Search results

1 – 10 of over 91000
Article
Publication date: 26 July 2011

Ke Rong, Zheng Liu and Yongjiang Shi

The purpose of this paper is to explore a way to reshape the business ecosystem for existing industries by comparing traditional and Shanzhai networks in China. The…

1107

Abstract

Purpose

The purpose of this paper is to explore a way to reshape the business ecosystem for existing industries by comparing traditional and Shanzhai networks in China. The research is also conducted on the supporting activities by service intermediaries in the ecosystem.

Design/methodology/approach

This research starts with a literature review on firms' strategy of industry maturity from three perspectives, including technology orientation, innovation orientation, and network orientation. The approach of multiple case studies is adopted to unveil the reshaping process of the business ecosystem. Two types of networks are mapped: the traditional mobile companies' network and the Shanzhai network. Intra‐network and inter‐network cross‐case analyses aim to generate the research findings and provide implications for different ecosystem players.

Findings

First, the relationship between industry and the business ecosystem is placed into a two by two matrix. Second, in order to reshape the business ecosystem, the traditional network prefers geographical dispersion to other countries to establish a new ecosystem, whereas the Shanzhai network brings niche substitutes to cut down industry entry barriers. Third, government agencies, as one of the service intermediaries, not only support the traditional network dispersion by providing preferential policies, but also support the reshaping process enabled by the Shanzhai network with legal guidance and resource capture. Fourth, other service intermediaries such as law firms, technology services, talent searchers, financial and industry associations, have greater impact on the Shanzhai network than on the traditional network. Fifth, from the comparison between these two networks, strategies to reshape the ecosystem can be differentiated in five aspects: frugal solution, platform enablement, organization recentralization, downstream innovation, and regulation adaptation.

Research limitations/implications

This research further develops the observations into service intermediaries not only in core business but also in the extended level of the business ecosystem. The Shanzhai phenomenon also provides an excellent example implicating classical theories like cluster, innovation and global manufacturing virtual network. From a methodology perspective, this research combined the roadmap methods and cross‐case analysis. However, this study focuses more on Shanzhai network study than the traditional network.

Practical implications

Five nurturing strategies implicate small firms in the Shanzhai network and large firms in the traditional network as well as service intermediaries.

Originality/value

This paper is the first one to deeply study the relationship between industry and the business ecosystem in China, and the reshaping process of a mature business ecosystem from the traditional network, Shanzhai network and service intermediaries' perspectives.

Details

Journal of Science and Technology Policy in China, vol. 2 no. 2
Type: Research Article
ISSN: 1758-552X

Keywords

Book part
Publication date: 13 December 2017

Qiongwei Ye and Baojun Ma

Internet + and Electronic Business in China is a comprehensive resource that provides insight and analysis into E-commerce in China and how it has revolutionized and…

Abstract

Internet + and Electronic Business in China is a comprehensive resource that provides insight and analysis into E-commerce in China and how it has revolutionized and continues to revolutionize business and society. Split into four distinct sections, the book first lays out the theoretical foundations and fundamental concepts of E-Business before moving on to look at internet+ innovation models and their applications in different industries such as agriculture, finance and commerce. The book then provides a comprehensive analysis of E-business platforms and their applications in China before finishing with four comprehensive case studies of major E-business projects, providing readers with successful examples of implementing E-Business entrepreneurship projects.

Internet + and Electronic Business in China is a comprehensive resource that provides insights and analysis into how E-commerce has revolutionized and continues to revolutionize business and society in China.

Details

Internet+ and Electronic Business in China: Innovation and Applications
Type: Book
ISBN: 978-1-78743-115-7

Article
Publication date: 31 July 2020

Yong Liu, Zhi-yang Liu and Jiao Li

The purpose of this paper is an attempt to design a proper incentive coordination mechanism to deal with the channel conflicts between the traditional sales and online…

Abstract

Purpose

The purpose of this paper is an attempt to design a proper incentive coordination mechanism to deal with the channel conflicts between the traditional sales and online direct sales.

