Aiping Jiang, Qingxia Li, Jinyi Yan, Leqing Huang and Haining Wu
The purpose of this paper is to focus on finding the optimal maintenance interval and the minimum maintenance cost for redundant system, considering environment factors.
Abstract
Purpose
The purpose of this paper is to focus on finding the optimal maintenance interval and the minimum maintenance cost for redundant system, considering environment factors.
Design/methodology/approach
The authors propose a decision model with environment-based preventive maintenance for the repairable redundant system. Referring to the k-out-of-n model and Proportional Hazard Model, the reliability analysis is completed for the redundant system affected by internal and external issues. Meanwhile, the maintenance cost for the redundant system is divided into two categories: the fixed maintenance cost involving whole system replacement at the time of system failure, and the cost to replace failure components when the system still functions.
Findings
Upon the required reliability analysis, an optimal maintenance interval that minimizes the average maintenance cost per unit time is identified. The simulation results indicate that the optimal maintenance interval with consideration of environmental factors is significantly shorter than that without consideration of these factors, with the maintenance cost increase within 10 percent.
Practical implications
The redundant systems have widely been used in industries including the aero craft control system and warship power system. The model could be applied in the more real case considering the types of components and the operation environment, and help production managers better maintain machines by increasing the safety and reliability of the redundant model with the more frequent inspection.
Originality/value
Previous research of redundant system always focuses on internal degradation, while ignoring the reliability analysis for a redundant system with various multiple components under the influence of environment. However, this work could fill the theoretical gap, i.e. simultaneously consider both environmental and internal factors for a redundant system with non-homogeneous components. Meanwhile, the proposed superior model increases the reliability and safety of the k-out-of-n model with reasonable cost. Production managers could benefit a lot from this as well.
Details
Keywords
Qingxia Li, Xiaohua Zeng and Wenhong Wei
Multi-objective is a complex problem that appears in real life while these objectives are conflicting. The swarm intelligence algorithm is often used to solve such multi-objective…
Abstract
Purpose
Multi-objective is a complex problem that appears in real life while these objectives are conflicting. The swarm intelligence algorithm is often used to solve such multi-objective problems. Due to its strong search ability and convergence ability, particle swarm optimization algorithm is proposed, and the multi-objective particle swarm optimization algorithm is used to solve multi-objective optimization problems. However, the particles of particle swarm optimization algorithm are easy to fall into local optimization because of their fast convergence. Uneven distribution and poor diversity are the two key drawbacks of the Pareto front of multi-objective particle swarm optimization algorithm. Therefore, this paper aims to propose an improved multi-objective particle swarm optimization algorithm using adaptive Cauchy mutation and improved crowding distance.
Design/methodology/approach
In this paper, the proposed algorithm uses adaptive Cauchy mutation and improved crowding distance to perturb the particles in the population in a dynamic way in order to help the particles trapped in the local optimization jump out of it which improves the convergence performance consequently.
Findings
In order to solve the problems of uneven distribution and poor diversity in the Pareto front of multi-objective particle swarm optimization algorithm, this paper uses adaptive Cauchy mutation and improved crowding distance to help the particles trapped in the local optimization jump out of the local optimization. Experimental results show that the proposed algorithm has obvious advantages in convergence performance for nine benchmark functions compared with other multi-objective optimization algorithms.
Originality/value
In order to help the particles trapped in the local optimization jump out of the local optimization which improves the convergence performance consequently, this paper proposes an improved multi-objective particle swarm optimization algorithm using adaptive Cauchy mutation and improved crowding distance.
Details
Keywords
Wenxue Wang, Qingxia Li and Wenhong Wei
Community detection of dynamic networks provides more effective information than static network community detection in the real world. The mainstream method for community…
Abstract
Purpose
Community detection of dynamic networks provides more effective information than static network community detection in the real world. The mainstream method for community detection in dynamic networks is evolutionary clustering, which uses temporal smoothness of community structures to connect snapshots of networks in adjacent time intervals. However, the error accumulation issues limit the effectiveness of evolutionary clustering. While the multi-objective evolutionary approach can solve the issue of fixed settings of the two objective function weight parameters in the evolutionary clustering framework, the traditional multi-objective evolutionary approach lacks self-adaptability.
