Search results

1 – 10 of 295
Article
Publication date: 11 March 2024

Zhen Xu, Ruohong Hao, Xuanxuan Lyu and Jiang Jiang

Knowledge sharing in online health communities (OHCs) disrupts consumers' health information-seeking behavior patterns such as seeking health information and consulting. Based on…

Abstract

Purpose

Knowledge sharing in online health communities (OHCs) disrupts consumers' health information-seeking behavior patterns such as seeking health information and consulting. Based on social exchange theory, this study explores how the two dimensions of experts' free knowledge sharing (general and specific) affect customer transactional and nontransactional engagement behavior and how the quality of experts' free knowledge sharing moderates the above relationships.

Design/methodology/approach

We adopted negative binomial regression models using homepage data of 2,982 experts crawled from Haodf.com using Python.

Findings

The results show that experts' free general knowledge sharing and free specific knowledge sharing positively facilitate both transactional and nontransactional engagement of consumers. The results also demonstrate that experts' efforts in knowledge-sharing quality weaken the positive effect of their knowledge-sharing quantity on customer engagement.

Originality/value

This study provides new insights into the importance of experts' free knowledge sharing in OHCs. This study also revealed a “trade-off” between experts' knowledge-sharing quality and quantity. These findings could help OHCs managers optimize knowledge-sharing recommendation mechanisms to encourage experts to share more health knowledge voluntarily and improve the efficiency of healthcare information dissemination to promote customer engagement.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 13 June 2023

Yi-Hsin Lin, Deshuang Niu, Yanzhe Guo and Ningshuang Zeng

This study examines how project uncertainties (environmental uncertainty and participant uncertainty) affect guanxi and contractual governance and assesses the mediating role of…

195

Abstract

Purpose

This study examines how project uncertainties (environmental uncertainty and participant uncertainty) affect guanxi and contractual governance and assesses the mediating role of guanxi governance between project uncertainty and contractual governance.

Design/methodology/approach

Data were collected in two stages from Chinese contractors. First, in-depth interviews were conducted with nine construction engineering project practitioners in different contracts as a pilot for questionnaire designing. Second, a cross-sectional questionnaire survey was conducted with professionals and practitioners of construction enterprises to collect primary data. Partial least squares structural equation modeling (PLS-SEM) was used to test seven hypotheses based on data collected from 198 respondents.

Findings

Project environmental uncertainty promotes the use of guanxi governance, while project participant uncertainty hinders it; the relationship between both types of uncertainty and contractual governance is the same as with guanxi governance. Furthermore, guanxi governance promotes contractual governance and partially mediates project environmental uncertainty and contractual governance and a complete mediating role between project participant uncertainty and contractual governance.

Research limitations/implications

As the interviewed samples are mainly from China, the study should be replicated using large representative samples from East Asian countries, such as Japan and South Korea, to gain a more comprehensive understanding of the influence of guanxi governance. Further, while the internal consistency reliability and convergent validity of the questionnaire data in this study align with the standards, a larger sample size would improve the reliability and validity of the research results and better represent the overall work situation of contractors, owners and public policymakers.

Originality/value

The results provide insights into project governance research and have implications for construction practitioners in deploying governance-related resources.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 3 May 2024

Dong Huan Shen, Shuai Guo, Hao Duan, Kehao Ji and Haili Jiang

The paper focuses on the issue of manual rebar-binding tasks in the construction industry, which are marked by high labor intensity, high costs and inefficient operations. The…

Abstract

Purpose

The paper focuses on the issue of manual rebar-binding tasks in the construction industry, which are marked by high labor intensity, high costs and inefficient operations. The rebar-binding robots that are currently available are not fully mature. Most of them can only bind one or two nodes in one position, which leads to significant time wastage in movement. Based on a new type of rebar-binding robot, this paper aims to propose a new movement and binding control that reduces manpower and enhances efficiency.

Design/methodology/approach

The robot is combined with photoelectric sensors, travel switches and other sensors. It is supposed to move accurately and run in a limited area on the rebar mesh through logical judgment, speed control and position control. Machine vision is used by the robot to locate the rebar nodes and then adjusts the binding-gun position to ensure that multiple rebar nodes are bound sequentially.

Findings

By moving on the rebar mesh with accuracy, the robot meets the positioning accuracy requirements of the binding module, with experimental testing accuracy within 5 mm. Furthermore, its ability to bind four rebar nodes in one place results in a high efficiency and a binding effect that meets building standards.

Originality/value

The innovative design of the robot can adapt itself to the rebar mesh, move accurately to the target position and bind four nodes at that position, which reduces the number of movements on the mesh. Repetitive and heavy rebar-binding tasks can be efficiently completed by the robot, which saves human resources, reduces worker labor intensity and reduces construction overhead. It provides a more feasible and practical solution for using robots to bind rebar nodes.

