Search results

1 – 10 of 122
Article
Publication date: 15 September 2023

Tu Lyu, Xiaorui Lyu, Hao Chen and Qiu Zhao

Based on the dynamic capability theory, our study tries to explore the mediator mechanism of service supply chain dynamic capability between market orientation and service…

Abstract

Purpose

Based on the dynamic capability theory, our study tries to explore the mediator mechanism of service supply chain dynamic capability between market orientation and service innovation performance, as well as the boundary conditions in which service supply chain dynamic capability plays a role, in order to reveal the key elements and their mechanisms for manufacturing enterprises to improve service performance.

Design/methodology/approach

With a total of 317 valid questionnaires, structural equation modeling (SEM) was used to test the research model and hypotheses.

Findings

The empirical results confirm that the three types of service supply chain dynamic capability (environment insight capability, resource integration capability and resource reconfiguration capability) can partially mediate the relationship between firm market orientation (responsive and proactive market orientations) and service innovation performance. In addition, supply chain collaboration has different types of moderator effects on the relationship between the three types of service supply chain dynamic capability and service innovation performance.

Originality/value

This research discovers that market orientation and dynamic capability are the key factors leading to high service performance and reveals the mediating role of service supply chain dynamic capability between market orientation and service innovation performance. Moreover, this research explores the moderating role of supply chain collaboration in service supply chain resource reconfiguration capability and service innovation performance.

Details

Journal of Organizational Change Management, vol. 36 no. 6
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 31 May 2022

Hao Chen, Mengya Liu and Tu Lyu

This study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and…

Abstract

Purpose

This study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and information security policy (ISP) compliance intention and the effects of psychological capital (PsyCap) on relieving SRS and promoting compliance.

Design/methodology/approach

The authors tested a series of hypotheses by applying partial least squares–based structural equation modeling to survey data from 488 employees in Chinese enterprises.

Findings

The results suggest that the relationship between SRS and ISP compliance intention is fully mediated by information security fatigue. Employees’ SRS promotes their information security fatigue, which reduces their intention to follow ISPs. In addition, employees with high PsyCap may experience low levels of SRS and information security fatigue, which promotes their willingness to comply with ISPs.

Originality/value

This study extends knowledge by introducing information security fatigue and PsyCap to the field of information security management, and it calls attention to the effects on information security behaviors of employee emotions and positive psychological resources in an organization. The authors reveal the emotion-based mediating effect of information security fatigue and the positive influence of PsyCap in information security management.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 June 2021

Hao Chen, Wenli Li, Tu Lyu and Xunan Zheng

The rapid development of the Internet in China has profoundly affected the country's charities, which many people support through online donations (e.g. providing financial help…

2075

Abstract

Purpose

The rapid development of the Internet in China has profoundly affected the country's charities, which many people support through online donations (e.g. providing financial help) and charity information forwarding (a new behavior of participating in online charities via social media). However, the development of online charities has been accompanied by many problems, such as donation fraud and fake charity information, which adversely affect social kindness. The purpose of this paper is to understand people's online donation and forwarding behaviors and to explore the mechanisms of such behaviors from the perspectives of cognitive-based trust and emotional-based empathic concern.

Design/methodology/approach

This study developed a research model based on the elaboration likelihood model (ELM) and stimulus–organism–response (SOR) model. The researchers obtained 287 valid samples via a scenario-based experimental survey and conducted partial least squares structural equation modeling (PLS-SEM) to test the model.

Findings

The results indicated that (1) online donation intention is motivated by rational-based trust and emotional-based empathic concern; (2) online charity information forwarding is triggered only when trust is built, and there is no significant correlation between empathic concern and forwarding intention; and (3) content quality, initiator credibility, and platform reputation are three critical paths to promote trust; in addition, an individual's empathic concern can be motivated by the emotional appeal.

Originality/value

This study highlights the different mechanisms of donation and forwarding behaviors and provided theoretical measures for motiving trust and empathic concern in the online context to promote people's participation in online charity.

Details

Industrial Management & Data Systems, vol. 121 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 16 July 2020

Hsien-Cheng Lin, Xiao Han, Tu Lyu, Wen-Hsien Ho, Yunbao Xu, Tien-Chih Hsieh, Lihua Zhu and Liang Zhang

Research in tourism and hospitality industry marketing has identified many highly effective applications of social media. However, studies in the existing literature do not enable…

7228

Abstract

Purpose

Research in tourism and hospitality industry marketing has identified many highly effective applications of social media. However, studies in the existing literature do not enable a comprehensive understanding of this phenomenon because they lack a theoretical foundation. Therefore, this study systematically reviewed the literature from the perspective of the task-technology fit (TTF) theory. The purpose of this paper is to map out what is known about social media use in tourism and hospitality marketing and what areas need further exploration.