Design/methodology/approach
This paper proposes a community detection algorithm that integrates evolutionary clustering and decomposition-based multi-objective optimization methods. In this approach, a benchmark correction procedure is added to the evolutionary clustering framework to prevent the division results from drifting.
Findings
Experimental results demonstrate the superior accuracy of this method compared to similar algorithms in both real and synthetic dynamic datasets.
Originality/value
To enhance the clustering results, adaptive variances and crossover probabilities are designed based on the relative change amounts of the subproblems decomposed by MOEA/D (A Multiobjective Optimization Evolutionary Algorithm based on Decomposition) to dynamically adjust the focus of different evolutionary stages.
Details
Keywords
Zhihong Li, Yongzhong Sha, Xuping Song, Kehu Yang, Kun ZHao, Zhixin Jiang and Qingxia Zhang
Risk perception is an essential factor affecting how individuals evaluate risk, make decisions and behave. The impact of risk perception on customer purchase behavior has been…
Abstract
Purpose
Risk perception is an essential factor affecting how individuals evaluate risk, make decisions and behave. The impact of risk perception on customer purchase behavior has been widely studied; however, the association has been debated. Therefore, the purpose of this paper is to examine the relationship between risk perception and customer purchase behavior and to examine factors that could moderate it.
Design/methodology/approach
This study conducted a meta-analysis of this relationship and examined factors that could moderate it. Six databases were comprehensively searched. Two reviewers independently selected the studies for inclusion, extracted data and assessed quality. Pearson's r was used as the effect estimate. A total of 33 studies were included in the meta-analysis.
Findings
The results revealed a negative relationship between risk perception and customer purchase behavior. The geographical region, purchase channel and country development level affected the relationship. The correlation between perceived risk and purchase behavior in European consumers was the highest, followed by the correlation in American consumers; the weakest correlation was found in Asian consumers. For consumers in developed countries, perceived risk had a stronger negative influence on customer purchase behavior than that for consumers in developing countries. The perceived risk of online purchase channels had a stronger negative impact on customer purchase behavior than that of offline purchase channels.
Research limitations/implications
Risk perception is a useful context in which to explain barriers to customer purchase behavior. In addition, reducing consumers’ risk perception and perfecting the market transaction process with respect to buying behavior should be further studied.
Originality/value
The findings of this review indicate a direct negative relationship between risk perception and customer purchase behavior. To the best of the authors’ knowledge, this review is the first to meta-analytically summarize the impact of risk perception on customer purchase behavior in social sciences research, and it also illuminates new perspectives for future studies.
Details
Keywords
Tingzhuang Han, Qingxia Wang, Cheng Zhang, Peng Peng, Shuai Long, Qingshan Yang and Qingwei Dai
This paper aims to explore the impact of Sc element on the microstructure and corrosion properties of Mg-0.5Zn alloy.
Abstract
Purpose
This paper aims to explore the impact of Sc element on the microstructure and corrosion properties of Mg-0.5Zn alloy.
Design/methodology/approach
Three kinds of Mg-0.5Zn-xSc (x = 0.1, 0.3 and 0.5 Wt.%) alloys were obtained, and the microstructure and corrosion properties were both analyzed.
Findings
As the Sc concentration increases, the corrosion resistance of the alloys initially improves and subsequently deteriorates. The trace addition of Sc can effectively reduce the grain size of Mg-Zn-Sc alloys and enhance the density of the corrosion products film. Consequently, an appropriate amount of Sc can reduce the corrosion rate of Mg-0.5Zn alloy.
