Based on the social capital theory, this article takes the Chinese inland scholars’ co-authorship network in the field of information science as the case, and investigates the influence of periphery authors’ network embeddedness on research impact by applying Poisson regression model. The empirical results indicate that: (1) Degree centrality positively affect the net citations, (2) an inverted U-shaped relationship exists between the degree centrality and the net citations, which confirms the existence of the optimal collaboration size, and (3) structural hole positively affect the net citations.
An Integrated Approach to Studying Multiplexity in Entrepreneurial NetworksIan McCarthy
Multiplexity occurs in entrepreneurial networks when flows interact within and across relationships. It defines how these networks function and evolve and cannot be examined by studying network structure or flows separately. Despite the growing recognition of the importance of multiplexity, related research has remained limited and lacks an integrated approach to simultaneously examine structure and flows, thus restricting our understanding of entrepreneurial networks. We propose an integrated approach for conducting inductive studies into multiplexity, involving an adaptation of the “business networks” conceptual model, the configuration theory perspective, and the Q-analysis method.
Network relationship is positively correlated with enterprise development and performance, which is an important
basis for studying enterprise development and judging enterprise development situation. In this paper, complex
network theory and methods are used to study enterprise network relationships. Based on graph theory, a graph
model of enterprise network relationships is constructed, and the Laplacian matrix of the graph model is used to
analyze important indicators of network relationships, relationship strength, stability, reciprocity, centrality and other
indicators of numerical analysis methods.
Mining and Analyzing Academic Social NetworksEditor IJCATR
Academics establish relationships by way of various interactions like jointly authoring a research paper or report, jointly
supervising a thesis, working jointly on a project, etc. Some of these relationships are ubiquitous whereas other are hard to keep track
of. Of all types of possible academic and research collaborations, co-authorship is best documented. In this paper we analyze the coauthorship
based academic social networks of computer science engineering departments of Indian Institutes of Technology (IITs) as
evidenced from their research publications produced during 2011 and 2015. We use social network analysis metrics to study the
collaboration networks in four leading IITs. From experimental results it can be concluded that IIT Delhi and IIT Kharagpur have a
close knit collaboration network whereas the collaboration network of IIT Kanpur and IIT Madras is fragmented. However, the
collaboration networks of all the four IITs exhibit similar network properties as expected from any other collaboration network
TOPIC networking portfolio
ACADEMIC LEVEL Undergrad. (yrs 3-4)
DISCIPLINE Business Studies
DOCUMENT TYPE Term paper
SPACING DOUBLE
CITATION STYLE Harvard
Based on social network theory, the article takes the co-patent network of China's mobile phone industry from 2003 to 2017 as the research object. Poisson regression model is used to investigate the impact of network structure embeddedness on innovation output. The empirical research results show that, (1) there exists optimal cooperation size for firms in the co-patent network, that is, moderate degree centrality may mean higher innovation output; (2) occupying more structural hole positions in the co-patent network may increase firms' innovation output; and (3) higher clustering coefficients significantly reduce firms’ innovation output.
An Integrated Approach to Studying Multiplexity in Entrepreneurial NetworksIan McCarthy
Multiplexity occurs in entrepreneurial networks when flows interact within and across relationships. It defines how these networks function and evolve and cannot be examined by studying network structure or flows separately. Despite the growing recognition of the importance of multiplexity, related research has remained limited and lacks an integrated approach to simultaneously examine structure and flows, thus restricting our understanding of entrepreneurial networks. We propose an integrated approach for conducting inductive studies into multiplexity, involving an adaptation of the “business networks” conceptual model, the configuration theory perspective, and the Q-analysis method.
Network relationship is positively correlated with enterprise development and performance, which is an important
basis for studying enterprise development and judging enterprise development situation. In this paper, complex
network theory and methods are used to study enterprise network relationships. Based on graph theory, a graph
model of enterprise network relationships is constructed, and the Laplacian matrix of the graph model is used to
analyze important indicators of network relationships, relationship strength, stability, reciprocity, centrality and other
indicators of numerical analysis methods.
Mining and Analyzing Academic Social NetworksEditor IJCATR
Academics establish relationships by way of various interactions like jointly authoring a research paper or report, jointly
supervising a thesis, working jointly on a project, etc. Some of these relationships are ubiquitous whereas other are hard to keep track
of. Of all types of possible academic and research collaborations, co-authorship is best documented. In this paper we analyze the coauthorship
based academic social networks of computer science engineering departments of Indian Institutes of Technology (IITs) as
evidenced from their research publications produced during 2011 and 2015. We use social network analysis metrics to study the
collaboration networks in four leading IITs. From experimental results it can be concluded that IIT Delhi and IIT Kharagpur have a
close knit collaboration network whereas the collaboration network of IIT Kanpur and IIT Madras is fragmented. However, the
collaboration networks of all the four IITs exhibit similar network properties as expected from any other collaboration network
TOPIC networking portfolio
ACADEMIC LEVEL Undergrad. (yrs 3-4)
DISCIPLINE Business Studies
DOCUMENT TYPE Term paper
SPACING DOUBLE
CITATION STYLE Harvard
Based on social network theory, the article takes the co-patent network of China's mobile phone industry from 2003 to 2017 as the research object. Poisson regression model is used to investigate the impact of network structure embeddedness on innovation output. The empirical research results show that, (1) there exists optimal cooperation size for firms in the co-patent network, that is, moderate degree centrality may mean higher innovation output; (2) occupying more structural hole positions in the co-patent network may increase firms' innovation output; and (3) higher clustering coefficients significantly reduce firms’ innovation output.
Howdy! Check this article with sociology dissertation length sample to understand what length should be. http://dissertationlength.com/sociology-dissertation-length
Look at this annotated bibliography maker sample, that may be useful for you. If you need more information visit https://www.annotatedbibliographymaker.com/vancouver-style-of-writing-bibliography/
Organizational Overlap on Social Networks and its ApplicationsSam Shah
[This work was presented at WWW 2013.]
Online social networks have become important for networking, communication, sharing, and discovery. A considerable challenge these networks face is the fact that an online social network is partially observed because two individuals might know each other, but may not have established a connection on the site. Therefore, link prediction and recommendations are important tasks for any online social network. In this paper, we address the problem of computing edge affinity between two users on a social network, based on the users belonging to organizations such as companies, schools, and online groups. We present experimental insights from social network data on organizational overlap, a novel mathematical model to compute the probability of connection between two peo- ple based on organizational overlap, and experimental validation of this model based on real social network data. We also present novel ways in which the organization overlap model can be applied to link prediction and community detection, which in itself could be useful for recommending entities to follow and generating personalized news feed.
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Team Formation Dynamics and Preferences in Online CoursesGreg Bybee
Published by Milad Eftekhar (Department of Computer Science, University of Toronto), Farnaz Ronaghi (Department of Management, Science and Engineering, Stanford University), and Amin Saberi (Department of Management, Science and Engineering, Stanford University) and sponsored by NovoEd.
Using data from online courses, we study the dynamics of team formation in online environments. In particular, we observe that the teams formed by online students for completing course projects are homogeneous in terms of age, location and education level but diverse in terms of primary skill. Motivated by the data, we propose a coalitional game that captures the teaming preferences of individuals and show that the core of the resulting game is always non- empty. Even though our proof is constructive, it does not always yield a polynomial-time algorithm. We show that it is NP-hard to find a solution in the core in the general case and propose polynomial-time algorithms for natural special cases motivated by observations of online course data.
