Search results

1 – 5 of 5
Open Access
Article
Publication date: 11 April 2024

Jiali Fang, Yining Tian and Yuanyuan Hu

The purpose of this study is to examine the relationship between the corporate social responsibility (CSR) performance of job-hopping executives at their former and subsequent…

Abstract

Purpose

The purpose of this study is to examine the relationship between the corporate social responsibility (CSR) performance of job-hopping executives at their former and subsequent firms.

Design/methodology/approach

We conduct regression analyses using a sample of firms listed on the Shanghai and Shenzhen Stock Exchanges from 2010 to 2020 to examine whether CSR performance is similar from one firm to the next as executives switch jobs.

Findings

We find a positive relationship between the CSR performance of former and subsequent firms under job-hopping executives. This relationship is the strongest in the year of the job switch; it weakens in the second year and eventually disappears in the third year. In addition, we show that this relationship benefits different CSR stakeholder groups and is contingent on executive and subsequent firm attributes and job-hopping characteristics. Furthermore, we demonstrate that firms that hire a new chief executive officer from a firm with a strong track record in CSR, the new firm experiences a significant surge in CSR performance compared with firms that do not experience such a shock.

Practical implications

This study has implications for executive hiring decisions.

Originality/value

This study extends the understanding of CSR determinants through the lens of inter-organisational ties associated with job-hopping executives.

Details

China Accounting and Finance Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1029-807X

Keywords

Article
Publication date: 28 March 2023

Siyu Su, Youchao Sun, Yining Zeng and Chong Peng

The use of aviation incident data to carry out aviation risk prediction is of great significance for improving the initiative of accident prevention and reducing the occurrence of…

Abstract

Purpose

The use of aviation incident data to carry out aviation risk prediction is of great significance for improving the initiative of accident prevention and reducing the occurrence of accidents. Because of the nonlinearity and periodicity of incident data, it is challenging to achieve accurate predictions. Therefore, this paper aims to provide a new method for aviation risk prediction with high accuracy.

Design/methodology/approach

This paper proposes a hybrid prediction model incorporating Prophet and long short-term memory (LSTM) network. The flight incident data are decomposed using Prophet to extract the feature components. Taking the decomposed time series as input, LSTM is employed for prediction and its output is used as the final prediction result.

Findings

The data of Chinese civil aviation incidents from 2002 to 2021 are used for validation, and Prophet, LSTM and two other typical prediction models are selected for comparison. The experimental results demonstrate that the Prophet–LSTM model is more stable, with higher prediction accuracy and better applicability.

Practical implications

This study can provide a new idea for aviation risk prediction and a scientific basis for aviation safety management.

Originality/value

The innovation of this work comes from combining Prophet and LSTM to capture the periodic features and temporal dependencies of incidents, effectively improving prediction accuracy.

Details

Aircraft Engineering and Aerospace Technology, vol. 95 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 29 May 2020

Jianyu Zhao, Anzhi Bai, Xi Xi, Yining Huang and Shanshan Wang

Malicious attacks extremely traumatize knowledge networks due to increasing interdependence among knowledge elements. Therefore, exposing the damage of malicious attacks to…

Abstract

Purpose

Malicious attacks extremely traumatize knowledge networks due to increasing interdependence among knowledge elements. Therefore, exposing the damage of malicious attacks to knowledge networks has important theoretical and practical significance. Despite the insights being offered by the growing research stream, few studies discuss the diverse responses of knowledge networks’ robustness to different target-attacks, and the authors lack sufficient knowledge of which forms of malicious attacks constitute greater disaster when knowledge networks evolve to different stages. Given the irreversible consequences of malicious attacks on knowledge networks, this paper aims to examine the impacts of different malicious attacks on the robustness of knowledge networks.

Design/methodology/approach

On the basic of dividing malicious attacks into six forms, the authors incorporate two important aspects of robustness of knowledge networks – structure and function – in a research framework, and use maximal connected sub-graphs and network efficiency, respectively, to measure structural and functional robustness. Furthermore, the authors conceptualize knowledge as a multi-dimensional structure to reflect the heterogeneous nature of knowledge elements, and design the fundamental rules of simulation. NetLogo is used to simulate the features of knowledge networks and their changes of robustness as they face different malicious attacks.

Findings

First, knowledge networks gradually form more associative integrated structures with evolutionary progress. Second, various properties of knowledge elements play diverse roles in mitigating damage from malicious attacks. Recalculated-degree-based attacks cause greater damage than degree-based attacks, and structure of knowledge networks has higher resilience against ability than function. Third, structural robustness is mainly affected by the potential combinatorial value of high-degree knowledge elements, and the combinatorial potential of high-out-degree knowledge elements. Forth, the number of high in-degree knowledge elements with heterogeneous contents, and the inverted U-sharp effect contributed by high out-degree knowledge elements are the main influencers of functional robustness.

