Search results
1 – 10 of over 10000Ling Zhang, Nan Feng, Haiyang Feng and Minqiang Li
For an entrant platform in the on-demand service market, choosing an appropriate employment model is critical. This study explores how the entrant optimally chooses the employment…
Abstract
Purpose
For an entrant platform in the on-demand service market, choosing an appropriate employment model is critical. This study explores how the entrant optimally chooses the employment model to achieve better performance and investigates the optimal pricing strategies and wage schemes for both incumbent and entrant platforms.
Design/methodology/approach
Based on the Hotelling model, the authors develop a game-theoretic framework to study the incumbent's and entrant's optimal service prices and wage schemes. Moreover, the authors determine the entrant's optimal employment model by comparing the entrant's optimal profits under different market configurations and analytically analyze the impacts of some critical factors on the platforms' decision-making.
Findings
This study reveals that the impacts of the unit misfit cost of suppliers or consumers on the pricing strategies and wage schemes vary with different operational efficiencies of platforms. Only when both the service efficiency of contractors and the basic employee benefits are low, entrants should adopt the employee model. Moreover, a lower unit misfit cost of suppliers or consumers makes entrants more likely to choose the contractor model. However, the service efficiency of contractors has nonmonotonic effects on the entrant's decision.
Originality/value
This study focuses on an entrant's decision on the optimal employment model in an on-demand service market, considering the competition between entrants and incumbents on both the supplier and consumer sides, which has not been investigated in the prior literature.
Details
Keywords
Do digital technologies of early 21st century capitalism promote or reduce consumer sovereignty? This chapter addresses this question by examining John Kenneth Galbraith’s…
Abstract
Do digital technologies of early 21st century capitalism promote or reduce consumer sovereignty? This chapter addresses this question by examining John Kenneth Galbraith’s critique of consumer sovereignty during the post-war period of industrial society and looks at the insights he provides to understand the impact of platform capitalism on consumer sovereignty today. This chapter has the following sections: (1) I review the main postulates of Galbraith’s theory; (2) I highlight the main differences between traditional advertising and online behavioral advertising; (3) I explain how online behavioral advertisement strengthens Galbraith’s dependence effect and revised sequence theories; (4) I then discuss normative challenges raised by digital platform corporations to individual sovereignty; and (5) finally, I argue that platform capitalism is a mature form of Galbraith’s “new industrial state.”
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Janina Seutter, Michelle Müller, Stefanie Müller and Dennis Kundisch
Whenever social injustice tackled by social movements receives heightened media attention, charitable crowdfunding platforms offer an opportunity to proactively advocate for…
Abstract
Purpose
Whenever social injustice tackled by social movements receives heightened media attention, charitable crowdfunding platforms offer an opportunity to proactively advocate for equality by donating money to affected people. This research examines how the Black Lives Matter movement and the associated social protest cycle after the death of George Floyd have influenced donation behavior for campaigns with a personal goal and those with a societal goal supporting the black community.
Design/methodology/approach
This paper follows a quantitative research approach by applying a quasi-experimental research design on a GoFundMe dataset. In total, 67,905 campaigns and 1,362,499 individual donations were analyzed.
Findings
We uncover a rise in donations for campaigns supporting the black community, which lasts substantially longer for campaigns with a societal than with a personal funding goal. Informed by construal level theory, we attribute this heterogeneity to changes in the level of abstractness of the problems that social movements aim to tackle.
Originality/value
This research advances the knowledge of individual donation behavior in charitable crowdfunding. Our results highlight the important role that charitable crowdfunding campaigns play in promoting social justice and anti-discrimination as part of social protest cycles.
Details
Keywords
Yu Wang, Daqing Zheng and Yulin Fang
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…
Abstract
Purpose
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.
Design/methodology/approach
This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.
Findings
The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.
Originality/value
This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.
Details
Keywords
Yulong (David) Liu, Henry F. L. Chung, Zuopeng (Justin) Zhang and Mian Wu
This research aims to explore the dark side of mobile applications by investigating the role of apps' technicality and app security in the mechanism of user satisfaction, app…
Abstract
Purpose
This research aims to explore the dark side of mobile applications by investigating the role of apps' technicality and app security in the mechanism of user satisfaction, app intention and customers' continuance tendency to make in-app purchases.
Design/methodology/approach
Drawing on attitude-behavior-context (ABC) theory, the study proposed a conceptual framework and examined the framework using a structural equation modeling (SEM) approach based on data collected from app users from New Zealand.
Findings
The results reveal the correlation between user satisfaction and in-app purchase with a mediator of app continuance intention (ACI). In particular, the results show that app technicality (AT) has a positive correlation with user satisfaction as an antecedent. App security and hedonic value are positively correlated with user satisfaction.
Originality/value
The research has three critical research implications. First, this research advances the understanding of the dark side of mobile apps by showing how app security influences customers' in-app purchases. Secondly, this study reveals and offers empirical evidence for the mechanism between app security and user satisfaction. Finally, the study provides empirical evidence of AT as a distal antecedent for in-app purchases.
