Search results

1 – 10 of over 1000
Article
Publication date: 7 June 2023

Yani Dong, Yan Li, Hai-Yan Hua and Wei Li

As the current Coronavirus 2019 pandemic eases, international tourism, which was greatly affected by the outbreak, is gradually recovering. The attraction of countries to overseas…

Abstract

Purpose

As the current Coronavirus 2019 pandemic eases, international tourism, which was greatly affected by the outbreak, is gradually recovering. The attraction of countries to overseas tourists is related to their overall performance in the pandemic. This research integrates the data of vaccination of different countries, border control policy and holidays to explore their differential impacts on the overseas tourists’ intention during the pandemic. This is crucial for destinations to built their tourism resilience. It will also help countries and industry organizations to promote their own destinations to foreign tourism enterprises.

Design/methodology/approach

This study proposes an analysis based on panel data for ten countries over 1,388 days. The coefficient of variation is used to measure monthly differences of Chinese tourists’ intention to visit overseas country destinations.

Findings

Results show that, for tourist intention of going abroad: border control of the destination country has a significant negative impact; daily new cases in the destination country have a significant negative impact; domestic daily new cases have a significant positive impact; holidays have significant negative impact; daily vaccination of the destination countries has significant positive impact; and domestic daily vaccination have negative significant impact.

Research limitations/implications

First, there is a large uncertainty in studying consumers’ willingness to travel abroad in this particular period because of unnecessary travel abroad caused by the control of the epidemic. Second, there are limitations in studying only Chinese tourists, and future research should be geared toward a broader range of research pairs.

Practical implications

First, from the government perspective, a humane response can earn the respect and trust of tourists. Second, for tourism industry, to encourage the public take vaccine would be beneficial for both the tourism destination and foreign tourism companies. The same effect can be achieved by helping tourists who are troubled by border control.

Social implications

First, this research provides suggestions for the government and the tourism industry to deal with such a crisis in the future. Second, this study found that vaccination has a direct impact on tourism. This provides a basis for improving people’s willingness to vaccinate. Thirdly, this study proves suggestion for the destinations to build tourism resilience.

Originality/value

This study analyzes the unique control measures and vaccination in different countries during the pandemic, then provides suggestions for the tourism industry to prepare for the upcoming postpandemic tourism recovery. This study is valuable for improving the economic resilience of tourism destinations. Additionally, it helps to analyze the advantages and disadvantages of different restrain policies around the world.

Details

Journal of Business & Industrial Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 18 July 2023

Yan Li, Shumei Jin, Qi Chen and Steven J. Armstrong

This research focuses on the work–family facilitation process to theorize and examine the potential positive impact of perceived overqualification (POQ) on an individual’s…

Abstract

Purpose

This research focuses on the work–family facilitation process to theorize and examine the potential positive impact of perceived overqualification (POQ) on an individual’s work–family interface. Drawing on social cognitive theory of self-regulation, this research identifies work–family balance self-efficacy (WFBSE) as a motivational mechanism through which POQ affects work engagement. Additionally, it proposes flexibility human resource (HR) practices as a key moderator of this process.

Design/methodology/approach

This research collected multi-wave time-lagged data from 342 managers in the hospitality industry. The research focused on managers with the title of headwaiter and above, while front-line service personnel were not included.

Findings

The results showed that POQ had an indirect positive relationship with work engagement via WFBSE. The results also showed that employee-experienced flexibility HR practices moderated the effectiveness of WFBSE in translating POQ into work engagement.

Practical implications

This research provides guidance and insights into how HRM systems can be customized to sustain positive outcomes in situations of overqualification. It is crucial that hotels offer flexibility options or individualization of work arrangements for overqualified employees.

Originality/value

The potential positive impact of POQ on employees’ work–family interface has been neglected. In addition, prior research has devoted little attention to potential organizational factors that enhance the positive effects of POQ. By examining the mediating and moderating effects, this research aims to explain how and under what conditions POQ facilitates work engagement.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 12 December 2023

Abdul Gaffar Khan, Monowar Mahmood, Mohammad Shariful Islam, Yan Li and Ha Jin Hwang

Employee expediency is a ubiquitous, unethical phenomenon in the workplace that is largely underresearched. Based on the tenets of conservation of resources (COR) theory, this…

Abstract

Purpose

Employee expediency is a ubiquitous, unethical phenomenon in the workplace that is largely underresearched. Based on the tenets of conservation of resources (COR) theory, this study investigates the influence of excessive performance pressure on employees' expedient behaviour via moral disengagement. It further examines the moderating role of employees' moral identity in the relationship between performance pressure and employee expediency.

Design/methodology/approach

The data were collected using a multi-wave paper-and-pencil survey amongst 388 sales associates working in pharmaceutical manufacturing companies in Bangladesh. A series of hierarchical regression analyses and bootstrapping techniques of the PROCESS macro were conducted to test the hypotheses.

