Qi He, Jingtao Fu, Wenhao Wu and Siqi Feng
Based on achievement motivation theory and two-factor theory, this research aimed to synergize cooperative goal interdependence (refer to possessing incentive factors) and…
Abstract
Purpose
Based on achievement motivation theory and two-factor theory, this research aimed to synergize cooperative goal interdependence (refer to possessing incentive factors) and illegitimate tasks (refer to the absence of security factors) and build a triple interaction model in the process of performance pressure affecting employees’ thriving at work.
Design/methodology/approach
This research collected 291 valid data through a two-point time-lagged method to test the direct effect of performance pressure on employees’ thriving at work and its moderating mechanism.
Findings
Performance pressure has a significant positive effect on employees’ thriving at work. Cooperative goal interdependence imposes an enhanced moderating effect between performance pressure and employees’ thriving at work. Illegitimate task imposes an interfering moderating effect between performance pressure and employees’ thriving at work and further interferes the enhanced moderating effect of cooperative goal interdependence.
Practical implications
Under the premise of advocating for employees to internalize performance pressure originating from the organizational performance management system into their own achievement motivation, leaders should establish incentive systems and security systems for employees to realize self-achievement through the process of goal management and task management.
Originality/value
This research confirmed the joint determination of incentive effect and insecurity effect on employees’ achievement motivation by cooperative goal interdependence and illegitimate task and revealed the boundary conditions of employees’ choice of thriving at work.
Details
Keywords
Jingtao Yi, Yi Zhong and Qian Zheng
The purpose of this paper is to investigate factors that account for variations in the export performance between private‐owned enterprises (POEs) and state‐owned enterprises from…
Abstract
Purpose
The purpose of this paper is to investigate factors that account for variations in the export performance between private‐owned enterprises (POEs) and state‐owned enterprises from the perspective of value chain.
Design/methodology/approach
The authors conducted empirical analysis with the panel data of 19 industrial sectors in China between 2005 and 2007.
Findings
This study finds that labor input, state ownership and vertical specialization have positive effects on export performance while capital and technology inputs have negative effects. In particular, the study found that the superior export performance of state‐owned enterprises to private‐owned ones can be mainly explained by their positions of vertical specialization in the upper stage along the industrial value chain.
Practical implications
The paper shows that, given the significance of POEs in China's economy and foreign trade, restrictions on POEs to enter certain high‐end industrial sectors should be relaxed and policy makers should undertake favourable policies to help POEs to engage in high‐end activities along the industrial value chain.
Originality/value
Although export performance has always been a heated topic in both economics and business studies, the value chain perspective has been rarely investigated and this paper fills the research gap.
Details
Keywords
Jingtao Liu, Lianju Ning and Qifang Gao
In the digital economy era, digital platforms are vital infrastructure for innovation subjects to perform digital innovation activities. Achieving efficient and smooth knowledge…
Abstract
Purpose
In the digital economy era, digital platforms are vital infrastructure for innovation subjects to perform digital innovation activities. Achieving efficient and smooth knowledge transfer between innovation subjects through digital platforms has become a novel research subject. This study aims to examine the knowledge transfer mechanism of digital platforms in the digital innovation ecosystem through modeling and simulation to offer a theoretical basis for digital innovation subjects to acquire digital value through knowledge-sharing and thus augment their competitive advantage.
Design/methodology/approach
This study explores the optimal symbiotic interaction rate between different users based on the classic susceptible-infected-removed (SIR) model. Additionally, it constructs a knowledge transfer mechanism model for digital platforms in the digital innovation ecosystem by combining the theories of communication dynamics and symbiosis. Finally, Matrix Laboratory (MATLAB) software is used for the model and numerical simulation.
Findings
The results demonstrate that (1) the evolutionary path of the symbiotic model is key to digital platforms' knowledge transfer in the digital innovation ecosystem. In the symbiotic model, the knowledge transfer path of digital platforms is “independent symbiosis—biased symbiosis (user benefit)—reciprocal symbiosis,” aligning with the overall interests of the digital innovation ecosystem. (2) Digital platforms' knowledge transfer effects within the digital innovation ecosystem show significant differences. The most effective knowledge transfer model for digital platforms is reciprocal symbiosis, whereas the least effective is parochial symbiosis (platform benefit). (3) The symbiotic rate has a significant positive impact on the evolutionary dynamics of knowledge transfer on digital platforms, especially in the reciprocal symbiosis model.
