Sayed Muhammad Fawad Sharif, Yang Naiding and Sayed Kifayat Shah
Collaborative projects require overlapping skills and capabilities to facilitate knowledge transfer. However, not all kinds of learning are virtuous and some may lead to leakage…
Abstract
Purpose
Collaborative projects require overlapping skills and capabilities to facilitate knowledge transfer. However, not all kinds of learning are virtuous and some may lead to leakage of commercially valuable knowledge. The purpose of this paper is to explain and restrain leakage of organizational competitive knowledge in collaborative projects.
Design/methodology/approach
A total of 398 survey questionnaires are collected from project-based firms in Pakistan. We gathered data from horizontal and vertical collaborations. Analysis is conducted with transaction cost economics lens through Process Macro 3.0.
Findings
Findings suggest that partner’s learning intent (PLI) and distrust positively affect knowledge leakage, whereas human resource management (HRM) practices have negative effect on knowledge leakage. Furthermore, HRM practices negatively moderate the relationship between PLI and knowledge leakage and distrust positively mediates it.
Research limitations/implications
This study integrates HRM with knowledge management to restrain knowledge leakage and contributes to knowledge management and strategic management. This study examines knowledge leakage in the presence of passive opportunism.
Originality/value
This study explains how passive opportunism translates into opportunistic behavior. Besides, effectiveness of HRM practices are least surveyed to restrain passive and active opportunisms.
Details
Keywords
Kifayat Nahiyan Rafi, Mohammad Osman Gani, Nik Mohd Hazrul Nik Hashim, Muhammad Sabbir Rahman and Mohammad Masukujjaman
Using the stimulus–organism–response (SOR) theoretical model, this empirical research aims to examine and validate how tourists’ interactions with 360-degree virtual reality (VR…
Abstract
Purpose
Using the stimulus–organism–response (SOR) theoretical model, this empirical research aims to examine and validate how tourists’ interactions with 360-degree virtual reality (VR) videos incorporating Web navigability and visual interface design quality (stimulus) on travel websites can make tourists more engaged and then satisfied (organism), which could make them more likely to visit destinations and spread electronic word of mouth (e-WOM) (response).
Design/methodology/approach
Using the convenience sampling method, 975 responses were collected through a questionnaire. The data were analysed using Smart-PLS 4 software to investigate the hypothesised relationships.
Findings
The findings demonstrate that 360-degree VR videos significantly create Web user engagement, and Web user engagement is significantly associated with Web user satisfaction. The result shows that Web user engagement and satisfaction impact the intention to visit the tourist destination. Additionally, Web user satisfaction impacts e-WOM. Lastly, navigability and visual interface design quality are significantly moderated between 360-degree VR videos and Web user engagement.
Research limitations/implications
This research only examined the tourists’ behavioural intentions with 360-degree VR videos during the pre-travel phase. In contrast, future research may investigate how tourists behave with VR during the on-site and post-travel phases.
Practical implications
Tourism marketers should not only adopt 360-degree VR but also integrate Web navigability and visual interface design to boost Web users’ engagement on tourism websites.
Originality/value
This study advances the study of VR from the tourists’ psychological perspective. Moreover, the SOR theory has been re-examined from the VR and technology tourism perspectives. It provides a general understanding of the behavioural aspects of tourists in developing countries.
