Search results
1 – 10 of 24Honglei Li, Qianqian Hu, Guangzhi Zhao and Bin Li
This study aims to answer the question of how business models (BMs) maintain stability while coping with environmental uncertainties. This study proposes a dynamic co-evolution of…
Abstract
Purpose
This study aims to answer the question of how business models (BMs) maintain stability while coping with environmental uncertainties. This study proposes a dynamic co-evolution of knowledge management and business model transformation based on a comparative analysis of the focal firms’ BMs and their main partners in two e-commerce ecosystems in China.
Design/methodology/approach
The open data of listed companies regarding the introduction of emerging topics on the transformation tendency of BMs in the post-COVID-19 business world is qualitatively analysed. The theoretical foundation is based on a critical review of the literature.
Findings
Three aspects of the co-evolution between knowledge management and business model transformation are introduced. These three aspects are as follows: knowledge integration helps with multi-system business integration and decision-making collaborations; knowledge sharing helps to enhance cognitive ability and network value based on businesses; and the creation of new knowledge helps enrich the knowledge base and promote the transformation of BMs.
Research limitations/implications
Solely attributing a firm’s ability to cope with environmental uncertainties to its business model weakens the importance of its knowledge management. This study argues that the co-evolution between knowledge management and business model transformation also plays a key role in a firm’s response to issues post-COVID-19.
Originality/value
This study calls for the development of a normative theory of co-evolution between knowledge management and business model transformation, implying uncharted territories of knowledge management based on interaction with business model designs in e-business ecosystems.
Details
Keywords
Xuejie Yang, Dongxiao Gu, Honglei Li, Changyong Liang, Hemant K. Jain and Peipei Li
This study aims to investigate the process of developing loyalty in the Chinese mobile health community from the information seeking perspective.
Abstract
Purpose
This study aims to investigate the process of developing loyalty in the Chinese mobile health community from the information seeking perspective.
Design/methodology/approach
A covariance-based structural equation model was developed to explore the mobile health community loyalty development process from information seeking perspective and tested with LISREL 9.30 for the 191 mobile health platform user samples.
Findings
The empirical results demonstrate that the information seeking perspective offers an interesting explanation for the mobile health community loyalty development process. All hypotheses in the proposed research model are supported except the relationship between privacy and trust. The two types of mobile health community loyalty—attitudal loyalty and behavioral loyalty are explained with 58 and 37% variance.
Originality/value
This paper has brought out the information seeking perspective in the loyalty formation process in mobile health community and identified several important constructs for this perspective for the loyalty formation process including information quality, communication with doctors and communication with patients.
Details
Keywords
Honglei Li, Ziyu Yang, Chunhua Jin and Jinxia Wang
The purpose of this paper is to reveal the inner mechanisms of the role of industrial internet platforms in empowering the digital transformation of SMEs. This ROOTCLOUD-based…
Abstract
Purpose
The purpose of this paper is to reveal the inner mechanisms of the role of industrial internet platforms in empowering the digital transformation of SMEs. This ROOTCLOUD-based case study shows that knowledge integration and knowledge sharing and driving play essential empowering roles in the impact of industrial internet platforms on the digital transformation of SMEs. The industrial internet platform promotes knowledge integration on the supply side, empowers cross-domain knowledge sharing and shapes the knowledge-driven digital supply chain system in the digital transformation processes of SMEs.
Design/methodology/approach
This paper presents a qualitative analysis of the knowledge empowerment role played by industrial internet platforms in the digital transformation process of SMEs. Based on theoretical sampling, this paper selects ROOTCLOUD as a typical case to analyse the implementation mechanism of the industrial internet platform in solving the digital transformation problems and challenges faced by SMEs.
Findings
Knowledge management (knowledge integration, sharing and driving) plays an important intermediary role between the empowerment of industrial internet platform and the digital transformation of SMEs. Specifically, the industrial internet platform empowers SMEs with knowledge, empowers supply-side knowledge integration, empowers cross-domain knowledge sharing and facilitates the formation of knowledge-driven supply chain systems.
