Search results

21 – 30 of over 55000
Article
Publication date: 1 June 2015

Shao-Dong Hu and Si-Yan Chen

The purpose of this paper is to investigate the effects of cultural beliefs on governance in a business network without a legal institutional framework. Particular emphasis is…

1229

Abstract

Purpose

The purpose of this paper is to investigate the effects of cultural beliefs on governance in a business network without a legal institutional framework. Particular emphasis is placed on the cross-country remittance mail operating network in Chaoshan, China, during the period 1860-1949. This investigation builds on Greif’s business governance theory and develops an analytical framework that considers cultural beliefs, agency relationships and multilateral punishment mechanisms. Furthermore, it uses the institutional analysis method to identify the institutional factors that sustained the remittance mail operating networks and their underlying mechanisms.

Design/methodology/approach

This paper adopts the qualitative research method. First, it investigates the history of the remittance mail operating network and agency relationships by searching through the contents of the relevant historical documents preserved in the official archives and information found in other records. Thereafter, it summarizes and demonstrates the cultural beliefs inferred from that research. The archival materials permit analysis of the interactions between cultural beliefs, agency relationships and multilateral punishment mechanisms by the institutional analysis method.

Findings

Due to the lack of legal institutions in China during the period under review, cultural beliefs played a central institutional role in cross-country business relations. Network governance was coupled with clan cultural beliefs in the remittance mail operating network. This relationship was the key to sustain the efficient operation of the remittance mail network.

Originality/value

In the West, corporate governance has been influenced by and has become an integral feature of Western culture and values. This is not necessarily so for the corporate governance in terms of Chinese culture and values. Thus, instead of mimicking the modes of developed countries, it is important for Chinese enterprises to seek a mode of corporate governance that is in accord with their local cultures. This may be an important focus for enterprise development.

Details

Chinese Management Studies, vol. 9 no. 2
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 30 September 2019

Marco Cioppi, Ilaria Curina, Fabio Forlani and Tonino Pencarelli

The purpose of this 22-year paper is to synthetize business and management literature in the context of online presence, online visibility and online reputation concepts. In…

2116

Abstract

Purpose

The purpose of this 22-year paper is to synthetize business and management literature in the context of online presence, online visibility and online reputation concepts. In particular, this paper aims to generalize the analysis by investigating the level of interest of the Internet, digital and interactive marketing-focused literature, as well as the more general business and management one towards these topics.

Design/methodology/approach

To identify the existence or otherwise of an online presence, visibility and reputation definition, as well as an index for measuring them, a systematic review and a content analysis process were performed on 199 articles categorized over 1997-2018.

Findings

The findings highlight the absence of clear and shared online presence, visibility and reputation definitions; the absence of unanimously accepted indexes for measuring them; and the identification of a sequence relationship between the three investigated constructs.

Research limitations/implications

The paper underlines the need for both theoretical and empirical contributions to reduce the complexity characterizing the business and management literature focused on these topics.

Originality/value

The current study brings out interesting directions for future research studies by systematizing all the articles devoted to the online presence, visibility and reputation concepts from a business and management perspective.

Book part
Publication date: 12 December 2022

Luke A. Turnock and Honor D. Townshend

With digital spaces an increasing feature of our everyday lives, and the internet now a primary means of sourcing IPEDs and information regarding their use, this chapter seeks to…

Abstract

With digital spaces an increasing feature of our everyday lives, and the internet now a primary means of sourcing IPEDs and information regarding their use, this chapter seeks to understand how digital fitness forum communities shape the dissemination of culturally embedded harm reduction advice. Findings are drawn from two netnographic studies of fitness forums, which identify several key areas in which community norms and structures served to inform harm reduction behaviours. This included embedded forum reputation systems and the ways in which these shaped IPED access, including through elevating ‘expert’ users and encouraging informed discussion regarding product quality, to the emergence of steroid testing services from forums as a community harm reduction tool. Second, forums were observed to often encourage users to conduct research and inform themselves regarding safe use, though limitations to this norm were also documented in relation to poor-quality medical advice, highlighting the issues with IPED users' reliance on anecdotal advice in the contexts of prohibition. Finally, the role of digital fitness forums as ‘digital backstage’ is considered, examining both how this can be harmful to IPED users from excluded or ‘otherised’ groups, but simultaneously offers cultural participants the opportunity for airing vulnerabilities in a space where their masculine identity is not threatened in doing so, thus facilitating harm reduction among cultural ‘insiders’.