Findings

The findings reveal that performance pressure significantly and positively affects employees' expediency. Additionally, moral disengagement partially mediates the positive relationship between performance pressure and employee expediency. Furthermore, moral identity moderates the direct effect of performance pressure on moral disengagement and the indirect effect of performance pressure on employee expediency through moral disengagement.

Practical implications

Managers are advised to consider the compatibility of economic and moral principles when defining performance targets or evaluating staff performance, as immoral behaviours harm organisations in the long run. Additionally, managers should emphasise candidates with high levels of sensitive moral qualities, such as integrity and moral behaviour, and their abilities should be given preference when hiring new employees, e.g. moral reasoning.

Originality/value

This pioneering study investigates the underlying psychological mechanisms and moral characteristics to unravel the association between performance pressure and employee expediency using the lens of COR theory. The study identified the moral consequences of performance pressure and mitigating strategies to reduce employee expedient behaviour.

Details

International Journal of Productivity and Performance Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0401

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 5 February 2024

Hanna Shin, Yan Li and Nara Youn

The authors investigated the factors influencing consumer evaluations of advertisements for ethical luxury products that incorporate animal rights and protection concerns. The…

Abstract

Purpose

The authors investigated the factors influencing consumer evaluations of advertisements for ethical luxury products that incorporate animal rights and protection concerns. The authors empirically examined how ethical messages influence advertisement persuasiveness through ethical consumer guilt and positively impact consumer evaluations of ethical luxury products. Furthermore, the authors explored the moderating role of consumers’ independent versus interdependent self-construals.

Design/methodology/approach

The authors conducted four experimental studies on the interplay among ethicality, luxury brand positioning and self-construal. Moderated mediation analyses revealed that moral emotions were responsible for the effect of ethical luxury advertisements that address animal welfare on brand attitude.

Findings

Advertisement messages signaling a luxury brand’s ethical efforts increase empathy through ethical consumer guilt, thereby generating favorable attitudes toward luxury products. However, this effect is limited to consumers with independent self-construal in South Korea and the United States of America.

Originality/value

The authors offer novel insights into the roles of ethical consumer guilt and empathy in the positive effects of ethical messages from luxury brands. Furthermore, the authors identified brand type and self-construal as boundary conditions for the effects observed across different consumer groups and markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 9 November 2023

Lubing Lyu and Haixia Zhao

This paper aims to study the interplay between a risk-averse national brand manufacturer's (NBM) selling mode decision and a risk-neutral e-platform's private brand (PB…

Abstract

Purpose

This paper aims to study the interplay between a risk-averse national brand manufacturer's (NBM) selling mode decision and a risk-neutral e-platform's private brand (PB) introduction decision.

Design/methodology/approach

A game theory model is used to solve selling mode decision, that is whether transform the selling mode from the wholesale mode to the marketplace mode, and PB introduction decision, that is, whether introduce the PB.

Findings

The results show that for the NBM, under certain condition, the NBM's selling mode decision is not affected by the e-platform's PB introduction decision. High revenue-sharing rate is conducive only when the difference in consumer preference between the PB and the national brand (NB) is small. The NBM's risk aversion will improve the applicability of the marketplace mode. For the e-platform, high PB preference of consumers and risk-averse behavior of the NBM is not conducive to PB introduction. For the supply chain, scenarios that the NB monopolizes the market under the wholesale mode and PB introduction under the marketplace mode should be prevented. PB introduction under the wholesale mode will become the only equilibrium with the increase of risk aversion of the NBM. Finally, the authors extend the scenario that consumers prefer the PB and the e-platform is risk-averse enterprise and find that PB introduction under the wholesale mode is detrimental to the NBM but beneficial to the supply chain. The impact of consumers' PB preference on the e-platform's PB introduction is opposite to the basic model. The impact of the e-platform's risk aversion on game equilibrium is opposite to that of the NBM's risk aversion.

Originality/value

This paper is first to study selling mode decision and PB introduction decision when considering enterprises' risk-averse attitude.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 23 January 2024

Benjamin Biesinger, Karsten Hadwich and Manfred Bruhn

(Digital) servitization, referring to service-driven strategies and their increasing implementation in manufacturing, is one of the most rapidly growing areas in industrial…

Abstract

Purpose

(Digital) servitization, referring to service-driven strategies and their increasing implementation in manufacturing, is one of the most rapidly growing areas in industrial service research. However, the cultural change involved in successful servitization is a phenomenon that is widely observed but poorly understood. This research aims to clarify the processes of social construction as manufacturers change their organizational culture to transform into industrial service providers.

Design/methodology/approach

This research takes a systematic approach to integrate disparate literature on servitization into a cohesive framework for cultural change, which is purposefully augmented by rationale culled from organizational learning and sensemaking literature.

Findings

The organizational learning framework for cultural change in servitization introduces a dynamic perspective on servitizing organizations by explaining social processes between organizational and member-level cultural properties. It identifies three major cultural orientations toward service, digital and learning that govern successful servitization.