Research limitations/implications
This study clarifies the mechanism underlying the digital transformation of SMEs empowered by industrial internet platforms, that is, the empowerment of industrial internet platform enhances the level of knowledge integration and sharing of SMEs, thus improving the effectiveness of SMEs in achieving digital transformation. Further empirical studies should be conducted on the above mechanism.
Originality/value
Based on the theoretical perspective of knowledge management, this paper discusses the problems and challenges faced in the digital transformation of SMEs through knowledge empowerment by the industrial internet platform ROOTCLOUD and proposes that knowledge empowerment in the industrial internet platform helps supply-side knowledge integration, promotes cross-domain knowledge sharing and contributes to forming a knowledge-driven supply chain system, thereby promoting the digital transformation of SMEs. System architects and relevant policy departments should pay attention to data-centred system construction, improve the construction of data-based collaborative application ecology and encourage industrial internet platforms to provide more targeted knowledge empowerment solutions for SMEs.
Details
Keywords
Honglei Li and Eric W.K. See-To
This study aims at building a framework for the electronic word-of-mouth (eWOM) response under the social media environment. The elaboration likelihood model was adopted to…
Abstract
Purpose
This study aims at building a framework for the electronic word-of-mouth (eWOM) response under the social media environment. The elaboration likelihood model was adopted to explain how message source credibility and message appeal jointly influence the eWOM response process, while source credibility provides a central route and message appeal plays a peripheral route for information processing.
Design/methodology/approach
This study used a scenario design to test the decision behavior in the Facebook environment through message content manipulation. A convenience sampling method was adopted in this study. We collected 203 valid questionnaires and tested this research model with LISREL 8.8. This study used a two-stage structural equation modeling data analysis method with LISREL 8.8, by which the measurement model was assessed through confirmatory factor analysis for the reliability and validity of the research model, and the causal relationship among factors was assessed through exploratory factor analysis .
Findings
The results showed that 53% variance of eWOM responses could be explained by message source credibility and emotional message appeal from the elaboration likelihood model perspective. Message source credibility plays a central role in the social media environment. The model was further tested with a demographic profile analysis for both gender and age. It is found that a female user is influenced by both source credibility and emotional appeal, but a male user is only influenced by message source credibility. The mature age group is more responsive to eWOM messages.
Research limitations/implications
The sample might not represent all social networking sites (SNS) users. The participants represent a small segment of the Facebook population around the globe. Secondly, this research design could be improved by using more recreational messages to test the effects of message appeal and message source credibility. Thirdly, the mobile phone is a type of physical product rather than an experiential product. Future studies could try to identify the same eWOM determinants with different SNS functions, for example, the inbox message function. Similarly, Facebook users are allowed to use both text and pictures to disseminate promotional messages.
Practical implications
This study provides an insight for SNS administrators regarding the determinants of driving more customer responses toward a message. Message source credibility and message appeal are identified as the antecedents for eWOM responses in SNS. Companies could make use of this finding to improve their marketing communication strategy in SNS. The finding can inform administrators of the importance of focusing on both customers’ psychological state and message attributes during the dissemination of promotional messages to improve the efficiency of the promotional effort. Companies aimed at receiving different types of eWOM responses in SNS may need to consider other factors for creating their promotional messages.
Originality/value
Previous studies have mainly identified factors influencing eWOM responses from the people-centered variables such as personal traits and social relationships. This study proposes that the eWOM response is a dual information processing process that can be explained by the ELM. When a user processes information in SNS, he follows both the central route and the peripheral route (i.e. source credibility and message appeal) which can influence the eWOM response. It is the first time that the source credibility is investigated as the central route in ELM model.
Details
Keywords
Shancang Li, Theo Tryfonas and Honglei Li
The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various…
Abstract
Purpose
The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.
Design/methodology/approach
Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.
Findings
IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.
Practical implications
The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.
Originality/value
The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.
