Search results
1 – 10 of 835Zhiyun Zhang, Ziqiong Zhang and Zili Zhang
Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews…
Abstract
Purpose
Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews and focal reviews affect reviewers' preference for anonymity. The purpose of this paper is to investigate why reviewers seek anonymity in terms of prior anonymous reviews and focal reviews.
Design/methodology/approach
Based on restaurant reviews collected from meituan.com, one of the largest group-buying ecommerce platforms in China, this study employed logistic regression to examine how prior anonymous reviews and focal reviews are associated with reviewers' preference for anonymity.
Findings
Results show that the volume and sequence of prior anonymous review are positively associated with the likelihood of reviewers' preference for anonymity, whereas focal review valence is negatively correlated with this preference. Focal review length is positively correlated with reviewers' preference for anonymity but negatively moderates the roles of review valence and prior anonymous reviews on this preference.
Originality/value
This study expands the information disclosure literature by exploring determinants of user identity disclosure from a reviewer perspective. This research also offers a methodological contribution by employing a more accurate measure to calculate reviewers' preference for anonymity, enhancing the empirical results. Lastly, this work supplements the online review literature on how prior anonymous reviews and focal reviews are associated with reviewers' identity disclosure.
Details
Keywords
Berit Greulich, Cornelius J. König and Ramona Mohr
The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due…
Abstract
Purpose
The purpose of this study is to investigate the phenomenon of defensive biasing in work stress surveys, which occurs when employees trivialize potential stressors and strains due to fear of negative consequences from their supervisors or management. This study aims to better understand the factors that influence this behavior and to develop a scale to measure it.
Design/methodology/approach
The study used an online survey of 200 employees to investigate the factors influencing defensive biasing behavior. The researchers developed a scale for defensive biasing with the help of subject matter experts and derived possible factors from the literature. Participants were presented with a hypothetical scenario in which they imagined a work stress survey in their organization and were asked to answer related items. The data were analyzed using regression analysis.
Findings
The study found that defensive biasing behavior was significantly predicted by perceived anonymity and neuroticism. Participants who felt less anonymous and had higher levels of neuroticism were more likely to engage in defensive biasing. Job insecurity and trust in supervisors were not found to be significant predictors of defensive biasing.
Originality/value
This study contributes to the literature on work stress surveys by developing a scale for defensive biasing and investigating the factors that influence this behavior. The study highlights the importance of making the survey process more transparent to reduce defensive biasing and obtain trustworthy results.
Details
Keywords
Bai Liu, Tao Ju, Jiarui Lu and Hing Kai Chan
This research investigates whether focal firms employ strategic supply chain information disclosure, focusing on the concealment of supplier and customer identities, as part of…
Abstract
Purpose
This research investigates whether focal firms employ strategic supply chain information disclosure, focusing on the concealment of supplier and customer identities, as part of their supply chain environmental risk management strategies (supplier sustainability risk and customer loss risk, respectively).
Design/methodology/approach
Using a panel dataset of Chinese listed firms from 2009 to 2019 and utilizing the suppliers’ environmental punishment of peer firms (peer events) as an exogenous shock and employing ordinary least squares (OLS) estimation, this study conducts a regression analysis to test how focal firms disclose the identities of their suppliers and customers.
Findings
Our results indicate that focal firms prefer to hide the identities of their suppliers and customers following the environmental punishment of peer firms’ suppliers. In addition, supplier concentration weakens the effect of withholding supplier identities, whereas customer concentration strengthens the effect of hiding customer identities. Mechanism analysis shows that firms hide supplier identities to avoid their reputation being affected and hide customer identities to prevent the deterioration of customers’ reputations and thus impact their market share.
Originality/value
Our study reveals that reputation spillover is another crucial factor in supply chain transparency. It is also pioneering in applying the anonymity theory to explain focal firms’ information disclosure strategy in supply chains.
Details
Keywords
Allan Farias Fávaro, Roderval Marcelino and Cristian Cechinel
This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to…
Abstract
Purpose
This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to analyse how the main characteristics of the existing blockchain solutions in this field to detect opportunities for the improvement of future applications.
