Search results
1 – 10 of 41Prasanta Kr Chopdar, Miltiadis D. Lytras and Anna Visvizi
Bicycle sharing offers a novel way to create smart and sustainable mobility solutions for the future. The purpose of this study is to draw on the Unified Theory of Acceptance and…
Abstract
Purpose
Bicycle sharing offers a novel way to create smart and sustainable mobility solutions for the future. The purpose of this study is to draw on the Unified Theory of Acceptance and Use of Technology 2 (UTAUT 2) framework for identifying the factors necessary to predict bike-sharing intention among users in India.
Design/methodology/approach
Data were collected through a questionnaire distributed across four major cities in India, and 515 responses were analyzed. A sequential approach was employed to analyze the data using Partial Least Square–Structural Equation Modeling (PLS-SEM) and Fuzzy-set Qualitative Comparative Analysis (fsQCA).
Findings
The findings from PLS analysis revealed that performance expectancy, effort expectancy, facilitating conditions, hedonic motivation and price value are the salient variables that affect users' intentions to participate in bike sharing. In addition, based on fsQCA, six configurations of causal conditions are presented as intermediate solutions that produce the same results. Although antecedent conditions, such as habit and social influence, had an insignificant effect on individuals' BSI, they create conditions sufficient to encourage users' participation in bike sharing in combination with other variables.
Research limitations/implications
A few limitations of this research and the implications of the findings in terms of theory and policy implications are also discussed.
Originality/value
The reported study is one of the earliest to explain bike-sharing adoption in India using the UTAUT 2 model.
Details
Keywords
Mark R. Mallon and Stav Fainshmidt
Because family businesses are highly complex enterprises, researchers need appropriate theoretical and methodological tools to study them. The neoconfigurational perspective and…
Abstract
Purpose
Because family businesses are highly complex enterprises, researchers need appropriate theoretical and methodological tools to study them. The neoconfigurational perspective and its accompanying method, qualitative comparative analysis, are particularly well suited to phenomena characterized by complex causality, but their uptake in family business research has been slow and fragmented. To remedy this, the authors highlight their unique ability to address research questions for which other approaches are not well suited and discuss how they might be applied to family business phenomena.
Design/methodology/approach
The authors introduce the core tenets of the neoconfigurational perspective and how its set-theoretic epistemology differs from traditional approaches to theorizing and analysis. The authors then use a dataset of family firms to present a primer on conducting qualitative comparative analysis and interpreting the results.
Findings
The authors find that family firm resources can be combined in multiple ways to affect business survival, suggesting that resources are substitutable and complementary. The authors discuss how the unique features of the neoconfigurational approach, namely equifinality, conjunctural causation and causal asymmetry, can be fruitfully applied to break new ground in scholarly understanding of family businesses.
Originality/value
This article allows family business researchers to apply the neoconfigurational approach without first having to consult multiple and disparate sources often written for other disciplines. This article explicates how to leverage the theoretical and empirical advantages of the neoconfigurational approach in the context of family businesses, supporting a more widespread adoption of the neoconfigurational perspective in family business research.
Details
Keywords
This study investigates Rokkan's research programme in the light of the differences between case- and variables-based methodologies. Three phases of the research process are…
Abstract
This study investigates Rokkan's research programme in the light of the differences between case- and variables-based methodologies. Three phases of the research process are distinguished. Studying the way Rokkan actually proceeded in the research within his Europe project, we find that he follows the protocols of case-methodologies such as grounded theory. In the second phase of the research process, however, he constructs variables-based models as tools for his macro-historical comparisons. To get to variables from the sensitizing concepts coded in the first phase, Rokkan defines his variables as close to cases as possible: variables as nominal level typologies, types as variable values. He thus faces two interrelated dilemmas. First, a philosophy of science dissonance: he legitimates his research only with reference to a variable-methodology, while his research is thoroughly case based. Second, a paradox of double coding: using variable-based models in the second phase, the status of the knowledge available in the first phase memos is degraded. Rokkan cannot decide between the two main solutions to these dilemmas: The first solution is to discard his heterogeneous data, instead working only with homogeneous data that opens up to more consistently variables-oriented research. The second solution is to replace the notion of variables/variable values with typology/types, thereby returning to cases, pursuing comparative case reconstructions in the third phase of research. The study concludes in favour of the second solution.
Details
Keywords
Arianna Seghezzi and Riccardo Mangiaracina
Failed deliveries (i.e. deliveries not accomplished due to the absence of customers) represent a critical issue in B2C (Business-to-consumer) e-commerce last-mile deliveries…
Abstract
Purpose
Failed deliveries (i.e. deliveries not accomplished due to the absence of customers) represent a critical issue in B2C (Business-to-consumer) e-commerce last-mile deliveries, implying high costs for e-commerce players and negatively affecting customer satisfaction. A promising option to reduce them would be scheduling deliveries based on the probability to find customers at home. This work proposes a solution based on presence data (gathered through Internet of Things [IoT] devices) to organise the delivery tours, which aims to both minimise the travelled distance and maximise the probability to find customers at home.
