Search results

1 – 10 of 44
Article
Publication date: 3 March 2023

Anxia Wan, Qianqian Huang, Ehsan Elahi and Benhong Peng

The study focuses on drug safety regulation capture, reveals the inner mechanism and evolutionary characteristics of drug safety regulation capture and provides suggestions for…

Abstract

Purpose

The study focuses on drug safety regulation capture, reveals the inner mechanism and evolutionary characteristics of drug safety regulation capture and provides suggestions for effective regulation by pharmacovigilance.

Design/methodology/approach

The article introduces prospect theory into the game strategy analysis of drug safety events, constructs a benefit perception matrix based on psychological perception and analyzes the risk selection strategies and constraints on stable outcomes for both drug companies and drug regulatory authorities. Moreover, simulation was used to analyze the choice of results of different parameters on the game strategy.

Findings

The results found that the system does not have a stable equilibrium strategy under the role of cognitive psychology. The risk transfer coefficient, penalty cost, risk loss, regulatory benefit, regulatory success probability and risk discount coefficient directly acted in the direction of system evolution toward the system stable strategy. There is a critical effect on the behavioral strategies of drug manufacturers and drug supervisors, which exceeds a certain intensity before the behavioral strategies in repeated games tend to stabilize.

Originality/value

In this article, the authors constructed the perceived benefit matrix through the prospect value function to analyze the behavioral evolution game strategies of drug companies and FDA in the regulatory process, and to evaluate the evolution law of each factor.

Details

Kybernetes, vol. 53 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 March 2023

Wu Wei, Hao Chen, Jie Feng and Jingya Li

The purpose of this study is to reveal the mechanism of peer abusive supervision on bystander behavior based on the perspective of bystander from two different paths of bystander…

Abstract

Purpose

The purpose of this study is to reveal the mechanism of peer abusive supervision on bystander behavior based on the perspective of bystander from two different paths of bystander empathy and bystander hostility toward supervisor. At the same time, it discusses the moderation effect of bystander traditionality on the two paths.

Design/methodology/approach

This study conducted a three-wave longitudinal survey. The data were collected from 454 employees and their coworkers in several Chinese enterprises. The authors used Mplus 7.4 and adopted a bootstrapping technique in the data analysis.

Findings

Peer abusive supervision leads bystanders to empathize with the abused colleague and thus exhibit more organizational citizenship behaviors, and peer abusive supervision also induces bystanders to develop hostility toward the abusive supervisor and thus produce more workplace negative gossip behaviors. In addition, it is found that bystander traditionality has a moderation effect in the process by which peer perceptions of abusive supervision influence bystander empathy and bystander hostility.

Originality/value

Based on Affective Events Theory, this study explores the mechanism of colleague perception of abusive supervision on bystander behavior from a bystander perspective. The results of this study not only provide a more comprehensive expansion of the weighting factors in the influence mechanism of abusive supervision but also provide new ideas for organizations to reduce the negative effects of workplace abusive behaviors.

Details

International Journal of Conflict Management, vol. 34 no. 3
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 6 June 2023

Xuehui Hao, Changzheng Wang, Shuai Guo, Jie Ma, Hui Chen and Xingchuan Zhao

The poor corrosion resistance of the ferrite-pearlite steel limits its application in marine engineering because of the enhanced galvanic effect caused by continuously accumulated…

Abstract

Purpose

The poor corrosion resistance of the ferrite-pearlite steel limits its application in marine engineering because of the enhanced galvanic effect caused by continuously accumulated cementite. Cr as one principal alloying element is commonly used to improve the corrosion resistance of steels. This paper aims to study the effect of Cr on corrosion behaviors of ferrite-pearlite steels in an acidic environment.

Design/methodology/approach

The tested steels were immersed in a simulated solution of 10 Wt.% NaCl with pH 0.85 for 72 h to evaluate the corrosion rate. After the immersion test, the corrosion morphologies and products were tested by scanning electron microscopy, energy dispersive X-ray analysis and X-ray diffraction. Meanwhile, an electrochemical workstation was used to study the electrochemical behaviors of samples.

Findings

At the initial corrosion stage, the corrosion rate increased in the sequence of Cr0, Cr0.5 and Cr1 steels, which was because of the competitive effect between the area ratio and the driving force caused by alloyed Cr. However, Cr1 steel exhibited the best corrosion resistance after a 72-h immersion test. This was because the alloyed Cr promoted the formation of protective Fe2O3 and FeCr2O4, which suppressed the preferential dissolution of ferrite and, thus, reduced the accumulation rate of carbides, resulting in the weakened galvanic corrosion.

Originality/value

This paper reports the role that Cr plays in the galvanic corrosion of ferrite-pearlite steels, which is important for the engineering application of ferrite-pearlite steels in marine environment.

