Search results
1 – 10 of 765Addressing the significant differences between referral programs and traditional promotional marketing, this paper aims to investigate and examine the impact of how reward-related…
Abstract
Purpose
Addressing the significant differences between referral programs and traditional promotional marketing, this paper aims to investigate and examine the impact of how reward-related information is presented within referral programs and how it interacts with reward size and reward allocation.
Design/methodology/approach
This study adopts framing effect and equity theory to build the relationship between reward presentation, reward size and reward allocation. Then, two scenario-based experimental studies are designed and conducted on Amazon Mechanical Turk.
Findings
The results show that there is no direct impact of reward presentation on referral likelihood, while the effect relies on reward size. As the levels of reward size increase, the referral likelihood gradually shifts from percentage form to dollar form as perceived size mediates the interaction effect on referral likelihood. Further, adding information about reward allocation also indicate the different impacts of equity and inequity on influencing the above findings.
Originality/value
The study contributes to the literature by introducing reward presentation and emphasizes its impact on individual’s behavior decisions in the context of referral programs. This study extends and broadens the scope and effectiveness of the framing effect on traditional promotional marketing strategies, while also bridging the gap in the literature by examining the combined role of information about rewards.
Details
Keywords
Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…
Abstract
Purpose
Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for critical influencing factors to discuss the combined influence mechanism of multiple factors on ISM performance (ISMP). This study aims to explore the critical success factors and understand how these factors contribute to ISMP.
Design/methodology/approach
This study used a mixed-method approach to achieve this study’s research goals. In Study 1, the authors conducted a qualitative analysis to take a series of International Organization for Standardization/International Electrotechnical Commission standard documents as the basis to refine the critical factors that may influence organizations’ ISMP. In Study 2, the authors built a research model based on the organizational control perspective and used the survey-based partial least squares-based structural equation modeling (PLS-SEM) approach to understand the relationships between these factors in promoting ISMP. In Study 3, the authors used the fuzzy set qualitative comparative analysis (fsQCA) method to empirically analyze the complex mechanisms of how the combinations of the factors affect ISMP.
Findings
The following three research findings are obtained. First, based on the text-based qualitative analysis, the authors refined the critical success factors that may increase ISMP, including information security policies (ISP), top management support (TMS), alignment (ALI), information security risk assessment (IRA), information security awareness (ISA) and information security culture (ISC). Second, the PLS-SEM testing results confirmed TMS is the antecedent variable motivating organization’s formation (ISP) and information control (ISC) approaches; these two types of organization control approaches increase IRA, ISA and ALI and then promote ISMP directly and indirectly. Third, the fsQCA testing results found two configurations that can achieve high ISMP and one driving path that leads to non-high ISMP.
Originality/value
This study extends knowledge by exploring configuration factors to improve or impede the performances of organizations’ ISM. To the best of the authors’ knowledge, this study is one of the first to explore the use of the fsQCA approach in information security studies, and the results not only revealed causal associations between single factors but also highlighted the critical role of configuration factors in developing organizational ISMP. This study calls attention to information security managers of an organization should highlight the combined effect between the factors and reasonably allocate organizational resources to achieve high ISMP.
Details
Keywords
Hao Chen, Jiajia Wang, Jiaying Bao, Zihan Zhang and Jingya Li
Based on the Cognitive Appraisal Theory of Stress, this study aims to reveal the mechanism of peer abusive supervision on bystander proactive behavior through two different paths…
Abstract
Purpose
Based on the Cognitive Appraisal Theory of Stress, this study aims to reveal the mechanism of peer abusive supervision on bystander proactive behavior through two different paths: bystander assertive impression management motivation and bystander defensive impression management motivation. Besides, the moderating effects of bystander uncertainty tolerance on the two paths are also explored.
Design/methodology/approach
In this study, 438 employees and their direct leaders from eight Chinese companies were surveyed in a paired survey at three time points, and the empirical data was analyzed using Mplus 7.4 software.
Findings
Peer abusive supervision leads bystanders to develop assertive impression management motivation and, thus, to exhibit more proactive behaviors. At the same time, peer abusive supervision also causes bystanders to develop defensive impression management motivation, which reduces the frequency of performing proactive behaviors. In addition, this study finds that bystander uncertainty tolerance plays a moderating role in influencing bystander assertive impression management motivation and bystander defensive impression management motivation in response to peer abusive supervision.
