Search results
1 – 9 of 9Yingxia Li, Norazlyn Kamal Basha, Siew Imm Ng and Qiaoling Lin
Cultivating loyal customers is a pressing concern for streamers. The present study investigates how to build interpersonal relationships with streamers and whether different…
Abstract
Purpose
Cultivating loyal customers is a pressing concern for streamers. The present study investigates how to build interpersonal relationships with streamers and whether different interpersonal relationship factors lead to repurchase intention and WOM intention in live streaming commerce. The moderating effect of gender is also examined.
Design/methodology/approach
A self-administered questionnaire was completed by 429 live streaming commerce users in mainland China. Partial least squares structural equation modeling was used to test the research hypotheses.
Findings
The results indicate that all four streamer attributes (expertise, authenticity, attractiveness, and homophily) have a positive influence on swift guanxi, and swift guanxi is effective in predicting both calculative commitment and affective commitment. In addition, all interpersonal relationship factors (swift guanxi, calculative commitment, and affective commitment) significantly affect repurchase intentions, with only affective commitment being linked to WOM intention. Also, the moderating role of gender was confirmed in expertise – swift guanxi, attractiveness – swift guanxi, cognitive commitment – repurchase intention and affective commitment – repurchase intention linkages.
Originality/value
This paper contributes to the live streaming commerce literature by integrating swift guanxi, calculative commitment, and affective commitment to understand the repurchase intention and WOM intention from the relationship-building process perspective. In addition, this paper enriches the source credibility and source attractiveness models by identifying gender boundaries on the effectiveness of these models in predicting swift guanxi.
Details
Keywords
Huimin Li, Chenchen Xu, Yongchao Cao and Chengyi Zhang
The purpose of this paper is twofold: first, it explores the influencing factors of the government’s trust decision-making in the private sector; second, it explores how these…
Abstract
Purpose
The purpose of this paper is twofold: first, it explores the influencing factors of the government’s trust decision-making in the private sector; second, it explores how these influencing factors affect the government’s trust decisions.
Design/methodology/approach
A theoretical model was established, and a questionnaire survey was conducted among 152 professionals. The collected datas were analyzed by the structural equation modeling (SEM) method.
Findings
The study identified four critical factors that influence the government’s decision to trust the private sector in public-private-partnership (PPP) projects. All the four factors have a positively correlated impact on the government’s trust decision-making. The structural equation path analysis shows that the most important factor affecting the government’s trust decision-making is the trustee’s (private sector) trustworthy characteristics, and the path coefficient is 0.92. The path coefficients of risk perception and the trustor’s trust tendency are 0.83 and 0.74, respectively. The influence of the legal system environment on government trust decision-making is moderate, with a path coefficient of 0.68.
Originality/value
This paper contributes to the literature in two aspects. First, the factors influencing decision-making to government trust in the private sector in PPP projects have been identified. Second, a comprehensive view of the mechanism of government trust in the private sector in PPP projects has been theorized by the SEM method.
Details
Keywords
Mathew Gregory Tagwai, Onimisi Abdullateef Jimoh, Shaib Abdulazeez Shehu and Hareyani Zabidi
This paper aims to give an oversight of what is being done by researchers in GIS and remote sensing (field) to explore minerals. The main objective of this review is to explore…
Abstract
Purpose
This paper aims to give an oversight of what is being done by researchers in GIS and remote sensing (field) to explore minerals. The main objective of this review is to explore how GIS and remote sensing have been beneficial in identifying mineral deposits for easier and cost-effective mining.
Design/methodology/approach
The approach of this research used Web of Science to generate a database of published articles on the application of GIS and remote sensing techniques for mineral exploration. The literature was further digested, noting the main findings, adopted method, illustration and research scales.
Findings
When applied alone, each technique seems effective, but it is important to know that combining different methods is more effective in identifying ore deposits.
Originality/value
This paper also examined and provided possible solutions to both current and future perspective issues relating to the application of GIS and remote sensing to mineral exploration. The authors believe that the conclusions and recommendations drawn from case studies and literature review will be of great importance to geoscientists and policymakers.
Details
Keywords
Luca Pugi, Giulio Rosano, Riccardo Viviani, Leonardo Cabrucci and Luca Bocciolini
The purpose of this work is to optimize the monitoring of vibrations on dynamometric test rigs for railway brakes. This is a quite demanding application considering the continuous…
Abstract
Purpose
The purpose of this work is to optimize the monitoring of vibrations on dynamometric test rigs for railway brakes. This is a quite demanding application considering the continuous increase of performances of high-speed trains that involve higher testing specifications for brake pads and disks.
Design/methodology/approach
In this work, authors propose a mixed approach in which relatively simple finite element models are used to support the optimization of a diagnostic system that is used to monitor vibration levels and rotor-dynamical behavior of the machine. The model is calibrated with experimental data recorded on the same rig that must be identified and monitored. The whole process is optimized to not interfere with normal operations of the rig, using common inertial sensor and tools and are available as standard instrumentation for this kind of applications. So at the end all the calibration activities can be performed normally without interrupting the activities of the rig introducing additional costs due to system unavailability.
Findings
Proposed approach was able to identify in a very simple and fast way the vibrational behavior of the investigated rig, also giving precious information concerning the anisotropic behavior of supports and their damping. All these data are quite difficult to be found in technical literature because they are quite sensitive to assembly tolerances and to many other factors. Dynamometric test rigs are an important application widely diffused for both road and rail vehicles. Also proposed procedure can be easily extended and generalized to a wide value of machine with horizontal rotors.
