Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 8 May 2024

Tyler Prochnow and Megan S. Patterson

Online gaming has emerged as a popular activity providing a social outlet for millions. However, implications of online game networks for mental health remain disputed. Concepts…

Abstract

Purpose

Online gaming has emerged as a popular activity providing a social outlet for millions. However, implications of online game networks for mental health remain disputed. Concepts of bridging social capital and bonding social capital may help characterize protective factors within social networks. This study aims to examine the associations between social capital derived from online versus in-person networks and mental health indicators among gamers.

Design/methodology/approach

Online gamers (n = 301) completed an online survey assessing their social networks (both in-person and through online gaming) and mental health indicators (depressive symptoms, anxiety, social isolation, perceived social support). Social network analysis was used to analyze bridging (network size, effective size, heterogeneity, weak ties) and bonding (closeness, frequent contact, confiding, connection quality) social capital. Separate linear regression models evaluated associations between bridging and bonding social capital for both online and in-person networks and depressive symptoms, anxiety, social support and social isolation.

Findings

In-person network characteristics showed the strongest associations with mental health outcomes. Greater average closeness and frequent confiding in the in-person network predicted lower isolation and fewer depressive symptoms. More diverse relationship types also correlated with lower depression. For online networks, closeness and confiding ties associated only with less isolation and greater support, not depressive symptoms, or anxiety.

Originality/value

While online gaming networks provide some degree of social support, in-person social capital exhibited stronger associations with mental health. This reinforces the importance of face-to-face relationships for emotional well-being. Findings suggest helping gamers cultivate close bonds offline. However, online connections still matter and should not be discounted.

Details

Journal of Public Mental Health, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5729

Keywords

Article
Publication date: 9 March 2023

Hang Yin, Jishan Hou, Chengju Gong and Chen Xu

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network…

Abstract

Purpose

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network vulnerability changes when the core enterprise is attacked is a challenging topic. The purpose of this paper is to reveal the failure process of SME cooperation networks caused by the failure of the core SME from the perspective of cascading failure.

Design/methodology/approach

According to the Torch High Technology Industry Development Center, Ministry of Science & Technology in China, 296 SMEs in Jiangsu province were used to construct an SME cooperation network of technology-based SMEs and an under-loading cascading failure model. The weight-based attack strategy was selected to mimic a deliberate node attack and was used to analyze the vulnerability of the SME cooperation network.

Findings

Some important conclusions are obtained from the simulation analysis: (1) The minimum boundary of node enterprises has a negative relationship with networks' invulnerability, while the breakdown probability has an inverted-U relationship with networks' invulnerability. (2) The combined effect of minimum boundary and breakdown probability indicates that the vulnerability of networks is mainly determined by the breakdown probability; while, minimum boundary helps prevent cascading failure occur. Furthermore, according to the case study, adapting capital needs and resilience in the cooperation network is the core problem in improving the robustness of SME cooperation networks.

Originality/value

This research proposed an under-loading cascading failure model to investigate the under-loading failure process caused by the shortage of resources when the core enterprise fails or withdraws from the SME cooperation network. Two key parameters in the proposed model—minimum capacity and breakdown probability—could serve as a guide for research on the vulnerability of SME cooperation networks. Additionally, practical meanings for each parameter in the proposed model are given, to suggest novel insights regarding network protection to facilitate the robustness and vulnerability in real SME cooperation networks.

Article
Publication date: 14 February 2023

Hua Pang

By building and examining an integral model, the principal objectives of this research are to systematically explore how indirect and direct network externalities lead to user…

Abstract

Purpose

By building and examining an integral model, the principal objectives of this research are to systematically explore how indirect and direct network externalities lead to user loyalty toward WeChat through the mediating effect of perceived gratifications.

Design/methodology/approach

The data were collected through an online survey of 688 young people in Mainland China. To empirically assess the conceptual model, zero-order correlation analyses and structural equation modeling were carried out utilizing web-based data.

Findings

Path analysis results demonstrate that indirect network externalities and direct network externalities exert a significant impact on users' hedonic gratifications and utilitarian gratifications. Moreover, the study discovers the significant mediating influences of utilitarian gratifications on the association between indirect network externalities and user loyalty.

Research limitations/implications

Theoretically, this article may extend the scope of diverse studies on the association between network externalities and perceived gratifications and offer fresh insights into how mobile social media could actually improve user loyalty through enhancing perceived values among younger generation. Practically, this research assists mobile social media practitioners in retaining users and gaining competitive advantages over rival applications.

Originality/value

Although the extraordinary growth of WeChat has successfully become the dominant media by which individuals develop interpersonal network and contact with others, the roles of perceived gratifications between network externalities and user loyalty toward WeChat have not yet been investigated in depth. These obtained outcomes not only enrich the existing literature regarding the relationship between network externalities and affective response, but also offer fresh insights to mobile social media designers, marketers and users.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 13 October 2023

Eduardo André Cândido Da Silva, Flávio Santino Bizarrias, Renato Penha, Luciano Ferreira da Silva and Cristiane Drebes Pedron

Despite the significant interest from researchers and practitioners, the literature on project value measurement from the perspective of the customer is non-existent. This study…

Abstract

Purpose

Despite the significant interest from researchers and practitioners, the literature on project value measurement from the perspective of the customer is non-existent. This study aims to address this gap by developing and validating a scale to measure project value through a customer lens called the customer perception of project value scale.