Details
Keywords
Teik-Leong Chuah, Meenchee Hong and Behzad Foroughi
Infection and cross-contamination have been massive concerns in the medical field. This study aims to investigate consumers’ awareness and their choices of endoscopes, which may…
Abstract
Purpose
Infection and cross-contamination have been massive concerns in the medical field. This study aims to investigate consumers’ awareness and their choices of endoscopes, which may deter them from the cross-contamination problem.
Design/methodology/approach
A discrete choice experiment survey was administered to 166 respondents in Penang, Malaysia. Participants were asked to make hypothetical choices and estimate their preference for endoscopes. The multinomial logit model was used to estimate the assumptions based on the stated preference data collected.
Findings
Only two-fifths of respondents are aware of their rights regarding endoscope selection. The findings are consistent with utility theory, where choices are made to maximise personal satisfaction. If given the choice, consumers preferred the single-use endoscope over the reusable or the doctor’s preferred endoscope. Price, insurance coverage and personal income are significant determinants of the consumer’s choice of endoscopes.
Research limitations/implications
This study only investigates subjects living in Penang. Other possible important attributes to endoscope choices, such as environmental and device availability may be considered in future study.
Practical implications
The findings may create awareness among consumers about their rights when choosing medical devices. It may also improve health-care institutions’ (users’) and device manufacturers’ (industry players’) understanding of consumer needs and demands from socioeconomic perspectives.
Social implications
The research offers insights into consumer rights and awareness of health-care services. Ultimately leading to better policy to protect consumers’ rights and safety.
Originality/value
This study contributes to the rare literature on consumer rights toward medical devices, in particular, the consumer’s awareness of the choice of endoscopes.
Details
Keywords
Qiang Lu, Yihang Zhou, Zhenzeng Luan and Hua Song
This study empirically investigates how ambidextrous innovations and their balancing affect the supply chain financing performance (SCFP) of small and medium-sized enterprises…
Abstract
Purpose
This study empirically investigates how ambidextrous innovations and their balancing affect the supply chain financing performance (SCFP) of small and medium-sized enterprises (SMEs), based on signaling theory. Moreover, this study explores the moderating effect of the breadth and depth of digital technology deployment on the relationship between ambidextrous innovations and the SCFP of SMEs.
Design/methodology/approach
A mixed-methods design is used, including a qualitative study and a quantitative study. Qualitative data have been collected from six multi-cases in different industries. Questionnaire data have been collected from 259 SMEs in China, and a multiple regression model is used to verify the research hypotheses.
Findings
The findings indicate that, in supply chain financing, both exploitative innovation and exploratory innovation are helpful in improving the SCFP of SMEs. For resource-constrained SMEs, a relative balance between exploitative innovation and exploratory innovation can help improve SCFP. The breadth of digital technology deployment can strengthen the relationship between exploitative innovation and SCFP, while the depth of digital technology deployment can weaken the relationship between exploratory innovation and SCFP. In addition, increasing the depth of digital technology deployment strengthens the positive correlation between the relative balance of ambidextrous innovations and SCFP.
Practical implications
To effectively obtain supply chain financing, SMEs can either concentrate their limited resources on a single type of innovation or use relative balance strategies to simultaneously pursue two innovations. In addition, in the process of obtaining supply chain financing by ambidextrous innovations, SMEs should appropriately deploy digital technologies.
Originality/value
This study first deconstructs the impact mechanism of ambidextrous innovation capabilities on SCFP based on signaling theory, and then discusses the balancing effect of ambidextrous innovations on SCFP in the cases of resource-constrained SMEs. This study also goes further and finds the negative moderating effect of digital technology deployment in the process of supply chain financing.
Details
Keywords
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
Digitalization and marketing technologies have made it possible to overcome some barriers to pricing – a multidisciplinary field between marketing, finance and IT – and have set…
Abstract
Digitalization and marketing technologies have made it possible to overcome some barriers to pricing – a multidisciplinary field between marketing, finance and IT – and have set the stage for a paradigm shift in the pricing profession. Value creation, the pricing process, and price communication have been transformed by innovative business models and advanced algorithmic and human–machine solutions. This chapter synthesizes the literature to date and provides a comprehensive framework for an all-encompassing 360° pricing approach that broadens the understanding of pricing in the context of digital business across all steps of the price management process. Starting from product attributes and motivational beliefs in consumers' value assessment and adoption of (technological or digital) products or services, new business models and pricing models emerge in the digital economy, human–machine solutions for price implementation and repricing are increasingly applied, and price search and communication take place through a variety of digital communication channels. Each stage of this framework discusses concrete examples, highlighting the freemium strategy, the subscription model, price tracking and repricing tools, and digital price information channels such as e-commerce, marketplace, or price comparison platforms. The implications for price management in a digital, technology-driven landscape are discussed from the executive level to the analyst level.
Details