Search results

11 – 20 of 269
Book part
Publication date: 26 August 2019

Marie Ouellet and Sadaf Hashimi

Purpose – Criminal groups have long been central to explanations of crime and deviance. Yet, challenges in measuring their dynamic and transient nature meant that group-level…

Abstract

Purpose – Criminal groups have long been central to explanations of crime and deviance. Yet, challenges in measuring their dynamic and transient nature meant that group-level explanations were often displaced in favor of individual-level ones. This chapter outlines how network methods provide a powerful tool for modeling the dynamic nature of criminal groups.

Approach – The chapter starts by providing a brief introduction to social network analysis, including key concepts and terminology. The chapter then focuses on the types of relational data available to study criminal groups, and how network methods can be used to delineate group boundaries. The chapter concludes by presenting a framework for understanding group dynamics from a network perspective, describing the contributions of network analysis to theories of group processes.

Findings – Network methods have provided meaningful advances to the study of group dynamics, leading scholars to revisit assumptions about the impact of group’ structure on delinquent behavior. Network studies of group dynamics have primarily focused on the cohesion–delinquency link (within-group structure) and the social contagion of conflict (between-group structure), highlighting important opportunities for the intersection of these two inquiries.

Value – Network methods provide a means to revisit and extend theories of crime and delinquency with a focus on social structure. The unique affinity between group dynamics and network methods highlights immense opportunities for expanding the knowledge of collective trajectories.

Details

Methods of Criminology and Criminal Justice Research
Type: Book
ISBN: 978-1-78769-865-9

Keywords

Article
Publication date: 26 February 2020

Yitong Yu, Shi Xu, Gang Li and Da Shi

This study aims to provide researchers in hospitality management with a comprehensive understanding of the experience sampling method (ESM) and to engage them in the use of ESM in…

1198

Abstract

Purpose

This study aims to provide researchers in hospitality management with a comprehensive understanding of the experience sampling method (ESM) and to engage them in the use of ESM in their future research. With this critical discussion of the advantages and challenges of the method, researchers can apply it appropriately to deepen and broaden their research findings.

Design/methodology/approach

This study chooses an empirical example in the context of hotel employees’ surface acting, tiredness and sleep quality to illustrate the application of ESM. Based on the example, this paper conducts a two-level modeling in Mplus, including a cross-level mediation analysis and mean centering.

Findings

This paper demonstrates the applicability and usefulness of ESM for hospitality research and provides a detailed demonstration of how to use the statistical program Mplus to analyze ESM data. With this paper, researchers will be able to consider how to engage ESM in their future studies.

Originality/value

To the best of the authors‘ knowledge, this paper is among the first to provide a hands-on demonstration of ESM to hospitality researchers. The authors call for more research in hospitality management to use ESM to answer complex and pressing research questions.

Details

International Journal of Contemporary Hospitality Management, vol. 32 no. 4
Type: Research Article
ISSN: 0959-6119

Keywords

Open Access
Article
Publication date: 12 July 2023

Nicola Cobelli and Emanuele Blasioli

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management…

1030

Abstract

Purpose

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management. Furthermore, this study aims to provide an overview of the existing resources in healthcare management and education and other developing interdisciplinary fields.

Design/methodology/approach

This work uses bibliometric analysis to conduct a comprehensive review to map the use of the unified theory of acceptance and use of technology (UTAUT) and the unified theory of acceptance and use of technology 2 (UTAUT2) research models in healthcare academic studies. Bibliometric studies are considered an important tool to evaluate research studies and to gain a comprehensive view of the state of the art.

Findings

Although UTAUT dates to 2003, our bibliometric analysis reveals that only since 2016 has the model, together with UTAUT2 (2012), had relevant application in the literature. Nonetheless, studies have shown that UTAUT and UTAUT2 are particularly suitable for understanding the reasons that underlie the adoption and non-adoption choices of eHealth services. Further, this study highlights the lack of a multidisciplinary approach in the implementation of eHealth services. Equally significant is the fact that many studies have focused on the acceptance and the adoption of eHealth services by end users, whereas very few have focused on the level of acceptance of healthcare professionals.

Originality/value

To the best of the authors’ knowledge, this is the first study to conduct a bibliometric analysis of technology acceptance and adoption by using advanced tools that were conceived specifically for this purpose. In addition, the examination was not limited to a certain era and aimed to give a worldwide overview of eHealth service acceptance and adoption.

