Zhiying Wang, Hangyu Deng and Guiyun Li
This study aims to explore the impact of information security knowledge on information security compliance behavior using neuroscience science.
Abstract
Purpose
This study aims to explore the impact of information security knowledge on information security compliance behavior using neuroscience science.
Design/methodology/approach
This study uses electroencephalography (EEG) equipment to collect brain cognitive data from participants under two specific conditions. The conditions are before and after information security knowledge interventions contextualized with the “Wannacry” ransomware incident.
Findings
Firstly, the information security knowledge interventions lead to differences in the participants’ behavioral data under the two conditions, with participants showing increased attention to security warnings after intervention. Secondly, the P300 waveform is observed in the decision-making process for information security compliance behavior both before and after intervention, suggesting that the cognitive processes of the brain are influenced by information security knowledge. Finally, the amplitude of the P300 waveform is larger after intervention compared to before, and the energy in the β frequency band induced by decision-making for information security compliance behavior is higher before intervention than after.
Originality/value
Few studies have focused on the corresponding research regarding how to enhance information security compliance behavior. This study confirms that information security knowledge can significantly improve information security compliance behavior encouraging users to proactively implement security measures to counter information security threats. The findings reveal the impact of EEG on the cognitive processes involved in decision-making for information security compliance behavior and offer a novel approach for improving information security behavior through information security knowledge interventions.
Details
Keywords
Forecasting demand of emergency supplies under major epidemics plays a vital role in improving rescue efficiency. Few studies have combined intuitionistic fuzzy set with…
Abstract
Purpose
Forecasting demand of emergency supplies under major epidemics plays a vital role in improving rescue efficiency. Few studies have combined intuitionistic fuzzy set with grey-Markov method and applied it to the prediction of emergency supplies demand. Therefore, this article aims to establish a novel method for emergency supplies demand forecasting under major epidemics.
Design/methodology/approach
Emergency supplies demand is correlated with the number of infected cases in need of relief services. First, a novel method called the Intuitionistic Fuzzy TPGM(1,1)-Markov Method (IFTPGMM) is proposed, and it is utilized for the purpose of forecasting the number of people. Then, the prediction of demand for emergency supplies is calculated using a method based on the safety inventory theory, according to numbers predicted by IFTPGMM. Finally, to demonstrate the effectiveness of the proposed method, a comparative analysis is conducted between IFTPGMM and four other methods.
Findings
The results show that IFTPGMM demonstrates superior predictive performance compared to four other methods. The integration of the grey method and intuitionistic fuzzy set has been shown to effectively handle uncertain information and enhance the accuracy of predictions.
Originality/value
The main contribution of this article is to propose a novel method for emergency supplies demand forecasting under major epidemics. The benefits of utilizing the grey method for handling small sample sizes and intuitionistic fuzzy set for handling uncertain information are considered in this proposed method. This method not only enhances existing grey method but also expands the methodologies used for forecasting demand for emergency supplies.
Highlights (for review)
An intuitionistic fuzzy TPGM(1,1)-Markov method (IFTPGMM) is proposed.
The safety inventory theory is combined with IFTPGMM to construct a prediction method.
Asymptomatic infected cases are taken to forecast the demand for emergency supplies.
An intuitionistic fuzzy TPGM(1,1)-Markov method (IFTPGMM) is proposed.
The safety inventory theory is combined with IFTPGMM to construct a prediction method.
Asymptomatic infected cases are taken to forecast the demand for emergency supplies.
Details
Keywords
This paper aims to illustrate the concept of “consumer nationalism” and its implications for corporate reputation management in China.
Abstract
Purpose
This paper aims to illustrate the concept of “consumer nationalism” and its implications for corporate reputation management in China.
Design/methodology/approach
The paper discusses three incidents involving companies from different countries of origin as cases in point to explore Chinese consumers' infusion of national identity into the public discourse concerning multinational businesses in the Chinese market.
Findings
It is demonstrated that the emotional power of nationalism is a critical component of the political marketplace in contemporary China and at times becomes central to Chinese consumers' relationship with global brands. Consumer nationalism controversies put the involved companies and brands in the spotlight of confrontation with local citizenry. The salience of consumer national advocacy underscores the tensions and contradictions in China's encounter with globalization.
