Search results

1 – 10 of over 31000
Article
Publication date: 30 September 2014

Zongchao Li and Cong Li

Although a large number of prior studies have discussed the impact of using social media to organizations, the existing literature has not yet provided a clear guidance on what…

2263

Abstract

Purpose

Although a large number of prior studies have discussed the impact of using social media to organizations, the existing literature has not yet provided a clear guidance on what specific communication strategy organizations should adopt on social media and what relationship they need to establish with the public. To fill this theoretical gap, the purpose of this paper is to examine the effects of message strategy and interactivity from a relationship-building perspective within a social media context.

Design/methodology/approach

Through a 2×2 between-subjects experiment (n=84), this study tests the effects of two message strategies, communal-relationship oriented messages and exchange-relationship oriented messages, with either a high or low level of interactivity within a corporate Twitter setting.

Findings

The study findings indicate that communication strategies with different relationship orientations differ in quality. Communal-relationship oriented messages tend to generate more favorable relationship outcomes such as trust and control mutuality than exchange-relationship oriented messages. Message interactivity also positively influences attitude toward the company, perceived company credibility, and commitment.

Originality/value

The unique contribution of this study is to extend relationship theories to a discussion of what message strategies organizations should use on social media. It suggests that messages oriented toward different relationships can lead to different outcomes. It also demonstrates the effectiveness of message interactivity in building a relationship between an organization and the public.

Article
Publication date: 1 June 2005

Ruey‐Kei Chiu and Jason C.H. Chen

The paper aims to propose a model that attempts to build an innovative common gateway compliant with RosettaNet Standards for the secure message exchange between electronic…

1475

Abstract

Purpose

The paper aims to propose a model that attempts to build an innovative common gateway compliant with RosettaNet Standards for the secure message exchange between electronic businesses in this age of internet economy.

Design/methodology/approach

The use of RosettaNet Standards is to achieve the effectiveness and efficiency of message exchange, and consequently gain mutual benefits by means of agile response for cross‐organizational co‐operation. This common message gateway is built and implemented as an organization's front‐end interface, but is seamlessly integrated with business's back‐end information systems for the message exchange with the business partners of the organization. The proposed common gateway service model provides organizations with low cost, high efficiency, high security of message exchange and transmission over the internet. A prototyping system is also built and tested in a local network devices manufacturing company with its suppliers to examine its feasibility and efficiency.

Findings

The result shows that the service model can help the company to achieve a new level of efficiency and effectiveness of streamlining data flow and creating a seamless link with its business partners in this era of internet economy.

Originality/value

The paper presents a common gateway service system for secure data exchange and transmission over the internet between business partners to build a value‐added supply network.

Details

Industrial Management & Data Systems, vol. 105 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Article
Publication date: 5 June 2007

Ruey‐Kei Chiu, Shiao‐Ping Yu and S.C. Lenny Koh

To present a research model attempting to build an innovative common gateway complaint with Rosettanet Standards for the secure message exchange between electronic businesses…

Abstract

Purpose

To present a research model attempting to build an innovative common gateway complaint with Rosettanet Standards for the secure message exchange between electronic businesses under this age of internet economy. The use of Rosettanet Standards is to achieve the effectiveness and efficiency of message exchange and consequently gain mutual benefits by means of agile response for cross‐organizational co‐operation.

Design/methodology/approach

The common service gateway is modeled by taking the advantages of transmission comply with the standard model specified by RosettaNet among business trading partners involved in supply chain system. A prototyping system compliant with the model presented is built and installed as a gateway interface of digital firms and seamlessly integrate to the firm's backend information system to conduct the message exchange with its business trading partners. The prototype is also implemented to prove the feasibility and effectiveness of this proposal of innovative model.

Findings

Through the practical experiment, the service model provided can really assist the firms using this service gateway to conduct its peer trading partners with having same gateway installed may streamline their flow of business data and create a higher value of supply chain between them in terms of communication and operation costs.

Research limitations/implications

More experiments and trials of the prototyping system need to be conducted in different test cases in order to make a concrete conclusion of this paper.

Practical implications

The adoption of international standard model is easier to implement a supply chain system and the business value is also can be achieved if the electronic data exchange is carried over the internet.

Originality/value

The system model presented in this paper can be a valuable reference for further similar development to build an electronic business to achieve the low cost, high efficiency, high security message exchange for digital firms at this internet era.

Details

Benchmarking: An International Journal, vol. 14 no. 3
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 1 December 2005

Jianying Zhou, Jose Onieva and Javier Lopez

As a value‐added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a…

Abstract

Purpose

As a value‐added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. This paper aims to present two optimized multi‐party certified email protocols.

Design/methodology/approach

Reviews two existing email protocols and provides a modified version to overcome their security flaws and weaknesses. Extends the two‐party protocol to a multi‐party scenario.

Findings

Both of the protocols have three major features. A sender could notify multiple recipients of the same information while only those recipients who acknowledged are able to get the information. Both the sender and the recipients can end a protocol run at any time without breach of fairness. The exchange protocols are optimized, each of which has only three steps, and the trusted third party will not be involved unless an exception (e.g. a network failure or a party's misbehavior) occurs.

