Search results

1 – 10 of 41
Article
Publication date: 15 February 2022

Prasanta Kr Chopdar, Miltiadis D. Lytras and Anna Visvizi

Bicycle sharing offers a novel way to create smart and sustainable mobility solutions for the future. The purpose of this study is to draw on the Unified Theory of Acceptance and…

1091

Abstract

Purpose

Bicycle sharing offers a novel way to create smart and sustainable mobility solutions for the future. The purpose of this study is to draw on the Unified Theory of Acceptance and Use of Technology 2 (UTAUT 2) framework for identifying the factors necessary to predict bike-sharing intention among users in India.

Design/methodology/approach

Data were collected through a questionnaire distributed across four major cities in India, and 515 responses were analyzed. A sequential approach was employed to analyze the data using Partial Least Square–Structural Equation Modeling (PLS-SEM) and Fuzzy-set Qualitative Comparative Analysis (fsQCA).

Findings

The findings from PLS analysis revealed that performance expectancy, effort expectancy, facilitating conditions, hedonic motivation and price value are the salient variables that affect users' intentions to participate in bike sharing. In addition, based on fsQCA, six configurations of causal conditions are presented as intermediate solutions that produce the same results. Although antecedent conditions, such as habit and social influence, had an insignificant effect on individuals' BSI, they create conditions sufficient to encourage users' participation in bike sharing in combination with other variables.

Research limitations/implications

A few limitations of this research and the implications of the findings in terms of theory and policy implications are also discussed.

Originality/value

The reported study is one of the earliest to explain bike-sharing adoption in India using the UTAUT 2 model.

Details

International Journal of Emerging Markets, vol. 18 no. 11
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 24 July 2023

Mark R. Mallon and Stav Fainshmidt

Because family businesses are highly complex enterprises, researchers need appropriate theoretical and methodological tools to study them. The neoconfigurational perspective and…

Abstract

Purpose

Because family businesses are highly complex enterprises, researchers need appropriate theoretical and methodological tools to study them. The neoconfigurational perspective and its accompanying method, qualitative comparative analysis, are particularly well suited to phenomena characterized by complex causality, but their uptake in family business research has been slow and fragmented. To remedy this, the authors highlight their unique ability to address research questions for which other approaches are not well suited and discuss how they might be applied to family business phenomena.

Design/methodology/approach

The authors introduce the core tenets of the neoconfigurational perspective and how its set-theoretic epistemology differs from traditional approaches to theorizing and analysis. The authors then use a dataset of family firms to present a primer on conducting qualitative comparative analysis and interpreting the results.

Findings

The authors find that family firm resources can be combined in multiple ways to affect business survival, suggesting that resources are substitutable and complementary. The authors discuss how the unique features of the neoconfigurational approach, namely equifinality, conjunctural causation and causal asymmetry, can be fruitfully applied to break new ground in scholarly understanding of family businesses.

Originality/value

This article allows family business researchers to apply the neoconfigurational approach without first having to consult multiple and disparate sources often written for other disciplines. This article explicates how to leverage the theoretical and empirical advantages of the neoconfigurational approach in the context of family businesses, supporting a more widespread adoption of the neoconfigurational perspective in family business research.

Book part
Publication date: 19 April 2024

Lars Mjøset

This study investigates Rokkan's research programme in the light of the differences between case- and variables-based methodologies. Three phases of the research process are…

Abstract

This study investigates Rokkan's research programme in the light of the differences between case- and variables-based methodologies. Three phases of the research process are distinguished. Studying the way Rokkan actually proceeded in the research within his Europe project, we find that he follows the protocols of case-methodologies such as grounded theory. In the second phase of the research process, however, he constructs variables-based models as tools for his macro-historical comparisons. To get to variables from the sensitizing concepts coded in the first phase, Rokkan defines his variables as close to cases as possible: variables as nominal level typologies, types as variable values. He thus faces two interrelated dilemmas. First, a philosophy of science dissonance: he legitimates his research only with reference to a variable-methodology, while his research is thoroughly case based. Second, a paradox of double coding: using variable-based models in the second phase, the status of the knowledge available in the first phase memos is degraded. Rokkan cannot decide between the two main solutions to these dilemmas: The first solution is to discard his heterogeneous data, instead working only with homogeneous data that opens up to more consistently variables-oriented research. The second solution is to replace the notion of variables/variable values with typology/types, thereby returning to cases, pursuing comparative case reconstructions in the third phase of research. The study concludes in favour of the second solution.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Open Access
Article
Publication date: 3 April 2023

