Search results

1 – 10 of 374
Article
Publication date: 7 November 2023

Jun Yu, Zhengcong Ma and Lin Zhu

This study aims to investigate the configurational effects of five rules – artificial intelligence (AI)-based hiring decision transparency, consistency, voice, explainability and…

681

Abstract

Purpose

This study aims to investigate the configurational effects of five rules – artificial intelligence (AI)-based hiring decision transparency, consistency, voice, explainability and human involvement – on applicants' procedural justice perception (APJP) and applicants' interactional justice perception (AIJP). In addition, this study examines whether the identified configurations could further enhance applicants' organisational commitment (OC).

Design/methodology/approach

Drawing on the justice model of applicants' reactions, the authors conducted a longitudinal survey of 254 newly recruited employees from 36 Chinese companies that utilise AI in their hiring. The authors employed fuzzy-set qualitative comparative analysis (fsQCA) to determine which configurations could improve APJP and AIJP, and the authors used propensity score matching (PSM) to analyse the effects of these configurations on OC.

Findings

The fsQCA generates three patterns involving five configurations that could improve APJP and AIJP. For pattern 1, when AI-based recruitment with high interpersonal rule (AI human involvement) aims for applicants' justice perception (AJP) through the combination of high informational rule (AI explainability) and high procedural rule (AI voice), there must be high levels of AI consistency and AI voice to complement AI explainability, and only this pattern of configurations can further enhance OC. In pattern 2, for the combination of high informational rule (AI explainability) and low procedural rule (absent AI voice), AI recruitment with high interpersonal rule (AI human involvement) should focus on AI transparency and AI explainability rather than the implementation of AI voice. In pattern 3, a mere combination of procedural rules could sufficiently improve AIJP.

Originality/value

This study, which involved real applicants, is one of the few empirical studies to explore the mechanisms behind the impact of AI hiring decisions on AJP and OC, and the findings may inform researchers and managers on how to best utilise AI to make hiring decisions.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 April 2023

Jun Yu, Jieli Liu and Qin Xu

This study empirically explores how firms configure the strength and the temporal and spatial features of corporate volunteering (CV) events to promote corporate reputation (CR).

Abstract

Purpose

This study empirically explores how firms configure the strength and the temporal and spatial features of corporate volunteering (CV) events to promote corporate reputation (CR).

Design/methodology/approach

Using event system theory as a framework and applying fuzzy-set qualitative comparative analysis (fsQCA) to 385 firms and 2,783 public respondents, this study explores the configurational effects of five elements of CV events—employee engagement, customer engagement, meagre incentive, duration and scope of influence—on two types of CR: capability reputation (CAR) and character reputation (CHR).

Findings

The results indicate that (1) the impact of volunteering on CR is not only configurational in nature, but also characterised by equifinality (i.e. the presence of multiple paths to success); (2) with meagre incentive and in the absence of scope-of-influence support, long-term employee and customer engagement in CV is sufficient to achieve high CAR; (3) adequate and diverse incentives, high employee engagement and a sufficiently broad scope of influence work well with either high customer engagement or long duration to achieve high CAR and CHR, respectively; (4) there are identical configurations that can achieve high CAR and CHR.

Originality/value

This study contributes to the CV and CR literature by extending the application of event system theory to proactive events.

Details

Management Decision, vol. 61 no. 10
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 19 January 2023

Jun Yu, Qian Wen and Qin Xu

The purpose of this study is to empirically explore how firms configure centrifugal and centripetal forces in promoting breakthrough innovation (BI), thus improving their…

Abstract

Purpose

The purpose of this study is to empirically explore how firms configure centrifugal and centripetal forces in promoting breakthrough innovation (BI), thus improving their strategic performance (SP) in the artificial intelligence (AI) context.

Design/methodology/approach

This study applies the centrifugal and centripetal forces model to a survey sample of 285 Chinese AI firms. Fuzzy-set qualitative comparative analysis (fsQCA) and propensity score matching (PSM) are integrated to explore the configurational effects of three centrifugal forces—the autonomy of technical experts, knowledge search and alliance network—and two centripetal forces—strictness of organisational institutions (SOI) and human–human–AI collaboration (HHAC)—on BI, examining whether the configurations that enhance BI can further improve SP.

Findings

The results indicate that the strictness of innovation institutions (SII) and strictness of ethical institutions (SEI) are equally important for determining SOI. Three configurations can improve BI when SOI and HHAC are the core conditions; only one of three configurations can further improve SP significantly.