Details
Keywords
Alex Bradley, Haijiang Li, Honglei Qin, Wen Xi, Daniel Peel and Nicholas Nisbet
Defining building information modelling (BIM) standards for the infrastructure domain is a central issue to the successful implementation of BIM in civil engineering domains. To…
Abstract
Purpose
Defining building information modelling (BIM) standards for the infrastructure domain is a central issue to the successful implementation of BIM in civil engineering domains. To this end, this paper aims to present a requirements and process analysis for the ports and waterways domain to address the lack of BIM standards development, using the information delivery manual (IDM) approach and the ethos of openBIM standards.
Design/methodology/approach
This research uses the IDM approach. This involves the definition of use cases, process maps, exchange scenarios and subsequent exchange requirements. All these developments were sourced and validated by a series of international industry consultations.
Findings
The paper identifies 30 domain relevant use cases collated from existing sources and new cases. An overview and detailed ports and waterways process map (defining actors, activities and data exchanges). The process maps highlighted 38 exchange scenarios between various activities. Various exchange requirements were defined and are discussed in the context of the required information exchange model and the extensions required to fulfil the needs of the domain. The analysis provides the core information for the next steps of development for a substantial extension to the Industry Foundation Classes and the supporting data dictionary standards.
Research limitations/implications
Because of the international scope of the research, the outcomes can be applied by any stakeholders in the domain of ports and waterways. Therefore, some variation is expected at a national and organizational level. This research has the potential to accelerate the adoption of openBIM standards within the ports and waterways domain leading to increases in efficiency, collaborative working.
Originality/value
This paper reviews the requirements of an identified gap in the provision of openBIM standards relevant and applicable to the domain of ports and waterways.
Details
Keywords
Chang Li, Xingui Zhou, Quanchao Gu, Xingheng Yan and Honglei Wang
A continuous chemical vapor deposition (CVD) method has been used to fabricate pyro-carbon (PyC) coating on continuous silicon carbide (SiC) fibers. The paper aims to evaluate…
Abstract
Purpose
A continuous chemical vapor deposition (CVD) method has been used to fabricate pyro-carbon (PyC) coating on continuous silicon carbide (SiC) fibers. The paper aims to evaluate these coated fibers by testing filament tensile and using microstructure characterization.
Design/methodology/approach
The continuous SiC fiber-reinforced SiC matrix (SiC/SiC) composite is widely studied in aerospace and nuclear applications. The PyC is the probable option in fusion and fast reactor. However, the conventional fabrication method of PyC coating has some drawbacks influencing performance and efficiency.
Findings
The results showed that PyC-coated SiC fibers with continuous CVD method are more straight than conventional ones and residual deformations could not be observed, and these PyC coatings have complete geometry and uniform thickness. In different process conditions, the thickness of PyC coating could control from ∼100 to ∼1,000 nm.
Originality/value
The coated SiC fibers in a lower gas ratio (1:7 to 1:3), lower pressure (500–1,000 Pa) and appropriate winding speed (3 to 5 rpm) have relative high filament tensile strength (∼3.5 to ∼3.9 GPa). And the strength of coated SiC fibers has a negative correlation with the measured thickness of PyC coating. A distinctive growth process was discovered in the continuous CVD method. In a certain range, the quicker growing rate of PyC is obtained in shorter deposition time which means an efficient and quality method could be applied to fabricate coatings.
Details
Keywords
Yuhang Gao, Xiaohong Chen, Ping Liu, Honglei Zhou, Shaoli Fu, Wei Li, Xinkuan Liu, Fengcang Ma, Yanbo Zhu and Jiayan Wu
This study aims to investigate the effect of coatings prepared by the addition of copper-aluminum alloy powder on the corrosion behavior of 90/10 copper-nickel alloy.
Abstract
Purpose
This study aims to investigate the effect of coatings prepared by the addition of copper-aluminum alloy powder on the corrosion behavior of 90/10 copper-nickel alloy.
