Search results
1 – 10 of over 5000This study aims to clarify the impact of agriculture–tourism integration (ATI) on in situ urbanization (ISURB) of rural residents, to highlight the role of industrial integration…
Abstract
Purpose
This study aims to clarify the impact of agriculture–tourism integration (ATI) on in situ urbanization (ISURB) of rural residents, to highlight the role of industrial integration in the process of China's ISURB and to provide industrial integration suggestions for promoting urbanization quality in Chinese counties.
Design/methodology/approach
By sorting out the panel data of China's 1868 counties, the evaluation index system of ISURB was constructed. Difference in difference (DID) and spatial Durbin-difference in difference (SDM-DID) model is used for estimate the relationship between ATI and ISURB.
Findings
First, ATI can improve ISURB by 11.4% higher than other regions. Second, theoretical analysis model of ATI on ISURB is constructed from four aspects of “drive–push–pull–block.” The results show that ATI can promote ISURB by increasing upgrading of rural industries, rural employment demand and income capacity, whereas ATI may inhibit ISURB by reducing farmland. Third, considering changes in institutional, hard and soft factors, rural collective economy, information infrastructure and digital finance all promote positive impact of ATI on ISURB. Fourth, ATI will produce spillover effects on ISURB in neighboring regions, which is more pronounced in the central and western regions.
Research limitations/implications
This study lacks quantification of ATI, so future studies are encouraged to further quantify ATI at the county level.
Practical implications
This study has policy significance for constructing ATI demonstration counties and promoting ISURB in China's counties.
Social implications
It is of great practical value to promote China's ISURB. By stimulating ATI, it can improve income and employment capacity of rural residents and stimulate ISURB of China.
Originality/value
This study enriches the theoretical and practical research on industrial integration behaviors during the process of ISURB.
Highlights
Use county data to measure in situ urbanization (ISURB)
Agriculture–tourism integration (ATI) can increase ISURB
Constructs a “drive-push-pull-block” model to explain the influence mechanism
Use spatial Durbin-difference in difference (SDM-DID) models
Consider collective economy, rural information infrastructure and digital finance
Use county data to measure in situ urbanization (ISURB)
Agriculture–tourism integration (ATI) can increase ISURB
Constructs a “drive-push-pull-block” model to explain the influence mechanism
Use spatial Durbin-difference in difference (SDM-DID) models
Consider collective economy, rural information infrastructure and digital finance
Graphical abstract
Details
Keywords
Giordano Ruggeri, Stefano Corsi and Chiara Mazzocchi
This study aims to provide a comprehensive overview of the academic landscape in wine economics and business research over the past decades, capturing and analysing the literature…
Abstract
Purpose
This study aims to provide a comprehensive overview of the academic landscape in wine economics and business research over the past decades, capturing and analysing the literature through rigorous bibliometric methodologies. The study is intended as a foundational resource for academics, policymakers and industry stakeholders interested in the evolving scholarly discourse within the wine industry.
Design/methodology/approach
The authors analyse data from over 3,200 papers in the field of wine economics and business published between 1990 and 2022, sourced from Scopus. Various bibliometric indicators are applied, including publication and citation counts, and methods like keyword and co-citation analyses were used to map out the thematic and intellectual landscape.
Findings
The study reveals the escalating global relevance of wine economics and business research and identifies prominent papers and authors, influential countries and leading journals. The analysis reveals a dynamic shift in academic focus. Initially concentrating on foundational inquiries in the 1990s, research evolved to encompass complex themes such as e-commerce, wine tourism, sustainability and global crises. The study emphasises the adaptability and resilience of the wine supply chain and anticipates future research areas.
Originality/value
This study presents a comprehensive bibliometric analysis of the expanding body of research in wine economics and business, using data from over 3,200 documents published between 1990 and 2022. It uniquely combines different advanced bibliometric tools to provide a multifaceted overview of wine economics and business research.
Details
Keywords
Abstract
Purpose
This paper breaks through the limitations of the research on bullwhip effect in the traditional supply chain, extends the research perspective to digital supply chain and discusses the weakening effect of digital supply chain on bullwhip effect by comparing the overall performance of the two.
Design/methodology/approach
This paper starts with the weakening mechanism of supply chain digitization on bullwhip effect, builds bullwhip effect models of traditional supply chain and digital supply chain, respectively, simulates the influence of supply chain digitization transformation on bullwhip effect by using Matlab software and analyzes the causes of bullwhip effect in supply chain led by T company and the digitization process.