Design/methodology/approach

A descriptive cumulative review of the literature obtained 99 articles published in tourism and hospitality journals from 2010 to 2019.

Findings

The analysis suggests that to understand social media use in tourism marketing, researchers and practitioners in the industry must clarify the following four issues: the control variables, longitudinal analyzes and TTF concepts that should be used in future studies; the fitness of social media platforms for tourism marketing; how various social media platforms differ in terms of performance outcome; and the digital divide in the use of social media for tourism.

Originality/value

An integrated framework was developed to identify constructs and to understand their relationships. Recent studies in this domain are discussed; theoretical and practical suggestions and implications for future research are given.

Details

International Journal of Contemporary Hospitality Management, vol. 32 no. 8
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 September 2002

John Driver and Panos Louvieris

A marketing‐centric view of the connected enterprise implies that qualitative information in its systems and general document structures share a marketing‐based vocabulary – we…

Abstract

A marketing‐centric view of the connected enterprise implies that qualitative information in its systems and general document structures share a marketing‐based vocabulary – we propose that this should be founded on POSIT. As any system needs to be accessed and understood by people, the basis of its construction and navigation principles should be transparent even though many component processes will be automated. Based on the use of natural language, a user‐defined glossary stems from a selection of primitives and relationships between them. Semantic mapping employing the reciprocal text‐to‐graphical capability of EXPRESS and EXPRESS G is outlined. The significance of XML and related developments is introduced in the context of qualitative information search and extraction from documents. Consensual language also aids connectivity of intranets and extranets to the Internet.

Details

Qualitative Market Research: An International Journal, vol. 5 no. 3
Type: Research Article
ISSN: 1352-2752

Keywords

Article
Publication date: 14 February 2020

Po-Chien Chang, Ting Wu and Juan Du

The purpose of this study is to examine the dual effects of the violation of psychological contract on patient’s antisocial behaviour via the mediator of patient trust and the…

Abstract

Purpose

The purpose of this study is to examine the dual effects of the violation of psychological contract on patient’s antisocial behaviour via the mediator of patient trust and the role of doctor-patient communication as a critical contingent variable in the psychological contract violation of patient’s antisocial behaviour relationship.

Design/methodology/approach

The data were collected from 483 hospitalized patients distributed in Shanxi province, China by using a self-administered survey.

Findings

The results indicated that psychological contract violation is positively associated with patient antisocial behaviour via patient trust. Moreover, the study found that doctor-patient communication moderates the mediated effects of psychological contract violation on patient’s antisocial behaviour through patient trust; that is, the mediated effect on antisocial behaviour is weaker when both doctor and patients have more communication.

Research limitations/implications

Due to a cross-sectional design in nature, the causal relationship cannot be developed based on the results. Despite the limitation, the present study provides insights for improving doctor-patient relationship by emphasizing the importance of increasing patient trust and doctor-patient communication.

Practical implications

To improve the quality of doctor-patient relationship, this study addresses the significance of properly showing understandings and care to regain mutual trust and reducing the likelihood of patient’s antisocial behaviour.

Social implications

The research findings have implications for both the health system and medical schools in China to reinforce the professional ethics and improve their medical humanities as the main concerns to generate a more sustainable doctor–patient relationship.

Originality/value

This study includes patient trust as a mediator and doctor-patient communication as a moderator to investigate the moderated mediation relationship among patients and medical professionals. By further examining the doctor-patient relationship, the results may not only help improve the efficient implementation of medical practices but also support the institutes and develop medical professionals for more positive doctor-patient relationships.

Details

International Journal of Conflict Management, vol. 31 no. 4
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 2 January 2020

Cass Shum, Kweisi Ausar and Min-Hsuan Tu

Drawing from the appraisal theory, this paper aims to examine the conditions under which abusive leaders experience guilt and suggests that guilt motivates leaders to help…

1097

Abstract

Purpose

Drawing from the appraisal theory, this paper aims to examine the conditions under which abusive leaders experience guilt and suggests that guilt motivates leaders to help followers.

Design/methodology/approach

A scenario study with a sample of 285 hospitality supervisors was used to test the theoretical model. Path analyses were conducted to test the three-way-moderated mediation model.

Findings

Results show a three-way interaction among enacted abuse, managerial abuse and agreeableness on the guilt: leaders are more likely to experience guilt over their enacted abusive supervision when they do not perceive their direct manager as abusive and when they are agreeable. Moreover, guilt mediates the relationship between enacted abuse and a leader’s intention to help their followers.