Originality/value

By introducing SOI composed of equally important levels of SII and SEI and HHAC, this research is one of the few empirical studies to explore the mechanisms behind the impact of centrifugal and centripetal forces on BI and SP, which may help researchers and managers address innovation challenges in the AI context.

Details

European Journal of Innovation Management, vol. 27 no. 5
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 22 May 2024

Xiaona Pang, Wenguang Yang, Wenjing Miao, Hanyu Zhou and Rui Min

Through the scientific and reasonable evaluation of the site selection of the emergency material reserve, the optimal site selection scheme is found, which provides reference for…

Abstract

Purpose

Through the scientific and reasonable evaluation of the site selection of the emergency material reserve, the optimal site selection scheme is found, which provides reference for the future emergency decision-making research.

Design/methodology/approach

In this paper, we have chosen three primary indicators and twelve secondary indicators to construct an assessment framework for the determination of suitable locations for storing emergency material reserves. By mean of the improved entropy weight-order relationship weight determination method, the evaluation model of kullback leibler-technique for order preference by similarity to an ideal solution (KL-TOPSIS) emergency material reserve location based on relative entropy is established. On this basis, 10 regional storage sites in Beijing are selected for evaluation.

Findings

The results show that the evaluation model of the location of emergency material reserve not only respects the objective knowledge, but also considers the subjective information of the experts, which makes the ranking result of the location of the emergency material reserve more accurate and reliable.

Originality/value

Firstly, the modification factor is added to the calculation formula of traditional entropy weight method to complete the improvement of entropy weight method. Secondly, the order relation analysis method is used to assign subjective weights to the indicators. The principle of minimum information entropy is introduced to determine the comprehensive weight of the index. Finally, KL distance and TOPSIS method are combined to determine the relative entropy and proximity degree of alternative solutions and positive and negative ideal solutions, and the scientific and effective of the method is proved by case study.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 16 August 2023

Anish Khobragade, Shashikant Ghumbre and Vinod Pachghare

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity…

Abstract

Purpose

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.

Design/methodology/approach

D3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.

Findings

Experimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.

Research limitations/implications

Despite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.

Practical implications

Link prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the characteristics and objectives of the system or network.

Originality/value

The representation learning approach helps to reduce incompleteness using a link prediction that infers possible missing facts by using the existing entities and relations of D3FEND.

Details

International Journal of Web Information Systems, vol. 19 no. 3/4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 22 August 2023

He Ding, Jun Liu and Enhai Yu

Drawing on conversation of resources theory, the present paper aimed to investigate the effect of strengths-based leadership on follower career satisfaction and the mediating role…

Abstract

Purpose

Drawing on conversation of resources theory, the present paper aimed to investigate the effect of strengths-based leadership on follower career satisfaction and the mediating role of follower strengths use as well as the moderating role of emotional exhaustion in the relationship.

Design/methodology/approach

Research data were gathered at 3 time points with a sample of 210 participants working in various organizations in China. Structural equation model (SEM) was applied to examine the authors' hypotheses.

Findings

The results indicated that strengths-based leadership has a positive impact on follower career satisfaction and follower strengths use fully mediates the effect of strengths-based leadership on follower career satisfaction. More importantly, emotional exhaustion enhanced the direct relationship between strengths use and career satisfaction and the indirect association of strengths-based leadership with follower career satisfaction through follower strengths use.

Research limitations/implications

The main limitation of the present paper was the single source of research data.

Originality/value

The present paper advances strengths-based leadership theory and research and provides a new insight into cultivating employee career satisfaction.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Open Access
Article
Publication date: 28 July 2020

Julián Monsalve-Pulido, Jose Aguilar, Edwin Montoya and Camilo Salazar

This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently…

2182

Abstract

This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently recommending digital resources. The paper presents the architectural details of the intelligent and autonomous dimensions of the recommendation system. The paper describes a hybrid recommendation model that orchestrates and manages the available information and the specific recommendation needs, in order to determine the recommendation algorithms to be used. The hybrid model allows the integration of the approaches based on collaborative filter, content or knowledge. In the architecture, information is extracted from four sources: the context, the students, the course and the digital resources, identifying variables, such as individual learning styles, socioeconomic information, connection characteristics, location, etc. Tests were carried out for the creation of an academic course, in order to analyse the intelligent and autonomous capabilities of the architecture.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 3 October 2023

Lu Wang, Jun Zhang, Jian Li, Huayi Yu and Jun Li

This study aims to provide a series of drivers that prompt the blockchain technology (BT) adoption decisions in circular supply chain finance (SCF) and also assesses their degrees…

Abstract

Purpose

This study aims to provide a series of drivers that prompt the blockchain technology (BT) adoption decisions in circular supply chain finance (SCF) and also assesses their degrees of influence and interrelationships, which leads to the construction of a theoretical model depicting the influence mechanism of BT adoption decisions in circular SCF.