Design/methodology/approach

With respect to the problems of channel conflicts between the traditional sales and online direct sales, to optimize the sale system and get more profits, considering the influences of consumer network acceptance, the authors establish demand and profit function based on consumer's utility, respectively. What's more, we exploit the game theory to analyze the optional decisions of the supply chain under the incentive coordination condition and no incentive coordination condition, and then we discuss the supply chain's optimal pricing, demand, profit and compensation incentive levels with the different effect of consumer network acceptance.

Findings

The level of compensation incentive provided by the manufacturer is influenced by consumer network acceptance and product cost. The lower the consumer network acceptance, the better the compensation incentive coordination effect of manufacturers. Manufacturers, wholesalers, retailers and consumers are all important players in real supply chain relationships. When a manufacturer exists as a dominant role, it should pay full attention to the impact of consumer behavior on supply chain decisions.

Practical implications

The research can clarify the influence and mechanism of consumer behavior on supply chain channel conflict coordination, and deal with channel conflicts.

Originality/value

The proposed incentive coordination can effectively realize supply chain channel conflict resolution, and provide decision-making ideas and methods for manufacturers to develop the supply chain management of online direct sales channels.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 33 no. 3
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 23 June 2022

Yoel Modesto Gonzalez Bravo

This chapter analyzes how patterns of political corruption across Latin America influence regional entrepreneurial activity as well as the effectiveness of different…

Abstract

This chapter analyzes how patterns of political corruption across Latin America influence regional entrepreneurial activity as well as the effectiveness of different solutions that have been proposed to promote entrepreneurial initiatives. For this purpose, the causes of this institutional failure and its influence on the regional entrepreneurial system will be explored under a literature review. This review is used to identify its main issues to propose an analytical framework, based on game theory and social network analysis, to understand the dynamics of the different players involved in the interaction between the corrupt political contexts and the regional entrepreneurial ecosystem. This framework is extended to further analyze several well-known regional corrupt business cases and the suitability of different solutions to revert this failure to foster entrepreneurial initiatives with a positive developmental impact in the region.

Details

The Emerald Handbook of Entrepreneurship in Latin America
Type: Book
ISBN: 978-1-80071-955-2

Keywords

Article
Publication date: 19 October 2015

Eugene Ch'ng

The purpose of this paper is to present a Big Data solution as a methodological approach to the automated collection, cleaning, collation, and mapping of multimodal…

Abstract

Purpose

The purpose of this paper is to present a Big Data solution as a methodological approach to the automated collection, cleaning, collation, and mapping of multimodal, longitudinal data sets from social media. The paper constructs social information landscapes (SIL).

Design/methodology/approach

The research presented here adopts a Big Data methodological approach for mapping user-generated contents in social media. The methodology and algorithms presented are generic, and can be applied to diverse types of social media or user-generated contents involving user interactions, such as within blogs, comments in product pages, and other forms of media, so long as a formal data structure proposed here can be constructed.

Findings

The limited presentation of the sequential nature of content listings within social media and Web 2.0 pages, as viewed on web browsers or on mobile devices, do not necessarily reveal nor make obvious an unknown nature of the medium; that every participant, from content producers, to consumers, to followers and subscribers, including the contents they produce or subscribed to, are intrinsically connected in a hidden but massive network. Such networks when mapped, could be quantitatively analysed using social network analysis (e.g. centralities), and the semantics and sentiments could equally reveal valuable information with appropriate analytics. Yet that which is difficult is the traditional approach of collecting, cleaning, collating, and mapping such data sets into a sufficiently large sample of data that could yield important insights into the community structure and the directional, and polarity of interaction on diverse topics. This research solves this particular strand of problem.