Algorithms, Measurement, Theory, Team Formation; Online Education; Social Learning; Core of Collaborative Games
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
Jakari Griffith - An Examination of Interracial ContactJakari Griffith
He has a consistent presence in variety of academic conferences worldwide dealing with leadership development and positive employment channelization. Dr. Jakari Griffith believes in all round student development and is quite a popular teacher among his pupils for his highly sociable nature and philanthropic actions
Improving Ranking Web Documents using User’s Feedbacks...............................................................1
Fatemeh Ehsanifar and Hasan Naderi
A Survey on Sparse Representation based Image Restoration ............................................................... 11
Dr. S. Sakthivel and M. Parameswari
Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs
.................................................................................................................................................................... 25
Sajad Bolhasani and Hasan Naderi
A Survey on Prioritization Methodologies to Prioritize Non-Functional Requirements ........................ 32
Saranya. B., Subha. R and Dr. Palaniswami. S.
A Review on Various Visual Cryptography Schemes ................................................................................ 45
Nagesh Soradge and Prof. K. S. Thakare
Web Page Access Prediction based on an Integrated Approach ............................................................. 55
Phyu Thwe
A Survey on Bi-Clustering and its Applications ..................................................................................65
K. Sathish Kumar, M. Ramalingam and Dr. V. Thiagarasu
Pixel Level Image Fusion: A Neuro-Fuzzy Approach ................................................................................ 71
Swathy Nair, Bindu Elias and VPS Naidu
A Comparative Analysis on Visualization of Microarray Gene Expression Data...................................... 87
Poornima. S and Dr. J. Jeba Emilyn
Using these slides, I presented my paper titled "Institutional works in scholarly networks: A rapprochement between agency and structure" at the 2014 Academy of Management annual meeting. In the paper, I attempt to find an answer to the question: how noble ideas emerge in academia?
Howdy! Check this article with sociology dissertation length sample to understand what length should be. http://dissertationlength.com/sociology-dissertation-length
Look at this annotated bibliography maker sample, that may be useful for you. If you need more information visit https://www.annotatedbibliographymaker.com/vancouver-style-of-writing-bibliography/
Organizational Overlap on Social Networks and its ApplicationsSam Shah
[This work was presented at WWW 2013.]
Online social networks have become important for networking, communication, sharing, and discovery. A considerable challenge these networks face is the fact that an online social network is partially observed because two individuals might know each other, but may not have established a connection on the site. Therefore, link prediction and recommendations are important tasks for any online social network. In this paper, we address the problem of computing edge affinity between two users on a social network, based on the users belonging to organizations such as companies, schools, and online groups. We present experimental insights from social network data on organizational overlap, a novel mathematical model to compute the probability of connection between two peo- ple based on organizational overlap, and experimental validation of this model based on real social network data. We also present novel ways in which the organization overlap model can be applied to link prediction and community detection, which in itself could be useful for recommending entities to follow and generating personalized news feed.
Social Network Analysis for Competitive IntelligenceAugust Jackson
How can CI teams apply the concepts of social network analysis to gain insight into the capabilities and plans of their competitors? Presented by Jim Richardson and August Jackson in April 2007 at the Society of Competitive Intelligence Professionals annual conference in New York City.
Team Formation Dynamics and Preferences in Online CoursesGreg Bybee
Published by Milad Eftekhar (Department of Computer Science, University of Toronto), Farnaz Ronaghi (Department of Management, Science and Engineering, Stanford University), and Amin Saberi (Department of Management, Science and Engineering, Stanford University) and sponsored by NovoEd.
Using data from online courses, we study the dynamics of team formation in online environments. In particular, we observe that the teams formed by online students for completing course projects are homogeneous in terms of age, location and education level but diverse in terms of primary skill. Motivated by the data, we propose a coalitional game that captures the teaming preferences of individuals and show that the core of the resulting game is always non- empty. Even though our proof is constructive, it does not always yield a polynomial-time algorithm. We show that it is NP-hard to find a solution in the core in the general case and propose polynomial-time algorithms for natural special cases motivated by observations of online course data.
Algorithms, Measurement, Theory, Team Formation; Online Education; Social Learning; Core of Collaborative Games
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
Jakari Griffith - An Examination of Interracial ContactJakari Griffith
He has a consistent presence in variety of academic conferences worldwide dealing with leadership development and positive employment channelization. Dr. Jakari Griffith believes in all round student development and is quite a popular teacher among his pupils for his highly sociable nature and philanthropic actions
Improving Ranking Web Documents using User’s Feedbacks...............................................................1
Fatemeh Ehsanifar and Hasan Naderi
A Survey on Sparse Representation based Image Restoration ............................................................... 11
Dr. S. Sakthivel and M. Parameswari
Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs
.................................................................................................................................................................... 25
Sajad Bolhasani and Hasan Naderi
A Survey on Prioritization Methodologies to Prioritize Non-Functional Requirements ........................ 32
Saranya. B., Subha. R and Dr. Palaniswami. S.
A Review on Various Visual Cryptography Schemes ................................................................................ 45
Nagesh Soradge and Prof. K. S. Thakare
Web Page Access Prediction based on an Integrated Approach ............................................................. 55
Phyu Thwe
A Survey on Bi-Clustering and its Applications ..................................................................................65
K. Sathish Kumar, M. Ramalingam and Dr. V. Thiagarasu
Pixel Level Image Fusion: A Neuro-Fuzzy Approach ................................................................................ 71
Swathy Nair, Bindu Elias and VPS Naidu
A Comparative Analysis on Visualization of Microarray Gene Expression Data...................................... 87
Poornima. S and Dr. J. Jeba Emilyn
Using these slides, I presented my paper titled "Institutional works in scholarly networks: A rapprochement between agency and structure" at the 2014 Academy of Management annual meeting. In the paper, I attempt to find an answer to the question: how noble ideas emerge in academia?
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The possibility of modeling and abstracting interaction has been the key driver in social network-based
research as it facilitates, among other things, the generation of recommendations which is vital for most
businesses. Being ubiquitous, learning activities also facilitate the formation of these networks. Thus, to
gain insights into the evolution of activities and interactions that occur during learning events, it is
important to understand these networks and their respective models. In this article, we present a survey of
the representative methods employed in modeling various interactions observed in learner-centered
networks. Finally, we comparatively analyze the respective models and identify which models perform
better in respective cases.
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...COINs2010
COLLABORATIVE INNOVATION NETWORKS, VIRTUAL COMMUNITIES AND
GEOGRAPHICAL CLUSTERING
M. De Maggio, P. A. Gloor, G. Passiante
Abstract
This paper describes the emergence of Collaborative Knowledge Networks (CKNs), distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale.
CKNs are made up of groups of self-motivated individuals, linked by the idea of something new and exciting, and by the common goal of
improving existing business practices, new products or services for which they see a real need. Their strength is related to their ability to activate
creative collaboration, knowledge sharing and social networking mechanisms, affecting positively individual capabilities and organizations’
performance.
We describe the case of a Global Consulting Community to highlight the cultural and structural aspects of this phenomenon. Our case study also
illustrates the composition of the CKN ecosystem, which are made up by a combination of Collaborative Innovation, Learning and Interest Networks.
Empirical evidence suggests physical proximity as a supporting success factor of such communities, depending on the capital and knowledge intensity of the target industry.
Do hierarchical positions influence participant’s network behaviour within C...Martin Rehm
We investigate whether hierarchical positions have an impact on collaborative learning processes within
Communities of Learning(CoL). More specifically, we provide empirical evidence from a training program
of a global organization. Using social network analysis, our findings indicate that hierarchical positions
significantly influence participants’ network behaviour. Moreover, our results show that individuals tend to
gather information from outside of their own hierarchical position.
Impact of informal networks on knowledge management strategy critique re...Adib Chehade
The aim of critique review was to search the gaps and limitations of the paper. The paper
reviewed is Impact of informal networks on knowledge management strategy. This paper has
been written by Jewel and Underwood and published in 2005 in a book of Montano as a chapter.