Research limitations/implications

The authors use the frontier method to expose the detriments of malicious attacks both to structural and functional robustness in each evolutionary stage, and the authors reveal the relationship and effects of knowledge-based connections and knowledge combinatorial opportunities that contribute to maintaining them. Furthermore, the authors identify latent critical factors that may improve the structural and functional robustness of knowledge networks.

Originality/value

First, from the dynamic evolutionary perspective, the authors systematically examine structural and functional robustness to reveal the roles of the properties of knowledge element, and knowledge associations to maintain the robustness of knowledge networks. Second, the authors compare the damage of six forms of malicious attacks to identify the reasons for increased robustness vulnerability. Third, the authors construct the stock, power, expertise knowledge structure to overcome the difficulty of knowledge conceptualization. The results respond to multiple calls from different studies and extend the literature in multiple research domains.

Details

Journal of Knowledge Management, vol. 24 no. 5
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 4 July 2018

Yining Li and Peilin Zhang

In real working condition, signal is highly disturbed and even drowned by noise, which extremely interferes in detecting results. Therefore, this paper aims to provide an…

Abstract

Purpose

In real working condition, signal is highly disturbed and even drowned by noise, which extremely interferes in detecting results. Therefore, this paper aims to provide an effective de-noising method for the debris particle in lubricant so that the ultrasonic technique can be applied to the online debris particle detection.

Design/methodology/approach

For completing the online ultrasonic monitoring of oil wear debris, the research is made on some selected wear debris signals. It applies morphology component analysis (MCA) theory to de-noise signals. To overcome the potential weakness of MCA threshold process, it proposes fuzzy morphology component analysis (FMCA) by fuzzy threshold function.

Findings

According to simulated and experimental results, it eliminates most of the wear debris signal noises by using FMCA through the signal comparison. According to the comparison of simulation evaluation index, it has highest signal noise ratio, smallest root mean square error and largest similarity factor.

Research limitations/implications

The rapid movement of the debris particles, as well as the lubricant temperature, may influence the measuring signals. Researchers are encouraged to solve these problems further.

Practical implications

This paper includes implications for the improvement in the online debris detection and the development of the ultrasonic technique applied in online debris detection.

Originality value

This paper provides a promising way of applying the MCA theory to de-noise signals. To avoid the potential weakness of the MCA threshold process, it proposes FMCA through fuzzy threshold function. The FMCA method has great obvious advantage in de-noising wear debris signals. It lays the foundation for online ultrasonic monitoring of lubrication wear debris.

Details

Industrial Lubrication and Tribology, vol. 70 no. 6
Type: Research Article
ISSN: 0036-8792

Keywords

Article
Publication date: 28 June 2013

Sheau‐yueh J. Chao

The purpose of this paper is to provide the historical background of genealogical records and analyze the value of Chinese genealogical research through the study of names and…

Abstract

Purpose

The purpose of this paper is to provide the historical background of genealogical records and analyze the value of Chinese genealogical research through the study of names and genealogical resources.

Design/methodology/approach

The paper examines the historical evolution and value of Chinese genealogical records, with the focus on researching the Islamic Chinese names used by the people living in Guilin. The highlight of this paper includes the analysis and evolution of the Islamic Chinese names commonly adopted by the local people in Guilin. It concludes with the recommendations on emphasizing and making the best use of genealogical records to enhance the research value of Chinese overseas studies.

Findings

The paper covers the history of Islam and describes how the religion was introduced into China, as well as Muslims' ethnicity and identity. It also places focus on the importance of building a research collection in Asian history and Chinese genealogy.

Research limitations/implications

This research study has a strong subject focus on Chinese genealogy, Asian history, and Islamic Chinese surnames. It is a narrow field that few researchers have delved into.

Practical implications

The results of this study will assist students, researchers, and the general public in tracing the origin of their surnames and developing their interest in the social and historical value of Chinese local history and genealogies.

Social implications

The study of Chinese surnames is, by itself, a particular field for researching the social and political implications of contemporary Chinese society during the time the family members lived.

Originality/value

Very little research has been done in the area of Chinese local history and genealogy. The paper would be of value to researchers such as historians, sociologists, ethnologists and archaeologists, as well as students and anyone interested in researching a surname origin, its history and evolution.

1 – 5 of 5