Search results

1 – 10 of over 1000
Article
Publication date: 5 April 2024

Yuchen Wang and Rui Guo

Based on social cognitive theory, this study aims to explore the psychological mechanism behind consumer verification behavior following tourism e-commerce live-streaming.

Abstract

Purpose

Based on social cognitive theory, this study aims to explore the psychological mechanism behind consumer verification behavior following tourism e-commerce live-streaming.

Design/methodology/approach

Based on grounded theory, data were collected through 20 semi-structured in-depth interviews and analyzed.

Findings

This study identified that companies commonly use reminder messages and secondary promotions to facilitate the verification of tourism live-streaming products. Throughout this process, consumers undergo various psychologies related to verification. Specifically, they experience four positive verification psychologies: fear of missing out, anticipated emotions, status self-esteem and promotional perception. They also encounter two negative verification psychologies: psychological reactance and invasiveness. In addition, environmental factors such as the type of tourism live-streaming products and tourism destinations, along with individual trait factors like cognitive miserliness, tourism experience, autonomy, regulatory mode and impulsiveness, play significant roles in shaping verification behavior. These factors collectively influence the formation of verification behavior.

Originality/value

This study can provide recommendations for tourism companies to conduct marketing events following live-streaming. It is one of the earlier comprehensive studies discussing how to promote verification behavior following tourism e-commerce live-streaming. It helps to understand the psychological mechanism underlying the formation of verification behavior.

Article
Publication date: 20 September 2023

Salima Hamouche and Alain Marchand

Managers play a crucial role in organizations. They make decisions that directly influence organizational success and significantly impact employees’ mental health, development…

Abstract

Purpose

Managers play a crucial role in organizations. They make decisions that directly influence organizational success and significantly impact employees’ mental health, development and performance. They are responsible for ensuring the financial well-being and long-term sustainability of organizations. However, their mental health is often overlooked, which can negatively affect employees and organizations. This study aims to address managers’ mental health at work, by examining specifically the direct and indirect effects of identity verification on their psychological distress and depression through self-esteem at work. The study also aims to examine the moderating as well as moderated mediation effects of identity salience.

Design/methodology/approach

A sample of 314 Canadian managers working in 56 different companies was studied, using multilevel analyses.

Findings

The findings showed that the verification of managers’ identity vis-à-vis recognition is positively associated with psychological distress and depression. Self-esteem completely mediates the association between low identity verification vis-à-vis work control and psychological distress, and also the association between low identity verification vis-à-vis work control and superior support and depression, while it partially mediates the association between low identity verification vis-à-vis recognition and depression.

Practical implications

This study can also help both managers and human resource management practitioners in understanding the role of workplaces in the identity verification process and developing relevant interventions to prevent mental health issues among managers at work.

Originality/value

This study proposed a relatively unexplored approach to the study of managers’ mental health at work. Its integration of identity theory contributes to expanding research on management and workplace mental health issues.

Open Access
Article
Publication date: 5 April 2023

Tomás Lopes and Sérgio Guerreiro

Testing business processes is crucial to assess the compliance of business process models with requirements. Automating this task optimizes testing efforts and reduces human error…

2588

Abstract

Purpose

Testing business processes is crucial to assess the compliance of business process models with requirements. Automating this task optimizes testing efforts and reduces human error while also providing improvement insights for the business process modeling activity. The primary purposes of this paper are to conduct a literature review of Business Process Model and Notation (BPMN) testing and formal verification and to propose the Business Process Evaluation and Research Framework for Enhancement and Continuous Testing (bPERFECT) framework, which aims to guide business process testing (BPT) research and implementation. Secondary objectives include (1) eliciting the existing types of testing, (2) evaluating their impact on efficiency and (3) assessing the formal verification techniques that complement testing.

Design/methodology/approach

The methodology used is based on Kitchenham's (2004) original procedures for conducting systematic literature reviews.

Findings

Results of this study indicate that three distinct business process model testing types can be found in the literature: black/gray-box, regression and integration. Testing and verification approaches differ in aspects such as awareness of test data, coverage criteria and auxiliary representations used. However, most solutions pose notable hindrances, such as BPMN element limitations, that lead to limited practicality.

Research limitations/implications

The databases selected in the review protocol may have excluded relevant studies on this topic. More databases and gray literature could also be considered for inclusion in this review.

Originality/value

Three main originality aspects are identified in this study as follows: (1) the classification of process model testing types, (2) the future trends foreseen for BPMN model testing and verification and (3) the bPERFECT framework for testing business processes.