Originality/value
However, the addition of Sc also introduces the second phase particles in the alloy, leading to galvanic corrosion, which adversely affects the corrosion resistance of Mg-0.5Zn alloy. Therefore, the amount of Sc added should be carefully controlled.
Details
Keywords
Omar Hasan Salah and Mohannad Moufeed Ayyash
A mobile wallet (m-wallet) is a part of financial technology products and is still in the infant stage in Palestine. The technology acceptance model (TAM) formed the basis of the…
Abstract
Purpose
A mobile wallet (m-wallet) is a part of financial technology products and is still in the infant stage in Palestine. The technology acceptance model (TAM) formed the basis of the model development, which was extended in the study to include an analysis of how knowledge sharing (KOS), perceived value (PEV), perceived privacy awareness and control (PRI) and perceived security (SEC) influenced the primary TAM components of perceived ease of use (PEU), perceived usefulness (PRU) and intention to use m-wallets among Palestinian users.
Design/methodology/approach
This study used questionnaires as its primary data collection method. The questionnaires were distributed via online media, and the data collection period spanned from January 10, 2023, to February 21, 2023. The study received 360 responses from participants. Smart PLS and SPSS v.23 software were used to perform a method test on the collected questionnaire data.
Findings
The study’s findings demonstrate the factors influencing Palestinian users’ adoption of m-wallets by extending the Technology Acceptance Model (TAM) to include knowledge sharing, perceived value, privacy awareness and control and security, in addition to the main TAM elements, perceived ease of use (PEU) and perceived usefulness (PU), offering new insights into technology adoption in developing regions and addressing gaps in the literature.
Research limitations/implications
This study has some limitations. First, it is limited because it looks at users’ intentions to use rather than their actual usage. The actual use of an m-wallet should be the topic of further research. Second, rather than focusing on Small and Medium Enterprises (SMEs), this study examined users’ intentions to use m-wallets. Thus, SMEs’ use of m-wallets may be studied in future research. Third, because the study users were from Palestine, the results may not be generalizable. Therefore, additional populations and cultures should be studied in future research. Fourth, the study used a convenience sample of 282 users. As a result, it is not easy to generalize to a sizable population. Future studies should use larger sample sizes or random samples. Finally, this study examined the direct relationship between independent and dependent variables. Future research may consider personal innovativeness and artificial intelligence as potential moderators.
Practical implications
User knowledge sharing can be an important factor driving user intention to use m-wallet. Users can raise awareness of m-wallets by sharing their knowledge and experiences with others about their uses, features and advantages. This is particularly useful in a country like Palestine, where m-wallets are not widely accepted or used. Therefore, m-wallets service providers should improve their services to motivate the users to share their knowledge with others to increase user intention to use. For instance, m-wallet service providers can provide user support programs that assist users in resolving issues, responding to inquiries and offering feedback on the service. Additionally, m-wallet service providers can enhance the user experience of their m-wallet by providing user-friendly interfaces, quick and dependable service and robust security features. By improving the user experience and providing users with a supportive and responsive environment, service providers can encourage users to share their positive experiences with others and increase user intention to use the m-wallet. User knowledge sharing can be an important factor driving user intention to use m-wallet. Users can raise awareness of m-wallets by sharing their knowledge and experiences with others about their uses, features and advantages. This is particularly useful in a country like Palestine, where m-wallets are not widely accepted or used. Therefore, m-wallets service providers should improve their services to motivate the users to share their knowledge with others to increase user intention to use. For instance, m-wallet service providers can provide user support programs that assist users in resolving issues, responding to inquiries and offering feedback on the service. Additionally, m-wallet service providers can enhance the user experience of their m-wallet by providing user-friendly interfaces, quick and dependable service and robust security features.
