Search results
1 – 10 of 10Zhengbiao Han, Shuiqing Huang, Huan Li and Ni Ren
This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO…
Abstract
Purpose
This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO 27000. The purpose of this paper is to testify the feasibility of this method and provide suggestions for improving information security of the digital library.
Design/methodology/approach
This paper adopts convenience sampling to select respondents. The assessment of assets is through analyzing digital library-related business and function through a questionnaire which collects data to determine asset types and the importance of asset attributes. The five-point Likert scale questionnaire method is used to identify the threat possibility and its influence on the assets. The 12 respondents include directors and senior network technicians from the editorial department, comic library, children’s library, counseling department and the learning promotion centre. Three different Guttman scale questionnaires, tool testing and on-site inspection are combined to identify and assess vulnerabilities. There were different Guttman scale questionnaires for management personnel, technical personnel and general librarian. In all, 15 management librarians, 7 technical librarians and 72 ordinary librarians answered the vulnerability questionnaire. On-site inspection was conducted on the basis of 11 control domains of ISO 27002. Vulnerabilities were scanned using remote security evaluation system NSFOCUS. The scanning covered ten IP sections and a total of 81 hosts.
Findings
Overall, 2,792 risk scores were obtained. Among them, 282 items (accounting for 10.1 per cent of the total) reached the high risk level; 2 (0.1 per cent) reached the very high risk level. High-risk items involved 26 threat types (accounting for 44.1 per cent of all threat types) and 13 vulnerability types (accounting for 22.1 per cent of all vulnerability types). The evaluation revealed that this digital library faces seven major hidden dangers in information security. The assessment results were well accepted by staff members of this digital library, which testified to the applicability of this method to a Chinese digital library.
Research limitations/implications
This paper is only a case study of a typical Chinese digital library using a digital library information security assessment method. More case-based explorations are necessary to prove the feasibility of the assessing strategy proposed in this study.
Originality/value
Based on the findings of recent literature, the authors found that very few researchers have made efforts to develop methods for calculating the indicators for digital library information security risk assessment. On the basis of ISO 27000 and other related information security standards, this case study proposed an operable method of digital library information security risk assessment and used it to assess a the information security of a typical Chinese digital library. This study can offer insights for formulating a digital library information security risk assessment scale.
Details
Keywords
Shuiqing Huang, Lin He, Bo Yang and Ming Zhang
The algorithm of disjoint literature‐based knowledge discovery provides a convenient, efficient and effective auxiliary method for scientific research. Based on an analysis of…
Abstract
Purpose
The algorithm of disjoint literature‐based knowledge discovery provides a convenient, efficient and effective auxiliary method for scientific research. Based on an analysis of Swanson's A‐B‐C model of disjoint literature‐based knowledge discovery and Gordon's intermediate literature theory, this paper seeks to propose a more comprehensive compound correlation model for disjoint literature‐based knowledge discovery.
Design/methodology/approach
A new algorithm of vector space model (VSM) based disjoint literature‐based knowledge discovery is designed to implement the compound correlation model.
Findings
The validity tests showed that this new model not only simulated both of Swanson's early and well‐known discoveries of Raynaud's disease‐fish oil and migraine‐magnesium connections successfully, but also applied to knowledge discovery in the agricultural economics literature in the Chinese language.
Research limitations/implications
Although the workload was reduced to the minimum under the compound correlation model compared with other algorithms and models, part of the work needed some manual intervention in the process of disjoint literature‐based knowledge discovery with the VSM‐based compound correlation model.
Practical implications
The algorithm was capable of knowledge discovery with a large‐scale dataset and had an advantage in identifying a series of hidden connections among a set of literatures. Therefore, application of the model might be extended to more fields.
Originality/value
Traditional two‐step knowledge discovery procedures were integrated into the model, which contained open and closed disjoint literature‐based knowledge discovery.
Details
Keywords
Shuiqing Yang, Yusheng Zhou, Jianrong Yao, Yuangao Chen and June Wei
As retailers have increasingly embraced an omnichannel retailing strategy, explaining and predicting the helpfulness of online review should consider both online-based and…
Abstract
Purpose
As retailers have increasingly embraced an omnichannel retailing strategy, explaining and predicting the helpfulness of online review should consider both online-based and offline-based reviews. The paper aims to discuss this issue.
Design/methodology/approach
Based on the signaling theory, this study intends to examine the impacts of review-related and reviewer-related signals on review helpfulness in the context of omnichannel retailing. The proposed research model and corresponding hypotheses were tested by using negative binomial regression.