Research limitations/implications

The automated mapping of extremely large networks involving hundreds of thousands to millions of nodes, encapsulating high resolution and contextual information, over a long period of time could possibly assist in the proving or even disproving of theories. The goal of this paper is to demonstrate the feasibility of using automated approaches for acquiring massive, connected data sets for academic inquiry in the social sciences.

Practical implications

The methods presented in this paper, together with the Big Data architecture can assist individuals and institutions with a limited budget, with practical approaches in constructing SIL. The software-hardware integrated architecture uses open source software, furthermore, the SIL mapping algorithms are easy to implement.

Originality/value

The majority of research in the literature uses traditional approaches for collecting social networks data. Traditional approaches can be slow and tedious; they do not yield adequate sample size to be of significant value for research. Whilst traditional approaches collect only a small percentage of data, the original methods presented here are able to collect and collate entire data sets in social media due to the automated and scalable mapping techniques.

Details

Industrial Management & Data Systems, vol. 115 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 23 October 2003

Nancy Luke

The connection between women’s empowerment and health has been a growing concern among demographers and other social scientists, who theorize that empowering women – or…

Abstract

The connection between women’s empowerment and health has been a growing concern among demographers and other social scientists, who theorize that empowering women – or enhancing their ability to define and make strategic life choices – will improve their reproductive health (Kabeer, 1999). The importance of empowering women became a central theme at the International Conference on Population and Development (ICPD) held in Cairo in 1994. The Cairo policy document codified the notion that women must be empowered in order for them and societies as a whole reach their reproductive health goals, including lowering fertility and population growth, stemming the spread of sexually transmitted diseases (STDs) and HIV/AIDS, and ensuring healthy pregnancy and delivery (Hodgson & Watkins, 1997; Sen & Batliwala, 2000).

Details

Gender Perspectives on Health and Medicine
Type: Book
ISBN: 978-1-84950-239-9

Article
Publication date: 1 April 2001

Pietro Romano and Andrea Vinelli

Supply chain management (SCM) is conceived by academics and practitioners as either an extension of logistics or an all‐encompassing approach to business integration. From…

8218

Abstract

Supply chain management (SCM) is conceived by academics and practitioners as either an extension of logistics or an all‐encompassing approach to business integration. From the authors’ point of view, SCM involves not only logistic activities but also other processes such as quality management. This paper seeks to understand how quality can be managed using a supply chain perspective and what the operative and strategic consequences are for both the individual companies and the whole supply network. It reports a case study conducted on Marzotto, an important Italian textile and apparel company, and its supply chain relationships. The study compares the quality practices in the two different kinds of supply network of which Marzotto is the focal firm. One is managed using a traditional customer‐supplier approach and the other a broader and more co‐ordinated perspective. In the latter case, it was found that the whole supply network could improve its ability to meet the expectations of the final consumer in terms of quality through the joint definition and co‐management of quality practices/procedures.

Details

International Journal of Operations & Production Management, vol. 21 no. 4
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 1 April 2006

Kate Hutchings and David Weir

To explore the implications of internationalisation for guanxi and wasta and the role of trust, family and favours in underpinning these traditional models of networking

7351

Abstract

Purpose

To explore the implications of internationalisation for guanxi and wasta and the role of trust, family and favours in underpinning these traditional models of networking. The paper also draws some implications for management development professionals and trainers.

Design/methodology/approach

The argument is based on relevant literature and cases, and the authors' own knowledge acquired through research in China over 8 years and the Arab World over 25 years. The Chinese research involved analysis of company reports, informal conversations and semi‐structured interviews conducted with almost 100 interviewees including Western expatriate managers and local Chinese managers between 1998 and 2005 in Shanghai, Beijing, Suzhou and Wuxi. The Arab research also involved analysis of company reports and informal conversations, as well as interviews and surveys conducted throughout the Middle Eastern region, including the GCC states, Algeria, Jordan, Libya, Palestine and Yemen.

Findings

The research finds differences in the continuing relevance of guanxi and wasta and suggests that while guanxi is adapting to internationalisation, wasta remains traditional in its influence on business and social life.