Social implications
The widespread adoption of m-wallets is an important area of research, as it has significant theoretical implications for technology adoption. M-wallets provide an easy and secure way to pay without cash or physical cards. Therefore, identifying the factors affecting users’ intention to use m-wallets can help Palestinian m-wallet service providers to develop their marketing strategies. Extending the TAM to include four important factors (knowledge sharing, perceived value, perceived privacy awareness and control and perceived security) has improved our understanding of technology adoption models. The study empirically examines the intentions of Palestinian users to use m-wallets and how this novel technology is used in this area of the Arab world. The results empirically support that these factors strongly affect users’ intentions to use m-wallets. Thus, this study fills the knowledge gap about the factors influencing the use of m-wallets in Palestine and adds to the literature on the user intentions to use new technologies. Finally, this study is one of the first to examine the relationship between knowledge sharing, perceived value, perceived privacy awareness and control, perceived security and technology acceptance models in general and the extended TAM with these factors in a specific m-wallet context.
Originality/value
The preliminary empirical study investigates the factors affecting the use of m-wallets in Palestine by extending TAM with knowledge sharing, perceived value, perceived privacy awareness and control and perceived security as external variables to the model. The findings of this study help to fill a gap in the existing literature by identifying key variables that affect Palestinians’ intentions to use m-wallet. This study also contributes to the increase in knowledge in the area. To date, no studies have explored privacy in terms of awareness, control and knowledge sharing as essential factors that affect users’ intention to use m-wallets in Palestine.
Details
Keywords
Diana R. Anbar, Tengyuan Chang, Safi Ullah, Mohammed Taha Alqershy, Kawther Mousa and Xiaopeng Deng
This study explores the factors influencing knowledge hiding (KH) in international construction projects (ICPs), focussing on the role of ethnic minorities (EMs) and interpersonal…
Abstract
Purpose
This study explores the factors influencing knowledge hiding (KH) in international construction projects (ICPs), focussing on the role of ethnic minorities (EMs) and interpersonal distrust (ID). It also aims to understand how these factors influence KH and explore the mediating effect of ID on the relationship between EMs and KH.
Design/methodology/approach
A survey questionnaire was developed and distributed to professionals participating in ICPs. We used structural equation modelling (SEM) to analyse 294 valid responses, examining the effect of EMs, ID and demographic variables on KH behaviours. Our approach integrates insights from social identity theory (SIT) and actor network theory (ANT) to provide a comprehensive framework for understanding the observed dynamics.
Findings
The findings reveal that EMs significantly influence KH behaviours, with ID partially mediating this relationship. Additionally, demographic variables such as gender and age also play significant roles in KH behaviours. However, the degree of education did not show a significant impact on KH. Our results emphasise the critical importance of addressing ID and fostering inclusive environments to reduce KH.
Research limitations/implications
While our study sheds light on the complex dynamics of KH in ICPs, further research could explore additional contextual factors and organisational influences. While our study emphasises the importance of inclusive practices and trust-building to mitigate KH, it also recognises the need for a deeper understanding of power dynamics and organisational contexts.
Practical implications
Our findings underscore the importance of creating transparent and inclusive cultures of knowledge sharing (KS). Implementing inclusion initiatives and providing cultural awareness training can enhance project outcomes and organisational success. We also propose a practical framework to mitigate KH by promoting trust, inclusivity and effective KS practices.
Originality/value
This study contributes to the understanding of knowledge management in multicultural project teams by integrating SIT and ANT, offering a comprehensive perspective on the factors driving KH in ICPs. The findings pave the way for future investigations into power dynamics and organisational contexts within ICPs.
Details
Keywords
Abraham Cyril Issac, Amandeep Dhir and Michael Christofi
Mindfulness is the human ability to be fully present, aware of where we are and what we're doing. This study explores on the impact of mindfulness on different elements of…
Abstract
Purpose
Mindfulness is the human ability to be fully present, aware of where we are and what we're doing. This study explores on the impact of mindfulness on different elements of knowledge management, knowledge creation, knowledge sharing and knowledge hiding.
Design/methodology/approach
The authors undertake an inductive reasoning approach whereby they try to generate themes from specific observations and conceptualize the theory of mindfulness and knowledge transfer.