Design/methodology/approach
A systematic review of the literature on the subject was carried out in three databases recognized by the research community (IEEE Xplore, Scopus and Web of Science) and the Frontiers in Blockchain journal. A total of 1,967 articles were initially found, and after the exclusion process, the 26 remaining articles were classified according to the following dimensions: System Type, Open Access, Review Type, Reviewer Incentive, Token Economy, Blockchain Access, Blockchain Identification, Blockchain Used, Paper Storage, Anonymity and Maturity of the solution.
Findings
Results show that the solutions are normally concerned on offering incentives to the reviewers' work (often monetary). Other common general preferences among the solutions are the adoption of open reviews, the use of Ethereum, the implementation of publishing ecosystems and the use of InterPlanetary File System to the storage of the papers.
Originality/value
There are currently no studies covering the main aspects of blockchain solutions in the field of scientific peer review. The present study provides an overall review of the topic, summarizing important information on the current research and helping new adopters to develop solutions grounded on the existing literature.
Details
Keywords
The purpose of this study is to examine how the constructs of false self, preference for online social interaction (POSI), compulsive internet use (CIU), and online disinhibition…
Abstract
Purpose
The purpose of this study is to examine how the constructs of false self, preference for online social interaction (POSI), compulsive internet use (CIU), and online disinhibition affect social withdrawal in a social media context. The mediating effects of moral disengagement and cyber aggression are also tested.
Design/methodology/approach
Data were collected using an online survey (n = 533) from consumers in Japan. This study used structural equation modeling and PROCESS to examine the proposed relationships.
Findings
The study revealed that false self positively affects moral disengagement while online disinhibition positively affects cyber aggression and moral disengagement. Preference for online social interaction and compulsive internet use both positively impacts social withdrawal. Cyber aggression and moral disengagement were established mediators between false self/ Preference for online social interaction/ compulsive internet use/ online disinhibition and social withdrawal.
Research limitations/implications
Although restricted to cyberaggression, owing to the reciprocal relationship between cyber victimization and cyberaggression, cyber victimization can be included for further study. This study expands the understanding of social withdrawal within the context of social media.
Practical implications
Based on the findings, policies and programs that address mental health that build self-esteem, self-confidence and reduce anxiety ought to be undertaken. Managing and formulating guidelines on anonymity should also be taken into consideration.
Originality/value
This research demonstrates the crucial constructs that affect social media users negatively from the aspects of cyberaggression, moral disengagement and social withdrawal. It also establishes the importance of mental health in reducing adverse effects from social media.
Details
Keywords
To propose the use of indirect survey protocols, in general and the item count technique (ICT), in particular, that ensure participant anonymity in organizations to explore the…
Abstract
Purpose
To propose the use of indirect survey protocols, in general and the item count technique (ICT), in particular, that ensure participant anonymity in organizations to explore the effect of employee perceived abusive supervision on job performance.
Design/methodology/approach
We apply ICT to a sample of 363 employees (52.6% female) from Greek organizations. Utilizing multivariate statistical techniques, we investigated how employees assess the impact of their personal encounters with abusive supervision on job performance. This approach allowed us to explore the percentage of employees perceiving negative effects on job performance, distinguishing our study from previous studies that primarily focus on quantifying the extent or magnitude of abusive supervision in organizational settings. Also, we investigated how employee socio-demographic characteristics, human capital characteristics and affective traits relate to the evaluation of experienced abusive supervision as a negative factor for their job performance.
Findings
We found that approximately 62% of the respondents evaluated personal experience of abusive supervision as negatively affecting their job performance. We also found that the likelihood of employees evaluating personal experience of abusive supervision as having a negative impact on their job performance is: (1) higher for female employees, (2) does not depend on employee age, job tenure and education; (3) is lower for employees with managerial roles and (4) increases with employee trait negative affectivity.
Originality/value
The study is a response to the call for researchers to use innovative methods for advancing abusive supervision research. The study highlights the significance of taking a proactive stance towards addressing abusive supervision in the workplace, by using indirect survey methods that ensures employee anonymity. The results have implications for organizational strategies aimed at increasing awareness of abusive supervision and its impact on employee performance.