Details

Business Process Management Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 19 February 2024

Jingkun Liu

This paper aims to elucidate the responsiveness of China’s judicial system in addressing the challenges of identifying online illegal fund-raising crimes that have emerged in…

Abstract

Purpose

This paper aims to elucidate the responsiveness of China’s judicial system in addressing the challenges of identifying online illegal fund-raising crimes that have emerged in recent years. This study systematically evaluates the efficacy and potential pitfalls of legal guidelines contained in judicial interpretations, such as holistic determination, sampling verification and presumption of the nature of funds. In addition, the research endeavors to propose pertinent recommendations for refining the existing judicial rules.

Design/methodology/approach

This research mainly uses a doctrinal methodology, focusing on the principal judicial interpretations formulated by the Supreme People’s Court and other central judicial entities in China. The scope encompasses the realm of online illegal fund-raising crimes as well as other cybercrimes. The analytical framework involves a comprehensive examination of these authoritative judicial documents, coupled with a theoretical and critical analysis of relevant academic materials.

Findings

This research underscores that while judicial interpretations serve as an effective legal strategy to confront the challenges posed by online illegal fund-raising crimes, their implementation introduces a nuanced landscape. These legal guidelines, often emanating from diverse judicial departments and tackling specific issues, carry the inherent risk of giving rise to new complexities and fostering inconsistency. Judicial authorities shall exercise prudence in both the formulation and application of these guidelines, ensuring their harmonization with existing legal norms and fundamental legal principles.

Originality/value

This research constitutes a critical and comprehensive examination of judicial interpretations in China pertaining to online illegal fund-raising crimes. It offers valuable insights into the country’s judicial interpretation system and its legal responses to financial crimes. The paper serves as a valuable resource for academics, law enforcement professionals, policymakers, legislators and researchers.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 11 July 2023

Cong Liu and Jiahui Gao

The purpose of this paper is to examine the interesting but largely unexamined impact of self-uncertainty on the persuasiveness of self-deprecating advertisement.

Abstract

Purpose

The purpose of this paper is to examine the interesting but largely unexamined impact of self-uncertainty on the persuasiveness of self-deprecating advertisement.

Design/methodology/approach

In the present research, the experimental design and survey methods are used to collect data. Furthermore, the ANOVA and bootstrap analysis methods are adopted to verify whether a self-deprecating advertisement is more persuasive for consumers experiencing self-uncertainty and explore the mediating role of self-verification.

Findings

Study 1 indicates that people experiencing self-uncertainty are more likely to engage in actual self-verification. Study 2 demonstrates that consumers experiencing self-uncertainty are more likely to purchase products in a self-deprecating advertisement (vs. self-enhancing advertisement), and actual self-verification motive underlies this effect. In Study 3, a novel boundary condition for the main effect–product type (hedonic vs. utilitarian) is found, and it further reveals that the impact of self-uncertainty on the persuasiveness of self-deprecating advertisement will attenuate when the advertised product is utilitarian.

Practical implications

This research reveals that self-deprecating advertising is more desirable for consumers who experience self-uncertainty. Based on the conclusions in this paper, the self-deprecating advertising is more attractive and desirable for consumers who are reminded about their personal uncertainties. Thus, marketers could employ self-deprecating (vs. self-enhancing) advertisement to promote products. For example, in order to promote the waterproof function of iPhone 12, Apple China released a self-deprecating advertisement of “Splash proof and water resistant. Don't worry, iPhone.”

Originality/value

First, this research not only sheds new light on the relationship between self-uncertainty and the persuasiveness of self-deprecating advertisement but also verifies the mediating role of self-verification motive in this relationship. Moreover, this research reveals that self-uncertainty is a significant factor in how people react to the self-deprecating advertisement. It is noteworthy that the self-uncertainty effect is more likely to be found when the advertised product is related to hedonic or experiential consumption as opposed to utilitarian consumption.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 36 no. 1
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 18 April 2023

Changyu Wang, Jin Yan, Lijing Huang and Ningyue Cao

Drawing on information foraging theory and the SERVQUAL model, this study built a research model to investigate the roles of middle-aged and elderly short-video creators' online…

Abstract

Purpose

Drawing on information foraging theory and the SERVQUAL model, this study built a research model to investigate the roles of middle-aged and elderly short-video creators' online attributes in attracting short-video viewers to be their followers.

Design/methodology/approach

Taking Douyin (a famous short-video platform in China) as an example, this study used a sequential triangulation mixed-methods approach (quantitative → qualitative) to examine the proposed model by investigating both creators and viewers.

