Search results

1 – 10 of 380
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 20 September 2021

R. Scott Hacker and Abdulnasser Hatemi-J

The issue of model selection in applied research is of vital importance. Since the true model in such research is not known, which model should be used from among various…

225

Abstract

Purpose

The issue of model selection in applied research is of vital importance. Since the true model in such research is not known, which model should be used from among various potential ones is an empirical question. There might exist several competitive models. A typical approach to dealing with this is classic hypothesis testing using an arbitrarily chosen significance level based on the underlying assumption that a true null hypothesis exists. In this paper, the authors investigate how successful the traditional hypothesis testing approach is in determining the correct model for different data generating processes using time series data. An alternative approach based on more formal model selection techniques using an information criterion or cross-validation is also investigated.

Design/methodology/approach

Monte Carlo simulation experiments on various generating processes are used to look at the response surfaces resulting from hypothesis testing and response surfaces resulting from model selection based on minimizing an information criterion or the leave-one-out cross-validation prediction error.

Findings

The authors find that the minimization of an information criterion can work well for model selection in a time series environment, often performing better than hypothesis-testing strategies. In such an environment, the use of an information criterion can help reduce the number of models for consideration, but the authors recommend the use of other methods also, including hypothesis testing, to determine the appropriateness of a model.

Originality/value

This paper provides an alternative approach for selecting the best potential model among many for time series data. It demonstrates how minimizing an information criterion can be useful for model selection in a time-series environment in comparison to some standard hypothesis testing strategies.

Details

Journal of Economic Studies, vol. 49 no. 6
Type: Research Article
ISSN: 0144-3585

Keywords

Access Restricted. View access options
Article
Publication date: 8 November 2022

Quyet Nguyen and Cong Van Nguyen

This paper aims to examine the impact of the existing information and communication technology (ICT) infrastructure and the development of the destination’s ICT on the tourism…

369

Abstract

Purpose

This paper aims to examine the impact of the existing information and communication technology (ICT) infrastructure and the development of the destination’s ICT on the tourism demand of international tourists in an emerging economy, Vietnam.

Design/methodology/approach

Using time-series data from 1995 to 2019, this study applies vector error correction model to analyse the impact of ICT infrastructure in the short- and long term.

Findings

The results of analysis show that although ICT infrastructure does not affect the number of international tourists in the short term, it positively contributes to tourism development in the long term. In addition, the results also show that in the short term, consumer prices have a negative impact on tourist arrivals while having a positive effect in the long run.

Research limitations/implications

This study only considers the impact of ICT infrastructure on the whole without going into each factor reflecting different aspects of the ICT infrastructure. Moreover, this research only stops at the pre-pandemic period, so it has not shown the role of ICT infrastructure in travel and tourism demand during severe pandemic periods.

Practical implications

The research results are an essential basis to support the Vietnamese Government’s strategy to pursue an accelerated investment policy in ICT infrastructure, especially investment in the tourism and hotel industries. On the other hand, the research results also create more motivation and confidence for managers and operators of destinations in Vietnam to invest in ICT infrastructure and apply ICT in management.

Originality/value

This study adds to the literature on tourism–ICT linkages in an emerging tourism market directly between ICT infrastructure and international arrivals with a dynamic time series–based approach that considers the dynamics in the tourist demand identification model. In addition, this study used consumer price index to assess the impact of price on tourist demand instead of using the exchange rate or using the relative prices between the origin and destination countries.