Practical implications

The paper suggests the need for increased training of international managers to adjust to culture‐specific networking in China and the Arab World and provides some practical guidelines to managers to assist their intercultural effectiveness in these two regions of the world.

Originality/value

The research is important in that it extends knowledge of traditional networking practices in exploring the Arab World which is hitherto under‐researched and in undertaking comparative examination of China and the Arab World which is also a new area of research.

Details

Journal of European Industrial Training, vol. 30 no. 4
Type: Research Article
ISSN: 0309-0590

Keywords

Article
Publication date: 4 November 2020

Yi-Chun Chang, Kuan-Ting Lai, Seng-Cho T. Chou, Wei-Chuan Chiang and Yuan-Chen Lin

Telecommunication (telecom) fraud is one of the most common crimes and causes the greatest financial losses. To effectively eradicate fraud groups, the key fraudsters must…

Abstract

Purpose

Telecommunication (telecom) fraud is one of the most common crimes and causes the greatest financial losses. To effectively eradicate fraud groups, the key fraudsters must be identified and captured. One strategy is to analyze the fraud interaction network using social network analysis. However, the underlying structures of fraud networks are different from those of common social networks, which makes traditional indicators such as centrality not directly applicable. Recently, a new line of research called deep random walk has emerged. These methods utilize random walks to explore local information and then apply deep learning algorithms to learn the representative feature vectors. Although effective for many types of networks, random walk is used for discovering local structural equivalence and does not consider the global properties of nodes.

Design/methodology/approach

The authors proposed a new method to combine the merits of deep random walk and social network analysis, which is called centrality-guided deep random walk. By using the centrality of nodes as edge weights, the authors’ biased random walks implicitly consider the global importance of nodes and can thus find key fraudster roles more accurately. To evaluate the authors’ algorithm, a real telecom fraud data set with around 562 fraudsters was built, which is the largest telecom fraud network to date.

Findings

The authors’ proposed method achieved better results than traditional centrality indices and various deep random walk algorithms and successfully identified key roles in a fraud network.

Research limitations/implications

The study used co-offending and flight record to construct a criminal network, more interpersonal relationships of fraudsters, such as friendships and relatives, can be included in the future.

Originality/value

This paper proposed a novel algorithm, centrality-guided deep random walk, and applied it to a new telecom fraud data set. Experimental results show that the authors’ method can successfully identify the key roles in a fraud group and outperform other baseline methods. To the best of the authors’ knowledge, it is the largest analysis of telecom fraud network to date.

Details

Data Technologies and Applications, vol. 55 no. 1
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 1 October 2005

Janice C. Molloy

Purpose – Seeks to highlight an emerging transition in mentoring research, that is, the transition from an exclusive focus on mentoring dyads to an integrative focus on…

2846

Abstract

Purpose – Seeks to highlight an emerging transition in mentoring research, that is, the transition from an exclusive focus on mentoring dyads to an integrative focus on mentoring development networks. Highlights from extant research are discussed as well as considerations for individuals interested in conducting research on development networks. Design/methodology/approach – A range of recently published works (1985‐2005) that aim to define, conceptualize, and test theories regarding development networks was evaluated. The sources included management as well as training and development journals and book chapters. Findings – This article provides information about how the concept of development networks has evolved over the past 20 years. Highlights from empirical research and considerations for future research are discussed. Practical implications – The article is a useful source of information regarding an emerging area of study within the mentoring literature. The paper discusses considerations for practitioners and academics regarding the construction and effectiveness of development networks. Originality/value – This article provides an overview of an emerging mentoring dynamic which is under‐studied. Given that individuals likely utilize development networks in addition to or instead of traditional mentor‐protégé dyads, research on development networks is warranted.

Details

Career Development International, vol. 10 no. 6/7
Type: Research Article
ISSN: 1362-0436

Keywords

1 – 10 of over 91000