Details

Anti-Corrosion Methods and Materials, vol. 70 no. 4
Type: Research Article
ISSN: 0003-5599

Keywords

Article
Publication date: 4 April 2023

Jie Sun and Hao Jiao

This study aims to explore the mediating effect of digital options on the relationship between emerging information technology investments (ITIs) and firm performance (FP). In…

Abstract

Purpose

This study aims to explore the mediating effect of digital options on the relationship between emerging information technology investments (ITIs) and firm performance (FP). In particular, it analyses the performance impacts of investments in five emerging technologies of IT or non-IT firms.

Design/methodology/approach

Secondary data are collected from Chinese A-share listed companies from 2010 to 2018. The authors propose an econometric model focusing on the impact of ITIs on a firm’s market value and profit. A propensity score matching model is applied to control endogeneity.

Findings

The ITIs’ effect on FP is found to be completely mediated by digital options, and the reach of digital options plays a more positive role in the relationship between ITIs and Tobin’s Q, whereas the richness of digital options is stronger between ITIs and return on net assets (ROE). The group study shows that the impact of process technologies such as cloud computing and the Internet of Things has a more profound impact on Tobin’s Q, and the knowledge technologies represented by artificial intelligence, blockchain and big data strongly affect ROE. In addition, the positive relationship between ITIs and FP is unrelated to IT/non-IT firms.

Research limitations/implications

First, the data are based on 219 publicly announced emerging ITIs in China and thus may not be generalizable to other cultural/national contexts. Second, there is a lack of a large sample data set of emerging ITI information in China, and the duration of this study is constrained to the relatively short rise of emerging technologies.

Practical implications

This study provides firm decision-makers with practical implications. The results imply that the effect of ITIs on FP depends on digital options, so both IT firms (e.g., Big Tech giants) and non-IT firms (e.g., incumbents) should discover how to balance firm value and profit in their management of emerging technology investment projects with digital options thinking.

Originality/value

To the best of the authors’ knowledge, this is the first empirical study to investigate the relationship between ITIs and FP from the perspective of digital options, exploring five emerging technologies and considering firm life, size, and state ownership in a sample of Chinese listed firms.

Details

Chinese Management Studies, vol. 18 no. 2
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 24 October 2023

WenFeng Qin, Yunsheng Xue, Hao Peng, Gang Li, Wang Chen, Xin Zhao, Jie Pang and Bin Zhou

The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation…

Abstract

Purpose

The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation methods of the system.

Design/methodology/approach

A multi-channel data acquisition scheme based on PCI-E (rapid interconnection of peripheral components) was proposed. The flexible biosensor is integrated with the flexible data acquisition card with monitoring capability, and the embedded (device that can operate independently) chip STM32F103VET6 is used to realize the simultaneous processing of multi-channel human health parameters. The human health parameters were transferred to the upper computer LabVIEW by intelligent clothing through USB or wireless Bluetooth to complete the transmission and processing of clinical data, which facilitates the analysis of medical data.

Findings

The smart clothing provides a mobile medical cloud platform for wearable medical through cloud computing, which can continuously monitor the body's wrist movement, body temperature and perspiration for 24 h. The result shows that each channel is completely accurate to the top computer display, which can meet the expected requirements, and the wearable instant care system can be applied to healthcare.

Originality/value

The smart clothing in this study is based on the monitoring and diagnosis of textiles, and the electronic communication devices can cooperate and interact to form a wearable textile system that provides medical monitoring and prevention services to individuals in the fastest and most accurate way. Each channel of the system is precisely matched to the display screen of the host computer and meets the expected requirements. As a real-time human health protection platform technology, continuous monitoring of human vital signs can complete the application of human motion detection, medical health monitoring and human–computer interaction. Ultimately, such an intelligent garment will become an integral part of our everyday clothing.

Details

International Journal of Clothing Science and Technology, vol. 36 no. 1
Type: Research Article
ISSN: 0955-6222

Keywords

Open Access
Article
Publication date: 10 November 2023

Na Hao, H. Holly Wang, Xinxin Wang and Wetzstein Michael

This study aims to test the compensatory consumption theory with the explicit hypothesis that China's new-rich tend to waste relatively more food.

Abstract

Purpose

This study aims to test the compensatory consumption theory with the explicit hypothesis that China's new-rich tend to waste relatively more food.

Design/methodology/approach

In this study, the authors use Heckman two-step probit model to empirically investigate the new-rich consumption behavior related to food waste.

Findings

The results show that new-rich is associated with restaurant leftovers and less likely to take them home, which supports the compensatory consumption hypothesis.

Practical implications

Understanding the empirical evidence supporting compensatory consumption theory may improve forecasts, which feed into early warning systems for food insecurity. And it also avoids unreasonable food policies.

Originality/value

This research is a first attempt to place food waste in a compensatory-consumption perspective, which sheds light on a new theory for explaining increasing food waste in developing countries.