Arianna Seghezzi and Riccardo Mangiaracina

Failed deliveries (i.e. deliveries not accomplished due to the absence of customers) represent a critical issue in B2C (Business-to-consumer) e-commerce last-mile deliveries…

1497

Abstract

Purpose

Failed deliveries (i.e. deliveries not accomplished due to the absence of customers) represent a critical issue in B2C (Business-to-consumer) e-commerce last-mile deliveries, implying high costs for e-commerce players and negatively affecting customer satisfaction. A promising option to reduce them would be scheduling deliveries based on the probability to find customers at home. This work proposes a solution based on presence data (gathered through Internet of Things [IoT] devices) to organise the delivery tours, which aims to both minimise the travelled distance and maximise the probability to find customers at home.

Design/methodology/approach

The adopted methodology is a multi-method approach, based on interviews with practitioners. A model is developed and applied to Milan (Italy) to compare the performance of the proposed innovative solution with traditional home deliveries (both in terms of cost and delivery success rate).

Findings

The proposed solution implies a significant reduction of missed deliveries if compared to the traditional operating mode. Accordingly, even if allocating the customers to time windows based on their availability profiles (APs) entails an increase in the total travel time, the average delivery cost per parcel decreases.

Originality/value

On the academic side, this work proposes and evaluates an innovative last-mile delivery (LMD) solution that exploits new AI (Artificial Intelligence)-based technological trends. On the managerial side, it proposes an efficient and effective novel option for scheduling last-mile deliveries based on the use of smart home devices, which has a significant impact in reducing costs and increasing the service level.

Details

Industrial Management & Data Systems, vol. 123 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 9 February 2024

Chengpeng Zhang, Zhihua Yu, Jimin Shi, Yu Li, Wenqiang Xu, Zheyi Guo, Hongshi Zhang, Zhongyuan Zhu and Sheng Qiang

Hexahedral meshing is one of the most important steps in performing an accurate simulation using the finite element analysis (FEA). However, the current hexahedral meshing method…

Abstract

Purpose

Hexahedral meshing is one of the most important steps in performing an accurate simulation using the finite element analysis (FEA). However, the current hexahedral meshing method in the industry is a nonautomatic and inefficient method, i.e. manually decomposing the model into suitable blocks and obtaining the hexahedral mesh from these blocks by mapping or sweeping algorithms. The purpose of this paper is to propose an almost automatic decomposition algorithm based on the 3D frame field and model features to replace the traditional time-consuming and laborious manual decomposition method.

Design/methodology/approach

The proposed algorithm is based on the 3D frame field and features, where features are used to construct feature-cutting surfaces and the 3D frame field is used to construct singular-cutting surfaces. The feature-cutting surfaces constructed from concave features first reduce the complexity of the model and decompose it into some coarse blocks. Then, an improved 3D frame field algorithm is performed on these coarse blocks to extract the singular structure and construct singular-cutting surfaces to further decompose the coarse blocks. In most modeling examples, the proposed algorithm uses both types of cutting surfaces to decompose models fully automatically. In a few examples with special requirements for hexahedral meshes, the algorithm requires manual input of some user-defined cutting surfaces and constructs different singular-cutting surfaces to ensure the effectiveness of the decomposition.