Originality/value

This research contributes to the servitization literature by presenting a new approach to reframe and explore cultural change processes across multiple levels, thus providing a concrete starting point for further research in this area.

Details

Journal of Service Theory and Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2055-6225

Keywords

Article
Publication date: 12 April 2024

Zhen Li, Jianqing Han, Mingrui Zhao, Yongbo Zhang, Yanzhe Wang, Cong Zhang and Lin Chang

This study aims to design and validate a theoretical model for capacitive imaging (CI) sensors that incorporates the interelectrode shielding and surrounding shielding electrodes…

Abstract

Purpose

This study aims to design and validate a theoretical model for capacitive imaging (CI) sensors that incorporates the interelectrode shielding and surrounding shielding electrodes. Through experimental verification, the effectiveness of the theoretical model in evaluating CI sensors equipped with shielding electrodes has been demonstrated.

Design/methodology/approach

The study begins by incorporating the interelectrode shielding and surrounding shielding electrodes of CI sensors into the theoretical model. A method for deriving the semianalytical model is proposed, using the renormalization group method and physical model. Based on random geometric parameters of CI sensors, capacitance values are calculated using both simulation models and theoretical models. Three different types of CI sensors with varying geometric parameters are designed and manufactured for experimental testing.

Findings

The study’s results indicate that the errors of the semianalytical model for the CI sensor are predominantly below 5%, with all errors falling below 10%. This suggests that the semianalytical model, derived using the renormalization group method, effectively evaluates CI sensors equipped with shielding electrodes. The experimental results demonstrate the efficacy of the theoretical model in accurately predicting the capacitance values of the CI sensors.

Originality/value

The theoretical model of CI sensors is described by incorporating the interelectrode shielding and surrounding shielding electrodes into the model. This comprehensive approach allows for a more accurate evaluation of the detecting capability of CI sensors, as well as optimization of their performance.

Details

Sensor Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 27 November 2023

Yirui Chen, Qianhu Chen, Yiling Xu, Elisa Arrigo and Pantaleone Nespoli

In the post-pandemic era urban ecosystem planning has become critically important. Given the emphasis on relevant issues concerning the complex interactions between human…

Abstract

Purpose

In the post-pandemic era urban ecosystem planning has become critically important. Given the emphasis on relevant issues concerning the complex interactions between human civilizations and natural systems within urban environments in the new normal, this article aims to enrich the field of knowledge management developing a cross-cultural analysis for clarifying the role of knowledge in planning and urban ecosystems.

Design/methodology/approach

This paper is conceptual in nature. Based on a theoretical foundation built by a critical literature review and data from the China Statistical Yearbook and China’s National Bureau of Statistics, this paper introduces some emerging real-impact topics regarding the connections between humanistic knowledge and urban planning. A comparative analysis between the capital city of Chang’an in the Tang dynasty of China and the capital city of Athens in Ancient Greek was used for explaining the influence of knowledge on successful urban planning.

Findings

The understanding the role of cross-cultural differences in knowledge management and practices for urban ecosystems offer the opportunities for rethinking consolidated approach to the interaction among social, economic, and environmental dimensions in urban settings.

Originality/value

This paper implies a new inter-disciplinary research field of great interest for the real impact KM community by illuminating how knowledge management is central in urban planning and across cultures.

Details

Journal of Knowledge Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 30 October 2023

Jiahua Jin, Qin Chen and Xiangbin Yan

Given the popularity of online health communities (OHCs) and medical question-and-answer (Q&A) services, it is increasingly important to understand what constitutes useful answers…

Abstract

Purpose

Given the popularity of online health communities (OHCs) and medical question-and-answer (Q&A) services, it is increasingly important to understand what constitutes useful answers and user-adopted standards in healthcare domain. However, few studies provide insights into how health information characteristics, provider characteristics and recipient characteristics jointly influence user information adoption decisions. To fill this research gap, this study examines the combined effects of physicians' certainty tone as information characteristics, seniority as provider characteristics and disease severity as recipient characteristics on patients' health information adoption.

Design/methodology/approach

Drawing on dual-process theory and information adoption model, an extended information adoption model is established in this study to examine the effect of attitude certainty on patients' health information adoption, and the moderating effects of online seniority and offline seniority, as well as patient motivation level—disease severity. Utilizing logit regression models, the authors empirically tested the hypotheses based on 4,224 Q&A records from a popular Chinese OHC.

Findings

The results show that (1) attitude certainty has a significant positive impact on patients' health information adoption, (2) the relationship between attitude certainty and information adoption is negatively moderated by physicians' online seniority, but is positively moderated by offline seniority; (3) there is a negative three-way interaction effect of attitude certainty, online seniority and disease severity on patients' health information adoption.

Originality/value

This study extends the information adoption model to examine the two-way interaction between argument quality and source reliability, as well as the three-way interaction with user motivation level, especially for health information adoption in the healthcare field. These findings also provide direct practical applications for knowledge contributors and OHCs.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 1000