Two limitations have been identified (only two organizations have been considered and only 28
people have gathered the responses). However, the findings of chosen paper got full support
from prior and new literature, and it has been concluded that the findings can be applied to all
organizations. It has been suggested that more efforts have been done by taking multiple
organizations from different industries in order to make worthwhile conclusion.
Operation Management Strategies 1
LITERATURE REVIEW 7
Literature Reviewin Operation Management Strategies
Qualitative cases in operation management
The study inspects the condition of subjective research endeavors in operation administration. Five fundamental operation administration diaries are incorporated for their effect on the field. The subjective detailed analyzes picked were distributed somewhere around 1993 and 2008. With an expanding pattern to utilizing more subjective research endeavors, there have been significant and huge commitments to the operation administration department, particularly in the territory of hypothesis building.
In a significant number of the subjective detailed analyzes they explored, sufficient points of interest in research outline, information accumulation, and information investigation were absent. For example, there are studies that don't offer examining rationale or a portrayal of the investigation through which research draws results. Further, researches conventions for doing inductive detailed analyze are much better created contrasted with the research conventions for doing deductive careful investigations. Thusly, there is an absence of reliability in how the case technique has been connected. As subjective researchers, they offer recommendations on how we can enhance what have been done and raise the level of thoroughness and consistency (Mei, 2011).
Buyer perceptions of supply disruption risk
Scott argues that as supply chains get to be more minds boggling, firms face expanding dangers of supply interruptions. The process through which purchasers settle on decisions notwithstanding these dangers, nonetheless, has not been investigated. In spite of research highlighting the criticalness of behavioral methodologies to risk, there is restricted research that applies these perspectives of danger in the supply chain writing. This paper addresses this crevice by drawing on behavioral danger hypothesis to examine the causal connections among circumstance, representations of danger, and choice making inside the buying area.
They investigate the relationship between greatness of supply disturbance, likelihood of supply interruption, and general supply disturbance risk. Furthermore, they attract on trade hypotheses to distinguish item and business sector figures that effect purchasers' impression of the likelihood and extent of supply interruption. At last, they take a gander at how representations of danger influence the choice to look for options wellsprings of supply. The model was tested utilizing information gathered from 223 obtaining administrators and purchasers of immediate materials. The results demonstrate that both the likelihood and the size of supply disturbance are paramount to purchasers' general view of supply interruption risk (Ellis, 2010).
Examining supply chain relationships
Gilbert finds out that firm.
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING ijcsit
This study examines the individuals’ participation intentions and behaviour on Social Networking Sites (SNSs). For this purpose, the Technology Acceptance Model (TAM) is utilized and extended in this study through the addition of “perceived social capital” construct aiming to increase its explanatory power and predictive ability in this context. Data collected from a survey of 1100 participants and distilled to 657 usable sets has been analysed to assess the predictive power of proposed model via structural equation modelling. The model proposed in this study explains 56% of the variance in “Participation Intentions” and 55% of the variance in “Participation Behaviour”. Participation of behavioural intention in the model’
explanatory power was the highest amongst the constructs (able to explain 28% of usage behaviour).While, “Attitude” explain around 11% of SNSs usage behaviour. The study findings also show that “Perceived Social Capital” construct has a notable impact on usage behaviour, this impact came indirectly through its direct effect on “Attitude” and “Perceived Usefulness”. Participation of “Perceived Social Capital” in the models' explanatory power was the third highest amongst the constructs. “Perceived Social Capital”, alone explain around 9% of SNSs usage behaviour.
Running head: LITERATURE REVIEW 1
Running head: LITERATURE REVIEW 17
LITERATURE REVIEW
Student’s Name:
Instructor’s name:
Affiliation:
Course:
Date:
CRITIQUE: WHO GETS THE CARROT AND WHO GETS THE STICK?
In this qualitative article, the researchers studied the gap in gender pay in leadership positions in the globe today. The purpose of the research was to find out whether there existed any parity in the payment and company performances of male and female employees in managerial positions. The researchers conducted a thorough literature review in which the following subject categories were studied: the existence of a pay gap between males and females in top executive positions, how managerial compensation packages are structured and their effect on company performance.
This category encompassed prior research studies on women and paid, from previous research articles such as from The Wall Street Journal and The Equal opportunities commission of 1999. They also studied the effect of work performance on pay, founded on the agency theory by Eisenhardt. The romance of leadership was also studied from several sources including over thirty thousand research articles belonging to thirty-four different companies. From the literature review, the researchers developed a designed a study to establish the relationship between pay and company performance, in a real setting of an organization and using companies’ archived economic data. The hypothesis formulated included: there is a variation in the allocation of bonuses, where male executive directors get higher bonuses than the female ones and that there is a variation in the sensitivity of directors ‘bonuses to company performance, where female bonuses are less sensitive than male ones (Kulich, 306).
The population studied encompassed directors in just a sample of the United Kingdom listed firms. The researchers were particularly concerned with the industrial affiliations, the stock market data and the accounting data when either a male or a female director was on board. This made a total of ninety-six paired managing directors. The researchers examined various compensation measures, performance measures and set up various controls to standardize the data. Data analysis was done by use of univariate nonparametric Wilcoxon method because many of the employees used in the study had not received any bonuses in that year of the study. The hypotheses were then tested on Tobit’s regression framework. The results of the study supported both hypotheses strongly. They show that there indeed exists a gender pay gap between males and females since female directors earn averagely nineteen percent less than their male counterparts. There is also evidence of little sensitivity in company performance of women directors’ pay compared to male one.
IT Structure & Firm Interdependency - Relational RentsPaul Di Gangi
Di Gangi, P. M. and Bush, A. (2008) The impact of IT structure and firm interdependency on relational rents in innovation collaboration networks. Proceedings of the 14th Americas Conference on Information Systems.
Similar to Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars (20)
The purpose of this study is to analyze empirically by using secondary data on the possibility of corporate fraud by using various fraud theory approach. The research model in this study was tested using the ordinary least square (OLS) analysis method. A total of 310 company data were collected which consisted of financial data and other supporting data published by companies listed on the Indonesia Stock Exchange in the range of 2012 to 2017. This study provides empirical evidence that all the variant of fraud theory (fraud triangle theory, fraud diamond theory and fraud pentagon theory) can be investigated for its significant effect on corporate fraud by only using secondary data that are available and freely accessed by the public. The empirically tested research model in this study can provide a comprehensive understanding of practitioners, academics, government agencies and the general public in analyzing the topic of corporate fraud.
Traditional markets in Indonesia were created so that people from all walks of life can fulfill their needs, especially staple food products, without having to spend a lot of money. However, the prices of food products in different markets vary depending on the consumers of the particular market. The aims of this article were to compare the price difference of staple food products in several traditional markets and to find out the factors that cause the price difference. The data were collected by carrying out a survey to five traditional markets around Jakarta regarding the prices of ten staple food products. The data were analyzed quantitatively using statistical calculation ANOVA from SPSS version 22, and also qualitatively to discuss several factors underlying the price differences. Results revealed that price differences of staple food products were not only caused by market location, but other factors such as pricing strategy and consumer specification. This research implied that traditional markets were still chosen by Indonesian consumers to fulfill their needs because of the competitive price.
Airport enterprise innovation performance is a crucial issue that planners, decision makers and managers should focus in order to drive the airport enterprise performance towards sustainable development. The strategic infrastructure needs, and investments need to include improvements across all major factors that affect the innovation dimension of sustainable development.