Details

Industrial Robot: the international journal of robotics research and application, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 February 2024

Jiang Jiang, Eldon Y. Li and Li Tang

Trust plays a crucial role in overcoming uncertainty and reducing risks. Uncovering the trust mechanism in the sharing economy may enable sharing platforms to design more…

Abstract

Purpose

Trust plays a crucial role in overcoming uncertainty and reducing risks. Uncovering the trust mechanism in the sharing economy may enable sharing platforms to design more effective marketing strategies. However, existing studies have inconsistent conclusions on the trust mechanism in the sharing economy. Therefore, this study aims to investigate the antecedents and consequences of different dimensions of trust (trust in platform and trust in peers) in the sharing economy.

Design/methodology/approach

First, we conducted a meta-analysis of 57 related articles. We tested 13 antecedents of trust in platform (e.g. economic benefits, enjoyment, and information quality) and eight antecedents of trust in peers (e.g. offline service quality and providers’ reputation), as well as their consequences. Then, we conducted subgroup analyses to test the moderating effects of economic development level (Developed vs Developing), gender (Female-dominant vs Male-dominant), platform type (Accommodation vs Transportation), role type (Obtainers vs Providers), and uncertainty avoidance (Strong vs Weak).

Findings

The results confirm that all antecedents and consequences significantly affect trust in platform or peers to varying degrees. Moreover, trust in platform greatly enhances trust in peers. Besides, the results of the moderating effect analyses demonstrate the variability of antecedents and consequences of trust under different subgroups.

Originality/value

This paper provides a clear and holistic view of the trust mechanism in the sharing economy from an object-based trust perspective. The findings may offer insights into trust-building in the sharing economy.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 14 September 2023

Yongchang Jiang, Hejie Zhu and E. Bai

The existence of the advertising delay effect and its impact on supply chain operations have been demonstrated in the current study. Therefore, this study develops a timely…

Abstract

Purpose

The existence of the advertising delay effect and its impact on supply chain operations have been demonstrated in the current study. Therefore, this study develops a timely inventory control strategy for the fresh produce supply chain to address the advertising delay effect in the fresh produce supply chain.

Design/methodology/approach

This study proposes a game model based on the Nerlove-Arrow time delay differential equation and Pontryagin's maximum principle. Through comparative analyses of the optimal equilibrium strategies, the authors compare the optimal equilibrium strategies, product goodwill and optimal inventory trajectories for suppliers and retailers under secondary replenishment decisions and decentralized decisions.

Findings

The authors find that (1) Only when the sales cycle meets certain conditions can the overall profit of the supply chain under the secondary replenishment decision be greater than that under the decentralized decision. As the price markup coefficient increases, the total profit of the supply chain first increases and then decreases. (2) With the increase in the delay time, the replenishment quantity during the initial period gradually decreases. After the delay time elapses, the inventory depletion rate under secondary replenishment decisions is faster than that under decentralized decision-making. (3) Although there is a continuously increasing maximum value of product goodwill with the increase in delay time, it becomes difficult to achieve this value for longer delays.

Practical implications

The authors’ findings provide a theoretical basis for supply chain members of fresh agricultural products to select replenishment and inventory control strategies when adopting different levels of delay in advertising marketing.

Originality/value

Firstly, this paper explains the impact of advertising delay effect on fresh produce supply chain from a dynamic perspective, and secondly, it provides guidance on advertising formulation and inventory replenishment for fresh produce retailers under the influence of advertising delay effect.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 16 April 2024

Hongyu Hou, Feng Wu and Xin Huang

The development of the digital age has made data and information more transparent, enhancing the strategic perspectives of both buyers (strategic waiting) and sellers (price…

Abstract

Purpose

The development of the digital age has made data and information more transparent, enhancing the strategic perspectives of both buyers (strategic waiting) and sellers (price fluctuations) in their decision-making. This research investigates the optimal dynamic pricing strategy of the content product developer in relation to their consideration of consumer fairness concerns to elucidate the impact of consumer fairness concerns on the dynamic pricing strategy of the developer.

Design/methodology/approach

This paper assumes that monopolistic content developers implement a dynamic pricing strategy for the content product. Through constructing a two-period dynamic pricing game model, this research investigates the optimal decisions of the content developer, contingent upon their consideration or disregard of consumer fairness concerns. In the extension section, the authors additionally account for the influence of myopic consumers on these optimal decisions.