Research limitations/implications
Conceptually, this paper presents evidence for the necessity to take into account nationalism in understanding contemporary Chinese consumer behavior.
Practical implications
The paper discusses lessons learned through the cases and make three general recommendations on communication strategies for managing consumer nationalism in the Chinese market.
Originality/value of paper
The paper locates the conceptual home for the social phenomenon of national advocacy in the process of consumption and its implications for corporate reputation management.
Details
Keywords
The purpose of this paper is to report the results of a qualitative study exploring the conditions associated with the creation, preservation and transmission of Shuishu archives…
Abstract
Purpose
The purpose of this paper is to report the results of a qualitative study exploring the conditions associated with the creation, preservation and transmission of Shuishu archives in China, and the crises today in their preservation and transmission and the reasons behind them. It also proposes activation mechanisms to shift Shuishu archives from jeopardized collective memory to preservable cultural memory.
Design/methodology/approach
Semi-structured interviews and ethnographic fieldwork were conducted over the course of a month in 2015.
Findings
The creation, preservation and transmission of Shuishu archives in the community of the Shui rely upon the community’s closed system. But this system has been broken as a result of modernization and wide use of new media in China. To preserve and transmit Shuishu archives to future generations, there needs to be mutual trust and equitable cooperation between government archives and the Shuishushi. The “cultural consciousness” of the Shui needs to be stimulated, and more members of the Shui and the whole of society need to participate in the preservation and transmission of this distinctive memory.
Practical implications
The study can provide a provocative example for education in preservation and LIS about community culture and archiving, and the preservation of social memory, identity and culture. The activation mechanisms seek to aid in the preservation and transmission of Shuishu archives and other similar community memory.
Originality/value
The study uses semi-structured interviews and ethnographic methodology to develop a rich understanding of the history and the status quo of the preservation and transmission of Shuishu archives. It redefines Shuishu archives and sheds light on the roles government archives should play in the preservation and transmission of Shuishu archives.
Details
Keywords
Dongqing Zhu, Zhiying Zhang and Chunzhen Wang
It is generally believed that supervisors would deter employee unethical behavior. However, drawing from social exchange theory and the theory of moral disengagement, we posit…
Abstract
Purpose
It is generally believed that supervisors would deter employee unethical behavior. However, drawing from social exchange theory and the theory of moral disengagement, we posit that supervisors are more willing to tolerate employee unethical behavior through moral disengagement when the perpetrator is a high performing employee.
Design/methodology/approach
Study 1, which measured employee unethical behavior in a specific group of doctors through a time-lagged survey, and Study 2, which manipulated employee unethical behavior with a diverse sample by a vignette-based experiment, provided convergent support for our hypothesized 1st-stage moderated mediation model. Hierarchical regression, bootstrapping and ANOVA are used to test our hypotheses.
Findings
Although supervisors generally showed a low social acceptance of an employee who engaged in unethical behavior, they were more likely to socially accept the perpetrator through moral disengagement when the employee was a high rather than a low performer.
Practical implications
Given that supervisor's tolerance of employee unethical behavior may be more dangerous than employee unethical behavior itself, organizations should set up an ethics committee to handle top managers' unethical behavior and consider morality equally important with performance in management practice.
Originality/value
The current research extends research on the interpersonal consequences of employee unethical behavior, explains how moral disengagement promotes social acceptance and identifies the moderating effect of job performance in the process.
Details
Keywords
Lingling Yu, Xiongfei Cao, Zhiying Liu and Junkai Wang
The purpose of this paper is to explore the effects of excessive social media use on individual job performance and its exact mechanism. An extended stressor–strain–outcome…
Abstract
Purpose
The purpose of this paper is to explore the effects of excessive social media use on individual job performance and its exact mechanism. An extended stressor–strain–outcome research model is proposed to explain how excessive social media use at work influences individual job performance.
Design/methodology/approach
The research model was empirically tested with an online survey study of 230 working professionals who use social media in organizations.
Findings
The results revealed that excessive social media use was a determinant of three types of social media overload (i.e. information, communication and social overload). Information and communication overload were significant stressors that influence social media exhaustion, while social overload was not a significant predictor of exhaustion. Furthermore, social media exhaustion significantly reduces individual job performance.