Key objective of the paper is to highlight the challenges in airport enterprise management towards sustainable development in terms of innovation improvement. A performance evaluation towards innovation and sustainable development framework is adopted and a case study application highlights the crucial role of airport enterprise management performance innovation dimension towards sustainable development. Conventional wisdom is to stimulate the interest on topic and promote a framework addressing to evaluate airport enterprise management performance towards innovation and sustainable development.
In the business world, companies need high performance. Performance is the result or overall success rate of a person over a period of time in carrying out tasks compared to various possibilities, such as predetermined standards of work, targets, or criteria. The purpose of the study was to analyze the influence of intellectual intelligence, emotional intelligence, and spiritual intelligence on employee performance. The population in this study were 63 employees of PT PLN (Persero). This study uses quantitative associative, with data analysis used is multiple linear regression analysis. The results showed that both intellectual intelligence, emotional intelligence, and spiritual intelligence had a positive and significant effect on employee performance. Intellectual intelligence has the greatest influence on employee performance, followed by spiritual intelligence and emotional intelligence. Intellectual intelligence, emotional intelligence and spiritual intelligence together have an effect of 52.4% on employee performance, and the remaining 47.6% is influenced by other factors not explained in this study.
The main purpose of the research study is to analyze the effect of organizational commitment, job satisfaction and work insecurity as well as their impact on the performance of Bank Aceh Syariah. The samples of the research are 209 employees which are selected with survey methods. Data was collected by using questionnaire, and then the data was analyzed with statistical methods of structural equation model (SEM). The study found that the organizational commitment and job satisfaction have a negative effect on turnover intention, but positive effect on the performance of Bank Aceh Syariah. The work insecurity has a positive effect on turnover intention, but negatif effect on the performance of the bank.
This study aims to test the effect of employee engagement and organization trust on organization citizenship behaviour and its impact on organization Effectiveness. The object of this research is the government organization of Pidie Jaya with Echelon IV Officers as a respondent. The number of sample is determined by using proportional sampling technique and Slovin equation, and it provides 171 respondents. Data is analyzed using the path analysis with the SPSS program assistance. The findings describes that employee engagement, organization trust, organization citizenship behaviour and organization Effectiveness have been going well. For the verification test of direct effect provides: employee engagement effects organization citizenship behaviour; organization trust effects organization citizenship behaviour significantly; employee engagement effects organization Effectiveness significantly; organization trust effects organization effectiveness significantly, and; organization citizenship behaviour effects organization Effectiveness significantly. These all findings prove that the previous theories are still applicable, and these also apply in Government organization of Pidie Jaya District. The originality of this research is in its novelty in term of the object, time, and statistic approach. This result contributes to academic and research area in order to develop the next model and method. For the practical, this has verified that the variables in this research need more attention from the managers especially in organization related.
This paper is an analysis on the impact machine learning, Artificial Intelligence, and robotics has on the supply chain management. The analysis covers the basis of AI in the SCM mechanisms while defining it from the ground up. Later on, to shed a true light on supply first the paper zooms in on the effects of machines in marketing. From what particular methodologies are deployed in today’s environment extending all the way to its anticipated outcomes. As the reader progresses he/she will find valuable studies on the main segments of machine learning within the supply chain itself. Certain novelties and innovations are scrutinized regarding SCM alongside these studies. These innovations are exemplified by certain cases presented in Part 3. The penultimate section briefly examines the possible drawbacks of the surge in machine application in SCM. The final section compiles the ideas presented in the paper as a whole and gives a glimpse of an estimate for the near future.
Huang (2018) decomposes the differences in quantile portfolio returns using distribution regression. The main issue of using distribution regression is that the decomposition results are path dependent. In this paper, we are able to obtain path independent decomposition results by combining the Oaxaca-Blinder decomposition and the recentered influence function regression method. We show that aggregate composition effects are all positive across quantiles and the market factor is the most significant factor which has detailed composition effect monotonically decreasing with quantiles. The main decomposition results are consistent with Huang (2018)
In Kenya, the newly promulgated constitution of 2010 (CoK, 2010), provides the basis of monitoring and evaluation as an important tool for operationalizing National and County Government projects to ensure projects success, integrity, transparency and accountability. The county governments are responsible for delivering basic services in collaboration with other agencies and partners to enhance quality of life: however, the county government projects has been marred by lack of integrity, transparency, accountability and litany of other monitoring and evaluation weakness which has undermined the impacts and success of projects including Regional Economic Blocs. Lake Region Economic Bloc (LREB) which comprised of fourteen counties bordering Lake Victoria Basin is not sparred either. The study was conducted in six LREB Counties namely, Migori, Homabay, Kisumu, Siaya, Kakamega and Vihiga chosen in a random manner. This study specifically assessed the effectiveness of Monitoring and Evaluation methods on the Performance of County Governments Projects. The study was guided by the theory of change. The research was carried out using descriptive survey design which entails both qualitative and quantitative data collection procedures. The researcher used stratified random sampling techniques to draw a sample from the study population. The qualitative method focused on group discussion and in-depth interviews. The quantitative techniques employed questionnaires to 398 purposively selected subjects from the county projects. Data collection was from two main sources; primary and secondary. Secondary sources included relevant county documents, constitution, legislations, policy documents and reports among others. The Study employed questionnaires, Focus group discussion and Interview guide as its primary data collection method. Statistical Package for Social Science (SPSS) version 18.0 was used for analysis. Data was analyzed using descriptive and inferential statistics techniques and presented in tables and figures. The study findings indicated thatM&E methods, indicated by the coefficient of effectiveness (R2) which is also evidenced by F change 109.403>p-values (0.05). This implies that this variableis significant (since the p values<0.05) and therefore should be considered as part of effectiveness of M&E systems on the performance of County Governments projects. The study concludes that there are no effective and adequate projects monitoring and evaluation methods in place for County Government Projects, which can facilitate the achievement of desired projects performance and outcomes. The study recommends that the County Government should develop a clear M&E methods for each project with clear data collection, analysis, reporting and implementation methods. This Study recommends further research to be conducted in the other Regional County Economic Blocs.
Regardless of where the Igbo man is, within or without the Igbo regions, trust is one of the foremost vital tool in business dealings and negotiations. This study aims at revealing the kind of trust apparent, and unique to the Igbo-men in business, how the Igbo-men build trust in their business, the antecedents of trust building in Igbo land, and the impacts of those trust in business dealings and negotiation. Through the process of content data analysis, results were drawn from a percentage margin of answers and feedbacks generated from real life experiences and discussions from unstructured interview from selected Igbo-men across the five states of the south-east region of Nigeria, which shows that 70% percentage of the Igbos practice the affective based trust in business dealings and negotiations, while 18% percentage practice cognitive based trust, 7% engages in both affective and cognitive based trust, and the remaining 5% are undecided.
This study is directed to determine the role of government treasurer in state university in tax compliance. With the spirit of the state apparatus, especially the Civil Servant, in reporting the taxes, it is expected to become a continuously growing and infectious snowball to the taxpayers to report their taxes correctly, completely and clearly as well as to avoid administrative sanctions that are subject to such non-compliance. This study method used is qualitative, the source of this study is government treasurer. The use of this qualitative approach is based on the concept of natural setting, grounded theory, descriptive, more concerned with the process than the outcome, temporary design, and research results are negotiated and agreed upon. The results show that treasurers have a big role in tax compliance, but however, there are still many obstacles that must be faced in fulfilling their financial obligations. this research was conducted only in one state university, so that data that could be processed was very limited.
The corporate governance is a popular topic within two last decade, and the emerging economies are practicing &enhancing their performances. The review is conducted to assess the effectiveness of the corporate governance implications on firm’s performances. The study followed the deductive approach and the journal articles, and the reports have used the source of the review. As per the literature findings, the researcher developed a conceptual design for the case review. The independent variable is the corporate governance mechanism, and the dependent variable is organizations performances. Both independent and dependent variables comprise the different type of corporate governance practice and the different function of the organizational performances. The review found that all the types of corporate governance practices are influenced to the organizational performance and the better corporate governance mechanism can enhance all type of performances.
