Showing 101 - 110 of 295
Persistent link: https://www.econbiz.de/10013383544
Weibo, China's largest microblogging platform, has become one of the key information-sharing platforms in modern society. This study examines topic propagation in relation to microblogging from the perspective of the "peer effect." Using data of hot topics from Weibo, we analyze how the social...
Persistent link: https://www.econbiz.de/10014315748
Persistent link: https://www.econbiz.de/10013466826
Persistent link: https://www.econbiz.de/10014230295
To better understand task failures in cloud computing systems, the authors analyze failure frequency of tasks based on Google cluster dataset, and find some frequently failing tasks that suffer from long-term failures and repeated rescheduling, which are called killer tasks as they can be a big...
Persistent link: https://www.econbiz.de/10012044191
Purpose: Scholars and practitioners have recognized the significance of integrating environmental practices into project context. This paper focuses on project environmental practices (PEP) and identifies PEP from the life cycle perspective, which includes green design, green procurement, green...
Persistent link: https://www.econbiz.de/10012070484
Purpose: The purpose of this paper is to scrutinize the performance effects of supply chain risk management (SCRM). Besides financial performance, two aspects of operational performance are examined: operational efficiency and flexibility. Moreover, the authors explore the moderating role of...
Persistent link: https://www.econbiz.de/10012072363
Purpose: This paper is to investigate how employees respond to information security policies (ISPs) when they view the policies as a challenge rather than a hindrance to work. Specifically, the authors examine the roles of challenge security demands (i.e. continuity and mandatory) and...
Persistent link: https://www.econbiz.de/10012186514
Purpose: While the bring-your-own-device (BYOD) trend provides benefits for employees, it also poses security risks to organizations. This study explores whether and how employees decide to adopt BYOD practices when they encounter information security–related conflict....
Persistent link: https://www.econbiz.de/10012277601
Persistent link: https://www.econbiz.de/10012406653