Originality/value
Starting from the bystander perspective, this study verifies the double-edged sword effect of peer abusive supervision on bystander proactive behavior as well as the mechanism of differentiated effects through cognitive appraisal, which broadens the scope of the research on abusive supervision, and deepens the academic understanding and development of the Cognitive Appraisal Theory of Stress. At the same time, it also provides new ideas for organizations to reduce the negative effects of workplace abusive behavior.
Details
Keywords
Liang Wang and Hao Chen
Based on the cognition-affection personality system theory, this study constructs and tests a mediation model of leadership non-contingent punishment on bystander workplace…
Abstract
Purpose
Based on the cognition-affection personality system theory, this study constructs and tests a mediation model of leadership non-contingent punishment on bystander workplace deviance behavior through bystander affective rumination and bystander psychological contract violation, as well as a chain mediation effect of bystander affective rumination and bystander psychological contract violation, and explores the moderation role of bystander performance pressure in this model.
Design/methodology/approach
This study takes 454 employees and their colleagues from several Chinese enterprises as the research subjects and conducts a paired survey at three-time points using Mplus 7.4 to analyze the empirical data.
Findings
The research results are as follows: Bystander affective rumination and bystander psychological contract violation play a mediation role between leadership non-contingent punishment and bystander workplace deviance behavior, respectively. Bystander affective rumination and bystander psychological contract violation play a chain mediation role in the positive role of leadership non-contingent punishment on bystander workplace deviance behavior. Bystander performance pressure moderates the chain mediation path by enhancing the positive role of leadership non-contingent punishment on bystander affective rumination.
Originality/value
This study comprehensively explores the internal path of the impact of leadership non-contingent punishment on bystander workplace deviance behavior from the perspective of bystanders through dual paths of cognition and affection. It enriches the result variables of leadership non-contingent punishment, expands existing research on the mediation mechanism of leadership non-contingent punishment and deepens the understanding of the mechanism of leadership non-contingent punishment. At the same time, it has practical guidance significance to promote the suppression of leadership non-contingent punishment in organizations, reduce the occurrence of employee workplace deviance behavior, help employees better integrate into the organization and build a harmonious organizational environment.
Details
Keywords
Hao Chen, Jianming Jiang, Liang Wang, Zihan Zhang and Jiaying Bao
The purpose of this study is to reveal the mechanism of humble leadership inducing abusive supervision from the low-status compensation perspective, examining the mediation role…
Abstract
Purpose
The purpose of this study is to reveal the mechanism of humble leadership inducing abusive supervision from the low-status compensation perspective, examining the mediation role of leader perceived thread to status. Besides, the moderation effect of regulatory focus on the mediation path is discussed.
Design/methodology/approach
This study conducted a three-wave longitudinal survey. The data was collected from 438 leaders and their employees in five Chinese enterprises. This study used Mplus 7.4 and adopted a bootstrapping technique for data analysis.
Findings
Humble leadership has a positive effect on leader perceived threat to status. Leader perceived threat to status plays a mediation role between humble leadership and leader abusive supervision. Leader regulatory focus is the “gate valve” that humble leadership fosters leader abusive supervision. That is, when the leader promotion focus is high, leader perceived threat to status bred by humble leadership is low, resulting in less abusive supervision. When the leader prevention focus is high, humble leadership brings relatively more abusive supervision through perceived threat to status.
Originality/value
This study explores why humble leadership breeds abusive supervision behaviors and reveals the mechanism behind the negative effect of humble leadership based on low-status compensation theory. This study not only promotes the continuous development of the field of humble leadership research through empirical research but also provides guidance for effectively suppressing the negative effects of humble leadership, promoting strengths and avoiding weaknesses and suppressing inappropriate management behaviors in management practice.
Details
Keywords
Pethmi De Silva, Nuwan Gunarathne and Satish Kumar
The purpose of this study is to perform bibliometric analysis to systematically and comprehensively examine the current landscape of digital knowledge, integration and performance…
Abstract
Purpose
The purpose of this study is to perform bibliometric analysis to systematically and comprehensively examine the current landscape of digital knowledge, integration and performance in the transformation of sustainability accounting, reporting and assurance.
Design/methodology/approach
This research uses a systematic literature review, following the Scientific Procedures and Rationales for Systematic Literature Review protocol and uses various bibliometric and performance analytical methods. These include annual scientific production analysis, journal analysis, keyword cooccurrence analysis, keyword clustering, knowledge gap analysis and future research direction identification to evaluate the existing literature thoroughly.