Innovative work behavior is likely to be an important need for the increasing performance of the hospital to provide the health public services. Theoretically and empirically, the behaviors be related to employee perception on management support, information technology and employee empowerment. The study aims to determine the effect of management supports and information technology on employee empowerment as well as their impact on the innovative work behaviors of the employee of dr. Zainoel Abidin District Hospital Banda Aceh. The study conducted of 302 employees of the hospital. The data collected by questionnaire and then the data is analyzed by statistical means of structural equation model (SEM). The study found that management support and information technology have a positive and significant effect on the employee empowerment and innovative work behavior. The employee empowerment mediates the effect of management supports and information technology on the innovative work behavior.
This research deals with an insight and analysis of the economy projectification in a smaller country, here represented by Croatia. The study was inspired by similar research conducted in Germany, Island and Norway and it is based on similar but partly adapted methodology. The objective of this study is to measure level of economy projectification in a smaller country, and to provide relevant data related for the level of project work. The random sample of 250 companies, from both public and private sectors, was selected across nine sectors of the economy. A stratified random sampling was drawn and interviews were conducted via telephone, so as on-line survey. While analysing collected data and considering the objectives of this paper, only basic statistical analyses were applied for calculating averages and mean values. This study confirmed that projectification trends and figures in a smaller country are similar to those in larger or developed countries. During the period of last five years, the projectification level of the Croatian economy was increased from 27% (in 2013.) to33% (in 2018.). The results show significant difference in projectification among the different sectors of economy, so as changes and trends over the recent time period.
This paper is designed to show how integrated process planning and cross employee planning can be a vital part to any business operation. It will also uncover how different integrated processes and employee relations will help a business to grow. Various topics ranging from enterprise resource planning, integrated planning in supply chains, the non-linear approach, innovation and digitalization coupled with cross training and empowerment, Human resources, and Manager Employee relations complement each other and could bring an organization together. Various thought processes and intellectual reasoning skills were instrumental in all consideration of this project. Many antiquated processes were changed over the years to update operations in the business world where conventional means were not effective. Integrating product planning and employee planning optimized operations both in the product and service industry and I will accent many of these optimizations. With recent technological advances and human relations tactics, project management and organization has been streamlined and works more productively than its predecessors. Regardless of the industry, integrated process planning, and cross employee planning could possible turn a dinosaur into a competitive part of the economy.
One of the problems in big cities are transportation.They solve this problem by providing mass transportation such bus or train. People use this facility to travel between surrounding cities or within the city. Jakarta recently has a new public transportation called TransJakarta which serving people travelingfrom nearby cities and in the city.In order to move or doing business between places people in Jakarta use TransJakarta This research aims to analyse ticket price, service quality and customer value toward customer satisfaction. We conducted a research by using questionnaires given to thepassangers and developed a model using a multiple regression to process the result from questionnaires. Samples were taken from The number of sample for this reseach was 130 customers taken from one bus stop which passengers traveled from BSD City to Grogol and Slipi. The results from partial testing showed that customer value andservice quality have effect on customer satisfaction while ticket price does not have effect on customer satisfaction.
This study aims to examine the mediating effect of Trust in the relationship between Perceived Website Quality (PWQual), eWOM, and Perceived Benefits on Consumer Attitudes Toward Online Shopping in Indonesia. The sample in this research are online shopping consumers in Indonesia there 118 respondents. The design research used a survey model purposive sampling method as a sampling technique. The data analyze in this research used Structural Equation Modeling (SEM) as an analysis technique with AMOS as analysis tools. This research shows that : Perceived Website Quality has a significant effect on Perceived Benefits and Trust, Perceived Benefits and Trust has a significant effect on Consumer Attitudes Toward Online Shopping, Perceived Website Quality has a significant effect on Consumer Attitudes Toward Online Shopping through Trust
Dairying is one of the livestock productions practiced almost all over Ethiopia, involving a vast number of small, medium, or large-sized, subsistence or market-oriented farms. However, the structure and performance of dairy sectors and its products marketing both for domestic consumption and for export is generally perceived poor in Ethiopia due to different challenges. These challenges vary across different production system to another and/or from one location to another. Among other challenges seasonality of production, spoilage (lack of milk collecting facilities), poor animal health and management, inadequate supply of quality feed, low productivity and genetics ,quality problem, weak vertical integration, absence processing plant, inadequate permanent trade routes and other facilities like feeds, water, holding grounds, lack or non-provision of transport, lack of access to land, ineffectiveness and inadequate infrastructural and institutional set-ups, prevalence of diseases, lack of credit and inadequate market information are dominant in Ethiopia. Therefore, market infrastructure facilities, producers cooperative, feed quality and quantity provision system need to be strengthen for effective dairy value chain development.
This research paper examines customer intention to reorder in respect to delivery service and product satisfaction. Our research model includes delivery service, satisfaction and reorder intention. Satisfaction in this research model work as mediating variable. A survey method was adopted to collect data, collected data were analysis using SPSS to see the correlation between variables. A significant relationship was found between delivery service and reorder intention as well as moderating role was also note with satisfaction and reorder intention.
This paper examines the impact of internet use on student performance. In this cross-sectional study, one hundred twenty survey responses were collected from plus two-level students from BirendranagarSurkhet. The respondents were selected from class 11 and 12 students randomly. Frequency of internet use, location of internet use, cooperation from teachers for internet learning and peer group influence on internet use for academic purpose has been analyzed with their academic performance.one sample t test was used to analyze the data. The finding concludes all these variables have positive impact if the student use internet for learning process. Similarly, the analysis shows that the student who used internet at home for learning purpose has found highest academic achievement.
More from The International Journal of Business Management and Technology (20)
Financial Assets: Debit vs Equity Securities.pptxWrito-Finance
financial assets represent claim for future benefit or cash. Financial assets are formed by establishing contracts between participants. These financial assets are used for collection of huge amounts of money for business purposes.
Two major Types: Debt Securities and Equity Securities.
Debt Securities are Also known as fixed-income securities or instruments. The type of assets is formed by establishing contracts between investor and issuer of the asset.
• The first type of Debit securities is BONDS. Bonds are issued by corporations and government (both local and national government).
• The second important type of Debit security is NOTES. Apart from similarities associated with notes and bonds, notes have shorter term maturity.
• The 3rd important type of Debit security is TRESURY BILLS. These securities have short-term ranging from three months, six months, and one year. Issuer of such securities are governments.
• Above discussed debit securities are mostly issued by governments and corporations. CERTIFICATE OF DEPOSITS CDs are issued by Banks and Financial Institutions. Risk factor associated with CDs gets reduced when issued by reputable institutions or Banks.
Following are the risk attached with debt securities: Credit risk, interest rate risk and currency risk
There are no fixed maturity dates in such securities, and asset’s value is determined by company’s performance. There are two major types of equity securities: common stock and preferred stock.
Common Stock: These are simple equity securities and bear no complexities which the preferred stock bears. Holders of such securities or instrument have the voting rights when it comes to select the company’s board of director or the business decisions to be made.
Preferred Stock: Preferred stocks are sometime referred to as hybrid securities, because it contains elements of both debit security and equity security. Preferred stock confers ownership rights to security holder that is why it is equity instrument
<a href="https://www.writofinance.com/equity-securities-features-types-risk/" >Equity securities </a> as a whole is used for capital funding for companies. Companies have multiple expenses to cover. Potential growth of company is required in competitive market. So, these securities are used for capital generation, and then uses it for company’s growth.