Findings
This study finds out that mindfulness critically facilitates an open environment and enhances the clarity of thought which aids in effective knowledge creation. Such a realistic understanding about the present scenario encourages employees to share knowledge and equips them to collaborate and effectively work in teams. Surprisingly, this study also finds that mindfulness increases the result orientation to the extent that employees tried to hide knowledge from their co-workers targeting certain self-desired outcomes. In other words, similar to knowledge creation and knowledge sharing, mindfulness increases agenda-based knowledge hiding.
Originality/value
The theory of mindfulness and knowledge transfer states that mindfulness increases knowledge creation, knowledge sharing and agenda-based knowledge hiding.
Details
Keywords
Mina Takhsha, Negar Barahimi, Arash Adelpanah and Reza Salehzadeh
This study aims to evaluate the effect of workplace ostracism on organization-based self-esteem (OBSE), organizational silence and knowledge sharing.
Abstract
Purpose
This study aims to evaluate the effect of workplace ostracism on organization-based self-esteem (OBSE), organizational silence and knowledge sharing.
Design/methodology/approach
The statistical population of this research includes the employees of University of Isfahan in Iran. The structural equation modeling method is used to analyze the data and the conceptual model using 130 participants.
Findings
The empirical results suggest that ostracism and organizational silence influence knowledge sharing, negatively. Ostracism influences organizational silence, positively; and ostracism influences OBSE, negatively. Furthermore, organization-based self-esteem influences knowledge sharing, positively. In addition, the indirect relationship from ostracism to knowledge sharing through organizational silence was confirmed; however, the mediating role of OBSE in the relationship between workplace ostracism and knowledge sharing was not confirmed.
Originality/value
This research is among the first to evaluate the relationship between workplace ostracism, knowledge sharing, organizational silence and OBSE simultaneously.
Details
Keywords
Abraham Cyril Issac, Timothy Colin Bednall, Rupashree Baral, Pierpaolo Magliocca and Amandeep Dhir
The purpose of this research study is to determine the ways in which employees’ personal power-expert and referent power influences their knowledge sharing and hiding behaviour…
Abstract
Purpose
The purpose of this research study is to determine the ways in which employees’ personal power-expert and referent power influences their knowledge sharing and hiding behaviour. There are hardly any studies that have investigated the effects of employee power and expectations regarding the consequences of divulging knowledge. In this study, the authors investigate whether expected gains and losses in employee personal power influence employees’ willingness to participate in knowledge transfer.
Design/methodology/approach
The authors adopted a two-wave survey design and collected critical data from 288 employees of knowledge-intensive industries identified through online techno-groups, such as Stack Exchange. In the first wave, out of the total, 192 knowledge workers attended the follow-up survey. The authors apply polynomial regression followed by surface response analysis to establish the effects of any discrepancy between the current levels of employees’ personal power and their expected levels if they divulge their unique critical knowledge.
Findings
The authors find out that employees having relatively strong personal power are more likely to share knowledge, and the expected losses in power are categorically associated with a reduced intention to share knowledge. The authors also observed an increased knowledge hiding with expected losses in power. Surprisingly, the authors find that these established negative outcomes are also specifically associated with the expected gains in personal power.
Research limitations/implications
The most significant contribution of this study is to establish that power plays an important but complex role in determining the employees’ participation in knowledge transfer activities. The authors specifically conclude that the optimal scenario for knowledge sharing is one in which the employees’ contributions are fairly valued and their reputation is not expected to change because of knowledge sharing.
Originality/value
To the best of the authors’ knowledge, this study is one of the first comprehensive studies that link power to both sharing and hiding of knowledge. This study is also unique in terms of its investigation of the effects of any discrepancy between current levels of employees’ personal power and their expected levels if they share or hide their unique critical knowledge. Thus, this research study is a unique contribution in terms of what and why of an untouched area in the entire knowledge management literature with a special focus on knowledge sharing and hiding.