Findings

Our findings reveal that the degree of consumer fairness concerns significantly influences the developer’s optimal dynamic pricing decision. When a developer offers content products with lower depth, there is a propensity for the developer to refrain from incorporating consumer fairness concerns into a dynamic pricing strategy. Conversely, in cases where the developer offers a high-depth content product, consumer fairness concerns benefit the developer. Furthermore, our analysis reveals a consistent benefit for the developer from the inclusion of myopic consumers.

Originality/value

Few studies have delved into the conjoined influence of consumer fairness concerns and strategic behavior on dynamic pricing strategy. Our findings indicate that consumer fairness concerns can enhance the efficiency of the value chain for content products under specific conditions. This paper not only enriches the existing literature on dynamic pricing by incorporating consumer fairness concerns theoretically but also offers practical insights. The outcomes of this research can guide content product developers in devising optimal dynamic pricing strategies.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 29 February 2024

Jingxin Lv and Shiquan Wang

This study aims to focus on the resource-based faultline of a top management team (TMT) and intends to investigate the impact of TMT resource-based faultline on corporate green…

Abstract

Purpose

This study aims to focus on the resource-based faultline of a top management team (TMT) and intends to investigate the impact of TMT resource-based faultline on corporate green innovation, by indicating the environmental management as a mediator and slack resources as a moderator to understand the relationship.

Design/methodology/approach

Based on the empirical data of Chinese listed manufacturing companies from 2008 to 2020, this study assesses the hypotheses using an OLS model with fixed effects of time and industry.

Findings

The results indicate that TMT resource-based faultline is significantly negatively correlated with corporate green innovation. The conclusion remains valid after endogeneity tests and robustness checks. Mechanism test shows that environmental management plays a mediating role in the association between TMT resource-based faultline and corporate green innovation. Moreover, slack resources diminish the negative association between TMT resource-based faultline and corporate green innovation.

Originality/value

The study not only expands the theoretical understanding of the deeper motivation of TMT faultline on corporate green innovation, but also provides a practical reference for optimizing the human resource allocation of the TMT and accelerating green transformation development.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 9 February 2024

Wei Wang, Haiwang Liu and Yenchun Jim Wu

This study aims to examine the influence of reward personalization on financing outcomes in the Industry 5.0 era, where reward-based crowdfunding meets the personalized needs of…

Abstract

Purpose

This study aims to examine the influence of reward personalization on financing outcomes in the Industry 5.0 era, where reward-based crowdfunding meets the personalized needs of individuals.

Design/methodology/approach

The study utilizes a corpus of 218,822 crowdfunding projects and 1,276,786 reward options on Kickstarter to investigate the effect of reward personalization on investors’ willingness to participate in crowdfunding. The research draws on expectancy theory and employs quantitative and qualitative approaches to measure reward personalization. Quantitatively, the number of reward options is calculated by frequency; whereas text-mining techniques are implemented qualitatively to extract novelty, which serves as a proxy for innovation.

Findings

Findings indicate that reward personalization has an inverted U-shaped effect on investors’ willingness to participate, with investors in life-related projects having a stronger need for reward personalization than those interested in art-related projects. The pledge goal and reward text readability have an inverted U-shaped moderating effect on reward personalization from the perspective of reward expectations and reward instrumentality.

Originality/value

This study refines the application of expectancy theory to online financing, providing theoretical insight and practical guidance for crowdfunding platforms and financiers seeking to promote sustainable development through personalized innovation.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 21 September 2022

Tan Jiang, Guang Luo, Zikai Wang and Wenhui Yu

The purpose of this study is to analyse and discuss the influencing factors of user experience in university mobile libraries and the improvement path of user experience in the…

Abstract

Purpose

The purpose of this study is to analyse and discuss the influencing factors of user experience in university mobile libraries and the improvement path of user experience in the context of mobile learning.

Design/methodology/approach

The study adopted the grounded theory research method, and the sample included 28 students from five universities, with mobile libraries as the research objects and semi-structured interview as data acquisition method. A step-by-step coding analysis of the original interview materials was conducted, which comprehensively identified the main concerns and problems encountered by users of the university mobile library apps especially in the mobile learning behaviour mode, and then a theoretical model of the influencing factors of the app user experience of the university mobile library was constructed.

Findings

A theoretical model of influencing factors was constructed, which determined that system quality, interaction quality, content quality, interface quality and function quality were the key elements of mobile library user experiences. Furthermore, based on the research results and user feedback obtained in the research process, the content and key points relating to the user experience can be elaborated in detail. In addition, this study was able to determine users' perspectives and their behavioural characteristics when engaging in mobile learning.

Originality/value

This study establishes a theoretical model of the factors influencing of the user experience of university mobile libraries based on mobile learning, which could provide a valuable reference for the design of other programs and strategies to promote user learning experiences of mobile library app in colleges and universities.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 295