研究目的

本文探讨了现有 ICT 基础设施和目的地 ICT 发展对新兴经济体越南国际游客旅游需求的影响。

研究设计/方法/方法

该研究使用 1995 年至 2019 年的时间序列数据, 应用矢量纠错模型 (VECM) 来分析 ICT 基础设施的短期和长期影响。

研究发现

分析结果表明, 虽然ICT基础设施在短期内不会影响国际游客数量, 但从长远来看对旅游业发展有积极贡献。此外, 研究结果还表明, 在短期内, 消费价格对游客人数产生了负面影响, 而从长期来看, 则产生了积极影响。

实践意义

研究结果是支持越南政府加快信息通信技术基础设施投资政策战略的重要基础, 特别是对旅游业和酒店业的投资。另一方面, 研究成果也为越南旅游目的地的管理者和经营者投资ICT基础设施和在管理中应用ICT创造了更多动力和信心。

研究原创性/价值

本研究通过考虑旅游需求识别模型中的动态的基于动态时间序列的方法, 增加了有关新兴旅游市场中旅游与 ICT 联系的文献, 该联系直接在 ICT 基础设施和国际入境者之间进行。此外, 该研究使用 CPI 来评估价格对游客需求的影响, 而不是使用汇率或使用来源国和目的地国之间的相对价格。

Details

Journal of Hospitality and Tourism Technology, vol. 13 no. 5
Type: Research Article
ISSN: 1757-9880

Keywords

Access Restricted. View access options
Article
Publication date: 25 October 2021

Fawzia Mohammed Idris, Mehdi Seraj and Huseyin Ozdeser

The purpose of this study is to find funding sources for social health insurance in Sudan to cover vulnerable families.

293

Abstract

Purpose

The purpose of this study is to find funding sources for social health insurance in Sudan to cover vulnerable families.

Design/methodology/approach

The concept of this paper is to look into the causality relationship between insured and directly paid poor people and their incomes through using the autoregressive distributed lag model (ARDL) and using a survey raw data carried out in 2010 in Sudan.

Findings

The findings show that insured vulnerable people and income-generating activities have a significant positive relationship. The results, on the other hand, show a marginally negative effect on income for those who have directly paid poor people.

Originality/value

Previous research on the position of zakat has focused primarily on its role in poverty alleviation and has given little consideration to its role in social security. This study is characterized by improving the possibility of changing the mechanism of distributing zakat funds in favor of health financing to maximize the benefit.

Details

Journal of Islamic Accounting and Business Research, vol. 13 no. 2
Type: Research Article
ISSN: 1759-0817

Keywords

Access Restricted. View access options
Book part
Publication date: 27 November 2018

K. Hazel Kwon and Jana Shakarian

This chapter explores collective information processing among black-hat hackers during their crises events. The chapter presents a preliminary study on one of Tor-based darknet…

Abstract

This chapter explores collective information processing among black-hat hackers during their crises events. The chapter presents a preliminary study on one of Tor-based darknet market forums, during the shutdowns of two cryptomarkets. Content and network analysis of forum conversations showed that black-hat users mostly engaged with rational information processing and were adept at reaching collective solutions by sharing security advices, new market information, and alternative routes for economic activities. At the same time, the study also found that anti-social and distrustful interactions were aggravated during the marketplace shutdowns. Communication network analysis showed that not all members were affected by the crisis events, alluding to a fragmented network structure of black-hat markets. The chapter concludes that, while darknet forums may constitute resilient, solution-oriented users, market crises potentially make the community vulnerable by engendering internal distrust.

Details

Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow
Type: Book
ISBN: 978-1-78769-666-2

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access Restricted. View access options
Book part
Publication date: 17 March 2020

Svea Lübstorf and Nale Lehmann-Willenbrock

Maintaining and protecting employee well-being and health is of paramount importance for organizations in order to prevent financial losses due to illness, absenteeism, and…

Abstract

Maintaining and protecting employee well-being and health is of paramount importance for organizations in order to prevent financial losses due to illness, absenteeism, and fluctuation. This chapter discusses the role of team meetings for employee well-being. As the contemporary workplace is shaped by team work, team meetings increasingly shape employees’ experiences at work. As such, team meetings may also have a major influence on employee well-being as they consume large amounts of time and thus strongly influence workers’ schedules. While previous research has predominantly focused on negative aspects of meetings and mainly considered them as a workplace stressor, this chapter advances a positive perspective on meetings as opportunities for boosting rather than impairing employee well-being. Upon reviewing the extant evidence about linkages between workplace meetings and well-being, the authors highlight the role of team dynamics during meetings for individual well-being and suggest new perspectives for future research. The authors also discuss actionable implications for structuring and facilitating meetings in order to avoid negative and increase positive effects of team meeting interactions on employee well-being.