Details

Doping in Sport and Fitness
Type: Book
ISBN: 978-1-80117-157-1

Keywords

Article
Publication date: 8 May 2019

Dinara Davlembayeva, Savvas Papagiannidis and Eleftherios Alamanos

The sharing economy is a socio-economic system in which individuals acquire and distribute goods and services among each other for free or for compensation through internet…

1369

Abstract

Purpose

The sharing economy is a socio-economic system in which individuals acquire and distribute goods and services among each other for free or for compensation through internet platforms. The sharing economy has attracted the interest of the academic community, which examined the phenomenon from the economic, social and technological perspectives. The paper aims to discuss this issue.

Design/methodology/approach

Given the lack of an overarching analysis of the sharing economy, this paper employs a quantitative content analysis approach to explore and synthesise relevant findings to facilitate the understanding of this emerging phenomenon.

Findings

The paper identified and grouped findings under four themes, namely: collaborative consumption practices, resources, drivers of user engagement and impacts, each of which is discussed in relation to the three main themes, aiming to compare findings and then put forward an agenda for further research.

Originality/value

The paper offers a balanced analysis of the building blocks of the sharing economy, to identify emerging themes within each stream, to discuss any contextual differences from a multi-stakeholder perspective and to propose directions for future studies.

Details

Information Technology & People, vol. 33 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 23 August 2018

Chinho Lin and Meichun Lin

It is necessary to determine the processes affecting cloud computing service applications in supply chain management (SCM) systems in order to facilitate cloud computing service…

1210

Abstract

Purpose

It is necessary to determine the processes affecting cloud computing service applications in supply chain management (SCM) systems in order to facilitate cloud computing service exchanges and transmission of data among supply chain members. The paper aims to discuss these issues.

Design/methodology/approach

Drawing on the elaboration likelihood model (ELM) and integrating the commitment trust theory, this paper develops a theoretical model using argument advantage and source credibility constructs to examine the relationships among perceived usefulness, attitude, trust and usage intention.

Findings

The results indicate that both the central route and the peripheral route of the ELM have a positive influence on perceived usefulness. The argument advantage has a strong influence on perceived usefulness as compared to source credibility while source credibility has a strong impact on trust. Furthermore, the perceived usefulness of cloud computing services plays a pivotal role in attitude and intention, whereas trust has a weak effect on usage intention.

Originality/value

The proposed model not only explores the argument that potential user evaluations of both the advantages of cloud computing services and source credibility influence their affective states, which in turn affect their usage intention, but it also examines the mediating factors that influence processes related to cloud SCM acceptance.

Details

Industrial Management & Data Systems, vol. 119 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 29 November 2022

Yung-Ting Chuang and Ching-Hsien Wang

The purpose of this paper is to propose a mobile and social-based question-and-answer (Q&A) system that analyzes users' social relationships and past answering behavior, considers…

Abstract

Purpose

The purpose of this paper is to propose a mobile and social-based question-and-answer (Q&A) system that analyzes users' social relationships and past answering behavior, considers users' interest similarity and answer quality to infer suitable respondents and forwards the questions to users that are willing to give high quality answers.

Design/methodology/approach

This research applies first-order logic (FOL) inference calculation to generate question/interest ID that combines a users' social information, interests and social network intimacy to choose the nodes that can provide high-quality answers. After receiving a question, a friend can answer it, forward it to their friends according to the number of TTL (Time-to-Live) hops, or send the answer directly to the server. This research collected data from the TripAdvisor.com website and uses it for the experiment. The authors also collected previously answered questions from TripAdvisor.com; thus, subsequent answers could be forwarded to a centralized server to improve the overall performance.

Findings

The authors have first noticed that even though the proposed system is decentralized, it can still accurately identify the appropriate respondents to provide high-quality answers. In addition, since this system can easily identify the best answerers, there is no need to implement broadcasting, thus reducing the overall execution time and network bandwidth required. Moreover, this system allows users to accurately and quickly obtain high-quality answers after comparing and calculating interest IDs. The system also encourages frequent communication and interaction among users. Lastly, the experiments demonstrate that this system achieves high accuracy, high recall rate, low overhead, low forwarding cost and low response rate in all scenarios.