Details
Keywords
Doga Istanbulluoglu and Lloyd C. Harris
Falsified online reviews (FORs) are the published/viewable consumer-generated online content regarding a firm (or its representatives) or its services and goods that is, to some…
Abstract
Purpose
Falsified online reviews (FORs) are the published/viewable consumer-generated online content regarding a firm (or its representatives) or its services and goods that is, to some degree, untruthful or falsified. The purpose of this study is first to explore the nature of FORs, focusing on reviewers' interpretations and refections on falsity, intent, anonymity and the target of their FOR. Secondly, the authors examine the valence and veracity dimensions of FORs and introduce a typology to differentiate their variations.
Design/methodology/approach
using an exploratory research design, 48 interviews were conducted with participants who post online reviews on social media about their experiences with food and beverage serving outlets.
Findings
The results show four common forms of FORs on social media. These are reviews focused on equity equalizing, friendly flattery, opinionated opportunism and malicious profiteering.
Research limitations/implications
The authors provide exploratory and in-depth information via interviews, but do not analyse the content of FORs.
Practical implications
Firms should be aware of varieties of FORs and that these may not be limited to malicious content. This is important in terms of showing that in dealing with FORs, a one-size-fits-all approach will not work. FORs are not always entirely fabricated, and instead various levels of falseness are observed, ranging from slight alterations to complete fabrications.
Originality/value
Previous research explored how to identify and differentiate FORs from truthful ones, focusing on the reviews or how they are perceived by readers. However, comparatively little is known of the reviewers of FORs. Hence, this study focuses on reviewers and offers new insights into the nature of FORs by identifying and examining the main forms of FORs on social media.
Details
Keywords
Apoorva Goel, Nabila Khan and Lata Dyaram
This study examines the yin (promotive) and yang (prohibitive) of employee voice based on employee preference for voice channel attributes. Employee inputs may be disregarded…
Abstract
Purpose
This study examines the yin (promotive) and yang (prohibitive) of employee voice based on employee preference for voice channel attributes. Employee inputs may be disregarded, requiring employees to maneuver for unheeded voice and adopt alternate voice tactics. The authors emphasize the ubiquity of lurking employee silence and its affective effects on subsequent cycles of voice or silence.
Design/methodology/approach
Qualitative design involving semi-structured interviews of employees from service sector firms in India assisted the inquiry.
Findings
Employees prefer voice channel attributes that ensure visibility and data substance for promotive voice and anonymity and confidentiality for prohibitive voice. Voice target switching and message reframing were common employee strategies. Silence on both sharing views/opinions (promotive) and voicing issues/concerns (prohibitive) weakens employee future voice incidents, besides suppressing the affect. Post-silence cognitive reappraisal increases voice incidences.
Research limitations/implications
Findings may have limited generalizability given the qualitative design of the study. Moving beyond extant episodic voice research, the authors demonstrate the recurrent nature of employee voice and silence. The study broadens perspectives on how varied voice types necessitate nuanced voice channel attributes.
Originality/value
Present work brings together organizational behavior (OB) perspective on discretionary voice through human resource (HR)-based channels, helping bridge the gap between previously disparate stands.
Details
Keywords
Milind Tiwari, Cayle Lupton, Ausma Bernot and Khaled Halteh
This paper aims to investigate technological innovations within the crypto space that have engendered novel financial crime risks and their potential utilization amidst…
Abstract
Purpose
This paper aims to investigate technological innovations within the crypto space that have engendered novel financial crime risks and their potential utilization amidst geopolitical conflicts.
Design/methodology/approach
The theoretical paper uses an analysis of recent geopolitical events, with a key focus on using cryptocurrencies to undertake illicit activities.
Findings
The study found that cryptocurrencies and the innovations made within the crypto domain are used for both legitimate and illicit purposes, including money laundering, terrorism financing and sanction evasion.
Originality/value
This research contributes to understanding the critical role cryptocurrencies play amidst geopolitical conflicts and emphasizes the need for regulatory considerations to prevent their misuse. To the best of the authors’ knowledge, this paper is the first scholarly contribution that considers the evolving mechanisms afforded by cryptocurrencies amidst geopolitical conflicts in undertaking illicit activities.
Details
Keywords
Shreya Sangal, Gaurav Duggal and Achint Nigam
The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…
Abstract
Purpose
The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.
Design/methodology/approach
The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.
Findings
Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.
Originality/value
No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.
Details