Concluding remarks
Both are employed in business. Businesses are often established through debit securities, then what is the need for equity securities. Companies have to cover multiple expenses and expansion of business. They can also use equity instruments for repayment of debits. So, there are multiple uses for securities. As an investor, you need tools for analysis. Investment decisions are made by carefully analyzing the market. For better analysis of the stock market, investors often employ financial analysis of companies.
Introduction to Indian Financial System ()Avanish Goel
The financial system of a country is an important tool for economic development of the country, as it helps in creation of wealth by linking savings with investments.
It facilitates the flow of funds form the households (savers) to business firms (investors) to aid in wealth creation and development of both the parties
how can i use my minded pi coins I need some funds.DOT TECH
If you are interested in selling your pi coins, i have a verified pi merchant, who buys pi coins and resell them to exchanges looking forward to hold till mainnet launch.
Because the core team has announced that pi network will not be doing any pre-sale. The only way exchanges like huobi, bitmart and hotbit can get pi is by buying from miners.
Now a merchant stands in between these exchanges and the miners. As a link to make transactions smooth. Because right now in the enclosed mainnet you can't sell pi coins your self. You need the help of a merchant,
i will leave the telegram contact of my personal pi merchant below. 👇 I and my friends has traded more than 3000pi coins with him successfully.
@Pi_vendor_247
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
what is the best method to sell pi coins in 2024DOT TECH
The best way to sell your pi coins safely is trading with an exchange..but since pi is not launched in any exchange, and second option is through a VERIFIED pi merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and pioneers and resell them to Investors looking forward to hold massive amounts before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade pi coins with.
@Pi_vendor_247
The secret way to sell pi coins effortlessly.DOT TECH
Well as we all know pi isn't launched yet. But you can still sell your pi coins effortlessly because some whales in China are interested in holding massive pi coins. And they are willing to pay good money for it. If you are interested in selling I will leave a contact for you. Just telegram this number below. I sold about 3000 pi coins to him and he paid me immediately.
Telegram: @Pi_vendor_247
What website can I sell pi coins securely.DOT TECH
Currently there are no website or exchange that allow buying or selling of pi coins..
But you can still easily sell pi coins, by reselling it to exchanges/crypto whales interested in holding thousands of pi coins before the mainnet launch.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and resell to these crypto whales and holders of pi..
This is because pi network is not doing any pre-sale. The only way exchanges can get pi is by buying from miners and pi merchants stands in between the miners and the exchanges.
How can I sell my pi coins?
Selling pi coins is really easy, but first you need to migrate to mainnet wallet before you can do that. I will leave the telegram contact of my personal pi merchant to trade with.
Tele-gram.
@Pi_vendor_247
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
If you are looking for a pi coin investor. Then look no further because I have the right one he is a pi vendor (he buy and resell to whales in China). I met him on a crypto conference and ever since I and my friends have sold more than 10k pi coins to him And he bought all and still want more. I will drop his telegram handle below just send him a message.
@Pi_vendor_247
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Vighnesh Shashtri
In India, financial inclusion remains a critical challenge, with a significant portion of the population still unbanked. Non-Banking Financial Companies (NBFCs) have emerged as key players in bridging this gap by providing financial services to those often overlooked by traditional banking institutions. This article delves into how NBFCs are fostering financial inclusion and empowering the unbanked.
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...beulahfernandes8
Role in Financial System
NBFCs are critical in bridging the financial inclusion gap.
They provide specialized financial services that cater to segments often neglected by traditional banks.
Economic Impact
NBFCs contribute significantly to India's GDP.
They support sectors like micro, small, and medium enterprises (MSMEs), housing finance, and personal loans.
USDA Loans in California: A Comprehensive Overview.pptxmarketing367770
USDA Loans in California: A Comprehensive Overview
If you're dreaming of owning a home in California's rural or suburban areas, a USDA loan might be the perfect solution. The U.S. Department of Agriculture (USDA) offers these loans to help low-to-moderate-income individuals and families achieve homeownership.
Key Features of USDA Loans:
Zero Down Payment: USDA loans require no down payment, making homeownership more accessible.
Competitive Interest Rates: These loans often come with lower interest rates compared to conventional loans.
Flexible Credit Requirements: USDA loans have more lenient credit score requirements, helping those with less-than-perfect credit.
Guaranteed Loan Program: The USDA guarantees a portion of the loan, reducing risk for lenders and expanding borrowing options.
Eligibility Criteria:
Location: The property must be located in a USDA-designated rural or suburban area. Many areas in California qualify.
Income Limits: Applicants must meet income guidelines, which vary by region and household size.
Primary Residence: The home must be used as the borrower's primary residence.
Application Process:
Find a USDA-Approved Lender: Not all lenders offer USDA loans, so it's essential to choose one approved by the USDA.
Pre-Qualification: Determine your eligibility and the amount you can borrow.
Property Search: Look for properties in eligible rural or suburban areas.
Loan Application: Submit your application, including financial and personal information.
Processing and Approval: The lender and USDA will review your application. If approved, you can proceed to closing.
USDA loans are an excellent option for those looking to buy a home in California's rural and suburban areas. With no down payment and flexible requirements, these loans make homeownership more attainable for many families. Explore your eligibility today and take the first step toward owning your dream home.
Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars
1. www.theijbmt.com 17|Page
The International Journal of Business Management and Technology, Volume 2 Issue 2 March 2018
ISSN: 2581-3889
Research Article Open Access
Periphery authors, network embeddedness, and research
impact: The case of Chinese inland scholars
*Zhi-hong Song, **Shuya Wang, ***Dong-mei Lee
*Institute of Management and Decision, Shanxi University
PO box 030006, No.92 Wucheng Road, Taiyuan City, Shanxi Province, P.R.China
**School of Economics and Management, Shanxi University
PO box 030006, No.92 Wucheng Road, Taiyuan City, Shanxi Province, P.R.China
***School of Mathematical Sciences, Shanxi University
PO box 030006, No.92 Wucheng Road, Taiyuan City, Shanxi Province, P.R.China
Abstract: Based on the social capital theory, this article takes the Chinese inland scholars’ co-authorship network in the
field of information science as the case, and investigates the influence of periphery authors’ network embeddedness on
research impact by applying Poisson regression model. The empirical results indicate that: (1) Degree centrality
positively affect the net citations, (2) an inverted U-shaped relationship exists between the degree centrality and the net
citations, which confirms the existence of the optimal collaboration size, and (3) structural hole positively affect the net
citations.
Key words: Periphery authors; Network embeddedness; Research impact; Co-authorship network; Chinese inland
scholars
JEL Class:M19
I. Introduction
In recent years, scientific collaborations among scholars have become a popular phenomenon. Extensive studies
indicate that collaboration is beneficial for scholars, which may not only expand research areas, but also can provide
complementary equipments and skills. In addition, scientific collaboration can make the best use of time and avoid
competition. Regarding the impact of scientific collaboration on research output, Olmeda et al.(2009) investigate the
scientific collaborations in Spain universities with social network analysis, and find that collaborations among Spain
university is characterized by geographical imbalance. Abbasi et al.(2007) comparing three measures in social network
analysis, which include degree centrality, betweenness centrality, and closeness centrality, and confirms the mediating
role of betweenness for finding new partners. As for network embeddedness, Kim(2014) investigate the roles of
structural embeddedness and relational embeddedness on supplier performance, and find that structural embeddedness
may improve the operational performance, but cannot improve the financial performance. Packard (2015) investigate the
impact of positional embeddedness and structural embeddedness on the success of actors, and find that positional
embeddedness is more valuable for actors and structural embeddedness is more important for entire staff.