Originality/value
Theory-driven investigation of the effects of excessive social media use on individual job performance is still relatively scarce, underscoring the need for theoretically-based research of excessive social media use at work. This paper enriches social media research by presenting an extended stressor–strain–outcome model to explore the exact mechanism of excessive use of social media at work, and identifying three components of social media-related overload, including information, communication and social overload. It is an initial attempt to systematically validate the casual relationships among excessive usage experience, overload, exhaustion and individual job performance based on the transactional theory of stress and coping.
Details
Keywords
Zhiying Lian, Ning Wang and Gillian Oliver
The purpose of this paper is to report findings from an investigation on the information culture and recordkeeping in two Chinese companies, exploring the interaction between…
Abstract
Purpose
The purpose of this paper is to report findings from an investigation on the information culture and recordkeeping in two Chinese companies, exploring the interaction between information culture and recordkeeping.
Design/methodology/approach
On the basis of systematic literature review, this research investigates the information culture and recordkeeping in two Chinese companies by conducting in-depth interviews with the staff of the two companies.
Findings
The attitude of the leadership and the staff towards records and information is different in the result-oriented information culture and rule-following culture. If a company aims to stay innovative and competitive, an information culture that can facilitate the good governance of records and information should be developed, and information professionals can play a key role in working towards this.
Originality/value
As a qualitative study of information culture and recordkeeping in Chinese companies, this paper provides the insight into the interaction between information culture and recordkeeping, demonstrates the impact of information culture on information governance and identifies the factors influencing information culture in an organization.
Details
Keywords
Peiqi Ding, Weili Xia, Zhiying Zhao and Xiang Li
Build-operate-transfer (BOT) contracts are widely used in the construction and operation of charging piles for new energy vehicles worldwide and stipulate that governments grant…
Abstract
Purpose
Build-operate-transfer (BOT) contracts are widely used in the construction and operation of charging piles for new energy vehicles worldwide and stipulate that governments grant charging pile operators franchises for a certain period of time to invest in the construction and operation of the charging piles. The charging piles are then transferred to governments when the concession expires. To encourage charging pile operators to build and operate charging piles, governments usually provide two kinds of subsidies, namely construction and operating subsidies.
Design/methodology/approach
The authors establish a typical game model to study the optimal BOT contract between a government and a charging pile operator and their preferences for the two kinds of subsidies.
Findings
First, the authors show that there are substitution and complementarity effects between the concession period and the subsidy level. Second, the operator prefers the construction subsidy (operating subsidy) when the additional operating cost is low (high). The government prefers the operating subsidy (construction subsidy) when consumer sensitivity to the number of charging piles is low (high) and the concession period is short or long (moderate). Finally, the adjusted joint subsidy can not only improve social welfare but also that the charging pile operator can obtain the same profit as under the operating subsidy at a lower subsidy amount.
Originality/value
This work develops the first analytical model to study two subsidies in the construction and operation of charging piles and investigate the optimal BOT contract and subsidy preferences. The insights are compelling not only for the charging pile operator but also for policymakers in practice from a circular economy perspective.
Details
Keywords
Xiongfei Cao, Lingling Yu, Zhiying Liu, Mingchuan Gong and Luqman Adeel
The purpose of this paper is to investigate the mechanism of building trust during the transition from online payment to mobile payment, as well as to examine the effect of trust…
Abstract
Purpose
The purpose of this paper is to investigate the mechanism of building trust during the transition from online payment to mobile payment, as well as to examine the effect of trust on the satisfaction and continuance intention of mobile payment users. Based on trust transfer theory, this study proposes that trust in online payment (i.e. trust in source) and two source-target relationship factors, namely, perceived similarity and entitativity, affect trust in mobile payment (i.e. trust in target). In turn, the resulting trust influences user satisfaction and continuance intention toward mobile payment in an online-mobile payment context.
Design/methodology/approach
The model was empirically tested on data collected from 219 mobile payment users of a famous payment enterprise in China.
Findings
The results indicated that the trust transfer process positively influences the continuance intention of mobile payment through satisfaction. Satisfaction is an important factor affecting continuance intention. Moreover, trust in online payment, perceived similarity, and perceived entitativity between online and mobile payments can positively influence trust in mobile payment.
Originality/value
This study investigates the post-adoption usage of mobile payment from the trust transfer perspective. It focuses on the trust-building process and emphasizes the importance of trust on the continuance intention toward mobile payment in an online-mobile payment context.