Originality/value

Provides a focus on a value‐added service – certified email.

Details

Information Management & Computer Security, vol. 13 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 29 August 2008

Juha Puustjärvi

This paper aims to report work on achieving semantic interoperability in electronic auctions. In particular, it considers the advantages and drawbacks of using hard‐coding and…

Abstract

Purpose

This paper aims to report work on achieving semantic interoperability in electronic auctions. In particular, it considers the advantages and drawbacks of using hard‐coding and using semantic messages in the communication between the auction system and the participants of the auction.

Design/methodology/approach

It is demonstrated that although XML‐documents are commonly used for information exchange they do not provide any means of talking about the semantics (i.e. meaning) data. It is also shown that by expressing exchanged documents by resource description framework (RDF) the semantics of the messages can be captured in the message.

Findings

It is recognized that hard‐coding is proven to be a valuable and powerful way for an exchange of structured and persistent business documents (messages). However, if we use hard‐coding in the case of non‐persistent documents and non‐static markets we will encounter problems in deploying new auction policies and extending the system by new participants.

Practical implications

The introduction of the RDF‐technology in message exchange is challenging as it incorporates Semantic web technologies into many parts of the auction system, e.g. on data stores and query languages. The introduction of this technology is also an investment. The investment on new Semantic web technology includes a variety of costs including software, hardware and training costs.

Originality/value

By automating electronic auctions both buyers and sellers can benefit as they can achieve cost reductions and shorten the duration of the auction processes. Also new auction formats can be easily deployed.

Details

International Journal of Web Information Systems, vol. 4 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 April 1990

Fay Turner

The Interlibrary Loan (ILL) protocol is a standard based on the OSI Reference Model that permits ILL messages to be exchanged between heterogeneous systems. By defining a standard…

Abstract

The Interlibrary Loan (ILL) protocol is a standard based on the OSI Reference Model that permits ILL messages to be exchanged between heterogeneous systems. By defining a standard for computer communications, the protocol permits the exchange of ILL messages between bibliographic institutions that use different computers, systems, and communication services. Recently approved as a Draft International Standard by the International Standards Organization, the protocol is expected to become an International Standard in 1991. Implementations based on this standard are currently being developed by institutions and software vendors in North America and Europe.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 21 November 2008

Luiz Angelo Steffenel, Maxime Martinasso and Denis Trystram

The purpose of this paper is to explain one of the most important collective communication patterns used in scientific applications which is the complete exchange, also called…

Abstract

Purpose

The purpose of this paper is to explain one of the most important collective communication patterns used in scientific applications which is the complete exchange, also called All‐to‐All. Although efficient algorithms have been studied for specific networks, general solutions like those available in well‐known MPI distributions (e.g. the MPI_Alltoall operation) are strongly influenced by the congestion of network resources.

Design/methodology/approach

In this paper we present an integrated approach to model the performance of the All‐to‐All collective operation, which consists in identifying a contention signature that characterizes a given network environment, using it to augment a contention‐free communication model.

Findings

This approach, assessed by experimental results, allows an accurate prediction of the performance of the All‐to‐All operation over different network architectures with a small overhead.

Practical implications

The paper discusses the problem of network contention in a grid environment, studying some strategies to minimize the impact of contention on the performance of an All‐to‐All operation.

Originality/value

The approach used, assessed by experimental results, allows an accurate prediction of the performance of the All‐to‐All operation over different network architectures with a small overhead. Also discussed is the problem of network contention in a grid environment and some strategies to minimize the impact of contention on the performance of an All‐to‐All operation.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 August 1992

Haydee S. Sheombar

Argues that, in order to use electronic data interchange (EDI)optimally, the current ways of working need to be redesigned. Here thesubject‐matter for redesign is the…

Abstract

Argues that, in order to use electronic data interchange (EDI) optimally, the current ways of working need to be redesigned. Here the subject‐matter for redesign is the boundary‐crossing logistical processes in the value‐adding partnerships of two organizations. The business redesigner needs, among other things, an understanding of the basic capabilities of EDI and of the concept of interorganizational co‐ordination. From the analysis of co‐ordination a classification of the information needed by logistical organizations results. Together with three basic co‐ordination mechanisms and a classification of messages, the classification provides a sound basis of understanding for the business redesigner.

Details

International Journal of Physical Distribution & Logistics Management, vol. 22 no. 8
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 1 April 1990

Leigh Swain and Paula Tallim

X.400, one of the first OSI Application layer standards to be ratified, has generated considerable interest in the computer and telecommunications industry. Software vendors and…

Abstract

X.400, one of the first OSI Application layer standards to be ratified, has generated considerable interest in the computer and telecommunications industry. Software vendors and network service providers are now marketing X.400‐based products. Message handling systems based on X.400 support interpersonal electronic mail services and also provide a generic mechanism for the exchange of information between computer systems. This ability to support information transfer between computer systems is the real contribution of X.400. Telecommunications based on this standard can be applied to library operations such as interlibrary loan, acquisitions and document delivery.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

1 – 10 of over 31000