Although extant studies provides important perspectives for understanding the relationship between scientific
collaboration and research output, most studies still focus on the impact of structural characteristics of collaboration on
research output. In addition, studies on network embeddedness are also focusing on business areas. Therefore, there is
still limited understanding on the impact of network embeddedness on research output.
This article tries to fill the gap by using social capital theory and investigate the impact of network embeddedness on
research output. Specifically, this paper takes the Chinese inland scholars’ co-authorship network in the field of
information science as the case, and investigates the impact of peripheral authors’ network embeddedness on research
impact by applying Poisson regression model.
2. www.theijbmt.com 18|Page
Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars
II. Theoretical background
Social capital refers to the characteristics of social organization, such as trust and rules, which may improve social
efficiency by coordination between actors (Burt, 2000). Social capital is a symbol of advantage. Society can be seen as a
market, in which actors exchange goods and ideas for individual benefits. The returns depend on the ability of
individual actors. Social capital is a complementary to human capital. Embeddedness in the social network is an asset,
which may provide the specific actor with better channels for accessing information (Burt, 2000).
Social capital includes inter-personal relationship and those resources embedded in the relationships (McFadyen,
2004). An actor may access and employ the resources embedded in the relationships through interaction. Embeddedness
is decisive for an actor to access social resources. In extant literature, two theories co-exist. One form of theory argue that
closure in the network is beneficial, which may provide actors with mutual trust and efficient coordination. Other form
of theory argue that open network involves large amount of structural holes, which may provide bridges for connecting
isolated groups and accessing new information and resources(Gonzalez,2013). However, the above two theory are not
conflict in essence. Burt(2000) argue that structural hole is a form of social capital, which may not imply that closure in
the network is not a form of social capital. An actor occupy the structural hole may reap benefits. However, the process
need trust, which may be guaranteed by closure in the network. He point out that closure is a form of social capital
when trust is needed for establishing collaboration. In reality, social capital is the product of out-group brokerage and
in-group trust in closure network.
Extant literature emphasize the impact of different dimensions of social capital on firm performance, which focus on
structural capital or relational capital, with Moran(2005) as an exception. We discuss the impact of relational
embeddedness and structural embeddedness on research output.
2.1 Relational embeddedness
Relational embeddedness refers to the breadth and depth of inter-personal relationships among scholars
(Gonzalez,2013), which is based on the dyadic relationships between two actors. Relational embeddedness can be
measured on three aspects. First, relational embeddedness can be measured by direct ties, which indicate the intensity of
interaction. Relational embeddedness refers to the ties between two actors of agencies, which may be regarded as the
social cohesion and inter-personal relationships. In addition, relational embeddedness can be seen as an asset, including
trust, reciprocity and obligation, which are created by continued communication and coordination. Besides, the
relational embeddedness can be seen as the intensity or quality of relationships (Kim, 2013)
As for the impact of relational embeddedness on firm performance, Tiwana et al.(2007) argue that higher degree of
relational embeddedness may facilitate the close collaboration, which may contribute to access tacit knowledge and
specific skills. Gulati et al.(2011) repeated collaborations may benefit of knowledge accumulation that technology and
experience.
2.2 Structural embeddedness
Structural embeddedness refers to the patterns of connectedness among agents, including who they can access and
how the relationship is created(Gonzalez,2013). The structural embeddedness is created in triadic or more complex
relationships, involving more dyadic relationships (Kim,2013). Open network may bridge different isolated groups and
access new information, which may contribute to performance improvement (Gonzalez,2013). In closely connected
networks, agents trust each other and coordinate more often, which bring good results.
As for network embeddedness, Kim(2013) investigate the roles of structural embeddedness and relational
embeddedness on supplier performance, and find that structural embeddedness may improve the operational
performance, but cannot improve the financial performance. Krause (2016) finds that structural embeddedness may
exert significant impact on the quality and flexibility of supplier firms.
III. Research Design
3.1 Date collection
The paper chooses articles published by Chinese inland scholars in Scientometrics as the data source, Using the
advanced search option in Web of Science, the search tactics are as follows: "SO(journal’s name)" and "AD" (author’s
address) for joint retrieval, such as "SO = Scientometrics Quarterly AND AD = People R China or China". A total of 469
articles were retrieved. Solo-authored articles and articles published by Chinese Hong Kong, Chinese Macao and
Chinese Taiwan are deleted from the results, which lead to 447 articles as the final analysis object.
3. www.theijbmt.com 19|Page
Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars
Based on the search results, the bibliographic information is collected, including the title, the name of author(s),
affiliations and year of publication. We define the peripheral authors as those who are less influential and less important
for the scientific development. In this article, we measure the peripheral authors based on the number of publications,
i.e. authors with less than five publications are peripheral authors
3.2 Variables
We use net citations as the measure of research output。First, citation is an important measure for academic
visibility and academic impact, which is widely used in assessing publications and journals. Second, because self-
citation may exaggerate the research impact, we use net citations as the measure of research impact.
Relational embeddedness reflects the intensity of collaborations among scholars. The weak tie is beneficial for
accessing heterogeneous knowledge, while strong tie is beneficial for the transfer of tacit knowledge. We measure
relational embeddedness with two indicators: degree centrality and average tie strength.
Degree centrality refers to the direct ties which the focal actor connects with other agents. Such direct ties may
contribute to resource exchange and integration, access new knowledge and experience, and improve the focal authors’
problem-solving ability.
Strength of ties draws on a different way of accounting for these co-authorships, which is measured by all the
collaborations of the focal author divided by the number of co-authors. As stated before, research collaboration could be
beneficial, but this cooperation also entails various costs. For example, costs of finding the right partner, costs of
organizing and distributing team work, costs of developing a shared understanding, trust, reciprocity and the transfer of
high quality information and tacit knowledge, among other costs. For the above reasons, an individual scholar is
inclined to cooperate with previously collaborated partners.
Structural embeddedness focuses on the position of the focal actors and how these actors establish connections.
Densely connected networks provide actors with the access to resources, and reduce the potential opportunism.
Embedded in loosely connected networks, actors may obtain heterogeneous resources to reduce information
redundancy. We use structural hole and clustering coefficient to measure structural embeddedness (Burt, 2000;
Kim,2013).
Structural hole refers to the non- redundant ties between two actors in social network. Burt(2000) argue that
structural hole may provide actors with the benefits of information access and control, and therefore provide
competitive advantage than other actors. Constraint is often used to measure structural hole. When the degree of
constraint is higher, the structural hole is lower, which means the network is more closely connected.
Clustering coefficient means the degree of cluster of the focal actor with other adjacent actors, which is also used to
measure structural hole. In network, if node k is also connected to node i and j, then node k,i,j is constructed as a
inter-connected network. If the probability of the node k connected to adjacent nodes is higher, the clustering coefficient
of node j is higher, which means the local network is densely connected. Otherwise, the clustering coefficient of node j is
lower, which means the local network is loosely connected.
Because Beijing and Shanghai are two major areas which have are crowded with more universities. “211”
universities are also provided with more funds than other universities. We use two variables to control the influence of
geographical differences. If the focal author’s affiliation is located in Beijing or Shanghai, the value is 1, otherwise 0. If
the focal author’s affiliation is “211” university, the value is 1, otherwise 0.
3.3 Methodology
The article uses social network analysis and Poisson regression model. For the measures on relational embeddedness
and structural embeddedness, the co-occurrence matrix is constructed using Bibexcel. Ucinet is used to obtain the
individual author’s degree centrality, strength of ties, structural hole, and clustering co-efficient. The net citations are
obtained through Web of Science. Control variables are obtained by the author’s affiliations.
Because the dependent variable is non-negative, a count model is usually used. We compared the results of Poisson
regression model and negative binomial model, and the results indicate that Poisson regression model is better than
negative binomial model. Therefore, we use Poisson regression model to estimate the co-efficient.