Design/methodology/approach
The adopted methodology is a multi-method approach, based on interviews with practitioners. A model is developed and applied to Milan (Italy) to compare the performance of the proposed innovative solution with traditional home deliveries (both in terms of cost and delivery success rate).
Findings
The proposed solution implies a significant reduction of missed deliveries if compared to the traditional operating mode. Accordingly, even if allocating the customers to time windows based on their availability profiles (APs) entails an increase in the total travel time, the average delivery cost per parcel decreases.
Originality/value
On the academic side, this work proposes and evaluates an innovative last-mile delivery (LMD) solution that exploits new AI (Artificial Intelligence)-based technological trends. On the managerial side, it proposes an efficient and effective novel option for scheduling last-mile deliveries based on the use of smart home devices, which has a significant impact in reducing costs and increasing the service level.
Details
Keywords
Chengpeng Zhang, Zhihua Yu, Jimin Shi, Yu Li, Wenqiang Xu, Zheyi Guo, Hongshi Zhang, Zhongyuan Zhu and Sheng Qiang
Hexahedral meshing is one of the most important steps in performing an accurate simulation using the finite element analysis (FEA). However, the current hexahedral meshing method…
Abstract
Purpose
Hexahedral meshing is one of the most important steps in performing an accurate simulation using the finite element analysis (FEA). However, the current hexahedral meshing method in the industry is a nonautomatic and inefficient method, i.e. manually decomposing the model into suitable blocks and obtaining the hexahedral mesh from these blocks by mapping or sweeping algorithms. The purpose of this paper is to propose an almost automatic decomposition algorithm based on the 3D frame field and model features to replace the traditional time-consuming and laborious manual decomposition method.
Design/methodology/approach
The proposed algorithm is based on the 3D frame field and features, where features are used to construct feature-cutting surfaces and the 3D frame field is used to construct singular-cutting surfaces. The feature-cutting surfaces constructed from concave features first reduce the complexity of the model and decompose it into some coarse blocks. Then, an improved 3D frame field algorithm is performed on these coarse blocks to extract the singular structure and construct singular-cutting surfaces to further decompose the coarse blocks. In most modeling examples, the proposed algorithm uses both types of cutting surfaces to decompose models fully automatically. In a few examples with special requirements for hexahedral meshes, the algorithm requires manual input of some user-defined cutting surfaces and constructs different singular-cutting surfaces to ensure the effectiveness of the decomposition.
Findings
Benefiting from the feature decomposition and the 3D frame field algorithm, the output blocks of the proposed algorithm have no inner singular structure and are suitable for the mapping or sweeping algorithm. The introduction of internal constraints makes 3D frame field generation more robust in this paper, and it can automatically correct some invalid 3–5 singular structures. In a few examples with special requirements, the proposed algorithm successfully generates valid blocks even though the singular structure of the model is modified by user-defined cutting surfaces.
Originality/value
The proposed algorithm takes the advantage of feature decomposition and the 3D frame field to generate suitable blocks for a mapping or sweeping algorithm, which saves a lot of simulation time and requires less experience. The user-defined cutting surfaces enable the creation of special hexahedral meshes, which was difficult with previous algorithms. An improved 3D frame field generation method is proposed to correct some invalid singular structures and improve the robustness of the previous methods.
Details
Keywords
Panniphat Atcha, Ilias Vlachos and Satish Kumar
Ineffective management inventory of medical products such as blood and vaccines can create severe repercussions for hospitals, clinics or medical enterprises, such as surgery…
Abstract
Purpose
Ineffective management inventory of medical products such as blood and vaccines can create severe repercussions for hospitals, clinics or medical enterprises, such as surgery delays and postponements. Inventory sharing is a form of horizontal collaboration that can provide solutions to key actors of the healthcare supply chain (HSC), yet no prior study reviewed this topic.
Design/methodology/approach
This study conducts a systematic literature review of thirty-nine inventory-sharing studies in the context of HSCs published from 2012 until early 2022. The descriptive and thematic analyses include chronological distribution, geographical location, comparison between developed/developing regions, stakeholder and incident analysis.
Findings
Thematic analysis classified inventory sharing among five product supply chains (blood, medical supplies, medicines, vaccines and generic medical products). Benefits include shortage reduction, cost minimisation, and wastage mitigation. Barriers include (1) IT infrastructure, (2) social systems, (3) cost and (4) supply chain operations. Perishable inventory policies include Fresher-First (FF), Last-Expire-First-Out (LEFO), First-In-First-Out (FIFO) and First-Expire-First-Out (FEFO). The analysis also showed differences between developed and developing countries. The study identifies several future research opportunities that include (1) product utilisation rate, (2) cost reductions, (3) shortage mitigation and (4) waste reduction.
Originality/value
No prior study has systematically reviewed inventory sharing in HSCs to reveal benefits, barriers, patterns and gaps in the current literature. It makes five propositions and develops a research model to guide future research. The study concludes with theoretical and managerial implications.
Details
Keywords
Felipe Sales Nogueira, João Luiz Junho Pereira and Sebastião Simões Cunha Jr
This study aims to apply for the first time in literature a new multi-objective sensor selection and placement optimization methodology based on the multi-objective Lichtenberg…
Abstract
Purpose
This study aims to apply for the first time in literature a new multi-objective sensor selection and placement optimization methodology based on the multi-objective Lichtenberg algorithm and test the sensors' configuration found in a delamination identification case study.
