scholarly journals Transaction credit in the unstructured crowd transaction network

2019 ◽  
Vol 3 (3) ◽  
pp. 267-283
Author(s):  
Zhishuo Liu ◽  
Tian Fang ◽  
Yao Dongxin ◽  
Nianci Kou

Purpose Current models of transaction credit in the e-commerce network face many problems, such as the one-sided measurement, low accuracy and insufficient anti-aggression solutions. This paper aims to address these problems by studying the transaction credit problem in the crowd transaction network. Design/methodology/approach This study divides the transaction credit into two parts, direct transaction credit and recommended transaction credit, and it proposes a model based on the crowd transaction network. The direct transaction credit comprehensively includes various factors influencing the transaction credit, including transaction evaluation, transaction time, transaction status, transaction amount and transaction times. The recommendation transaction credit introduces two types of recommendation nodes and constructs the recommendation credibility for each type. This paper also proposes a “buyer + circle of friends” method to store and update the transaction credit data. Findings The simulation results show that this model is superior with high accuracy and anti-aggression. Originality/value The direct transaction credit improves the accuracy of the transaction credit data. The recommendation transaction credit strengthens the anti-aggression of the transaction credit data. In addition, the “buyer + circle of friends” method fully uses the computing of the storage ability of the internet, and it also solves the failure problem of using a single node.

2017 ◽  
Vol 69 (4) ◽  
pp. 591-597
Author(s):  
Chaoran Liu ◽  
Yufeng Su ◽  
Jinzhao Yue ◽  
Junjie Wang ◽  
Weiwei Xia ◽  
...  

Purpose A self-adaptive piston is designed for the compressional gas cushion press nanoimprint lithography system. It avoids the lube pollution and high wear of traditional piston. Design/methodology/approach The self-adaptive piston device consists of symmetrical piston bodies, piston rings and other parts. The two piston bodies are linked by a ball-screw. The locking nut adjusts the distance between two piston bodies to avoid the piston rings from being stuck. The piston rings are placed between two piston bodies. Findings The simulation results based on COMSOL indicate that cylinder vibration caused by self-adaptive piston is 15.9 times smaller than the one caused by a traditional piston. Originality/value The self-adaptive piston is superior to the traditional piston in decreasing cylinder vibration.


2016 ◽  
Vol 34 (2) ◽  
pp. 107-115 ◽  
Author(s):  
Bill Dimovski

Purpose – A variety of papers have analyzed the underpricing of REIT IPOs or property company IPOs. The purpose of this paper is to compare the two sectors and examines differences in the underpricing of the two types of IPOs. Design/methodology/approach – An OLS regression is used to identify factors influencing the underpricing of A-REIT and property company IPOs from 1994 until 2014. Findings – This study finds that A-REIT IPOs have a significantly lower underpricing on average than Australian property company IPOs. The time taken to list appears to influence the underpricing of both A-REIT IPOs and property company IPOs, in that issues that are filled more quickly have higher underpricing but with the magnitude of the impact being less for A-REITs. The sentiment toward the stock market also appears to impact on the underpricing of A-REIT and property company IPOs again with the magnitude of the impact being less for A-REITs. Practical implications – The paper provides information to new A-REIT and property company issuers, underwriters and investors. Originality/value – The study is the first to compare and examine the differences in the underpricing of both REITs and property companies in the one country over the same time period.


2020 ◽  
Vol 36 (8) ◽  
pp. 29-31

Purpose Reviews the latest management developments across the globe and pinpoints practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings The problem with developing a reputation of being something of an oracle in the business world is that all of a sudden, everyone expects you to pull off the trick of interpreting the future on a daily basis. Like a freak show circus act or one-hit wonder pop singer, people expect you to perform when they see you, and they expect you to perform the thing that made you famous, even if it is the one thing in the world you don’t want to do. And when you fail to deliver on these heightened expectations, you are dismissed as a one trick pony, however good that trick is in the first place. Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 45 (1) ◽  
pp. 29-50 ◽  
Author(s):  
Aristides Isidoro Ferreira ◽  
Joana Diniz Esteves