Findings
Firstly, digitization can reduce bullwhip effect in multi-level supply chain by reducing information feedback deviation. Second, digital transformation is conducive to improving the overall performance of the supply chain. Third, government incentives can promote the digital transformation of supply chain and inhibit bullwhip effect.
Research limitations/implications
Although the study considers the heterogeneous subject -- the government's incentive effect on digital transformation and information sharing – it does not include the influence of the end node in the supply chain, that is the consumer. In addition, this paper only analyzes and discusses the bullwhip effect on the amplification of demand, without considering the situation that the market contraction will lead to the reduction of demand.
Practical implications
This paper considers the distortion degree and delay degree of information feedback, carries out quantitative analysis of bullwhip effect, builds the bullwhip effect model of traditional supply chain and digital supply chain, uses Matlab software to analyze the difference of the influence of supply chain digital transformation on bullwhip effect suppression and puts forward the corresponding control strategy.
Social implications
The research shows that digital transformation can reduce the bullwhip effect in multi-layer supply chain by reducing the information feedback deviation, which is conducive to improving the overall supply chain performance, and government support can accelerate the digital transformation of supply chain to a certain extent.
Originality/value
First, break through the limitations of traditional supply chain research, expand the research perspective to digital supply chain and discuss the weakening effect of digital supply chain on bullwhip effect by comparing the overall performance of the two. Second, quantify the bullwhip effect through information feedback bias and provide an analysis method for the weakening of the bullwhip effect. Third, the driving role of the government in the digital transformation of the supply chain is considered in the study, so that the model is more close to the actual situation of enterprise operation.
Details
Keywords
Christine Prince, Nessrine Omrani and Francesco Schiavone
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…
Abstract
Purpose
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.
Design/methodology/approach
An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.
Findings
The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.
Originality/value
While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
Details
Keywords
The author develops a bilateral Nash bargaining model under value uncertainty and private/asymmetric information, combining ideas from axiomatic and strategic bargaining theory…
Abstract
The author develops a bilateral Nash bargaining model under value uncertainty and private/asymmetric information, combining ideas from axiomatic and strategic bargaining theory. The solution to the model leads organically to a two-tier stochastic frontier (2TSF) setup with intra-error dependence. The author presents two different statistical specifications to estimate the model, one that accounts for regressor endogeneity using copulas, the other able to identify separately the bargaining power from the private information effects at the individual level. An empirical application using a matched employer–employee data set (MEEDS) from Zambia and a second using another one from Ghana showcase the applied potential of the approach.
Details
Keywords
Adrián Mendieta-Aragón, Julio Navío-Marco and Teresa Garín-Muñoz
Radical changes in consumer habits induced by the coronavirus disease (COVID-19) pandemic suggest that the usual demand forecasting techniques based on historical series are…
Abstract
Purpose
Radical changes in consumer habits induced by the coronavirus disease (COVID-19) pandemic suggest that the usual demand forecasting techniques based on historical series are questionable. This is particularly true for hospitality demand, which has been dramatically affected by the pandemic. Accordingly, we investigate the suitability of tourists’ activity on Twitter as a predictor of hospitality demand in the Way of Saint James – an important pilgrimage tourism destination.
Design/methodology/approach
This study compares the predictive performance of the seasonal autoregressive integrated moving average (SARIMA) time-series model with that of the SARIMA with an exogenous variables (SARIMAX) model to forecast hotel tourism demand. For this, 110,456 tweets posted on Twitter between January 2018 and September 2022 are used as exogenous variables.
Findings
The results confirm that the predictions of traditional time-series models for tourist demand can be significantly improved by including tourist activity on Twitter. Twitter data could be an effective tool for improving the forecasting accuracy of tourism demand in real-time, which has relevant implications for tourism management. This study also provides a better understanding of tourists’ digital footprints in pilgrimage tourism.
Originality/value
This study contributes to the scarce literature on the digitalisation of pilgrimage tourism and forecasting hotel demand using a new methodological framework based on Twitter user-generated content. This can enable hospitality industry practitioners to convert social media data into relevant information for hospitality management.