Details

The TQM Journal, vol. 35 no. 9
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 4 April 2018

Juan Shi, Ping Hu, Kin Keung Lai and Gang Chen

As a new communication paradigm, social networking sites (SNS) have boosted information diffusion and viral marketing. Prior researchers have identified various factors affecting…

5661

Abstract

Purpose

As a new communication paradigm, social networking sites (SNS) have boosted information diffusion and viral marketing. Prior researchers have identified various factors affecting information dissemination on SNS. However, they often focus on limited factors and there is a lack of an integrated theoretical framework that explains aspects of relevant factors. Besides, the research on the impacts of relationships on individual retweeting behavior is still controversial. The purpose of this paper is to propose a theoretical framework to systematically investigate the determinants of individual dissemination behavior on SNS based on the elaboration likelihood model (ELM). Moreover, the authors also examine the relative importance of those relevant factors.

Design/methodology/approach

The authors randomly selected 1,250 members of Twitter and crawled posts published by each member since he/she created the Twitter account using Twitter API. The authors processed the data to create panel data and tested hypotheses with the panel logit model.

Findings

Factors both on the central route and on the peripheral route of ELM have positive impacts on individual dissemination behavior. Among them, information receiver-related factor and relationships-related factors are the most influential. Contrastingly, source-related factors are the least influential. Furthermore, the authors find that social tie strength mediates almost 50 percent of the effect of value homophily on individual dissemination behavior.

Originality/value

The authors are the first to directly apply ELM to examine individual dissemination behavior on SNS. By integrating factors into the two information processing routes, They incorporate relevant factors into the model and systematically analyze their impacts on individual retweeting behavior on SNS. The research offers at least one explanation for the contradictory findings about the effect of homophily on individual sharing behavior in previous research. The authors propose new variables that gauge topical relevance and interpersonal value homophily on SNS.

Article
Publication date: 27 June 2022

Ke Ma, Yu Li, Guoyang Liu, Gang He, Chun Sha and Yilin Peng

The purpose of this study is to investigate the deformation characteristics and failure modes of the right bank slope of Xiluodu Hydropower Station after excavation.

Abstract

Purpose

The purpose of this study is to investigate the deformation characteristics and failure modes of the right bank slope of Xiluodu Hydropower Station after excavation.

Design/methodology/approach

Micro-seismic monitoring technology is applied to obtain the microfracture information and study the internal damage evolution law of the slope rock mass. A numerical model for discontinuous deformation analysis (DDA) is established to analyse the deformation characteristics and failure mode of the slope. Micro-seismic monitoring and DDA can verify and supplement each other's results in the investigation of slope failure.

Findings

The results show that the slope has a downhill displacement along the weathered zone under natural conditions; the maximum resultant displacement at the monitoring point is 380 mm. The micro-seismic events are concentrated in an area located 30–100 m horizontally away from the slope surface and at an elevation of 390–470 m. The distribution of these micro-seismic events is consistent with the location of the unloading and weathered zones; it is the same as the DDA simulation result.

Originality/value

The study is anticipated to be used as reference for the stability analysis of rock slopes. By combining the continuous (micro-seismic monitoring technology) and discontinuous (DDA) methods, the entire process starting from the gradual accumulation of internal rock micro-damage to the macroscopic discontinuous deformation and failure of the slope can be investigated.

Details

Engineering Computations, vol. 39 no. 8
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 28 November 2023

Hitesh Sharma, Praveen Ranjan Srivastava, Sajjad M. Jasimuddin, Zuopeng Justin Zhang and Ikram Jebabli

This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart…

Abstract

Purpose

This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart public services, cyber security issues, consumer behaviour and governance). Using papers from multiple sources, the relationship between technology advancements and tourist’s privacy concerns has been established.

Design/methodology/approach

This study adopted a machine learning-based systematic literature review approach to find out the clusters. The study analysed 68 papers using the topic modelling approach. A four-cluster solution was considered to be most representative of the extant literature identified using bibliographic coupling. Finally, content analysis of the selected literature has been performed.

Findings

This study identified four factors majorly leading to privacy concerns amid increasing technological advancements. Moreover, these factors were found to have a dyadic relationship with technological advancements. To everyone’s amazement, sustainable tourism was also found to have led to privacy concerns among tourists along with a lack of governance and cyber security issues. Furthermore, cluster-wise future research directions are provided based on the content analysis.

Originality/value

This study contributes to the literature by systematically reviewing and identifying the four dimensions leading to privacy concerns. To the best of the authors’ knowledge, the study done is the only attempt to synthesize the extant literature on tourists’ privacy concerns using an unbiased scientific approach.