Design/methodology/approach
Coatings of copper-aluminum alloy powder at different contents (Wt.% = 50%, 60%, 70% and 80%) were prepared by the high-temperature heat treatment process. The microstructure and component of the coatings were characterized by scanning electron microscope, X-ray diffraction, energy dispersive spectrometer and X-ray photoelectron spectroscopy. The electrochemical properties of the coating were explored by electrochemical impedance spectroscopy.
Findings
The results show that the aluminized layer was successfully constructed on the surface of 90/10 copper-nickel alloy, the composition of the coating was composed of copper-aluminum phase and aluminum-nickel phase, the existence of the aluminum-nickel phase was formed by the diffusion of Ni elements within the substrate and because of the diffusion, the Al-Ni phase was distributed in the middle and bottom of the coating more. The Al-Ni phase is considered to be the enhanced phase for corrosion resistance. When the copper-aluminum alloy powder content is 70 Wt.%, the corrosion resistance is the best.
Originality/value
The enhancement of corrosion resistance of 90/10 copper-nickel alloy by the copper-aluminum alloy powder was revealed, the composition of the aluminized layer and the mechanism of corrosion resistance were discussed.
Details
Keywords
Meng Wang, Yuwen Hua, Honglei Lia Sun, Ya Chen and Linping Jiang
This study aims to reveal the influencing factors of user churn behavior and explore how these factors influence user churn behavior of rural public digital cultural services…
Abstract
Purpose
This study aims to reveal the influencing factors of user churn behavior and explore how these factors influence user churn behavior of rural public digital cultural services (RPDCS), and then, to provide the avoidance strategies for user churn behavior of RPDCS.
Design/methodology/approach
Combined with the stimulus–organism–response theory and cognitive load theory, this study constructed a mixed model of user churn behavior. Data collected through online and offline questionnaire survey were tested using the partial least squares structural equation modeling approach, and finally, the authors proposed a user churn behavior model of RPDCS.
Findings
The results indicate that the environmental stimulus factors of RPDCS affected user churn behavior via user organism factors. This study suggests that administrators should pay more attention to the information demand of users and strengthen the effective supply of RPDCS. Meanwhile, it is necessary to improve the information literacy of rural users to restrain the user churn behavior and improve the effectiveness of RPDCS.
Originality/value
The research findings on the influencing factors of user churn behavior shed light on the user churn behavior in public digital cultural services, add new knowledge to the construction of the public cultural services system and provide empirical evidence for how to improve the utilization and effectiveness of RPDCS.
Details
Keywords
Meng Wang, Yuwen Hua, Honglei Lia Sun and Ya Chen
The user churn (UC) of rural public digital cultural services (RPDCS) indicates that rural users no longer use RPDCS or have switched to other services. The purpose of this study…
Abstract
Purpose
The user churn (UC) of rural public digital cultural services (RPDCS) indicates that rural users no longer use RPDCS or have switched to other services. The purpose of this study is to investigate the factors influencing RPDCS's UC and to contribute toward bridging the rural digital divide.
Design/methodology/approach
Based on the stimulus-organism-response theory, this study proposes a theoretical framework to investigate the factors influencing RPDCS's user churn. A total of 120 RPDCS users were initially recruited and 90 representative participants were chosen. Data were collected from the 90 respondents and 20 follow-up interviews. To examine the proposed framework and validate the correlations between these factors and UC, an analysis of variance (ANOVA) and multiple regression analysis were used. In addition, recommendations are made to avoid the UC of RPDCS to bridge the rural digital divide.
Findings
The results indicate that the UC of RPDCS was stimulated by both physical and ability divides and RPDCS ineffectiveness, resulting in increased churn rates and an exacerbated digital divide. Thus, avoiding the UC of RPDCS is an important way to bridge the rural digital divide, which includes both the physical and ability divides.
Originality/value
This study adds new knowledge about RPDCS and distinguishes it from previous research on public digital cultural services. In addition, the authors discuss how to avoid the UC of RPDCS, to bridge the rural digital divide.
Details