Originality/value

This paper proposes a mobile and social-based Q&A system that applies FOL inference calculation to analyze users' social relationships and past answering behavior, considers users' interest similarity and answer quality to infer suitable respondents and forwards the questions to users that are willing to give high quality answers. The experiments demonstrate that this system achieves high accuracy, high recall rate, low overhead, low forwarding cost and low response rate in all scenarios.

Article
Publication date: 19 June 2020

Mhamed Zineddine

Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing…

Abstract

Purpose

Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper aims to propose an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network.

Design/methodology/approach

The proposed model/algorithm is based on two main concepts, namely, machine learning using fuzzy neural networks (FNNs) and the weighted weakest link (WWL) algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2,482 certified computing products, in addition to a set of nodes composed of multiple items, are used to train, validate and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm.

Findings

The results show a well-performing trust model with an accuracy of 0.9996. Thus, the end-users of FC services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network.

Research limitations/implications

Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision-making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as the security certification process is paramount to mitigate these issues. The author recommends the repetition of the same study when data form such bodies is available.

Originality/value

The novel combination of FNN and WWL in a trust model mitigates uncertainty, subjectivity and enables the trust classification of complex FC nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.

Details

Information & Computer Security, vol. 28 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 15 July 2022

Stephen Gong, Liwei Shan and Li Yu

To examine whether and how the different levels of regional economic incentives would have an effect on underwriters' market share in general.

Abstract

Purpose

To examine whether and how the different levels of regional economic incentives would have an effect on underwriters' market share in general.

Design/methodology/approach

Drawing on Chinese IPO firms during the period 2006-2016, this study examines the impact of different levels of regional economic incentives on underwriters' market share.

Findings

The authors find that regional economic incentives have a positive impact on underwriters' market share and that local economic incentives have a significantly stronger impact than central economic incentives. Furthermore, the authors find that IPO firms with underwriters driven by regional economic incentives experience worse post-IPO performance than firms with underwriters driven by central economic incentives, which do not experience a significant decline in post-IPO performance.

Originality/value

Taken together, the authors’ findings are consistent with the notion that performance assessment motivates officials at various levels of government to bring companies in their jurisdiction to the IPO market prematurely. In addition, the results indicate that central economic incentives play a significant role in driving China's macroeconomic development and market-oriented system reforms. As such, they are one of the major driving forces behind China's market-oriented system reforms.

Details

China Accounting and Finance Review, vol. 24 no. 4
Type: Research Article
ISSN: 1029-807X

Keywords

Article
Publication date: 23 August 2018

Anil Kumar, Sachin Kumar Mangla, Sunil Luthra, Nripendra P. Rana and Yogesh K. Dwivedi

Consumers have the multiple options to choose their products and services, which have a significant impact on the pattern of consumer decision making in digital market and further…

3788

Abstract

Purpose

Consumers have the multiple options to choose their products and services, which have a significant impact on the pattern of consumer decision making in digital market and further increases the challenges for the service providers to predict their buying pattern. In this sense, the purpose of this paper is to propose a structural hierarchy model for analyzing the changing pattern of consumer decision making in digital market by taking an Indian context.

Design/methodology/approach

To accomplish the objectives, the research is conducted in two phases. An extensive literature review is performed in the first phase to list the factors related to the changing pattern of consumer decision making in digital market and then fuzzy Delphi method is applied to finalize the factors. In the second phase, fuzzy analytic hierarchy process (AHP) is employed to find the priority weights of finalized factors. The fuzzy set theory allows capturing the vagueness in the data.

Findings

The findings obtained in this study shows that consumers are much conscious about innovative and trendy products as well as brand and quality; therefore, the service providers must think about these two most important factors so that they can able to retain their consumer in their online portal.

Practical implications

The analysis shows that “innovative and trendy” is the first priority factor for the consumers followed by “brand and quality” and “fulfilment and time energy.” The proposed model can help the marketers and service providers in predicting customers’ preferences and their changing pattern efficiently under vague surroundings. The outcomes of this research work not only help the service provider to update their products and services according to consumers’ needs but can also help them to increase profit and minimize their risk.

Originality/value

This work contributes to consumer research literature focusing on problem evaluation in the context of changing pattern of consumer decision making in digital era.

Details

Journal of Enterprise Information Management, vol. 31 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

21 – 30 of over 55000