Findings
The analysis reveals significant insights into the transformative impact of digital technologies on sustainability practices. Annual scientific production and journal analyses highlight key contributors to the adoption of digital technologies in sustainability accounting, reporting and assurance. Keyword cooccurrence analyses have identified key themes in sustainability accounting, reporting and assurance, highlighting the transformative role of digital technologies such as artificial intelligence (AI), blockchain, Internet of Things (IoT) and big data. These technologies enhance corporate accountability, transparency and sustainability by automating processes and improving data accuracy. The integration of these technologies supports environmental, social and governance (ESG) reporting, circular economy initiatives and strategic decision-making, fostering economic, social and environmental sustainability. Cluster-by-coupling analyses delve into nine broader revealing that IoT improves ESG report accuracy, eXtensible Business Reporting Language structures ESG data and AI enhances life cycle assessments and reporting authenticity. In addition, digital transformation impacts environmental performance, big data optimizes resource use and edge computing improves eco-efficiency. Furthermore, this study identifies avenues for future research to advance the understanding and implementation of digital technology in sustainability accounting, reporting and assurance practices.
Research limitations/implications
Academically, this research enriches the understanding of how digital technologies shape sustainability practices and identifies gaps in digital knowledge and integration. Practically, it provides actionable insights for organizations to improve sustainability reporting and performance by effectively leveraging these technologies. Policy-wise, the findings advocate for frameworks supporting the effective implementation of these technologies, ensuring alignment with global sustainability goals.
Originality/value
This study offers a detailed analysis of the performance and intellectual framework of research on implementing digital technology in sustainability accounting, reporting and assurance. It highlights the evolving research landscape and emphasizes the need for further investigation into how emerging technologies can be leveraged to achieve sustainability goals.
Details
Keywords
Ryuichi Nakamoto, Hao-Cheng Chen, Hiroki Noguchi and Shohei Funatsu
The Penrose effect, or the limitation of the growth rate during expansion due to managerial constraints, has been examined in the context of business diversification, withdrawal…
Abstract
Purpose
The Penrose effect, or the limitation of the growth rate during expansion due to managerial constraints, has been examined in the context of business diversification, withdrawal and MNE’s foreign direct investment, primarily in the for-profit sector. However, insufficient attention has been paid to its impact on professional service firms, particularly in the context of their expansion through service exports. The main purpose of this study is to examine the Penrose effect in the internationalization of professional service firms through service exports.
Design/methodology/approach
This study focuses on large Japanese patent firms as traditional professional service firms and constructs panel data for 48 large patent firms over the observation period from 2002 to 2010 to test our hypotheses.
Findings
Our results demonstrate a negative relationship between degree of internationalization and international business growth, thus confirming the Penrose effect. Furthermore, we found that the degree of internationalization has a curvilinear relationship with international business growth and that institutional distance does not have a negatively moderating effect on the relationship between the degree of internationalization and international business growth.
Originality/value
This study made a theoretical contribution to Penrose's growth theory and previous studies on international management and professional service firms and international management by showing that the Penrose effect can be observed in the international expansion of professional service firms through service exports. Moreover, this study identifies the factors that modify the Penrose effect, thereby making a significant theoretical contribution.
Details
Keywords
Xiaohua Shi, Chen Hao, Ding Yue and Hongtao Lu
Traditional library book recommendation methods are mainly based on association rules and user profiles. They may help to learn about students' interest in different types of…
Abstract
Purpose
Traditional library book recommendation methods are mainly based on association rules and user profiles. They may help to learn about students' interest in different types of books, e.g., students majoring in science and engineering tend to pay more attention to computer books. Nevertheless, most of them still need to identify users' interests accurately. To solve the problem, the authors propose a novel embedding-driven model called InFo, which refers to users' intrinsic interests and academic preferences to provide personalized library book recommendations.
Design/methodology/approach
The authors analyze the characteristics and challenges in real library book recommendations and then propose a method considering feature interactions. Specifically, the authors leverage the attention unit to extract students' preferences for different categories of books from their borrowing history, after which we feed the unit into the Factorization Machine with other context-aware features to learn students' hybrid interests. The authors employ a convolution neural network to extract high-order correlations among feature maps which are obtained by the outer product between feature embeddings.
Findings
The authors evaluate the model by conducting experiments on a real-world dataset in one university. The results show that the model outperforms other state-of-the-art methods in terms of two metrics called Recall and NDCG.