Purpose – Activities such as making personal phone calls, surfing on the internet, booking personal appointments or chatting with colleagues may or may not deviate attentions from work. With this in mind, the purpose of this paper is to examine gender differences and motivations behind personal activities employees do at work, as well as individuals’ perception of the time they spend doing these activities. Design/methodology/approach – Data were obtained from 35 individuals (M age=37.06 years; SD=7.80) from a Portuguese information technology company through an ethnographic method including a five-day non-participant direct observation (n=175 observations) and a questionnaire with open-ended questions. Findings – Results revealed that during a five-working-day period of eight hours per day, individuals spent around 58 minutes doing personal activities. During this time, individuals engaged mainly in socializing through conversation, internet use, smoking and taking coffee breaks. Results revealed that employees did not perceive the time they spent on non-work realted activities accurately, as the values of these perceptions were lower than the actual time. Moreover, through HLM, the findings showed that the time spent on conversation and internet use was moderated by the relationship between gender and the leisure vs home-related motivations associated with each personal activity developed at work. Originality/value – This study contributes to the literature on human resource management because it reveals how employees often perceive the time they spend on non-work related activities performed at work inaccurately. This study highlights the importance of including individual motivations when studying gender differences and personal activities performed at work. The current research discusses implications for practitioners and outlines suggestions for future studies.


Target ◽  
2017 ◽  
Vol 29 (2) ◽  
pp. 319-338 ◽  
Author(s):  
Teresa Iribarren

This article explores translational literary Web 2.0 practices and user-generated cultural creations on the Internet, focusing on video poetry that re-creates canonical poets’ bodies of work. It will be argued that the use of for-profit platforms like YouTube and Vimeo by indie creators and translators of video poetry favours the emergence of new translational attitudes, practices and objects that have positive but also contentious effects. One the one hand, these online mediators explore new poetic expressions and tend to make the most of the potential for dissemination of poetic heritage, providing visibility to non-hegemonic literatures. On the other hand, however, these translational digitally-born practices and creations by voluntary and subaltern mediators might reinforce the hegemonic position of large American Internet corporations at the risk of commodifying cultural capital, consolidating English as a lingua franca and perhaps, in the long run, even fostering a potentially monocultural and internationally homogeneous aesthetics.


2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2019 ◽  
Vol 35 (1) ◽  
pp. 19-21

Purpose This paper reviews the latest management developments across the globe and pinpoints practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings If you search images of the word “strategy” on the internet, three of the first seven images to appear on Google (other search engines are available) include chess pieces, while two of the top ten hits involve light bulbs. Aside from the obvious conclusions that any strategic discussion should either involve chess grand masters or well-lit rooms, it is clear that most people assume winning games with lots of moves are possible is the key to a successful strategy. But is this a valid analogy, even at a high level? Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2019 ◽  
Vol 17 (1) ◽  
pp. 41-52 ◽  
Author(s):  
Javad Riahi Zaniani ◽  
Shahab Taghipour Ghahfarokhi ◽  
Mehdi Jahangiri ◽  
Akbar Alidadi Shamsabadi

Purpose This paper, using energy softwares, designed of Iran and optimized a residential villa in Saman city located in Chaharmahal and Bakhtiari Province. Design/methodology/approach Having used the ideas of Climate Consultant software, the basic designing was conducted by Design Builder Software, and the cooling and heating loads and lighting tools and equipment were calculated. Then, the amount of consuming of heating, cooling and lighting load of the building was optimized through insulation of walls and ceiling, using green roof, double glazing UPVC windows, light intensity sensor and variable refrigerant flow (VRF) system. Findings Simulation results for the stated scenarios showed an annual reduction in energy consumption of 21.1, 7.9, 26.41, 27.3 and 72.3 per cent, respectively. Also, by combining all the five scenarios, an optimal state was achieved which, from the results, brought about an annual reduction of 86.9 per cent in the energy consumption. Originality/value The authors hope that the results of the current paper could be helpful for designers and engineers in reduction of energy consumption for designing a building in similar climatic conditions.


Sign in / Sign up

Export Citation Format

Share Document