目的

本研究对旅游业当前的隐私问题进行了全面分析, 以揭示导致此类担忧的关键因素(即智能公共服务、网络安全问题、消费者行为和治理)。 通过考察来自多方渠道的现有文献, 本研究确立了技术进步与游客隐私问题之间的关系。

设计/方法/途径

本研究采用基于机器学习的系统文献综述方法来找出聚类。 该研究使用主题建模方法分析了 68 篇文章。四聚类解决方案是现有文献中最具代表的 文献分类方法。最后, 本研究对所选文献进行了内容分析。

研究结果

这项研究确定了在技术进步不断增加的情况下主要导致隐私问题的四个因素。 此外, 这些因素被发现与技术进步有二元关系。 本研究还发现可持续旅游业引发了游客对隐私的担忧以及缺乏治理和网络安全问题。 此外, 通过基于内容的分析, 本研究提供了未来的聚类研究方向。

独创性

本研究对现有文献的贡献在于通过系统地文献综述和分析以确定导致隐私问题的四个维度。该研究是基于公正的科学方法综合现有游客隐私问题文献的首度尝试。

Finalidad/Objetivo

Este estudio proporciona un análisis exhaustivo de la actual preocupación por la privacidad en el sector turístico, poniendo al descubierto los factores clave que la generan (los servicios públicos inteligentes, los problemas de ciberseguridad, el comportamiento de los consumidores y la gobernanza). Gracias al uso de artículos de múltiples fuentes, se ha establecido la relación entre los avances tecnológicos y la preocupación de los turistas por la privacidad.

Diseño/Metodología/Enfoque

Este estudio adoptó un enfoque de revisión sistemática de la literatura basado en el aprendizaje automático para descubrir los conglomerados. El estudio analizó sesenta y ocho artículos utilizando el enfoque de modelización de temas. Se consideró que una solución de cuatro conglomerados era la más representativa de la literatura existente identificada mediante el acoplamiento bibliográfico. Por último, se realizó un análisis de contenido de la bibliografía seleccionada.

Hallazgos

En este estudio se identificaron cuatro factores principales que suscitan inquietud por la privacidad en medio de los crecientes avances tecnológicos. Además, se descubrió que estos factores tienen una relación diádica con dichos avances. Para sorpresa de todos, se halló que el turismo sostenible, junto con la falta de gobernanza y los problemas de ciberseguridad, también suscitan entre los turistas preocupaciones por su privacidad. Finalmente, el análisis de contenido ofrece orientaciones para futuras investigaciones.

Originalidad

Este estudio contribuye a la literatura haciendo una revisión sistemática e identificando las cuatro dimensiones que conducen a la preocupación por la privacidad. Este estudio es el único intento de sintetizar la bibliografía existente sobre la preocupación de los turistas por su privacidad utilizando un enfoque científico imparcial.

Article
Publication date: 12 June 2020

Yitong Yu, Shi Xu, Gang Li and Haiyan Kong

This paper aims to provide researchers and practitioners with an understanding of abusive supervision in the context of hospitality. It seeks to conduct a comprehensive review of…

2845

Abstract

Purpose

This paper aims to provide researchers and practitioners with an understanding of abusive supervision in the context of hospitality. It seeks to conduct a comprehensive review of the area and offer recommendations for future research by exploring the antecedents, consequences, mechanisms and designs of research on abusive supervision.

Design/methodology/approach

Content analysis was conducted to review and analyze studies on abusive supervision in the context of hospitality. Previous studies were searched in the EBSCO, Scopus, Web of Science and Google Scholar electronic databases.

Findings

In total, 36 referred articles related to abusive supervision in hospitality were reviewed across four key areas, namely, antecedents, consequences, mechanisms and research design. After reviewing the research on abusive supervision in the context of hospitality, this paper offers future research directions with respect to research focus and research design.

Research limitations/implications

This paper only included English articles from peer-reviewed journals on abusive supervision. The number of reviewed articles was relatively small. This limitation may have arisen because abusive supervision is a new research field and is still a sensitive topic.

Practical implications

The results of this study may encourage managers to minimize or even halt abusive supervision. From an organizational perspective, formal policies may be developed to regularize supervisors’ behavior. In turn, employees could use this paper to learn further about abusive behavior and how to handle it effectively.

Social implications

The review highlighted the negative consequences of abusive supervision. Managers should urgently realize the seriousness of abusive supervision and develop effective policies to minimize its negative effect.

Originality/value

This paper contributes to the emerging literature on abusive supervision in the context of hospitality by identifying key research trends and framing the outlines of empirical studies. It identifies research gaps, and as the first review of abusive supervision in hospitality, it may encourage researchers to explore the topic on the basis of the characteristics of the sector and offer suggestions for future research.