Research limitations/implications
It requires a specific data size to prevent overfitting during model training, and the proposed method may face the user/item cold-start challenge.
Practical implications
The embedding-driven book recommendation model could be applied in real libraries to provide valuable recommendations based on readers' preferences.
Originality/value
The proposed method is a practical embedding-driven model that accurately captures diverse user preferences.
Details
Keywords
JiaRong Wang, Bo He and XiaoQiang Chen
This paper aims to obtain a symmetrical step-down topology with lower equivalent capacity and wider step-down range under the condition of the same output. Two new symmetrical…
Abstract
Purpose
This paper aims to obtain a symmetrical step-down topology with lower equivalent capacity and wider step-down range under the condition of the same output. Two new symmetrical step-down topologies of star-connected autotransformers are proposed in this paper. Taking the equivalent capacity as the main parameter, the obtained topologies are modeled and analyzed in detail.
Design/methodology/approach
This paper adopts the research methods of design, modeling, analysis and simulation verification. First, the star-connected autotransformer is redesigned according to the design objective of symmetrical step-down topology. In addition, the mathematical model of two topologies is established and a detailed theoretical analysis is carried out. Finally, the theoretical results are verified by simulation.
Findings
Two symmetrical star-connected autotransformer step-down topologies are designed, the winding configurations of the corresponding topology are presented, the step-down ranges of these three topologies are calculated and the influence of step-down ratio on the equivalent capacity of autotransformer are analyzed. Through analysis, the target step-down topologies are obtained when the step-down ratio is [1.1, 5.4] and [1.1, 1.9] respectively.
Research limitations/implications
Because the selected research object is only a star-connected autotransformer, the research results may lack generality. Therefore, researchers are encouraged to further study the topologies of other autotransformers.
Practical implications
This paper includes the implications of the step-down ratio on the equivalent capacity of autotransformers and the configuration of transformer windings.
Originality/value
The topologies designed in this paper enable star-connected autotransformer in the 12-pulse rectifier to be applied in step-down circumstances rather than situations of harmonic reduction only. At the same time, this paper provides a way that can be used to redesign the autotransformer in other multi-pulse rectifier systems, so that those transformers can be used in voltage regulation.
Details
Keywords
Kaiyang Wang, Fangyu Guo, Cheng Zhang, Jianli Hao and Zhitao Wang
The Internet of Things (IoT) offers substantial potential for improving efficiency and effectiveness in various applications, notably within the domain of smart construction…
Abstract
Purpose
The Internet of Things (IoT) offers substantial potential for improving efficiency and effectiveness in various applications, notably within the domain of smart construction. Despite its growing adoption within the Architecture, Engineering, and Construction (AEC) industry, its utilization remains limited. Despite efforts made by policymakers, the shift from traditional construction practices to smart construction poses significant challenges. Consequently, this study aims to explore, compare, and prioritize the determinants that impact the acceptance of the IoT among construction practitioners.
Design/methodology/approach
Based on the integrated model of Unified Theory of Acceptance and Use of Technology (UTAUT2), Task-Technology Fit (TTF), and perceived risk. A cross-sectional survey was administered to 309 construction practitioners in China, and the collected data were analyzed using structural equation modeling (SEM) to test the proposed hypotheses.
Findings
The findings indicate that TTF, performance expectancy, effort expectancy, hedonic motivation, facilitating conditions, and perceived risk exert significant influence on construction practitioners’ intention to adopt IoT. Conversely, social influence and habit exhibit no significant impact. Notably, the results unveil the moderating influence of gender on key relationships – specifically, performance expectancy, hedonic motivation, and habit – in relation to the behavioral intention to adopt IoT among construction practitioners. In general, the model explains 71% of the variance in the behavioral intention to adopt IoT, indicating that the independent constructs influenced 71% of practitioners’ intentions to use IoT.
Practical implications
These findings provide both theoretical support and empirical evidence, offering valuable insights for stakeholders aiming to gain a deeper understanding of the critical factors influencing practitioners’ intention to adopt IoT. This knowledge equips them to formulate programs and strategies for promoting effective IoT implementation within the AEC field.
Originality/value
This study contributes to the existing literature by affirming antecedents and uncovering moderators in IoT adoption. It enhances the existing theoretical frameworks by integrating UTAUT2, TTF, and perceived risk, thereby making a substantial contribution to the advancement of technology adoption research in the AEC sector.
Details