目的
利用刺激-有机体反应(SOR)理论模型, 本实证研究检验并验证了游客与旅游网站上结合了网络导航性和视觉界面设计质量(刺激)的360度虚拟现实(VR)视频的互动如何使游客更投入、更满意(有机体), 这可能使他们更有可能访问目的地并传播电子口碑(响应)。
设计/方法
采用方便抽样法, 通过问卷调查收集了975份回复。使用Smart-PLS 4软件对数据进行分析, 以调查假设的关系。
结果
研究结果表明, 360度虚拟现实(VR)视频显著提高了网络用户参与度, 网络用户参与与网络用户满意度显著相关。结果表明, 网络用户参与度和满意度对旅游目的地的访问意愿有影响。此外, 网络用户满意度也会影响电子口碑。最后, 在360度虚拟现实(VR)视频和网络用户参与度之间, 导航性和视觉界面设计质量显著适中。
研究限制/意义
这项研究只考察了游客在旅行前阶段使用360度虚拟现实(VR)视频的行为意图。相比之下, 未来的研究可能会调查游客在现场和旅行后阶段使用虚拟现实(VR)的行为。
实践意义
旅游营销人员不仅应采用360度虚拟现实(VR), 还应将网络导航性和视觉界面设计相结合, 以提高网络用户对旅游网站的参与度。
原创性
本研究从游客的心理角度推进了虚拟现实(VR) 的研究。此外, 还从虚拟现实(VR)和科技旅游的角度重新审视了SOR 理论。它提供了对发展中国家游客行为方面的一般了解。
Objetivo
Utilizando el modelo teórico estímulo-organismo-respuesta (SOR), esta investigación empírica examinó y validó cómo las interacciones de los turistas con los vídeos de RV de 360 grados que incorporan la navegabilidad web y la calidad del diseño de la interfaz visual (estímulo) en los sitios web de viajes pueden hacer que los turistas se sientan más comprometidos y luego satisfechos (organismo), lo que podría hacerles más propensos a visitar los destinos y a difundir el e-WOM (respuesta).
Diseño/metodología/enfoque
Utilizando el método de muestreo por conveniencia, se recogieron 975 respuestas a través de un cuestionario. Los datos se analizaron mediante el software Smart-PLS 4 para investigar las relaciones hipotetizadas.
Resultados
Los resultados demuestran que los vídeos de RV de 360 grados generan un compromiso significativo de los usuarios de la web y que el compromiso de los usuarios de la web se asocia significativamente con su satisfacción. El resultado muestra que el compromiso y la satisfacción del usuario web repercuten en la intención de visitar el destino turístico. Además, la satisfacción del usuario web influye en el e-WOM. Por último, la navegabilidad y la calidad del diseño de la interfaz visual son significativamente moderadas entre los vídeos de RV de 360 grados y el compromiso del usuario web.
Limitaciones/implicaciones de la investigación
Esta investigación sólo examinó las intenciones de comportamiento de los turistas con los vídeos de RV de 360 grados durante la fase previa al viaje. En cambio, en futuras investigaciones se podría estudiar cómo se comportan los turistas con la RV durante las fases in situ y posterior al viaje.
Implicaciones prácticas
Los profesionales del marketing turístico no sólo deberían adoptar la RV de 360 grados, sino también integrar la navegabilidad web y el diseño de la interfaz visual para potenciar el compromiso de los internautas en los sitios web turísticos.
Originalidad
Este estudio avanza en el estudio de la RV desde la perspectiva psicológica del turista. Además, se ha reexaminado la teoría S-O-R desde las perspectivas de la RV y el turismo tecnológico. Proporciona una comprensión general del aspecto conductual de los turistas en los países en desarrollo.
Details
Keywords
- e-WOM
- 360-Degree virtual reality
- Destination visit intention
- Visual interface design quality
- Web engagement
- Web navigability
- Web satisfaction
- 360 度虚拟现实、网络可导航性、视觉界面设计质量、网络参与度、网络满意度、目的地访问意向、电子口碑。
- Realidad virtual de 360 grados
- Navegabilidad web
- Calidad del diseño de la interfaz visual
- Compromiso web
- Satisfacción web
- Intención de visita al destino
- e-WOM
Shih-Hao Lu, Rohit Raj, Anupama Mahajan, Ajay Jha, Priyanka Verma, Hsia-Ping Lan and Sumanjeet Singh
The study aims to add to the existing literature on food supply chains by specifically taking into the redesigning of the alignment of storage, packaging and distribution…
Abstract
Purpose
The study aims to add to the existing literature on food supply chains by specifically taking into the redesigning of the alignment of storage, packaging and distribution practices in the modern complex supply chain. The redesign of the food supply chain’s storage, distribution and packaging is a transformative endeavor ultimately aimed at enhancing efficiency, sustainability and reliability.
Design/methodology/approach
In order to identify, classify and prioritize the main challenges, this study conducted an extensive analysis of the literature and experts’ opinions in the areas of academia, information technology and the food supply chain (FSC) using combined compromise solution method (CoCoSo) and complex proportional assessment (COPRAS).
