimation, this study conducts a regression analysis to test how focal firms disclose the identities of their suppliers and customers.

Findings

Our results indicate that focal firms prefer to hide the identities of their suppliers and customers following the environmental punishment of peer firms’ suppliers. In addition, supplier concentration weakens the effect of withholding supplier identities, whereas customer concentration strengthens the effect of hiding customer identities. Mechanism analysis shows that firms hide supplier identities to avoid their reputation being affected and hide customer identities to prevent the deterioration of customers’ reputations and thus impact their market share.

Originality/value

Our study reveals that reputation spillover is another crucial factor in supply chain transparency. It is also pioneering in applying the anonymity theory to explain focal firms’ information disclosure strategy in supply chains.

Details

International Journal of Operations & Production Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 17 August 2023

Allan Farias Fávaro, Roderval Marcelino and Cristian Cechinel

This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to…

Abstract

Purpose

This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to analyse how the main characteristics of the existing blockchain solutions in this field to detect opportunities for the improvement of future applications.

Design/methodology/approach

A systematic review of the literature on the subject was carried out in three databases recognized by the research community (IEEE Xplore, Scopus and Web of Science) and the Frontiers in Blockchain journal. A total of 1,967 articles were initially found, and after the exclusion process, the 26 remaining articles were classified according to the following dimensions: System Type, Open Access, Review Type, Reviewer Incentive, Token Economy, Blockchain Access, Blockchain Identification, Blockchain Used, Paper Storage, Anonymity and Maturity of the solution.

Findings

Results show that the solutions are normally concerned on offering incentives to the reviewers' work (often monetary). Other common general preferences among the solutions are the adoption of open reviews, the use of Ethereum, the implementation of publishing ecosystems and the use of InterPlanetary File System to the storage of the papers.

Originality/value

There are currently no studies covering the main aspects of blockchain solutions in the field of scientific peer review. The present study provides an overall review of the topic, summarizing important information on the current research and helping new adopters to develop solutions grounded on the existing literature.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 6 October 2023

Caroline S.L. Tan

The purpose of this study is to examine how the constructs of false self, preference for online social interaction (POSI), compulsive internet use (CIU), and online disinhibition…

Abstract

Purpose

The purpose of this study is to examine how the constructs of false self, preference for online social interaction (POSI), compulsive internet use (CIU), and online disinhibition affect social withdrawal in a social media context. The mediating effects of moral disengagement and cyber aggression are also tested.

Design/methodology/approach

Data were collected using an online survey (n = 533) from consumers in Japan. This study used structural equation modeling and PROCESS to examine the proposed relationships.

Findings

The study revealed that false self positively affects moral disengagement while online disinhibition positively affects cyber aggression and moral disengagement. Preference for online social interaction and compulsive internet use both positively impacts social withdrawal. Cyber aggression and moral disengagement were established mediators between false self/ Preference for online social interaction/ compulsive internet use/ online disinhibition and social withdrawal.

Research limitations/implications

Although restricted to cyberaggression, owing to the reciprocal relationship between cyber victimization and cyberaggression, cyber victimization can be included for further study. This study expands the understanding of social withdrawal within the context of social media.

Practical implications

Based on the findings, policies and programs that address mental health that build self-esteem, self-confidence and reduce anxiety ought to be undertaken. Managing and formulating guidelines on anonymity should also be taken into consideration.

Originality/value

This research demonstrates the crucial constructs that affect social media users negatively from the aspects of cyberaggression, moral disengagement and social withdrawal. It also establishes the importance of mental health in reducing adverse effects from social media.

Article
Publication date: 12 April 2024

Leonidas A. Zampetakis

To propose the use of indirect survey protocols, in general and the item count technique (ICT), in particular, that ensure participant anonymity in organizations to explore the…

Abstract

Purpose

To propose the use of indirect survey protocols, in general and the item count technique (ICT), in particular, that ensure participant anonymity in organizations to explore the effect of employee perceived abusive supervision on job performance.

Design/methodology/approach

We apply ICT to a sample of 363 employees (52.6% female) from Greek organizations. Utilizing multivariate statistical techniques, we investigated how employees assess the impact of their personal encounters with abusive supervision on job performance. This approach allowed us to explore the percentage of employees perceiving negative effects on job performance, distinguishing our study from previous studies that primarily focus on quantifying the extent or magnitude of abusive supervision in organizational settings. Also, we investigated how employee socio-demographic characteristics, human capital characteristics and affective traits relate to the evaluation of experienced abusive supervision as a negative factor for their job performance.

Findings

We found that approximately 62% of the respondents evaluated personal experience of abusive supervision as negatively affecting their job performance. We also found that the likelihood of employees evaluating personal experience of abusive supervision as having a negative impact on their job performance is: (1) higher for female employees, (2) does not depend on employee age, job tenure and education; (3) is lower for employees with managerial roles and (4) increases with employee trait negative affectivity.