Findings

Benefiting from the feature decomposition and the 3D frame field algorithm, the output blocks of the proposed algorithm have no inner singular structure and are suitable for the mapping or sweeping algorithm. The introduction of internal constraints makes 3D frame field generation more robust in this paper, and it can automatically correct some invalid 3–5 singular structures. In a few examples with special requirements, the proposed algorithm successfully generates valid blocks even though the singular structure of the model is modified by user-defined cutting surfaces.

Originality/value

The proposed algorithm takes the advantage of feature decomposition and the 3D frame field to generate suitable blocks for a mapping or sweeping algorithm, which saves a lot of simulation time and requires less experience. The user-defined cutting surfaces enable the creation of special hexahedral meshes, which was difficult with previous algorithms. An improved 3D frame field generation method is proposed to correct some invalid singular structures and improve the robustness of the previous methods.

Details

Engineering Computations, vol. 41 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 18 July 2023

Panniphat Atcha, Ilias Vlachos and Satish Kumar

Ineffective management inventory of medical products such as blood and vaccines can create severe repercussions for hospitals, clinics or medical enterprises, such as surgery…

Abstract

Purpose

Ineffective management inventory of medical products such as blood and vaccines can create severe repercussions for hospitals, clinics or medical enterprises, such as surgery delays and postponements. Inventory sharing is a form of horizontal collaboration that can provide solutions to key actors of the healthcare supply chain (HSC), yet no prior study reviewed this topic.

Design/methodology/approach

This study conducts a systematic literature review of thirty-nine inventory-sharing studies in the context of HSCs published from 2012 until early 2022. The descriptive and thematic analyses include chronological distribution, geographical location, comparison between developed/developing regions, stakeholder and incident analysis.

Findings

Thematic analysis classified inventory sharing among five product supply chains (blood, medical supplies, medicines, vaccines and generic medical products). Benefits include shortage reduction, cost minimisation, and wastage mitigation. Barriers include (1) IT infrastructure, (2) social systems, (3) cost and (4) supply chain operations. Perishable inventory policies include Fresher-First (FF), Last-Expire-First-Out (LEFO), First-In-First-Out (FIFO) and First-Expire-First-Out (FEFO). The analysis also showed differences between developed and developing countries. The study identifies several future research opportunities that include (1) product utilisation rate, (2) cost reductions, (3) shortage mitigation and (4) waste reduction.

Originality/value

No prior study has systematically reviewed inventory sharing in HSCs to reveal benefits, barriers, patterns and gaps in the current literature. It makes five propositions and develops a research model to guide future research. The study concludes with theoretical and managerial implications.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 5 April 2024

Felipe Sales Nogueira, João Luiz Junho Pereira and Sebastião Simões Cunha Jr

This study aims to apply for the first time in literature a new multi-objective sensor selection and placement optimization methodology based on the multi-objective Lichtenberg…

14

Abstract

Purpose

This study aims to apply for the first time in literature a new multi-objective sensor selection and placement optimization methodology based on the multi-objective Lichtenberg algorithm and test the sensors' configuration found in a delamination identification case study.

Design/methodology/approach

This work aims to study the damage identification in an aircraft wing using the Lichtenberg and multi-objective Lichtenberg algorithms. The former is used to identify damages, while the last is associated with feature selection techniques to perform the first sensor placement optimization (SPO) methodology with variable sensor number. It is applied aiming for the largest amount of information about using the most used modal metrics in the literature and the smallest sensor number at the same time.

Findings

The proposed method was not only able to find a sensor configuration for each sensor number and modal metric but also found one that had full accuracy in identifying delamination location and severity considering triaxial modal displacements and minimal sensor number for all wing sections.

Originality/value

This study demonstrates for the first time in the literature how the most used modal metrics vary with the sensor number for an aircraft wing using a new multi-objective sensor selection and placement optimization methodology based on the multi-objective Lichtenberg algorithm.