Details

International Journal of Contemporary Hospitality Management, vol. 32 no. 7
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 8 April 2016

Xiaonan Zhang, Sanyuan Shi, Hongyu Zhao, Man Lu and Xuguang Li

This paper aims to first analyze the reasons of a brick-wooden building tilts in Yunnan province in China. Then, a jacking method which combines the stress release methods and the…

Abstract

Purpose

This paper aims to first analyze the reasons of a brick-wooden building tilts in Yunnan province in China. Then, a jacking method which combines the stress release methods and the excavation of stress release trench were put forward.

Design/methodology/approach

This method uses the anchor static pile to guarantee the safety of the building in the process of rectifying.

Findings

The practice showed that the inclination rate of the building was stable in the process of jacking, which proved the efficiency of the proposed method.

Originality/value

It has a great value for similar rectification projects, and for the protection of cultural heritage and ancient buildings have a positive effect.

Details

World Journal of Engineering, vol. 13 no. 2
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 4 July 2023

Kai Shi, Jun Li and Gang Bao

The structural adaptive ability of the soft robot is fully demonstrated in the grasping task of the soft hand. A soft hand can easily realize the envelope operation of the object…

Abstract

Purpose

The structural adaptive ability of the soft robot is fully demonstrated in the grasping task of the soft hand. A soft hand can easily realize the envelope operation of the object without planning. With the continuous development of robot applications, researchers are no longer satisfied with the ability of the soft hand to grasp. The purpose of this paper is to perceive the object’s shape while grasping to provide a decision-making basis for more intelligent robot applications.

Design/methodology/approach

This paper proposes a dual-signal comparison method to obtain the fingertip position. The dual signal includes the displacement calculated by the static model without considering the external load change and the displacement calculated by the bending sensor. The dual-signal comparison method can use the obvious change trend difference between the above two signals in the hover and contact states to identify the touch position. The authors make the soft hand scan around the object through touch operation to detect the object’s shape, and the tracks of every touch fingertip position can envelop the object’s shape.

Findings

The experimental results show that the dual-signal comparison method can accurately identify the contact moment of soft fingers. This detection method makes the soft hand develop the shape detection ability. The soft hand in the experiment can perceive squares, circles and a few other complex shapes.

Originality/value

The dual-signal comparison method proposed in this paper can detect a touch action by using the signal change trend when the working condition suddenly changes with the rough robotic model and sensing, thus improving the utilization value of the measured signal. The problems of large model errors and inaccurate sensors also negatively impact the use of other soft robots. It is generally difficult to achieve good results by directly using these models and sensors with the thinking of rigid robot analysis. The dual-signal comparison method in this paper can provide some reference for this aspect.

Details

Industrial Robot: the international journal of robotics research and application, vol. 50 no. 6
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 21 July 2022

Chaolun Yuan, Weihua Liu, Gang Zhou, Xiaoran Shi, Shangsong Long, Zhixuan Chen and Xiaoyu Yan

This study aims to empirically examine the effect of supply chain innovation (SCI) announcements on shareholder value within the context of Industry 4.0 and Industry 5.0.

Abstract

Purpose

This study aims to empirically examine the effect of supply chain innovation (SCI) announcements on shareholder value within the context of Industry 4.0 and Industry 5.0.

Design/methodology/approach

This study uses an event study method to examine the effect of SCI announcements on shareholder value of the 156 listed companies in China.

Findings

First, SCI announcements have a positive effect on shareholder value. Second, SCI with an integrated form more positively affects shareholder value than SCI with an independent form. SCI at the strategy level more positively affects shareholder value than SCI at the operation level. Technology-type SCI more positively affects shareholder value than process-type SCI. Third, this study finds that investors pay more attention to the SCI of companies in the service industry than that of in the manufacturing industry. Finally, the post-hoc analysis finds that digital SCI more positively affects shareholder value than intelligent SCI.

Originality/value

First, most scholars use questionnaire data rather than second-hand data to conduct empirical research to explore the impact of SCI on performance. Second, although scholars focus on performance comprehensively, including operational, financial, relational and environmental performance, no scholars use an event study to explore the impact of SCI on the stock market. Third, no scholars have explored the differential impact of SCI in different industries. Forth, few scholars have classified SCI according to the characteristics to explore the differential impact of SCI. Finally, the differences between SCI of Industry 4.0 and SCI of Industry 5.0 have been described, but no scholars have used empirical research to explore the differences.

Details

Industrial Management & Data Systems, vol. 122 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

11 – 20 of 269