Originality/value
This study's results aid digital innovators in achieving efficient knowledge transfer through digital platforms and identify how symbiotic relationships affect the knowledge transfer process across the ecosystem. Accordingly, the authors propose targeted recommendations to promote the efficiency of knowledge transfer on digital platforms.
Details
Keywords
Mengmeng Li, Jian Chen, Jingtao Sun, Long Hao, Di Wu, Jianqiu Wang and Wei Ke
The purpose of this study is to investigate the initial corrosion behavior of pure Mg, AZ31 and AZ91 alloys in phosphate buffer solution (PBS) and to characterize the features in…
Abstract
Purpose
The purpose of this study is to investigate the initial corrosion behavior of pure Mg, AZ31 and AZ91 alloys in phosphate buffer solution (PBS) and to characterize the features in corrosion type and resistance of the corrosion product layer.
Design/methodology/approach
The scanning electron microscopy, equipped with energy-dispersive spectroscopy, X-ray photoelectron spectroscopy and electrochemical impedance spectroscopy have been used to characterize the as-corroded samples. Besides, the Mg2+ concentration in PBSs has been determined by inductively coupled plasma atomic emission spectrum.
Findings
It has been found that pure Mg suffers pit corrosion, and AZ31 initially undergoes pit corrosion and then uniform corrosion dominates with an extended immersion duration. However, AZ91 exhibits the uniform corrosion with the highest corrosion rate among the three materials. Besides, the corrosion product layer on AZ31 has the best compactness and corrosion resistance.
Originality/value
The findings add depth in understanding the corrosion of pure Mg and its alloys in PBS and also have guiding significance in exploring the effects by alloyed elements to develop new biomaterials with better performance.
Details
Keywords
The purpose of this paper is to reargue the great controversies surrounding marketization, by the concept of intrinsic value and to give a panorama of China's marketization and…
Abstract
Purpose
The purpose of this paper is to reargue the great controversies surrounding marketization, by the concept of intrinsic value and to give a panorama of China's marketization and social development during last 30 years.
Design/methodology/approach
The concept of intrinsic value is elaborated, and marketization and closely linked concepts such as price, wealth, happiness, freedom, etc. are reargued. An intrinsic value account (IVA) is constructed and the enhancement and weakening of some intrinsic values could be clearly shown. A panorama of China's marketization and social development is exhibited by IVA.
Findings
The basic point of this paper is that social development is a concept with strong but implicit ethical assumption and should be explicitly based upon intrinsic value. Without concrete definition and consensus on intrinsic value, it will face great disputes on judging human history as social development or social degradation. Market is not only an objective value‐neural system, but a subjective moral entity. China's maketization has enhanced economic value greatly, but suffered great loss by other intrinsic values.
Practical implications
IVA could be a practical instrument to evaluate social development and clarify the possible academic controversies on market. The arguments of China's marketization experience could be of benefit to other developing countries.
Social implications
This paper could encourage people, particularly policy makers, to consider their value assumptions, value priority, some basic concepts in market, and what human kind is really pursuing.
Originality/value
The paper shows that IVA could be a new instrument to better evaluate social development, similar to the National Income Account or National Happiness Account.
Details
Keywords
Juyan Zhang and Glen T. Cameron
In this historical analysis, Jacques Ellul’s theory of propaganda is applied to analyse the changes of China’s propaganda. It is found that China’s propaganda is undergoing…
Abstract
In this historical analysis, Jacques Ellul’s theory of propaganda is applied to analyse the changes of China’s propaganda. It is found that China’s propaganda is undergoing structural transformations from depending on human organisation to extensive control and use of media technology. Sociological propaganda as a complement to political propaganda has significantly expanded; integration propaganda replaced agitation propaganda. International image management by the government has become a new dimension of China’s propaganda. The research is one of the first to observe such structural changes.
Details
Keywords
Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing…
Abstract
Purpose
Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper aims to propose an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network.
Design/methodology/approach
The proposed model/algorithm is based on two main concepts, namely, machine learning using fuzzy neural networks (FNNs) and the weighted weakest link (WWL) algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2,482 certified computing products, in addition to a set of nodes composed of multiple items, are used to train, validate and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm.
Findings
The results show a well-performing trust model with an accuracy of 0.9996. Thus, the end-users of FC services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network.
Research limitations/implications
Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision-making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as the security certification process is paramount to mitigate these issues. The author recommends the repetition of the same study when data form such bodies is available.
Originality/value
The novel combination of FNN and WWL in a trust model mitigates uncertainty, subjectivity and enables the trust classification of complex FC nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.