Design/methodology/approach
This work aims to study the damage identification in an aircraft wing using the Lichtenberg and multi-objective Lichtenberg algorithms. The former is used to identify damages, while the last is associated with feature selection techniques to perform the first sensor placement optimization (SPO) methodology with variable sensor number. It is applied aiming for the largest amount of information about using the most used modal metrics in the literature and the smallest sensor number at the same time.
Findings
The proposed method was not only able to find a sensor configuration for each sensor number and modal metric but also found one that had full accuracy in identifying delamination location and severity considering triaxial modal displacements and minimal sensor number for all wing sections.
Originality/value
This study demonstrates for the first time in the literature how the most used modal metrics vary with the sensor number for an aircraft wing using a new multi-objective sensor selection and placement optimization methodology based on the multi-objective Lichtenberg algorithm.
Details
Keywords
Huimin Li, Boxin Dai, Yongchao Cao, Limin Su and Feng Li
Trust is the glue that holds cooperative relationships together and often exists in an asymmetric manner. The purpose of this study is to explore how to mitigate the issue of…
Abstract
Purpose
Trust is the glue that holds cooperative relationships together and often exists in an asymmetric manner. The purpose of this study is to explore how to mitigate the issue of losses or increased transaction costs caused by opportunistic behavior in a soft environment where trust asymmetry is quite common and difficult to avoid.
Design/methodology/approach
This study focuses on examining asymmetric trust between the government and the private sector in public-private partnership (PPP) projects. Drawing upon both project realities and relevant literature, the primary conditional variables influencing asymmetric trust are identified. These variables encompass power perception asymmetry, information asymmetry, interaction behavior, risk perception differences and government-side control. Subsequently, through the use of a survey questionnaire, binary-matched data from both the government and the private sector are collected. The study employs fuzzy-set qualitative comparative analysis (fsQCA) to conduct a configurational analysis, aiming to investigate the causal pathways that trigger asymmetric trust.
Findings
No single conditional variable is a necessary condition for the emergence of trust asymmetry. The pathways leading to a high degree of trust asymmetry can be categorized into two types: those dominated by power perception and those involving a combination of multiple factors. Differences in power perception play a crucial role in the occurrence of high trust asymmetry, yet the influence of other conditional variables in triggering trust asymmetry should not be overlooked.
Originality/value
The findings can contribute to advancing the study of trust relationships in the field of Chinese PPP projects. Furthermore, they hold practical value in facilitating the enhancement of trust relationships between the government and the private sector.
Details
Keywords
Konstantinos Kalodanis, Panagiotis Rizomiliotis and Dimosthenis Anagnostopoulos
The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate…
Abstract
Purpose
The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate the applicability of the requirements that the AI Act mandates to high-risk AI systems from the perspective of AI security.
Design/methodology/approach
This paper presents the main points of the proposed AI Act, with emphasis on the compliance requirements of high-risk systems. It matches known AI security threats with the relevant technical requirements, it demonstrates the impact that these security threats can have to the AI Act technical requirements and evaluates the applicability of these requirements based on the effectiveness of the existing security protection measures. Finally, the paper highlights the necessity for an integrated framework for AI system evaluation.
Findings
The findings of the EU AI Act technical assessment highlight the gap between the proposed requirements and the available AI security countermeasures as well as the necessity for an AI security evaluation framework.
Originality/value
AI Act, high-risk AI systems, security threats, security countermeasures.
Details
Keywords
James A. Meurs, Graham H. Lowman, David M. Gligor and Michael J. Maloni
Supply chain has long faced a persistent workforce shortage. To help both organizations and the field create environments that are more conducive to employee retention, the…
Abstract
Purpose
Supply chain has long faced a persistent workforce shortage. To help both organizations and the field create environments that are more conducive to employee retention, the authors investigate the outcomes of supply chain employee trust in their supervisor.
Design/methodology/approach
Applying person-environment fit theory, the authors evaluate the well-established antecedents to trust in supervisor ability, benevolence and integrity (ABI) relative to person-job (P-J) fit and person-vocation (P-V) fit of US supply chain employees.
Findings
Confirmatory factor analysis indicates that ABI is best modeled as dimensions of a second-order formative trust construct rather than as its antecedents. However, PLS-SEM provides somewhat unconvincing support for the impacts of ABI-trust. Instead, qualitative comparative analysis (QCA) delineates that all three ABI dimensions are not always needed for P-J and P-V fit in supply chain. Some employees respond to affective-based (i.e. benevolence) trust and others to cognitive-based (i.e. ability and integrity) trust.
Practical implications
The QCA results offer specific recommendations for supply chain organizations to enhance employee trust in supervisors to succeed in the struggle for labor.
Originality/value
The results counter extant trust theory, encouraging scholars to consider ABI as distinct dimensions of trust. The study also demonstrates the importance of considering QCA in supply chain research to meaningfully expand contributions to theory and practice.
Details