Findings
The results shown that both review-related (review rating and review sentiment strength) and reviewer-related (reviewer real name and reviewer expertise) signals positively affect review helpfulness. Contrary to the authors’ expectations, review length negatively affects review helpfulness. Specifically, when the review submitted from an omnichannel retailer’s offline channel, the positive impacts of reviewer real name on review helpfulness will be stronger, and the positive impacts of reviewer expertise on review helpfulness will be weaker.
Originality/value
Unlike many previous studies tend to explore the antecedents of review helpfulness in a single-channel setting, the study examined the factors that affect review helpfulness in an omnichannel retailing context.
Details
Keywords
Yuangao Chen, Yuqing Hu, Shasha Zhou and Shuiqing Yang
Drawing on the technology-organization-environment (TOE) framework, this study aims to investigate determinants of performance of artificial intelligence (AI) adoption in…
Abstract
Purpose
Drawing on the technology-organization-environment (TOE) framework, this study aims to investigate determinants of performance of artificial intelligence (AI) adoption in hospitality industry during COVID-19 and identifies the relative importance of each determinant.
Design/methodology/approach
A two-stage approach that integrates partial least squares structural equation modeling (PLS-SEM) with artificial neural network (ANN) is used to analyze survey data from 290 managers in the hospitality industry.
Findings
The empirical results reveal that perceived AI risk, management support, innovativeness, competitive pressure and regulatory support significantly influence the performance of AI adoption. Additionally, the ANN results show that competitive pressure and management support are two of the strongest determinants.
Practical implications
This research offers guidelines for hospitality managers to enhance the performance of AI adoption and presents policy-making insights to promote and support organizations to benefit from the adoption of AI technology.
Originality/value
This study conceptualizes the performance of AI adoption from both process and firm levels and examines its determinants based on the TOE framework. By adopting an innovative approach combining PLS-SEM and ANN, the authors not only identify the essential performance determinants of AI adoption but also determine their relative importance.
Details
Keywords
Yuangao Chen, Xinjia Tong, Shuiqing Yang and Shasha Zhou
This study aims to explore how specific cues with new manifestations (i.e. herding message and price discount information) and customer cognitive style influence attention…
Abstract
Purpose
This study aims to explore how specific cues with new manifestations (i.e. herding message and price discount information) and customer cognitive style influence attention allocation and purchase intention.
Design/methodology/approach
To empirically validate the research hypotheses, an eye-tracking experiment with a 2 × 2 × 2 mixed design was conducted on a sample of 44 participants recruited from a university in China. Repeated measures analysis of variance was employed for data analysis.
Findings
The results show that herding message and price discount information play different roles in viewers' attention and have an interactive effect on attention. Moreover, individual cognitive styles moderate the impact of herding message on attention allocation. Still, two cues positively affect customer purchase intention.
Originality/value
This study guides future research by applying cue utilization theory to investigate the effects of two cues in live streaming. Findings offer practical implications for how live streaming cues affect viewers' attention allocation and purchase intention.
Details
Keywords
– This paper aims to review the literature on mobile information services. It considers only peer-reviewed papers published in English between 2004 and 2014.
Abstract
Purpose
This paper aims to review the literature on mobile information services. It considers only peer-reviewed papers published in English between 2004 and 2014.
Design/methodology/approach
The method of systematic review was adopted to collect and analyse the relevant literature. The searches were conducted during the last week of July 2014 on different databases, and in total, 76 papers were considered after applying inclusion and exclusion criteria.
Findings
Seven themes emerged: “introducing mobile libraries”, “reporting on current trends”, “exploring users’ perceptions of libraries’ mobile services”, “presenting libraries’ mobile services”, “presenting mobile technology use in libraries”, “reporting case studies” and “reporting on evaluation of libraries’ mobile services”. It is evident that research on mobile libraries is very recent and focuses mainly on raising the Library and Information Science profession’s awareness of providing mobile information services.
Research limitations
This literature review focused only on peer-reviewed papers published between 2004 and 2014 in English.
Originality/value
This paper summarises and critically presents the relevant literature on libraries offering mobile information services. It informs libraries and librarians’ understanding of recent developments in mobile technology for the successful provision of information services.
Details
Keywords
Yuangao Chen, Ruyi Dai, Lu Wang, Shuiqing Yang, Yixiao Li and June Wei
This study adopts self-determination theory and stimulus-organism-response framework to develop a model that explores the motivations of such donors by considering their…
Abstract
Purpose
This study adopts self-determination theory and stimulus-organism-response framework to develop a model that explores the motivations of such donors by considering their self-determination needs and extrinsic and intrinsic motivations.
Design/methodology/approach
Based on online survey data collected from 436 crowdfunding donors in China, this study follows a structural equation modeling analysis to test hypotheses.
