Search results

1 – 10 of 877
Article
Publication date: 20 March 2024

Verdiana Giannetti, Jieke Chen and Xingjie Wei

Anecdotal evidence suggests that casting actors with similar facial features in a movie can pose challenges in foreign markets, hindering the audience's ability to recognize and…

Abstract

Purpose

Anecdotal evidence suggests that casting actors with similar facial features in a movie can pose challenges in foreign markets, hindering the audience's ability to recognize and remember characters. Extending developments in the literature on the cross-race effect, we hypothesize that facial similarity – the extent to which the actors starring in a movie share similar facial features – will reduce the country-level box-office performance of US movies in East and South-East Asia (ESEA) countries.

Design/methodology/approach

We assembled data from various secondary data sources on US non-animation movies (2012–2021) and their releases in ESEA countries. Combining the data resulted in a cross-section of 2,616 movie-country observations.

Findings

Actors' facial similarity in a US movie's cast reduces its box-office performance in ESEA countries. This effect is weakened as immigration in the country, internet penetration in the country and star power increase and strengthened as cast size increases.

Originality/value

This first study on the effects of cast's facial similarity on box-office performance represents a novel extension to the growing literature on the antecedents of movies' box-office performance by being at the intersection of the two literature streams on (1) the box-office effects of cast characteristics and (2) the antecedents, in general, of box-office performance in the ESEA region.

Details

International Marketing Review, vol. 41 no. 2
Type: Research Article
ISSN: 0265-1335

Keywords

Article
Publication date: 17 April 2024

Seunghun Shin, Chulmo Koo, Jungkeun Kim and Dogan Gursoy

This paper aims to examine the impact of metaverse experiences on customers’ offline behavioral intentions: How do customers’ visits to a hospitality business’s virtual property…

Abstract

Purpose

This paper aims to examine the impact of metaverse experiences on customers’ offline behavioral intentions: How do customers’ visits to a hospitality business’s virtual property in the metaverse affect their intentions to visit the physical property in the real world?

Design/methodology/approach

Based on the general learning model and social cognitive theory, this research hypothesizes the positive impact of metaverse experiences on customers’ visit intentions and explores two boundary conditions for positive impact: user–avatar resemblance and servicescape similarity. Two experimental studies were conducted.

Findings

Metaverse experience has a significant impact on customers’ visit intentions, and this impact is moderated by user–avatar resemblance and servicescape similarity.

Research limitations/implications

This research addresses the call for empirical studies regarding the effects of metaverse experience on people’s behavioral intentions.

Originality/value

As one of the earliest empirical studies on the marketing effects of the metaverse, this research provides a basis for future metaverse studies in the hospitality field.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 9 April 2024

Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…

Abstract

Purpose

This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.

Design/methodology/approach

We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.

Findings

We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.

Originality/value

While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 23 April 2024

Yong Liu, Xue-ge Guo, Qin Jiang and Jing-yi Zhang

We attempt to construct a grey three-way conflict analysis model with constraints to deal with correlated conflict problems with uncertain information.

Abstract

Purpose

We attempt to construct a grey three-way conflict analysis model with constraints to deal with correlated conflict problems with uncertain information.

Design/methodology/approach

In order to address these correlated conflict problems with uncertain information, considering the interactive influence and mutual restraints among agents and portraying their attitudes toward the conflict issues, we utilize grey numbers and three-way decisions to propose a grey three-way conflict analysis model with constraints. Firstly, based on the collected information, we introduced grey theory, calculated the degree of conflict between agents and then analyzed the conflict alliance based on the three-way decision theory. Finally, we designed a feedback mechanism to identify key agents and key conflict issues. A case verifies the effectiveness and practicability of the proposed model.

Findings

The results show that the proposed model can portray their attitudes toward conflict issues and effectively extract conflict-related information.

Originality/value

By employing this approach, we can provide the answers to Deja’s fundamental questions regarding Pawlak’s conflict analysis: “what are the underlying causes of conflict?” and “how can a viable consensus strategy be identified?”

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 19 January 2023

Mitali Desai, Rupa G. Mehta and Dipti P. Rana

Scholarly communications, particularly, questions and answers (Q&A) present on digital scholarly platforms provide a new avenue to gain knowledge. However, several studies have…

Abstract

Purpose

Scholarly communications, particularly, questions and answers (Q&A) present on digital scholarly platforms provide a new avenue to gain knowledge. However, several studies have raised a concern about the content anomalies in these Q&A and suggested a proper validation before utilizing them in scholarly applications such as influence analysis and content-based recommendation systems. The content anomalies are referred as disinformation in this research. The purpose of this research is firstly, to assess scholarly communications in order to identify disinformation and secondly, to help scholarly platforms determine the scholars who probably disseminate such disinformation. These scholars are referred as the probable sources of disinformation.