Originality/value

The study is a response to the call for researchers to use innovative methods for advancing abusive supervision research. The study highlights the significance of taking a proactive stance towards addressing abusive supervision in the workplace, by using indirect survey methods that ensures employee anonymity. The results have implications for organizational strategies aimed at increasing awareness of abusive supervision and its impact on employee performance.

Details

International Journal of Manpower, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 5 September 2023

Doga Istanbulluoglu and Lloyd C. Harris

Falsified online reviews (FORs) are the published/viewable consumer-generated online content regarding a firm (or its representatives) or its services and goods that is, to some…

Abstract

Purpose

Falsified online reviews (FORs) are the published/viewable consumer-generated online content regarding a firm (or its representatives) or its services and goods that is, to some degree, untruthful or falsified. The purpose of this study is first to explore the nature of FORs, focusing on reviewers' interpretations and refections on falsity, intent, anonymity and the target of their FOR. Secondly, the authors examine the valence and veracity dimensions of FORs and introduce a typology to differentiate their variations.

Design/methodology/approach

using an exploratory research design, 48 interviews were conducted with participants who post online reviews on social media about their experiences with food and beverage serving outlets.

Findings

The results show four common forms of FORs on social media. These are reviews focused on equity equalizing, friendly flattery, opinionated opportunism and malicious profiteering.

Research limitations/implications

The authors provide exploratory and in-depth information via interviews, but do not analyse the content of FORs.

Practical implications

Firms should be aware of varieties of FORs and that these may not be limited to malicious content. This is important in terms of showing that in dealing with FORs, a one-size-fits-all approach will not work. FORs are not always entirely fabricated, and instead various levels of falseness are observed, ranging from slight alterations to complete fabrications.

Originality/value

Previous research explored how to identify and differentiate FORs from truthful ones, focusing on the reviews or how they are perceived by readers. However, comparatively little is known of the reviewers of FORs. Hence, this study focuses on reviewers and offers new insights into the nature of FORs by identifying and examining the main forms of FORs on social media.

Details

European Journal of Marketing, vol. 58 no. 2
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 14 March 2023

Apoorva Goel, Nabila Khan and Lata Dyaram

This study examines the yin (promotive) and yang (prohibitive) of employee voice based on employee preference for voice channel attributes. Employee inputs may be disregarded…

Abstract

Purpose

This study examines the yin (promotive) and yang (prohibitive) of employee voice based on employee preference for voice channel attributes. Employee inputs may be disregarded, requiring employees to maneuver for unheeded voice and adopt alternate voice tactics. The authors emphasize the ubiquity of lurking employee silence and its affective effects on subsequent cycles of voice or silence.

Design/methodology/approach

Qualitative design involving semi-structured interviews of employees from service sector firms in India assisted the inquiry.

Findings

Employees prefer voice channel attributes that ensure visibility and data substance for promotive voice and anonymity and confidentiality for prohibitive voice. Voice target switching and message reframing were common employee strategies. Silence on both sharing views/opinions (promotive) and voicing issues/concerns (prohibitive) weakens employee future voice incidents, besides suppressing the affect. Post-silence cognitive reappraisal increases voice incidences.

Research limitations/implications

Findings may have limited generalizability given the qualitative design of the study. Moving beyond extant episodic voice research, the authors demonstrate the recurrent nature of employee voice and silence. The study broadens perspectives on how varied voice types necessitate nuanced voice channel attributes.

Originality/value

Present work brings together organizational behavior (OB) perspective on discretionary voice through human resource (HR)-based channels, helping bridge the gap between previously disparate stands.

Details

Personnel Review, vol. 53 no. 2
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 21 March 2024

Milind Tiwari, Cayle Lupton, Ausma Bernot and Khaled Halteh

This paper aims to investigate technological innovations within the crypto space that have engendered novel financial crime risks and their potential utilization amidst…

Abstract

Purpose

This paper aims to investigate technological innovations within the crypto space that have engendered novel financial crime risks and their potential utilization amidst geopolitical conflicts.

Design/methodology/approach

The theoretical paper uses an analysis of recent geopolitical events, with a key focus on using cryptocurrencies to undertake illicit activities.

Findings

The study found that cryptocurrencies and the innovations made within the crypto domain are used for both legitimate and illicit purposes, including money laundering, terrorism financing and sanction evasion.

Originality/value

This research contributes to understanding the critical role cryptocurrencies play amidst geopolitical conflicts and emphasizes the need for regulatory considerations to prevent their misuse. To the best of the authors’ knowledge, this paper is the first scholarly contribution that considers the evolving mechanisms afforded by cryptocurrencies amidst geopolitical conflicts in undertaking illicit activities.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

1 – 10 of 835