Details

China Agricultural Economic Review, vol. 16 no. 1
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 21 March 2022

Qingyan Jiang, Cuihong Yang, Jie Wu and Yan Xia

Known as the major capital providers in Belt and Road countries and the largest carbon emitter in the world, what role China's outward direct investment (ODI) plays in carbon…

Abstract

Purpose

Known as the major capital providers in Belt and Road countries and the largest carbon emitter in the world, what role China's outward direct investment (ODI) plays in carbon neutralization has become a matter of concern. This study aims to measure the impact of China's ODI on the carbon emissions of Belt and Road countries.

Design/methodology/approach

Based on an econometric model and an inter-regional input–output model, a new model measuring the carbon emission effects of ODI is developed.

Findings

The empirical results show that (1) in general, China's ODI generates an emission-reduction effect in Belt and Road countries; (2) The relationship between the emission-reduction effect and income level of host countries shows an approximate inverted U-shaped trend; and (3) China's ODI generates stronger emission-reduction effects on capital-intensive industries.

Originality/value

This study quantitatively measures the scale of carbon emission-increase and reduction effect, which is relatively lacking in previous studies. This study explores the heterogeneity from the perspectives of regions, countries and industries. The authors have compiled an inter-regional input–output table for the Belt and Road countries for 2014 to provide a broad basis for the study of related issues.

Details

International Journal of Emerging Markets, vol. 18 no. 11
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 3 January 2023

Karim Ullah, Muhammad Ashfaque, Muhammad Atiq, Muhammad Khan and Arif Hussain

The purpose of this paper is to explore the types of Shariah capabilities of Islamic banks, which provide bases for the types of Shariah value propositions, offered by the…

Abstract

Purpose

The purpose of this paper is to explore the types of Shariah capabilities of Islamic banks, which provide bases for the types of Shariah value propositions, offered by the relationship managers in their front-line service experiences with the customers.

Design/methodology/approach

A resource-based view of Shariah capabilities and a service-dominant logic view of value propositions are adopted. Fifteen relationship managers from multiple Islamic banks in Pakistan are interviewed to find a typology of Shariah capabilities and a resultant typology of value propositions for Islamic banks.

Findings

The findings suggest that Islamic banks claim to possess five types of Shariah capabilities, namely, Shariah governance capability (SGC), Shariah compliance capability (SCC), Shariah monitoring capability (SMC), Shariah structuring (product) capability (SSC) and Shariah learning capability (SLC). These capabilities lead to four types of values propositions, namely, Shariah identity value (SIV), Riba-free value (RFV), Shariah disclosure value (SDV) and Tangibility value (TV) of the real assets in transactions.

Research limitations/implications

The study has relied on the front-line experiences of relationship managers who are connected to the Islamic banks’ capabilities inside the banks and the value propositions that they offer to show relationships with customers in front-line service experiences. Other stakeholders may have different perspectives on both capabilities and value propositions.

Originality/value

This paper contributes to Islamic finance theory by theoretically and empirically showing two typologies for the Islamic banks' capabilities and value propositions, respectively.

Details

International Journal of Islamic and Middle Eastern Finance and Management, vol. 16 no. 4
Type: Research Article
ISSN: 1753-8394

Keywords

Open Access
Article
Publication date: 14 July 2022

Chunlai Yan, Hongxia Li, Ruihui Pu, Jirawan Deeprasert and Nuttapong Jotikasthira

This study aims to provide a systematic and complete knowledge map for use by researchers working in the field of research data. Additionally, the aim is to help them quickly…

1703

Abstract

Purpose

This study aims to provide a systematic and complete knowledge map for use by researchers working in the field of research data. Additionally, the aim is to help them quickly understand the authors' collaboration characteristics, institutional collaboration characteristics, trending research topics, evolutionary trends and research frontiers of scholars from the perspective of library informatics.

Design/methodology/approach

The authors adopt the bibliometric method, and with the help of bibliometric analysis software CiteSpace and VOSviewer, quantitatively analyze the retrieved literature data. The analysis results are presented in the form of tables and visualization maps in this paper.

Findings

The research results from this study show that collaboration between scholars and institutions is weak. It also identified the current hotspots in the field of research data, these being: data literacy education, research data sharing, data integration management and joint library cataloguing and data research support services, among others. The important dimensions to consider for future research are the library's participation in a trans-organizational and trans-stage integration of research data, functional improvement of a research data sharing platform, practice of data literacy education methods and models, and improvement of research data service quality.

Originality/value

Previous literature reviews on research data are qualitative studies, while few are quantitative studies. Therefore, this paper uses quantitative research methods, such as bibliometrics, data mining and knowledge map, to reveal the research progress and trend systematically and intuitively on the research data topic based on published literature, and to provide a reference for the further study of this topic in the future.

Details

Library Hi Tech, vol. 42 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 44