Design/methodology/approach

To identify disinformation, the proposed model deduces (1) content redundancy and contextual redundancy in questions (2) contextual nonrelevance in answers with respect to the questions and (3) quality of answers with respect to the expertise of the answering scholars. Then, the model determines the probable sources of disinformation using the statistical analysis.

Findings

The model is evaluated on ResearchGate (RG) data. Results suggest that the model efficiently identifies disinformation from scholarly communications and accurately detects the probable sources of disinformation.

Practical implications

Different platforms with communication portals can use this model as a regulatory mechanism to restrict the prorogation of disinformation. Scholarly platforms can use this model to generate an accurate influence assessment mechanism and also relevant recommendations for their scholars.

Originality/value

The existing studies majorly deal with validating the answers using statistical measures. The proposed model focuses on questions as well as answers and performs a contextual analysis using an advanced word embedding technique.

Details

Kybernetes, vol. 53 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 December 2023

Li Zhang and Xican Li

Aim to the limitations of grey relational analysis of interval grey number, based on the generalized greyness of interval grey number, this paper tries to construct a grey angle…

Abstract

Purpose

Aim to the limitations of grey relational analysis of interval grey number, based on the generalized greyness of interval grey number, this paper tries to construct a grey angle cosine relational degree model from the perspective of proximity and similarity.

Design/methodology/approach

Firstly, the algorithms of the generalized greyness of interval grey number and interval grey number vector are given, and its properties are analyzed. Then, based on the grey relational theory, the grey angle cosine relational model is proposed based on the generalized greyness of interval grey number, and the relationship between the classical cosine similarity model and the grey angle cosine relational model is analyzed. Finally, the validity of the model in this paper is illustrated by the calculation examples and an application example of related factor analysis of maize yield.

Findings

The results show that the grey angle cosine relational degree model has strict theoretical basis, convenient calculation and is easy to program, which can not only fully utilize the information of interval grey numbers but also overcome the shortcomings of greyness relational degree model. The grey angle cosine relational degree is an extended form of cosine similarity degree of real numbers. The calculation examples and the related factor analysis of maize yield show that the model proposed in this paper is feasible and valid.

Practical implications

The research results not only further enrich the grey system theory and method but also provide a basis for the grey relational analysis of the sequences in which the interval grey numbers coexist with the real numbers.

Originality/value

The paper succeeds in realizing the algorithms of the generalized greyness of interval grey number and interval grey number vector, and the grey angle cosine relational degree, which provide a new method for grey relational analysis.

Details

Grey Systems: Theory and Application, vol. 14 no. 2
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 4 April 2024

Xiaoling Li, Zongshu Wu, Qing Huang and Juanyi Liu

This study develops an empirical framework to address how large third-party sellers (TPSs) can apply customer acquisition strategies to improve their performance in consumers’…

Abstract

Purpose

This study develops an empirical framework to address how large third-party sellers (TPSs) can apply customer acquisition strategies to improve their performance in consumers’ person-goods matching process and how the platform firm’s similar strategies moderate the effects of TPSs’ strategies.

Design/methodology/approach

Using data collected from the top ten TPSs from a Chinese e-commerce platform, the fixed effect model is used to validate the conceptual model and hypotheses.

Findings

The study results show that both market detection strategy and matching optimization strategy can help large TPSs improve their sales performance. Moreover, the similar market detection strategy applied by the platform firm weakens the effect of large TPSs’ customer acquisition strategies, while the similar matching optimization strategy applied by the platform firm strengthens the effect of large TPSs’ customer acquisition strategies.

Originality/value

This study provides firsthand evidence on the performance of large TPSs’ and the platform firm’s strategies. It demonstrates the effectiveness of large TPSs’ market detection strategy and matching optimization strategy, which can be adopted to meet consumers’ search and evaluation motivations in their person-goods matching process respectively. Moreover, it identifies the role of platform firms by showing the moderating effect of similar strategies adopted by the platform firm on the effect of large TPSs’ customer acquisition strategies.

Details

Industrial Management & Data Systems, vol. 124 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 19 March 2024

Reijo Savolainen

To elaborate the nature of fact-checking in the domain of political information by examining how fact-checkers assess the validity of claims concerning the Russo-Ukrainian…

Abstract

Purpose

To elaborate the nature of fact-checking in the domain of political information by examining how fact-checkers assess the validity of claims concerning the Russo-Ukrainian conflict and how they support their assessments by drawing on evidence acquired from diverse sources of information.

