Search results
21 – 30 of over 55000The purpose of this paper is to investigate the effects of cultural beliefs on governance in a business network without a legal institutional framework. Particular emphasis is…
Abstract
Purpose
The purpose of this paper is to investigate the effects of cultural beliefs on governance in a business network without a legal institutional framework. Particular emphasis is placed on the cross-country remittance mail operating network in Chaoshan, China, during the period 1860-1949. This investigation builds on Greif’s business governance theory and develops an analytical framework that considers cultural beliefs, agency relationships and multilateral punishment mechanisms. Furthermore, it uses the institutional analysis method to identify the institutional factors that sustained the remittance mail operating networks and their underlying mechanisms.
Design/methodology/approach
This paper adopts the qualitative research method. First, it investigates the history of the remittance mail operating network and agency relationships by searching through the contents of the relevant historical documents preserved in the official archives and information found in other records. Thereafter, it summarizes and demonstrates the cultural beliefs inferred from that research. The archival materials permit analysis of the interactions between cultural beliefs, agency relationships and multilateral punishment mechanisms by the institutional analysis method.
Findings
Due to the lack of legal institutions in China during the period under review, cultural beliefs played a central institutional role in cross-country business relations. Network governance was coupled with clan cultural beliefs in the remittance mail operating network. This relationship was the key to sustain the efficient operation of the remittance mail network.
Originality/value
In the West, corporate governance has been influenced by and has become an integral feature of Western culture and values. This is not necessarily so for the corporate governance in terms of Chinese culture and values. Thus, instead of mimicking the modes of developed countries, it is important for Chinese enterprises to seek a mode of corporate governance that is in accord with their local cultures. This may be an important focus for enterprise development.
Details
Keywords
Marco Cioppi, Ilaria Curina, Fabio Forlani and Tonino Pencarelli
The purpose of this 22-year paper is to synthetize business and management literature in the context of online presence, online visibility and online reputation concepts. In…
Abstract
Purpose
The purpose of this 22-year paper is to synthetize business and management literature in the context of online presence, online visibility and online reputation concepts. In particular, this paper aims to generalize the analysis by investigating the level of interest of the Internet, digital and interactive marketing-focused literature, as well as the more general business and management one towards these topics.
Design/methodology/approach
To identify the existence or otherwise of an online presence, visibility and reputation definition, as well as an index for measuring them, a systematic review and a content analysis process were performed on 199 articles categorized over 1997-2018.
Findings
The findings highlight the absence of clear and shared online presence, visibility and reputation definitions; the absence of unanimously accepted indexes for measuring them; and the identification of a sequence relationship between the three investigated constructs.
Research limitations/implications
The paper underlines the need for both theoretical and empirical contributions to reduce the complexity characterizing the business and management literature focused on these topics.
Originality/value
The current study brings out interesting directions for future research studies by systematizing all the articles devoted to the online presence, visibility and reputation concepts from a business and management perspective.
Details
Keywords
Luke A. Turnock and Honor D. Townshend
With digital spaces an increasing feature of our everyday lives, and the internet now a primary means of sourcing IPEDs and information regarding their use, this chapter seeks to…
Abstract
With digital spaces an increasing feature of our everyday lives, and the internet now a primary means of sourcing IPEDs and information regarding their use, this chapter seeks to understand how digital fitness forum communities shape the dissemination of culturally embedded harm reduction advice. Findings are drawn from two netnographic studies of fitness forums, which identify several key areas in which community norms and structures served to inform harm reduction behaviours. This included embedded forum reputation systems and the ways in which these shaped IPED access, including through elevating ‘expert’ users and encouraging informed discussion regarding product quality, to the emergence of steroid testing services from forums as a community harm reduction tool. Second, forums were observed to often encourage users to conduct research and inform themselves regarding safe use, though limitations to this norm were also documented in relation to poor-quality medical advice, highlighting the issues with IPED users' reliance on anecdotal advice in the contexts of prohibition. Finally, the role of digital fitness forums as ‘digital backstage’ is considered, examining both how this can be harmful to IPED users from excluded or ‘otherised’ groups, but simultaneously offers cultural participants the opportunity for airing vulnerabilities in a space where their masculine identity is not threatened in doing so, thus facilitating harm reduction among cultural ‘insiders’.