Findings

Viewers who clicked the “like” button for the middle-aged and elderly creators' videos are more likely to follow the creators. Viewers will believe that middle-aged and elderly creators who received more likes are more popular. Thus, middle-aged and elderly creators with more likes usually have more followers. Viewers usually believe that middle-aged and elderly creators who more frequently publish professional and high-quality videos have invested more effort and who have official verification also have a high level of authority and are recognized by the platform. Thus, middle-aged and elderly creators with more professional videos and verification usually have more followers. Moreover, verification, the number of videos and the professionalism of videos can enhance the transformation of viewers who liked middle-aged and elderly creators' videos into their followers, and thus strengthen the positive relationship between the number of likes and the number of followers; however, the number of bio words will have an opposite effect.

Practical implications

These findings have implications for platform managers, middle-aged and elderly creators and the brands aiming to develop a “silver economy” by attracting more followers.

Originality/value

This study researches short-video platforms by using a mixed-methods approach to develop an understanding of viewers' decision-making when following middle-aged and elderly creators based on information foraging theory and the SERVQUAL model from the perspectives of both short-video creators and viewers.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 September 2023

Tony Zitti, Abdouramane Coulibaly, Idriss Ali Zakaria Gali-Gali, Valery Ridde and Anne-Marie Turcotte-Tremblay

This article compares the processes of community verification (CV) and user satisfaction surveys during the implementation of performance-based financing (PBF) in Mali and Burkina…

Abstract

Purpose

This article compares the processes of community verification (CV) and user satisfaction surveys during the implementation of performance-based financing (PBF) in Mali and Burkina Faso.

Design/methodology/approach

The authors adopted a qualitative approach based on a multiple-case study design. Data were collected from August 10 to 25, 2017, in Mali, and from January to May 2016 in Burkina Faso. In Mali, 191 semi-structured interviews were conducted with investigators (people who collect information from health centre users in the communities, using survey tools), users, users' relatives, and health workers in three of the 10 health districts in the Koulikoro region. In Burkina Faso, 241 non-participatory observation sessions were recorded in a research diary, and 92 semi-structured interviews and informal discussions were conducted with investigators, community verifiers, users, PBF support staff at the national level, and administrative staff in one of the 15 health districts involved in PBF. The data were analysed inductively.

Findings

In both Mali and Burkina Faso, the delayed availability of survey forms led to a delay in starting the surveys. In Mali, to get off to a quick start, some investigators went to health centres to conduct the sampling with their supervisors. In both countries, investigators reported difficulties in finding certain users in the community due to incorrect spelling of names, lack of telephone details, incomplete information on the forms, common or similar sounding names within the community, and user mobility. There was little interference from health workers during user selection and surveys in both countries. In both countries, many surveys were conducted in the presence of the user's family (husband, father-in-law, brother, uncle, etc.) and the person accompanying the investigator. Also in both countries, some investigators filled in forms without investigating. They justified this data fabrication by the inadequate time available for the survey and the difficulty or impossibility of finding certain users. In both countries, the results were not communicated to health centre staff or users in either country.

Research limitations/implications

CV and user satisfaction surveys are important components of PBF implementation. However, their implementation and evaluation remain complex. The instruments for CV and user satisfaction surveys for PBF need to be adapted and simplified to the local context. Emphasis should be placed on data analysis and the use of CV results.

Originality/value

There are similarities and differences in the CV process and user satisfaction surveys in Mali and Burkina Faso. In Mali, the data from the user satisfaction survey was not analyzed, while in Burkina Faso, the analysis did not allow for feedback. The local non-governmental organisations (NGOs) that carried out the CV were pre-financed for 50% of the amount in Mali. In Burkina Faso, community-based organisations (CBOs) were not pre-financed. The lack of financing negatively impacted the conduction of the surveys. In Mali, fraudulent completion of survey forms by interviewers was more common in urban than in rural areas. In Burkina Faso, the frauds concerned consultations for children under five years of age. In Burkina Faso, the survey form was not adapted to collect data on the level of satisfaction of the indigent.

Key messages

  1. There were similarities and differences in the community verification (CV) processes in Mali and Burkina Faso.

  2. In both Mali and Burkina Faso, tracing users within their community was difficult for several reasons, including incorrect or incomplete information on forms, common or similar names, and user mobility.

  3. In both countries, there was no feedback on the results of the CV process to health centre staff or users.

  4. Survey forms were falsified by investigators in both countries. In Mali, falsification was more common in urban than in rural areas. In Burkina Faso, falsification was more often observed for consultations for children under five years of age.

There were similarities and differences in the community verification (CV) processes in Mali and Burkina Faso.

In both Mali and Burkina Faso, tracing users within their community was difficult for several reasons, including incorrect or incomplete information on forms, common or similar names, and user mobility.