Article
Publication date: 15 March 2024

Huimin Li, Boxin Dai, Yongchao Cao, Limin Su and Feng Li

Trust is the glue that holds cooperative relationships together and often exists in an asymmetric manner. The purpose of this study is to explore how to mitigate the issue of…

24

Abstract

Purpose

Trust is the glue that holds cooperative relationships together and often exists in an asymmetric manner. The purpose of this study is to explore how to mitigate the issue of losses or increased transaction costs caused by opportunistic behavior in a soft environment where trust asymmetry is quite common and difficult to avoid.

Design/methodology/approach

This study focuses on examining asymmetric trust between the government and the private sector in public-private partnership (PPP) projects. Drawing upon both project realities and relevant literature, the primary conditional variables influencing asymmetric trust are identified. These variables encompass power perception asymmetry, information asymmetry, interaction behavior, risk perception differences and government-side control. Subsequently, through the use of a survey questionnaire, binary-matched data from both the government and the private sector are collected. The study employs fuzzy-set qualitative comparative analysis (fsQCA) to conduct a configurational analysis, aiming to investigate the causal pathways that trigger asymmetric trust.

Findings

No single conditional variable is a necessary condition for the emergence of trust asymmetry. The pathways leading to a high degree of trust asymmetry can be categorized into two types: those dominated by power perception and those involving a combination of multiple factors. Differences in power perception play a crucial role in the occurrence of high trust asymmetry, yet the influence of other conditional variables in triggering trust asymmetry should not be overlooked.

Originality/value

The findings can contribute to advancing the study of trust relationships in the field of Chinese PPP projects. Furthermore, they hold practical value in facilitating the enhancement of trust relationships between the government and the private sector.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 23 November 2023

Konstantinos Kalodanis, Panagiotis Rizomiliotis and Dimosthenis Anagnostopoulos

The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate…

Abstract

Purpose

The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate the applicability of the requirements that the AI Act mandates to high-risk AI systems from the perspective of AI security.

Design/methodology/approach

This paper presents the main points of the proposed AI Act, with emphasis on the compliance requirements of high-risk systems. It matches known AI security threats with the relevant technical requirements, it demonstrates the impact that these security threats can have to the AI Act technical requirements and evaluates the applicability of these requirements based on the effectiveness of the existing security protection measures. Finally, the paper highlights the necessity for an integrated framework for AI system evaluation.

Findings

The findings of the EU AI Act technical assessment highlight the gap between the proposed requirements and the available AI security countermeasures as well as the necessity for an AI security evaluation framework.

Originality/value

AI Act, high-risk AI systems, security threats, security countermeasures.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 January 2024

James A. Meurs, Graham H. Lowman, David M. Gligor and Michael J. Maloni

Supply chain has long faced a persistent workforce shortage. To help both organizations and the field create environments that are more conducive to employee retention, the…

Abstract

Purpose

Supply chain has long faced a persistent workforce shortage. To help both organizations and the field create environments that are more conducive to employee retention, the authors investigate the outcomes of supply chain employee trust in their supervisor.

Design/methodology/approach

Applying person-environment fit theory, the authors evaluate the well-established antecedents to trust in supervisor ability, benevolence and integrity (ABI) relative to person-job (P-J) fit and person-vocation (P-V) fit of US supply chain employees.

Findings

Confirmatory factor analysis indicates that ABI is best modeled as dimensions of a second-order formative trust construct rather than as its antecedents. However, PLS-SEM provides somewhat unconvincing support for the impacts of ABI-trust. Instead, qualitative comparative analysis (QCA) delineates that all three ABI dimensions are not always needed for P-J and P-V fit in supply chain. Some employees respond to affective-based (i.e. benevolence) trust and others to cognitive-based (i.e. ability and integrity) trust.

Practical implications

The QCA results offer specific recommendations for supply chain organizations to enhance employee trust in supervisors to succeed in the struggle for labor.

Originality/value

The results counter extant trust theory, encouraging scholars to consider ABI as distinct dimensions of trust. The study also demonstrates the importance of considering QCA in supply chain research to meaningfully expand contributions to theory and practice.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 1
Type: Research Article
ISSN: 0960-0035

Keywords

1 – 10 of 41