Design/methodology/approach

This study mainly uses the technology-organization-environment (TOE) framework, which focuses on the aspects based on the nature of innovation, intra-organizational characteristics and extra environmental consideration, to identify the drivers of blockchain adoption in circular SCF context, while the significance and causality of the drivers are explained using interpreting structural models (ISMs) and the decision-making trial and evaluation laboratory (DEMATEL) method.

Findings

The findings of this study indicate that government policy and technological comparative advantage are the underlying reasons for BT adoption decisions, management commitment and financial expectations are the critical drivers of BT adoption decisions while other factors are the receivers of the mechanism.

Practical implications

This study provides theoretical references and empirical insights that influence the technology adoption decisions of both BT and circular SCF by practitioners.

Originality/value

The theoretical research contributes significantly to current research and knowledge in both BT and circular SCF fields, especially by extending the existing TOE model by combining relevant enablers from technological, organizational and external environmental aspects with the financial performance objectives of circular SCF services, which refer to the optimization of the financial resources flows and financing efficiency.

Details

Management Decision, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 2 May 2024

Mikias Gugssa, Long Li, Lina Pu, Ali Gurbuz, Yu Luo and Jun Wang

Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However…

Abstract

Purpose

Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety monitoring methods in near real time or in a time-efficient manner in real construction practices. Therefore, this study developed a novel solution to enhance the time efficiency to achieve near-real-time safety glove detection and meanwhile preserve data privacy.

Design/methodology/approach

The developed method comprises two primary components: (1) transfer learning methods to detect safety gloves and (2) edge computing to improve time efficiency and data privacy. To compare the developed edge computing-based method with the currently widely used cloud computing-based methods, a comprehensive comparative analysis was conducted from both the implementation and theory perspectives, providing insights into the developed approach’s performance.

Findings

Three DL models achieved mean average precision (mAP) scores ranging from 74.92% to 84.31% for safety glove detection. The other two methods by combining object detection and classification achieved mAP as 89.91% for hand detection and 100% for glove classification. From both implementation and theory perspectives, the edge computing-based method detected gloves faster than the cloud computing-based method. The edge computing-based method achieved a detection latency of 36%–68% shorter than the cloud computing-based method in the implementation perspective. The findings highlight edge computing’s potential for near-real-time detection with improved data privacy.

Originality/value

This study implemented and evaluated DL-based safety monitoring methods on different computing infrastructures to investigate their time efficiency. This study contributes to existing knowledge by demonstrating how edge computing can be used with DL models (without sacrificing their performance) to improve PPE-glove monitoring in a time-efficient manner as well as maintain data privacy.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 2 July 2024

Yunyun Yu, Jiaqi Chen, Fuad Mehraliyev, Sike Hu, Shengbin Wang and Jun Liu

Although the importance and variety of emotions have been emphasized in existing literature, studies on discrete emotions remain limited. This study aims to propose a method for…

Abstract

Purpose

Although the importance and variety of emotions have been emphasized in existing literature, studies on discrete emotions remain limited. This study aims to propose a method for more precise recognition and calculation of emotions in massive amounts of online data on attraction visitor experiences and behaviour, by using discrete emotion theory.

Design/methodology/approach

Using HowNet’s word similarity calculation technique, this study integrated multiple generic dictionaries, including the sentiment vocabulary ontology database of the Dalian University of Technology, the National Taiwan University Sentiment Dictionary and the Boson Dictionary. Word2vec algorithm filters emotion words unique to hospitality and tourism in 1,596,398 texts from Sogou News, Wikipedia and Ctrip reviews about attractions, and 1,765,691 reviews about attractions in China.

Findings

The discrete sentiment dictionary developed in this study outperformed the original dictionary in identifying and calculating emotions, with a total vocabulary extension of 12.07%, demonstrating its applicability to tourism.

Research limitations/implications

The developed new dictionary can be used by researchers and managers alike to quickly and accurately evaluate products and services based on online visitor reviews.

Originality/value

To the best of the authors’ knowledge, this study is the first to construct a sentiment dictionary based on discrete emotion theory applicable to hospitality and tourism in the Chinese context. This study extended the applicability of affective psychology to hospitality and tourism using discrete emotion theory. Moreover, the study offers a methodological framework for developing a domain-specific sentiment dictionary, potentially applicable to other domains in hospitality.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

1 – 10 of 374