Details
Keywords
Dinara Davlembayeva, Savvas Papagiannidis and Eleftherios Alamanos
The sharing economy is a socio-economic system in which individuals acquire and distribute goods and services among each other for free or for compensation through internet…
Abstract
Purpose
The sharing economy is a socio-economic system in which individuals acquire and distribute goods and services among each other for free or for compensation through internet platforms. The sharing economy has attracted the interest of the academic community, which examined the phenomenon from the economic, social and technological perspectives. The paper aims to discuss this issue.
Design/methodology/approach
Given the lack of an overarching analysis of the sharing economy, this paper employs a quantitative content analysis approach to explore and synthesise relevant findings to facilitate the understanding of this emerging phenomenon.
Findings
The paper identified and grouped findings under four themes, namely: collaborative consumption practices, resources, drivers of user engagement and impacts, each of which is discussed in relation to the three main themes, aiming to compare findings and then put forward an agenda for further research.
Originality/value
The paper offers a balanced analysis of the building blocks of the sharing economy, to identify emerging themes within each stream, to discuss any contextual differences from a multi-stakeholder perspective and to propose directions for future studies.
Details
Keywords
It is necessary to determine the processes affecting cloud computing service applications in supply chain management (SCM) systems in order to facilitate cloud computing service…
Abstract
Purpose
It is necessary to determine the processes affecting cloud computing service applications in supply chain management (SCM) systems in order to facilitate cloud computing service exchanges and transmission of data among supply chain members. The paper aims to discuss these issues.
Design/methodology/approach
Drawing on the elaboration likelihood model (ELM) and integrating the commitment trust theory, this paper develops a theoretical model using argument advantage and source credibility constructs to examine the relationships among perceived usefulness, attitude, trust and usage intention.
Findings
The results indicate that both the central route and the peripheral route of the ELM have a positive influence on perceived usefulness. The argument advantage has a strong influence on perceived usefulness as compared to source credibility while source credibility has a strong impact on trust. Furthermore, the perceived usefulness of cloud computing services plays a pivotal role in attitude and intention, whereas trust has a weak effect on usage intention.
Originality/value
The proposed model not only explores the argument that potential user evaluations of both the advantages of cloud computing services and source credibility influence their affective states, which in turn affect their usage intention, but it also examines the mediating factors that influence processes related to cloud SCM acceptance.
Details
Keywords
Yung-Ting Chuang and Ching-Hsien Wang
The purpose of this paper is to propose a mobile and social-based question-and-answer (Q&A) system that analyzes users' social relationships and past answering behavior, considers…
Abstract
Purpose
The purpose of this paper is to propose a mobile and social-based question-and-answer (Q&A) system that analyzes users' social relationships and past answering behavior, considers users' interest similarity and answer quality to infer suitable respondents and forwards the questions to users that are willing to give high quality answers.
Design/methodology/approach
This research applies first-order logic (FOL) inference calculation to generate question/interest ID that combines a users' social information, interests and social network intimacy to choose the nodes that can provide high-quality answers. After receiving a question, a friend can answer it, forward it to their friends according to the number of TTL (Time-to-Live) hops, or send the answer directly to the server. This research collected data from the TripAdvisor.com website and uses it for the experiment. The authors also collected previously answered questions from TripAdvisor.com; thus, subsequent answers could be forwarded to a centralized server to improve the overall performance.
Findings
The authors have first noticed that even though the proposed system is decentralized, it can still accurately identify the appropriate respondents to provide high-quality answers. In addition, since this system can easily identify the best answerers, there is no need to implement broadcasting, thus reducing the overall execution time and network bandwidth required. Moreover, this system allows users to accurately and quickly obtain high-quality answers after comparing and calculating interest IDs. The system also encourages frequent communication and interaction among users. Lastly, the experiments demonstrate that this system achieves high accuracy, high recall rate, low overhead, low forwarding cost and low response rate in all scenarios.