Findings
The results indicate that perceived ease of use, perceived self-efficacy and social connection have positive effects on the donation intentions of backers through a combination of extrinsic and intrinsic motivations.
Originality/value
The findings shed light on various extrinsic and intrinsic motivations advancing knowledge of individual fund motivation in donation-based crowdfunding and provide guidelines for the development of donation-based crowdfunding theory and practice.
Details
Keywords
Yixiao Li, Yaoqi Hu and Shuiqing Yang
The aim of this study is to investigate how social media users' experience of seeking emergency information affects their engagement intention toward emergency information with a…
Abstract
Purpose
The aim of this study is to investigate how social media users' experience of seeking emergency information affects their engagement intention toward emergency information with a reciprocity framework integrated with information adoption model.
Design/methodology/approach
Drawing on reciprocity theory, indebtedness theory, and information adoption model, an integrative research model is developed. This study employs a questionnaire survey to collect data of 325 social media users in China. Structural equation modeling analyses are conducted to test the proposed theoretical model.
Findings
Social media users' experience of seeking emergency information has a strong effect on their perceived information usefulness and indebtedness, while perceived information usefulness further influences community norm, indebtedness, and engagement intention. The authors also found that perceived information usefulness mediates the relationships between experience of seeking emergency information and community norm/indebtedness.
Originality/value
This study offers a new perspective to explain social media users' engagement intention in the diffusion of emergency information. This study contributes to the literature by extending the theoretical framework of reciprocity and applying it to the context of emergency information diffusion. The findings of this study could benefit the practitioners who wish to leverage social media tools for emergency response purposes.
Details
Keywords
Shuiqing Yang, Yan Wang and June Wei
Attracted by tremendous market opportunities of mobile business, many web services providers have started to expand their web services from traditional PC-based environment into…
Abstract
Purpose
Attracted by tremendous market opportunities of mobile business, many web services providers have started to expand their web services from traditional PC-based environment into the mobile-based environment. However, success in the web services cannot guarantee the success in the mobile services. The purpose of this paper is to identify factors that influence consumer evaluation and use of mobile shopping services in a web-mobile service extension context.
Design/methodology/approach
Based on categorization theory, this paper focusses on the role of integration and consistency between web and mobile services. A research model was created and empirically tested on data collected from 298 mobile shopping users in China.
Findings
The structural equation modeling analysis indicates that evaluation of source (web service quality) positively affect evaluation of target (perceived mobile service quality and flow in mobile services). The study also found that the relationships between source and target (perceived integration and perceived consistency) play an important role in determining evaluation of the target, which in turn shapes intention to use mobile services.
Research limitations/implications
The survey is based on mobile shopping consumers. Caution is required in any effort to generalize the findings to other research contexts. Factors influencing a consumer's extension or adoption decisions in regard to different mobile services may not be the same, or the degree of influence may differ. Continued studies can test and compare our findings in different mobile services contexts.
Practical implications
The results of the findings provide specific methods for managing the process of web-mobile service extension. The results also indicate the importance of perceived consistency in shaping consumers’ evaluation of the extended mobile services in practical environments.
Originality/value
The present study extends the categorization theory to a multi-channel context and examines mobile services adoption from a cross-environment perspective. It considers evaluation of source, evaluation of target, and the relationships between source and target, which enriches the innovation adoption literature by providing a holistic insight into the evaluation and use of mobile services.
Details
Keywords
Ali Mansouri and Nooshin Soleymani Asl
This study aims to investigate the essential components needed to develop a practical mobile application for providing library services to its users.
Abstract
Purpose
This study aims to investigate the essential components needed to develop a practical mobile application for providing library services to its users.
Design/methodology/approach
The study was conducted in a descriptive-survey format. The statistical population constituted the libraries worldwide using mobile applications to provide library services to the users of academic and public libraries. The data were collected through the content-analysis method, World Wide Web and checklists.
Findings
It was found that services such as search, ask a librarian, database, renew, circulation and library hours were frequently used at academic libraries, while the services of search, search through barcode scanners and database were mostly common at public libraries. According to the users of academic and public libraries, circulation and renew, search, ask a librarian and library hours were considered as the most essential services to be included in library mobile applications.
Practical implications
Most libraries usually use mobile apps subjectively. Thus, it is important to identify the most important components of their usage and present them in a suitable pattern. The findings of this study identified the most important components in the design and development of mobile apps and proposed the right model for their integration into libraries.
Originality/value
The practical mobile application proposed here for library services is applicable to all types of libraries and provides an appropriate pattern for mobile application designers.
Details