Findings
The top three classes of key indicators revealed in this study are dynamic route optimization and on-demand delivery pods (RD4), implementation of active packaging with nanotechnology (RP3) and collaborative last-mile (RD2). The findings reveal that dynamic route optimization and on-demand delivery pods (RD4) and collaborative last-mile (RD2) are maintaining a balance between collaborative delivery networks through route optimization which is a very discussable theme in recent literature.
Originality/value
The research provides fresh insights into how perishable food shelf life parameters and the use of distribution networks within the short supply chain can be taken into consideration when redesigning the storage, packaging and distribution system for food supply chains.
Details
Keywords
Arooba Chaudhary and Talat Islam
Workplace bullying is a serious problem among nurses, which results in negative workplace behavior. Therefore, this study aims to understand how workplace bullying affects…
Abstract
Purpose
Workplace bullying is a serious problem among nurses, which results in negative workplace behavior. Therefore, this study aims to understand how workplace bullying affects employees’ knowledge hiding behavior. Specifically, this study explored psychological contract breach as an underlying mechanism between workplace bullying and knowledge hiding; and learning goal orientation as a boundary condition between psychological contract breach and knowledge hiding.
Design/methodology/approach
The study collected data from 343 nurses working in the health-care sector of Pakistan on convenience basis using a questionnaire-based survey between December 2021 to March 2022. The data were analyzed through structural equation modeling.
Findings
The results revealed the adverse effect of workplace bullying on knowledge hiding behaviors among nurses, and psychological contract breach was noted to mediate this association. Further, learning goal orientation was noted to buffer the relationship between psychological contract breach and knowledge hiding.
Research limitations/implications
The cross-section design may restrict causality; however, the findings suggest health-care administration take appropriate measures to reduce the adverse effects of workplace bullying. In addition, the administration is suggested to implement training programs to make nurses capable of dealing with workplace stressors (bullying and psychological contract breach).
Originality/value
This research provides a novel perspective to consider psychological contract breach as a mechanism between workplace bullying and knowledge hiding in the health-care sector from the conservation of resources perspective. It further explored learning goal orientation as a buffer to mitigate the effect of psychological contract breach on knowledge hiding.
Details
Keywords
Dechao Sun, Tahir Mahmood, Ubaid ur Rehman and Shouzhen Zeng
Gathering, analyzing and securing electronic data from various digital devices for use in legal or investigative procedures is the key process of computer forensics. Information…
Abstract
Purpose
Gathering, analyzing and securing electronic data from various digital devices for use in legal or investigative procedures is the key process of computer forensics. Information retrieved from servers, hard drives, cellphones, tablets and other devices is all included in this. This article tackles the challenging problem of how to prioritize different kinds of computer forensics and figure out which kind is most useful in cases of cybercrime, fraud, theft of intellectual property, harassment and espionage.
Design/methodology/approach
Therefore, we first introduce enhanced versions of Hamacher power aggregation operators (AOs) within the framework of bipolar complex fuzzy (BCF) sets. These include BCF Hamacher power averaging (BCFHPA), BCF Hamacher power-weighted averaging (BCFHPWA), BCF Hamacher power-ordered weighted averaging (BCFHPOWA), BCF Hamacher power geometric (BCFHPG), BCF Hamacher power-weighted geometric (BCFHPWG) and BCF Hamacher power-ordered-weighted geometric (BCFHPOWG) operators. Employing the devised AOs, we devise a technique of decision-making (DM) for dealing with DM dilemmas with the BCF set (BCFS).
Findings
We prioritize different types of computer forensic by taking artificial data in a numerical example and getting the finest computer forensic. Further, by this example, we reveal the applicability of the proposed theory. This work provides a more elaborate and versatile procedure for classifying computer forensics with dual aspects of criteria and extra fuzzy information. It allows for better and less biased DM in the more intricate digital investigations, which may lead to better DM and time-saving in real-life forensic scenarios. To demonstrate the significance and impression of the devised operators and techniques of DM, they are compared with existing ones.
Originality/value
This research is the first to combine Hamacher and power AOs in BCFS for computer forensics DM. It presents new operators and a DM approach that is not encountered in the existing literature and is specifically designed to deal with the challenges and risks associated with the classification of computer forensics. The framework’s capacity to accommodate bipolar criteria and extra fuzzy information is a major development in the field of digital forensics and decision science.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.