Originality/value
Most of the studies in literature are referred to electrical motors or turbomachines operating with relatively slow transients and constant inertial properties. For investigated machines both these conditions are not verified, making the proposed application quite unusual and original with respect to current application. At the same time, there is a wide variety of special machines that are usually marginally covered by standard testing methodologies to which the proposed approach can be successfully extended.
Details
Keywords
The purpose of this paper is to extract electrochemical reaction kinetics parameters, such as Tafel slope, exchange current density and equilibrium potential, which cannot be…
Abstract
Purpose
The purpose of this paper is to extract electrochemical reaction kinetics parameters, such as Tafel slope, exchange current density and equilibrium potential, which cannot be directly measured, this study aims to propose an improved particle swarm optimization (PSO) algorithm.
Design/methodology/approach
In traditional PSO algorithms, each particle’s historical optimal solution is compared with the global optimal solution in each iteration step, and the optimal solution is replaced with a certain probability to achieve the goal of jumping out of the local optimum. However, this will to some extent undermine the (true) optimal solution. In view of this, this study has improved the traditional algorithm: at each iteration of each particle, the historical optimal solution is not compared with the global optimal solution. Instead, after all particles have iterated, the optimal solution is selected and compared with the global optimal solution and then the optimal solution is replaced with a certain probability. This to some extent protects the global optimal solution.
Findings
The polarization curve plotted by this equation is in good agreement with the experimental values, which demonstrates the reliability of this algorithm and provides a new method for measuring electrochemical parameters.
Originality/value
This study has improved the traditional method, which has high accuracy and can provide great support for corrosion research.
Details
Keywords
Jan Mei Soon-Sinclair, Rounaq Nayak and Louise Manning
The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used…
Abstract
Purpose
The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used linear approaches to examine the root causes of the melamine milk scandal.
Design/methodology/approach
In the present study, we applied a systems approach to the melamine milk scandal to identify the complex systems-level failures across the supply chain leading to the incident and why food fraud incidents such as this occurred in the dairy sector. Additionally, systemic failures associated with food fraud vulnerability factors were considered (i.e. opportunities, motivation and control measures).
Findings
48 contributory factors of influence were identified and grouped across six sociotechnical levels across the Chinese dairy system, from government to equipment and surroundings. Lack of vertical integration (processes and communication) contributed to the failure. When viewed from a broader perspective, the melamine milk scandal can be linked to a series of human errors and organisational issues associated with government bodies, the dairy supply chain, individual organisations and management decisions and individual actions of staff or processes.
Practical implications
This approach is of value to policymakers and the industry as it supports public health investigations of food fraud incidents and proactive food safety management.
Originality/value
To the best of our knowledge, this is the first study to analyse a food safety or fraud incident using the AcciMap approach and the food fraud vulnerability assessment (FFVA) technique. AcciMap analysis is applied to both unintentional and intentional aspects of the incident.
Details
Keywords
Hua Liu and Shaobo Wei
Drawing upon resource dependence theory, this study aims to examine how a firm’s information technology (IT) capabilities (i.e. IT integration and IT reconfiguration) influence…
Abstract
Purpose
Drawing upon resource dependence theory, this study aims to examine how a firm’s information technology (IT) capabilities (i.e. IT integration and IT reconfiguration) influence its responses to disruptions – bridging with a current supplier and buffering with an alternative supplier. We further examine how such relationships are moderated by the firm–supplier relative dependence (i.e. firm dependence advantage and supplier dependence advantage).
Design/methodology/approach
Based on data from 141 match-paired surveys of firms in China, we test our model.
Findings
Our study finds that IT integration positively influences bridging and IT reconfiguration positively influences buffering. Furthermore, our findings indicate that the positive impact of IT integration on bridging is negatively influenced by the firm’s dependence (FD) advantage but positively moderated by the supplier’s dependence advantage. By contrast, the positive impact of IT reconfiguration on buffering is negatively influenced by the FD advantage.
Originality/value
Our study provides a more nuanced insight into the effects of IT capabilities on disruption responses and a better understanding of the buyer–supplier dependence boundary conditions under which these effects vary.
Details
Keywords
Kritcha Yawised, Darlin Apasrawirote, Maneerut Chatrangsan and Paisarn Muneesawang
The purpose of this study is to conduct a systematic literature review of the adoption of immersive marketing technology (IMT) in terms of strategic planning of its adoption…
Abstract
Purpose
The purpose of this study is to conduct a systematic literature review of the adoption of immersive marketing technology (IMT) in terms of strategic planning of its adoption, resource requirements and its implications and challenges.
Design/methodology/approach
This study categorizes and contextualizes qualitative approaches to evaluate the literature, with Scopus databases serving as the primary source of 90 selected articles in the areas of information technology, business and marketing strands. Theme analysis was carried out using thematic techniques and grounded approach principles to facilitate thematic coding and generate theme analysis.
Findings
The analysis was supported by the three concepts of business flexibility, agility and adaptability, which were drawn as a strategy for IMT adoption. The findings presented three main themes: proactive flexibility, responsive agility and reactive adaptability that enable business owner–managers to craft a strategy for IMT adoption.
Originality/value
The novel contribution of this study is the inclusion of key implications related to IMT as a starting point of the next level of innovative marketing for all academics, practitioners and business owner–managers.
Details
Keywords
Arindam Bhattacharjee and Anita Sarkar
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…
Abstract
Purpose
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.
Design/methodology/approach
Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.
Findings
Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.
Originality/value
This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.
Details