In both countries, there was no feedback on the results of the CV process to health centre staff or users.

Survey forms were falsified by investigators in both countries. In Mali, falsification was more common in urban than in rural areas. In Burkina Faso, falsification was more often observed for consultations for children under five years of age.

Details

International Journal of Public Sector Management, vol. 36 no. 6/7
Type: Research Article
ISSN: 0951-3558

Keywords

Article
Publication date: 21 March 2024

Zhaobin Meng, Yueheng Lu and Hongyue Duan

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…

Abstract

Purpose

The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.

Design/methodology/approach

This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.

Findings

This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.

Originality/value

This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 7 April 2023

Chiara Bedon and Christian Louter

Glass material is largely used for load-bearing components in buildings. For this reason, standardized calculation methods can be used in support of safe structural design in…

Abstract

Purpose

Glass material is largely used for load-bearing components in buildings. For this reason, standardized calculation methods can be used in support of safe structural design in common loading and boundary conditions. Differing from earlier literature efforts, the present study elaborates on the load-bearing capacity, failure time and fire endurance of ordinary glass elements under fire exposure and sustained mechanical loads, with evidence of major trends in terms of loading condition and cross-sectional layout. Traditional verification approaches for glass in cold conditions (i.e. stress peak check) and fire endurance of load-bearing members (i.e. deflection and deflection rate limits) are assessed based on parametric numerical simulations.

Design/methodology/approach

The mechanical performance of structural glass elements in fire still represents an open challenge for design and vulnerability assessment. Often, special fire-resisting glass solutions are used for limited practical applications only, and ordinary soda-lime silica glass prevails in design applications for load-bearing members. Moreover, conventional recommendations and testing protocols in use for load-bearing members composed of traditional constructional materials are not already addressed for glass members. This paper elaborates on the fire endurance and failure detection methods for structural glass beams that are subjected to standard ISO time–temperature for fire exposure and in-plane bending mechanical loads. Fire endurance assessment methods are discussed with the support of Finite Element (FE) numerical analyses.

Findings

Based on extended parametric FE analyses, multiple loading, geometrical and thermo-mechanical configurations are taken into account for the analysis of simple glass elements under in-plane bending setup and fire exposure. The comparative results show that – in most of cases – thermal effects due to fire exposure have major effects on the actual load-bearing capacity of these members. Moreover, the conventional stress peak verification approach needs specific elaborations, compared to traditional calculations carried out in cold conditions.

Originality/value

The presented numerical results confirm that the fire endurance analysis of ordinary structural glass elements is a rather complex issue, due to combination of multiple aspects and influencing parameters. Besides, FE simulations can provide useful support for a local and global analysis of major degradation and damage phenomena, and thus support the definition of simple and realistic verification procedures for fire exposed glass members.

Article
Publication date: 4 December 2023

Feifei Zhong, Guoping Liu, Zhenyu Lu, Lingyan Hu, Yangyang Han, Yusong Xiao and Xinrui Zhang

Robotic arms’ interactions with the external environment are growing more intricate, demanding higher control precision. This study aims to enhance control precision by…

Abstract

Purpose

Robotic arms’ interactions with the external environment are growing more intricate, demanding higher control precision. This study aims to enhance control precision by establishing a dynamic model through the identification of the dynamic parameters of a self-designed robotic arm.

Design/methodology/approach

This study proposes an improved particle swarm optimization (IPSO) method for parameter identification, which comprehensively improves particle initialization diversity, dynamic adjustment of inertia weight, dynamic adjustment of local and global learning factors and global search capabilities. To reduce the number of particles and improve identification accuracy, a step-by-step dynamic parameter identification method was also proposed. Simultaneously, to fully unleash the dynamic characteristics of a robotic arm, and satisfy boundary conditions, a combination of high-order differentiable natural exponential functions and traditional Fourier series is used to develop an excitation trajectory. Finally, an arbitrary verification trajectory was planned using the IPSO to verify the accuracy of the dynamical parameter identification.

Findings

Experiments conducted on a self-designed robotic arm validate the proposed parameter identification method. By comparing it with IPSO1, IPSO2, IPSOd and least-square algorithms using the criteria of torque error and root mean square for each joint, the superiority of the IPSO algorithm in parameter identification becomes evident. In this case, the dynamic parameter results of each link are significantly improved.

Originality/value

A new parameter identification model was proposed and validated. Based on the experimental results, the stability of the identification results was improved, providing more accurate parameter identification for further applications.

Details

Industrial Robot: the international journal of robotics research and application, vol. 51 no. 1
Type: Research Article
ISSN: 0143-991X

Keywords

1 – 10 of over 1000