Details

Managing Meetings in Organizations
Type: Book
ISBN: 978-1-83867-227-0

Keywords

Access Restricted. View access options
Book part
Publication date: 13 August 2018

Robert L. Dipboye

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Access Restricted. View access options
Book part
Publication date: 22 September 2022

Steven K. Vogel

Neoliberal political leaders such as Prime Minister Margaret Thatcher (1979–1990) and President Ronald Reagan (1981–1989) heralded entrepreneurs as capitalist heroes, yet for the…

Abstract

Neoliberal political leaders such as Prime Minister Margaret Thatcher (1979–1990) and President Ronald Reagan (1981–1989) heralded entrepreneurs as capitalist heroes, yet for the most part, the policies they enacted did not help real entrepreneurs. Their image of a self-made entrepreneur who thrives in the absence of government action was fundamentally flawed. Their ideology impaired their ability to promote entrepreneurship because they viewed support for entrepreneurs primarily in negative terms as the removal of government tax and regulatory burdens rather than in positive terms as the cultivation of a dynamic market infrastructure. This article presents this argument in four steps, focusing on the US case: (1) how neoliberal reforms embodied internal contradictions; (2) how reforms to market governance undermined entrepreneurship; (3) how other neoliberal policies also failed to support entrepreneurs; and (4) how policies that violated neoliberal principles, such as industry and technology policies, were actually more supportive of entrepreneurs.

Details

Entrepreneurialism and Society: New Theoretical Perspectives
Type: Book
ISBN: 978-1-80382-658-5

Keywords

Access Restricted. View access options
Article
Publication date: 26 August 2020

Rohit Gupta, Baidyanath Biswas, Indranil Biswas and Shib Sankar Sana

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios…

514

Abstract

Purpose

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios, optimal investment of firm, optimal efforts of attackers and their economic utilities are determined.

Design/methodology/approach

Throughout the analysis, a single firm and two attackers for a “firm as a leader” in a sequential game setting and “firm versus attackers” in a simultaneous game setting are considered. While the firm makes investments to secure its information assets, the attackers spend their efforts to launch breaches.

Findings

It is observed that the firm needs to invest more when it announces its security investment decisions ahead of attacks. In contrast, the firm can invest relatively less when all agents are unaware of each other’s choices in advance. Further, the study reveals that attackers need to exert higher effort when no agent enjoys the privilege of being a leader.

Research limitations/implications

In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator.

Practical implications

This study reports that the optimal breach effort exerted by each attacker is proportional to its obtained economic benefit for both sequential and simultaneous attack scenarios. A set of numerical experiments and sensitivity analyzes complement the analytical modeling.

Originality/value

In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Book part
Publication date: 5 November 2021

Craig R. Scott and Katie K. Kang

A contemporary view of group communication must consider hidden groups, which are those collectives that intentionally conceal key aspects of their identity at various levels…

Abstract

A contemporary view of group communication must consider hidden groups, which are those collectives that intentionally conceal key aspects of their identity at various levels (e.g., group, member, organization) from relevant audiences. This chapter reviews several general research areas and findings related to hidden groups and then briefly examines some of the theories and methodological issues relevant to hidden groups. Building on that, a multilevel framework that also considers members and broader organizational structures is offered to help distinguish various types of hidden groups.

Details

The Emerald Handbook of Group and Team Communication Research
Type: Book
ISBN: 978-1-80043-501-8

Keywords

1 – 10 of 380
Per page
102050