Universities and institutions of higher education with a professional, special, educational and cultural environment, play an important role in effective knowledge management and preparing the background for knowledge sharing. Faculty members are known as the main elements of the university who own mental and intellectual property. Their knowledge sharing under certain conditions along with knowledge sharing behaviors improve individual and organizational operations. Moreover, the tendency to do these actions is the most important factor in knowledge sharing behavior and emotional intelligence (EQ), as one of the social intelligence factors, can guide individual thinking and activity. This study examines the impact of emotional intelligence on faculty members' knowledge sharing behaviors. Regarding the purpose and nature, this study was functional and its methodology was exploratory and due to evaluation of the relations and impacts among variables, it was a correlational method. Data collection included interviews with experts for the qualitative part and a questionnaire for the quantitative part. The qualitative findings indicate different emotional intelligence dimensions, which includes self-awareness, social skills, coping with pressure, adaptability and overall creation. In addition, the result of EQ dimensions on knowledge sharing behavior reveal that "social skills, coping with pressure, and overall creation" share a link with faculty members' research behavior among the four dimensions of knowledge sharing behavior and that "adaptability" has no significant relationship with knowledge sharing behavior.
In recent years, the academic world has been faced with much academic misconduct. Examples involve plagiarizing papers, manipulating data, and launching predatory or hijacked journals. The literature exposing these activities is growing exponentially, and so is the presentation of criteria or guidelines for counteracting the problem. Most of the research is focused on predatory or hijacked journal detection and providing suitable warnings. Overlooked in all this is the fact that papers published in these journals are questionable, but nevertheless show up in standard citation databases. We need some way to flag them so future researchers will be aware of their questionable nature and prevent their use in literature review.
Purpose-This paper aims to investigate a novel model for organizational intelligence (OI) in Iranian public universities. OI is an effective concept in organizational behavior for reshaping the organizational rules. Multidimensional nature of OI makes it a very useful management tool. Design/methodology/approach-This model is investigated by using an expert panel opinion and decision-making trial and evaluation laboratory technique based on Iranian university professors' opinions. Findings-The proposed model consists of eight dimensions: structural, cultural, strategic, communicational, informational, functional, behavioral and environmental dimensions. Each one of these dimensions consists of some components. The results showed that the "Structural", "Cultural", "Strategic", "Informational" and "Environmental" dimensions are the cause dimensions, while the "Behavioral" and "Communicational" dimensions are the effect dimensions. Hierarchical levels of these dimensions are also determined. Practical implications-Comprehending this model offers a handful of beneficial insights for university managers. These points are synoptically stated in the form of managerial implications. Originality/value-The paper by using a real case study provides a cause and effect model for OI management in Iranian public universities and can be enhanced for other organizations.
Purpose Internet of Things (IoT) as the new technological paradigm has found many applications in different domains. Nowadays, more than 30,000 records related to IoT research can be accessed in Scopus (Scopus.com). Health care is the one of domains which benefits from IoT. However, observations indicate that most active researchers in this area are technical people not health professionals. The purpose of this paper is to understand how health professionals can contribute to the IoT body of knowledge. Design/methodology/approach IoT professionals are asked to provide their views regarding research concerns, and the collected data are analyzed by phenomenography research methodology. Findings Findings indicate that health professionals can contribute through providing information, requirement or standards for developing IoT systems or devices. They can also introduce new applications or domains for which IoT is fit. Originality/value This paper tries to fill the gap concerning the lack of attention to undertaking IoT-related research from health professionals’ side and highlights ways that health professionals can contribute IoT body of knowledge.
Purpose Despite the availability of prior studies on the Internet of Things (IoT) development, they have largely focused on challenges associated with evolving IoT. Hence, identifying requirements for IoT development, as a multifaceted phenomenon, whereby the challenges would be tackled remains a less-explored valuable line of inquiry. The purpose of this paper is to present a holistic view of crucial building blocks of IoT development, in order to fill this gap. Design/methodology/approach This paper conducts empirical research using a grounded theory (GT), centering on semi-structured interviews with 25 experts involved in the Iranian IoT development effort. Data were analyzed by using MAXQDA software. Findings This study presents a conceptual framework of requirements for IoT development, consisting of 14 concepts and 5 categories. The findings reveal that strategic, interactive, institutional, market-oriented and information and communication technology (ICT) infrastructure requirements play a salient role in facilitating IoT development. Practical implications The findings of this study shed some light on the momentous aspects of IoT development. Practitioners including governmental policymakers, industry and private sectors could benefit from the policy recommendations offered in this study in terms of strategic viewpoint, legal issues, business perspective and technological readiness. Originality/value From the methodological aspect, the present research is among the first studies on utilizing GT for exploration of requirements for IoT development. From the theoretical perspective, a remarkable achievement of this study is to profoundly discover some less-explored concepts of IoT development such as commercialization, feasibility study, futurology and institutional aspects. Furthermore, findings of this study highlight the contribution of innovation systems theory for the IoT development area in terms of alignment of the emerged requirements for IoT development with the functions of this theory.
PurposeThis study aims to investigate the possible negativity of job embeddedness in developing countries. Operationally, the study aimed to configure the relationship between job embeddedness and cyberloafing with respect to both contextual (job satisfaction) and individual (internet addiction) factors.Design/methodology/approachIncorporating the conservation of resources theory and reactance theory into the theory of job embeddedness, the present study adopted a resource-based approach to job embeddedness to examine its main and moderated effects on cyberloafing in a three-way interaction model. With the focus on public organizations, 500 administrative employees from an Iranian university were surveyed using self-reporting measures, and the collected data were analyzed using partial least squares–structural equation modeling and hierarchical moderated multiple regression.FindingsAs predicted, job embeddedness was positively associated with cyberloafing; however, in contrast with predictions, job satisfaction had no inverse impact on the job embeddedness–cyberloafing relationship, and its role was limited to neutralizing the increasing effect of internet addiction.Practical implicationsConsideration should be given to how job embeddedness interacts with contextual and individual moderators to affect cyberloafing. In particular, this study implicated some practical procedures to provide employees with on- and off-the-job resources and avoid fighting over the organization's resources. Additionally, this study provides insights into embeddedness-satisfaction interplay to provide employees with propitious work conditions in line with organizational productivity.Originality/valueThere is little research on the association between job embeddedness and counterproductive work behaviors, and the findings are inconsistent. A review of the literature revealed no study addressing cyberloafing implications of job embeddedness. This study expands the literature by theoretically and empirically correlating job embeddedness and cyberloafing in a non-western developing country. Accordingly, the significance of this study is its capability in mitigating cyberloafing behaviors by promoting the adverse job embeddedness.
Information systems, as an emerging discipline which is dynamic and interdisciplinary, is constantly undergoing rapid changes; therefore, one of the most critical issues is to study the topics and methodological trends in this field. This study aimed to thoroughly investigate the topics and methodologies used in information system throughout a twelve-year period (2007-2018). In the present study, all the articles published in the top eight information system journals were investigated based on their topics and methodologies using a literature analysis approach, and the most common topics and methodologies in such studies were then detected. The main topics addressed in this filed were electronic commerce/business, information system research, and IS usage/adoption, and the survey was the dominant research methodology in this regard. Furthermore, an increase in the use of the mathematical models indicates that more accurate quantitative research methods have made this field more mature. The research findings also show that the Internet of Things (IoT), big data, social media, bitcoin and block chain, digital transformation, sharing economy, digital platform, methodology of machine learning, data mining, and text mining are the main research topics and methods which should be further studied.
In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.