4. www.theijbmt.com 20|Page
Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars
IV. Empirical results
4.1 Descriptive statistics and correlation matrix of variables
Table 1 shows the Descriptive statistics. From Table 1, we can see that the average net citations of each author are above
11. The degree centrality is 3.98, which means each author have an average of 4 co-authors. The mean value of university
is 0.74, which means that over half of the authors are working at “211” universities. Before using Poisson regression
model, the multi-collinearity is checked with VIF, which is also shown in Table 1. The VIF values of all variables are less
than the threshold value of 10, indicating the problem of multi- collinearity is not serious.
TABLE 1 Descriptive statistics
Table 2 shows the correlation matrix between variables. From Table 2, we can see that net citations are positively
correlated with degree centrality and Area. Besides, net citations are positively correlated with the strength of ties,
indicating that an individual author is inclined to cooperate with previously collaborated partners.
TABLE 2 Correlation matrix
Min Max Mean Standard variance VIF
Degree centrality 1 36 3.98 3.086 4.967
Strength of ties 1 4 1.07225 0.263178 1.652
Structural hole 0.209 1.724 0.87386 0.265331 4.329
Clustering
coefficient
0 6.4 1.11965 0.927238 1.892
Area 0 1 0.4 0.491 1.007
University 0 1 0.74 0.439 1.016
Net citations 0 142 11.33 16.705
Degree
centrality
Strength of
ties
Structural
hole
Clustering
coefficient
Area University
Degree
centrality
1
Strength of ties 0.461** * 1
Structural hole -0.702** * -0.055 1
Clustering
coefficient
0.197** * 0.177** * 0.309** * 1
Area 0.009 0.047 0.042 0.015 1
University -0.096** -0.034 0.075 -0.072 -0.021 1
Net citations 0.185** * 0.111* -0.077 0.003 0.162** * 0.001
***Significant at 0.01 level (two sides).
5. www.theijbmt.com 21|Page
Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars
4.2 Results of network Regressions
In order to investigate the impact of relational embeddedness and structural embeddedness on research output, we
construct a Poisson regression model with net citations as the dependent variable. The Poisson regression results are
shown in Table 3. From Table 3, we can see that the model has a relatively good of fitness.
Degree centrality has a significantly positive impact on net citations (β=0.252,p=0.0000), indicating that when the
degree centrality is higher, the net citation of an individual author is also higher. When a focal author cooperate with
more partners, which may bring benefits to the focal author by providing more information and resources, which in turn
may improves the research quality.
The square of degree centrality has a significantly negative impact on net citations (β=-0.004,p=0.0000), indicating
that degree centrality has an inverted impact on research quality. The results shows that there exist optimal collaboration
size when a focal author seeks partners, which is consistent with the findings by Mcfadyen(2004). The results implies
that although more direct ties means more information and resources, but more time are needed to maintain these
relationship, which also may lower the research quality.
TABLE 3 Poisson regression results
The strength of ties has a significantly negative impact on net citations (β=-0.102, p=0.0566), indicating that repeated
collaborations among peripheral authors may have a negative impact on net citations. The reason may be that repeated
collaborations among authors may produce information redundancy, therefore provide few new information that can be
used in publications.
Structural hole has a significantly positive impact on net citations (β=1.542,p=0.0000), indicating that the higher
degree of structural hole may provide the focal author with mutual trust and reduce opportunism, which may be
beneficial for increasing research quality.
** Significant at 0.05 level (two sides).
β coefficient Z statistics sig.
Degree centrality 0.252*** 16.396 0.0000
Degree centrality× Degree centrality -0.004*** -11.08 0.0000
Strength of ties -0.102 -1.906 0.0566
Structural hole 1.542*** 11.868 0.0000
Clustering coefficient -0.467*** -11.136 0.0000
Clustering coefficient ×Clustering
coefficient
0.045*** 6.025 0.0000
Area 0.460*** 16.71 0.4298
University 0.025 0.789 0.0000
R-squared 0.119153
LR statistic 774.58
Prob(LR statistic) 0.0000
Note:* * * p<0.01
6. www.theijbmt.com 22|Page
Periphery authors, network embeddedness, and research impact: The case of Chinese inland scholars
Clustering coefficient has a significantly positive impact on net citations (β=1.542,p=0.0000), indicating that the
higher the clustering coefficient is, the higher the research quality will be. The results imply that an open network may
reduce the redundancy in the network, and obtain heterogeous information, which are needed in improving research
quality.
The square of clustering coefficient has a significantly positive impact on net citations (β=0.460,p=0.0000),
indicating that moderate embeddedness has a significant impact on research quality. The closure and stability of
network is beneficial not only for members to share tacit knowledge, but also may transfer opportunistic behavior of
members, which may strengthen mutual trust and promote collaboration.
V. Conclusion
Based on the social capital theory, this article takes the Chinese inland scholars’ co-authorship network in the field of
information science as the case, and investigates the influence of peripheral authors’ network embeddedness on research
impact by applying Poisson regression model. The empirical results indicate that, (1) degree centrality positively affect
the net citations, (2) an inverted U-shaped relationship exists between the degree centrality and the net citations, which
confirms the existence of the optimal collaboration size, and (3) structural hole positively affect the net citations.
There are still some limitations with this study. First, co-authorship is only one form of scientific collaboration. Co-
authored publication may not reflect the real collaborations. Scholars may cooperate in other forms, which may or may
not involve implicit product. Future studies should use questionnaire to investigate the real collaborations among
scholars(Gonzalez,2013 ). In addition, the article investigates the separate impact of relational embeddedness and
structural embeddedness on research quality. There may exist joint effects of the above two factors, which may be
investigated in future research.
References
[1.] Olmeda,G. C., Perianes‐Rodriguez, A., Ma, A. O., Guerrero‐Bote, V. P., & Anegón, F. D. M. (2009). Visualization of scientific
co‐authorship in spanish universities. , 61(1), 83-100.
[2.] Abbasi, A., Hossain, L., & Leydesdorff, L. (2012). Betweenness centrality as a driver of preferential attachment in the evolution
of research collaboration networks . Journal of Informetrics, 6(3), 403-412..
[3.] Kim, D. Y. (2014). Understanding supplier structural embeddedness: a social network perspective. Journal of Operations
Management, 32(5), 219-231.
[4.] Packard, G., Aribarg, A., Eliashberg, J., & Foutz, N. Z. (2015). The role of network embeddedness in film success
☆. International Journal of Research in Marketing, 33(2), 328-342.
[5.] Burt, R. S. (2000). The network structure of social capital. Research in Organizational Behavior, 22(00), 345-423
[6.] Mcfadyen, M. A., & Cannella, A. A. (2004). Social capital and knowledge creation: diminishing returns of the number and
strength of exchange. Academy of Management Journal, 47(5), 735-746.
[7.] Gonzalez,C. N., Veloso, F. M., & Krackhardt, D. (2013). The impact of network embeddedness on research output. Research
Policy,42(9), 1555-1567.
[8.] Moran, P. (2005). Structural vs. relational embeddedness: social capital and managerial performance. Strategic Management
Journal, 26(12), 1129-1151.
[9.] Tiwana, A. (2008). Do bridging ties complement strong ties? an empirical examination of alliance ambidexterity. Strategic
Management Journal,29(3), 251-272.
[10.] Gulati, R. (1995). Social structure and alliance formation patterns: a longitudinal analysis. Administrative Science
Quarterly, 40(4), 619-652.
[11.] Krause, D. R., Handfield, R. B., & Tyler, B. B. (2007). The relationships between supplier development, commitment, social
capital accumulation and performance improvement. Journal of Operations Management,25(2), 528-545