Design/methodology/approach

Descriptive quantitative and qualitative content analysis of 128 reports written by the fact-checkers of Snopes – an established fact-checking organisation – during the period of 24 February 2022 – 28 June, 2023. For the analysis, nine evaluation grounds were identified, most of them inductively from the empirical material. It was examined how the fact-checkers employed such grounds while assessing the validity of claims and how the assessments were bolstered by evidence acquired from information sources such as newspapers.

Findings

Of the 128 reports, the share of assessments indicative of the invalidity of the claims was 54.7%, while the share of positive ratings was 26.7%. The share of mixed assessments was 15.6%. In the fact-checking, two evaluation grounds, that is, the correctness of information and verifiability of an event presented in a claim formed the basis for the assessment. Depending on the topic of the claim, grounds such as temporal and spatial compatibility, as well as comparison by similarity and difference occupied a central role. Most popular sources of information offering evidence for the assessments include statements of government representatives, videos and photographs shared in social media, newspapers and television programmes.

Research limitations/implications

As the study concentrated on fact-checking dealing with political information about a specific issue, the findings cannot be extended to concern the fact-checking practices in other contexts.

Originality/value

The study is among the first to characterise how fact-checkers employ evaluation grounds of diverse kind while assessing the validity of political information.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 7 February 2023

Yalan Yan, Siyu Xin and Xianjin Zha

Knowledge transfer which refers to the communication of knowledge from a source so that it is learned and applied by a recipient has long been a challenge for knowledge…

Abstract

Purpose

Knowledge transfer which refers to the communication of knowledge from a source so that it is learned and applied by a recipient has long been a challenge for knowledge management. The purpose of this study is to understand influencing factors of transactive memory system (TMS) and knowledge transfer.

Design/methodology/approach

Drawing on the theories of communication visibility, social distance and flow, this study develops a research model. Then, data are collected from users of the social media mobile App. Partial least squares-structural equation modeling (PLS-SEM) is employed to analyze data.

Findings

TMS is a valid second-order construct in the social media mobile app context, which is more reflected by credibility. Meanwhile, communication visibility and social distance each have positive effects on TMS which further has a positive effect on knowledge transfer. Flow has a positive effect on knowledge transfer.

Practical implications

Developers of the mobile App should carefully consider the role of information and communication technology (ICT) in supporting TMS and knowledge transfer. They should consider recommendation algorithm so that the benefit of communication visibility can be retained. They should design the feature to classify users based on similarity so as to stimulate users' feeling of close social distance. They should keep on improving features based on users' holistic experience.

Originality/value

This study incorporates the perspectives of communication visibility, social distance and flow to understand TMS and knowledge transfer, presenting a new lens for research.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 6 February 2024

Junyi Chen, Buqing Cao, Zhenlian Peng, Ziming Xie, Shanpeng Liu and Qian Peng

With the increasing number of mobile applications, efficiently recommending mobile applications to users has become a challenging problem. Although existing mobile application…

Abstract

Purpose

With the increasing number of mobile applications, efficiently recommending mobile applications to users has become a challenging problem. Although existing mobile application recommendation approaches based on user attributes and behaviors have achieved notable effectiveness, they overlook the diffusion patterns and interdependencies of topic-specific mobile applications among user groups. mobile applications among user groups. This paper aims to capture the diffusion patterns and interdependencies of mobile applications among user groups. To achieve this, a topic-aware neural network-based mobile application recommendation method, referred to as TN-MR, is proposed.

Design/methodology/approach

In this method, first, the user representations are enhanced by introducing a topic-aware attention layer, which captures both the topic context and the diffusion history context. Second, it exploits a time-decay mechanism to simulate changes in user interest. Multitopic user representations are aggregated by the time decay module to output the user representations of cascading representations under multiple topics. Finally, user scores that are likely to download the mobile application are predicted and ranked.

Findings

Experimental comparisons and analyses were conducted on the actual 360App data set, and the results demonstrate that the effectiveness of mobile application recommendations can be significantly improved by using TN-MR.

Originality/value

In this paper, the authors propose a mobile application recommendation method based on topic-aware attention networks. By capturing the diffusion patterns and dependencies of mobile applications, it effectively assists users in selecting their applications of interest from thousands of options, significantly improving the accuracy of mobile application recommendations.

Details

International Journal of Web Information Systems, vol. 20 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of 877