Design/methodology/approach

A list of items was initially generated based on 762 sample responses through a systematic review of the literature and with the participation of specialists. Exploratory and confirmatory factorial analyses and structural equation modelling were used to develop and validate the scale.

Findings

The authors formulated a four-dimension scale. The dimensions used to measure the second-order construct are customer centrality, process, delivery and cost-benefit. This was validated using a nomological structure.

Research limitations/implications

The non-consensual nature of what is value in projects restricts the results of this study to the context of a specific group of stakeholders only, that is, the consumers of the projects. The authors also see limitations in the absence of competing scales, which do not allow the comparison of the instrument with alternative measures.

Practical implications

This study allows project managers and other professionals to measure a project’s perceived value from the customer’s point of view and manage the improvement of this perception.

Originality/value

To the best of the authors’ knowledge, this is the first study to propose a scale to measure project value, which advances the literature on project management and value and contributes to academic knowledge and practice by measuring project value from the customer standpoint.

Details

European Business Review, vol. 36 no. 3
Type: Research Article
ISSN: 0955-534X

Keywords

Article
Publication date: 14 August 2023

Oliver von Dzengelevski, Torbjørn H. Netland, Ann Vereecke and Kasra Ferdows

When is it more profitable for multinational manufacturers to manufacture in high-cost environments and when in low-cost environments? While the literature offers many cues to…

Abstract

Purpose

When is it more profitable for multinational manufacturers to manufacture in high-cost environments and when in low-cost environments? While the literature offers many cues to answer this question, too little empirical research directly addresses this. In this study, we quantitatively and empirically investigate the financial effect of companies' production footprint in low-cost and high-cost environments for different types of production networks.

Design/methodology/approach

Using the data of 770 multinational manufacturing companies, we analyze the relationship between production footprints and profitability during four calendar semesters in 2018 and 2019 (N = 2,940), investigating the moderating role of companies' production network type.

Findings

We find that companies with networks distinguished by both high levels of product complexity and process sophistication profit the most from producing to a greater extent in high-cost countries. For these companies, shifting production to low-cost countries would be associated with negative performance implications.

Practical implications

Our findings suggest that the production geography of companies should be attuned to their network type, as defined by the companies' process sophistication and product complexity. Manufacturing in low-cost countries is not always the best choice, as doing so can adversely affect profits if the products are highly innovative and the production processes are complex.

Originality/value

We contribute to the scarce empirical literature on managing global production networks and provide a data-driven analysis that contributes to answering some of the enduring questions in this critical area.

Details

International Journal of Operations & Production Management, vol. 44 no. 5
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 7 May 2024

Yalan Wang, Chengjun Wang, Wei Wang and Xiaoming Sun

This study aims to investigate the influence of inventors’ abilities to acquire external knowledge, provide broad and professional knowledge and patenting output (i.e. different…

Abstract

Purpose

This study aims to investigate the influence of inventors’ abilities to acquire external knowledge, provide broad and professional knowledge and patenting output (i.e. different types of inventors) on the formation of structural holes.

Design/methodology/approach

The authors collected 59,798 patents applied for and granted in the USA by 33 of the largest firms worldwide in the pharmaceutical industry between 1975 and 2014. A random-effects tobit model was used to test the hypotheses.

Findings

The inventors’ ability to acquire external knowledge contributes to the formation of structural holes. While inventors’ ability to provide broad knowledge positively affects the formation of structural holes, their ability to provide professional knowledge works otherwise. In addition, key inventors and industrious inventors are more likely to form structural holes than talents.

Originality/value

The results identify individual factors that affect the formation of structural holes and improve the understanding of structural hole theory. This study is unique in that most scholars have studied the consequences of structural hole formation rather than their antecedents. Studies on the origin of structural holes neglect the effect of inventors’ knowledge abilities and patenting output. By addressing this gap, this study contributes to a more comprehensive theoretical understanding of structural holes. The results can guide managers in managing structural holes in accordance with inventors’ knowledge abilities and patenting outputs, which optimize the allocation of network resources.

Details

Journal of Knowledge Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 28 February 2023

Shan Du

This paper aims to propose the mechanism of cross-network effect embedded, which can help cross-border e-commerce (CBEC) platforms strengthen cooperative relationships with…

Abstract

Purpose

This paper aims to propose the mechanism of cross-network effect embedded, which can help cross-border e-commerce (CBEC) platforms strengthen cooperative relationships with sellers more equitably and effectively by using the network structural characteristics of the platforms themselves.