Originality/value
This paper proposes a mobile and social-based Q&A system that applies FOL inference calculation to analyze users' social relationships and past answering behavior, considers users' interest similarity and answer quality to infer suitable respondents and forwards the questions to users that are willing to give high quality answers. The experiments demonstrate that this system achieves high accuracy, high recall rate, low overhead, low forwarding cost and low response rate in all scenarios.
Details
Keywords
Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing…
Abstract
Purpose
Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper aims to propose an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network.
Design/methodology/approach
The proposed model/algorithm is based on two main concepts, namely, machine learning using fuzzy neural networks (FNNs) and the weighted weakest link (WWL) algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2,482 certified computing products, in addition to a set of nodes composed of multiple items, are used to train, validate and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm.
Findings
The results show a well-performing trust model with an accuracy of 0.9996. Thus, the end-users of FC services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network.
Research limitations/implications
Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision-making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as the security certification process is paramount to mitigate these issues. The author recommends the repetition of the same study when data form such bodies is available.
Originality/value
The novel combination of FNN and WWL in a trust model mitigates uncertainty, subjectivity and enables the trust classification of complex FC nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.
Details
Keywords
Stephen Gong, Liwei Shan and Li Yu
To examine whether and how the different levels of regional economic incentives would have an effect on underwriters' market share in general.
Abstract
Purpose
To examine whether and how the different levels of regional economic incentives would have an effect on underwriters' market share in general.
Design/methodology/approach
Drawing on Chinese IPO firms during the period 2006-2016, this study examines the impact of different levels of regional economic incentives on underwriters' market share.
Findings
The authors find that regional economic incentives have a positive impact on underwriters' market share and that local economic incentives have a significantly stronger impact than central economic incentives. Furthermore, the authors find that IPO firms with underwriters driven by regional economic incentives experience worse post-IPO performance than firms with underwriters driven by central economic incentives, which do not experience a significant decline in post-IPO performance.
Originality/value
Taken together, the authors’ findings are consistent with the notion that performance assessment motivates officials at various levels of government to bring companies in their jurisdiction to the IPO market prematurely. In addition, the results indicate that central economic incentives play a significant role in driving China's macroeconomic development and market-oriented system reforms. As such, they are one of the major driving forces behind China's market-oriented system reforms.
Details
Keywords
Anil Kumar, Sachin Kumar Mangla, Sunil Luthra, Nripendra P. Rana and Yogesh K. Dwivedi
Consumers have the multiple options to choose their products and services, which have a significant impact on the pattern of consumer decision making in digital market and further…
Abstract
Purpose
Consumers have the multiple options to choose their products and services, which have a significant impact on the pattern of consumer decision making in digital market and further increases the challenges for the service providers to predict their buying pattern. In this sense, the purpose of this paper is to propose a structural hierarchy model for analyzing the changing pattern of consumer decision making in digital market by taking an Indian context.
Design/methodology/approach
To accomplish the objectives, the research is conducted in two phases. An extensive literature review is performed in the first phase to list the factors related to the changing pattern of consumer decision making in digital market and then fuzzy Delphi method is applied to finalize the factors. In the second phase, fuzzy analytic hierarchy process (AHP) is employed to find the priority weights of finalized factors. The fuzzy set theory allows capturing the vagueness in the data.
Findings
The findings obtained in this study shows that consumers are much conscious about innovative and trendy products as well as brand and quality; therefore, the service providers must think about these two most important factors so that they can able to retain their consumer in their online portal.
Practical implications
The analysis shows that “innovative and trendy” is the first priority factor for the consumers followed by “brand and quality” and “fulfilment and time energy.” The proposed model can help the marketers and service providers in predicting customers’ preferences and their changing pattern efficiently under vague surroundings. The outcomes of this research work not only help the service provider to update their products and services according to consumers’ needs but can also help them to increase profit and minimize their risk.
Originality/value
This work contributes to consumer research literature focusing on problem evaluation in the context of changing pattern of consumer decision making in digital era.
Details
Keywords
Sigi Goode and Amir Riaz
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…
Abstract
Purpose
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.
Design/methodology/approach
This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.
Findings
Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.
Originality/value
To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
Details