Research limitations/implications

This study shows that abusive supervisors pay an emotional cost for their enacted abuse (in terms of guilt).

Practical implications

Hospitality organization should assign non-abusive mentors to leaders, especially agreeable ones, to detect and reduce abusive supervision.

Originality/value

First, this study addressed the lack of research on the effect of abusive supervision on the abusers by studying the conditions under which abusive leaders experience guilt. Second, this study shows that because of guilt, abusive leaders have a higher intention to help their followers. It explains why abusive leaders can be helpful.

Details

International Journal of Contemporary Hospitality Management, vol. 32 no. 6
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 23 January 2024

Hao Chen and Yuge Hai

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…

Abstract

Purpose

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for critical influencing factors to discuss the combined influence mechanism of multiple factors on ISM performance (ISMP). This study aims to explore the critical success factors and understand how these factors contribute to ISMP.

Design/methodology/approach

This study used a mixed-method approach to achieve this study’s research goals. In Study 1, the authors conducted a qualitative analysis to take a series of International Organization for Standardization/International Electrotechnical Commission standard documents as the basis to refine the critical factors that may influence organizations’ ISMP. In Study 2, the authors built a research model based on the organizational control perspective and used the survey-based partial least squares-based structural equation modeling (PLS-SEM) approach to understand the relationships between these factors in promoting ISMP. In Study 3, the authors used the fuzzy set qualitative comparative analysis (fsQCA) method to empirically analyze the complex mechanisms of how the combinations of the factors affect ISMP.

Findings

The following three research findings are obtained. First, based on the text-based qualitative analysis, the authors refined the critical success factors that may increase ISMP, including information security policies (ISP), top management support (TMS), alignment (ALI), information security risk assessment (IRA), information security awareness (ISA) and information security culture (ISC). Second, the PLS-SEM testing results confirmed TMS is the antecedent variable motivating organization’s formation (ISP) and information control (ISC) approaches; these two types of organization control approaches increase IRA, ISA and ALI and then promote ISMP directly and indirectly. Third, the fsQCA testing results found two configurations that can achieve high ISMP and one driving path that leads to non-high ISMP.

Originality/value

This study extends knowledge by exploring configuration factors to improve or impede the performances of organizations’ ISM. To the best of the authors’ knowledge, this study is one of the first to explore the use of the fsQCA approach in information security studies, and the results not only revealed causal associations between single factors but also highlighted the critical role of configuration factors in developing organizational ISMP. This study calls attention to information security managers of an organization should highlight the combined effect between the factors and reasonably allocate organizational resources to achieve high ISMP.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 August 2022

Kha-Tu Huynh, Tu-Nga Ly and Thuong Le-Tien

This study aims to solve problems of detecting copy-move images. With input images, the problem aims to: Confirm the original or forgery of the images, evaluate the performance of…

Abstract

Purpose

This study aims to solve problems of detecting copy-move images. With input images, the problem aims to: Confirm the original or forgery of the images, evaluate the performance of the detection and compare the proposed method’s effectiveness to the related ones.

Design/methodology/approach

This paper proposes an algorithm to identify copy-move images by matching the characteristics of objects in the same group. The method is carried out through two stages of grouping the objects and comparing objects’ features. The classification and clustering can improve processing time by skipping groups of only one object, and feature comparison on objects in the same group improves accuracy of the detection. YOLO5, the latest version of you only look once (YOLO) developed by Ultralytics LLC, and K-means are applied to classify and group the objects in the first stage. Then, modified Zernike moments (MZMs) and correlation coefficients are used for the features extraction and matching in the second stage. The Open Images V6 data set is used to train the YOLO5 model. The combination of YOLO5 and MZM makes the effectiveness of the proposed method for copy-move image detection with an average accuracy of 94.26% for images of benchmark and MICC-F600 and 95.37% for natural images. The outstanding feature of the method is that it can balance both processing time and accuracy in detecting duplicate regions on the image.

Findings

The problem is then solved by doing the following steps: Build a method to detect objects and compare their features to find the similarity if they are copy-move objects; use YOLO5 for the object detection and group the same category objects; ignore the group having only one object and extract the features of the other groups by MZMs; detect copy-move regions using K-means clustering; and calculate and compare the detection accuracy of the proposed method and related methods.

Originality/value

The main contributions of this paper include: Reduce the processing time by using YOLO5 in objects detection and K-means in clustering; improve the accuracy by using MZM to extract features and correlation coefficients to matching them; and implement and prove the effectiveness of the proposed method for three copy-move data sets: benchmark, MICC-F600 and author-built images.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of 122