研究目的
2019冠狀病毒病引致消費者習慣有根本的改變; 這些改變顯示,根據歷史序列而運作的慣常需求預測技巧未必是正確的。這不確性尤以受到大流行極大影響的酒店服務需求為甚。因此,我們擬探討、若把在推特網站上的旅遊活動視為聖雅各之路 (一個重要的朝聖旅遊聖地) 酒店服務需求的預測器,這會否是合適的呢?
研究設計/方法/理念
本研究比較 SARIMA 時間序列模型與附有外生變數 (SARIMAX)模型兩者在預測旅遊及酒店服務需求方面的表現。為此,研究人員收集在推特網站上發佈的資訊,作為外生變數進行研究。這個樣本涵蓋於2018年1月至2022年9月期間110,456個發佈資訊。
研究結果
研究結果確認了傳統的時間序列模型,若涵蓋推特網站上的旅遊活動,則其對旅遊需求方面的預測會得到顯著的改善。推特網站的數據,就改善預測實時旅遊需求的準確度,或許可成為有效的工具; 而這發現對旅遊管理會有一定的意義。本研究亦讓我們進一步瞭解朝聖旅遊方面旅客的數碼足跡。
研究的原創性
現存文獻甚少探討朝聖旅遊的數字化,而本研究不但在這方面充實了有關的文獻,還使用了一個根據推特網站上使用者原創內容嶄新的方法框架,進行分析和探討。這會幫助酒店從業人員把社交媒體數據轉變為可供酒店管理之用的合宜資訊。
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Janina Seutter, Michelle Müller, Stefanie Müller and Dennis Kundisch
Whenever social injustice tackled by social movements receives heightened media attention, charitable crowdfunding platforms offer an opportunity to proactively advocate for…
Abstract
Purpose
Whenever social injustice tackled by social movements receives heightened media attention, charitable crowdfunding platforms offer an opportunity to proactively advocate for equality by donating money to affected people. This research examines how the Black Lives Matter movement and the associated social protest cycle after the death of George Floyd have influenced donation behavior for campaigns with a personal goal and those with a societal goal supporting the black community.
Design/methodology/approach
This paper follows a quantitative research approach by applying a quasi-experimental research design on a GoFundMe dataset. In total, 67,905 campaigns and 1,362,499 individual donations were analyzed.
Findings
We uncover a rise in donations for campaigns supporting the black community, which lasts substantially longer for campaigns with a societal than with a personal funding goal. Informed by construal level theory, we attribute this heterogeneity to changes in the level of abstractness of the problems that social movements aim to tackle.
Originality/value
This research advances the knowledge of individual donation behavior in charitable crowdfunding. Our results highlight the important role that charitable crowdfunding campaigns play in promoting social justice and anti-discrimination as part of social protest cycles.
Details
Keywords
Efrosini Siougle, Sophia Dimelis and Nikolaos Malevris
This study explores the link between ISO 9001 certification, personal data protection and firm performance using financial balance sheet and survey data. The security aspect of…
Abstract
Purpose
This study explores the link between ISO 9001 certification, personal data protection and firm performance using financial balance sheet and survey data. The security aspect of data protection is analyzed based on the major requirements of the General Data Protection Regulation and mapped to the relevant controls of the ISO/IEC 27001/27002 standards.
Design/methodology/approach
The research analysis is based on 96 ISO 9001–certified and non-certified publicly traded manufacturing and service firms that responded to a structured questionnaire. The authors develop and empirically test their theoretical model using the structural equation modeling technique and follow a difference-in-differences econometric modeling approach to estimate financial performance differences between certified and non-certified firms accounting for the level of data protection.
Findings
The estimates indicate three core dimensions in the areas of “policies, procedures and responsibilities,” “access control management” and “risk-reduction techniques” as desirable components in establishing the concept of data security. The estimates also suggest that the data protection level has significantly impacted the performance of certified firms relative to the non-certified. Controlling for the effect of industry-level factors reveals a positive relationship between data security and high-technological intensity.
Practical implications
The results imply that improving the level of compliance to data protection enhances the link between certification and firm performance.
Originality/value
This study fills a gap in the literature by empirically testing the influence of data protection on the relationship between quality certification and firm performance.
Details
Keywords
Yu Wang, Daqing Zheng and Yulin Fang
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…
Abstract
Purpose
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.
Design/methodology/approach
This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.
Findings
The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.
Originality/value
This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.
Details