Design/methodology/approach

A two-stage evolutionary game model has been used to confirm the influence factors. The mathematical derivation of evolutionary game analysis is combined with the simulation method to examine the role of cross-network effect in cooperation. The evolutionary game model based on the cross-network effect is proposed to achieve better adaptability to the study of cooperation strategy from the two-sided market perspective.

Findings

The evolutionary game model captures the interactions of cross-network effect and the influence factors from a dynamic perspective. The cross-network effect has a certain substitution on the revenue-sharing rate of SMEs. CBEC platforms can enhance the connection between consumers and the website by improving the level of construction, which is a good way to attract sellers more cost-effectively and efficiently.

Research limitations/implications

This study provides a new method for the validation of the cross-network effect, especially when data collection is difficult. But this method is only a numerical simulation. So the conclusions still need to be further tested empirically. Besides, researchers are advised to explore the relationship between the added user scale and the cross-network effect in some specificCBEC platforms.

Practical implications

This study provides a new method for the validation of the cross-network effect, especially when data collection is difficult. But this method is only a numerical simulation. So the conclusions still need to be further tested empirically. Besides, researchers are advised to explore the relationship between the added user scale and the cross-network effect in some specific CBEC platforms.

Originality/value

Investigations that study cooperation strategy from the cross-network effect perspective in CBEC are limited. The research figured out which influence factors are affected by the cross-network effect in cooperation. A two-stage evolutionary game model was proposed to explain the interaction of the factors. The evolutionary game analysis with a simulation method was combined to highlight the role of cross-network effect on cooperation strategy to give a deeper investigation into the sustainable cooperation ofCBEC.

Details

Kybernetes, vol. 53 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Book part
Publication date: 23 May 2024

Pooja Kansra

Coronavirus illness is an irresistible infection instigated by a newfound coronavirus. Social distancing was identified as the most effective preventive measure, and it has…

Abstract

Coronavirus illness is an irresistible infection instigated by a newfound coronavirus. Social distancing was identified as the most effective preventive measure, and it has shifted the teaching to online mode. The present study explored the various perceptions held by students while attending the classes during COVID-19. Primary data have been obtained for the fulfillment of the objective of the study. The data were analyzed with descriptive and inferential statistics. It was exhibited that students specified that online teaching provides real-world skills followed by financial benefits, active learning, recorded lectures, comfortable, ease of access, safe, flexible timings, interactive, and build self-confidence. However, various challenges in online classes were less interaction, technical issues, network issues, lack of self-discipline, social isolation, family distractions, difficult e-learning tools, etc. Logit regression provided that willingness to attend online classes in post COVID-19 was associated with age, gender, IT skills, prior experience, and location. Application of e-learning posed several challenges and possibilities throughout the entire field of education throughout the pandemic. The study suggested the need to address the various challenges faced by the students on immediate basis. It was recommended that training programs can help to prepare the students to take the benefits of digital education platforms.

Details

Navigating the Digital Landscape
Type: Book
ISBN: 978-1-83549-272-7

Keywords

Article
Publication date: 3 April 2024

Ifeanyi Adindu Anene and Achebe Nancy

This study aims to develop a model for integration of information and communication technologies (ICTs) in resource sharing practices for enhanced service delivery in academic…

Abstract

Purpose

This study aims to develop a model for integration of information and communication technologies (ICTs) in resource sharing practices for enhanced service delivery in academic libraries in Southeast Nigeria. Seven objectives guided the study; ICT-based resource sharing practices in academic libraries in Southeast Nigeria; ICT infrastructure for resource sharing; ICT needs of librarians for resource sharing practices; stages of ICT integration in resource sharing; perception of librarians towards ICT-based resource sharing; challenges to integration of ICT in resource sharing practices; design a model for the integration of ICT into resource sharing; all in academic libraries in Southeast Nigeria.

Design/methodology/approach

The research design adopted for this study is the mixed research design containing the “descriptive survey” research design and the “research and development, R&D.” The population of the study is 164, comprising all of the librarians in federal universities in Southeast Nigeria. All of the librarians of the five federal universities will be involved in the study. Hence, there was no sampling. The instrument for data collection is a structured questionnaire.

Findings

The findings of the study revealed that 88.8% of the librarians use ICT to boost the volume of resources; while 74% of the librarians were positive in all responses pertaining to ICT-based resource sharing practices in the libraries. The study also revealed that ICT infrastructures in the library for resource sharing are highly available and applicable; while computers and internet networks are the most needed gadgets for the operations. Libraries in Southeast Nigeria are in the applying and transforming stages of ICT adoption at a 69.7% response rate; while the librarians have a strong belief and understanding that a lot can be achieved in resource sharing through ICT; and would recommend such. Poor electrification, inadequate funding and unavailability of some ICT technologies were equally identified as challenges. The study conclusively developed a resource sharing model, the Southeast Federal University Library Connect; accessible at https://southeastfeduniconnect.njh.com.ng

Originality/value

The research study is one of the few types of research that has developed a functional model for resource sharing in academic libraries in Southeast Nigeria.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 1000