
Hong Ling- Fudan University
Hong Ling
- Fudan University
About
59
Publications
8,759
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,134
Citations
Current institution
Publications
Publications (59)
The urgent decline of global progress towards achieving the Sustainable Development Goals (SDGs) in the post-COVID-19 era necessitates immediate action in the field of smart cities. This paper proposes a new framework to assess the performance of global smart cities, emphasizing the vitality and potential of sustainability-oriented smartness for gl...
This article opens up the black box of innovation and examines the relationship between functional diversity in software teams and the often neglected dimension of innovation – speed, over the two phases of innovation: creativity and idea implementation. By combining information processing view and social identity theory, the authors hypothesize th...
The popularity of mobile dating applications has reconstructed how people initiate new romantic relationships. Photo attractiveness, the most prominent information provided in the online dating context before social interactions, has attracted considerable attention but reached inconsistent conclusions. By considering the location, gender, and attr...
Mild cognitive impairment (MCI) is a very unstable transition state between normal aging and dementia. Due to lack of accurate treatment and with high risk of dementia transformation, early diagnosis and intervention of MCI has become very important. In view of the limitations of current MCI screening methods dominated by neuropsychological testing...
This article opens up the black box of innovation and examines the relationship between functional diversity in software teams and the often neglected dimension of innovation - speed, over the two phases of innovation: Creativity and idea implementation. By combining information processing view and social identity theory, the authors hypothesize th...
Driven by the ubiquitous ICTs, mobile/virtual working came into prevalence and enabled contemporary knowledge workers to work anytime, anywhere. However, some companies recently ended the work-from-home policy and required employees of " presenteeism" , since they believed that employees would be more collaborative and innovative when they were tog...
The interactive essence of Web2.0 impacts news industry: users are extensively engaged in content creation and value contribution, yet a growing concern is that users’ interaction may amplify the negativity bias, resulting in a worrying media environment such that negative news drive out positive news. Focusing on interactive spiral of online news,...
In the mobile age, protecting users' information from privacy-invasive apps becomes increasingly critical. To precaution users against possible privacy risks, a few Android app stores prominently disclose app permission requests on app download pages. Focusing on this emerging practice, this study investigates the effects of contextual cues (percei...
The prevalence of mobile applications poses a new challenge in privacy protection. To address privacy concerns, prior studies have identified the direct effects of contextual cues but few have revealed their interaction effects. In reality, contextual cues do not appear in isolation, existence of multiple contextual cues introduces an extra complex...
Creativity in the use of information systems (IS) is critical to the performance and long-term success of organizations. Building on an organizational ambidexterity perspective, we investigate ambidexterity in IS usage which is defined as the capacity to simultaneously achieve exploitative usage and explorative usage at a workgroup level. This pape...
Integrating research work and latest insights from the popular press on users' SNS switching, this study considers the role of trend and fatigue in why people switch from a SNS. Specifically, we employ a PPM framework as a theoretical foundation, and enrich it with constructs derived from juxtaposing recent practitioner insights and relevant litera...
In the age of mobile commerce, users receive floods of commercial messages. How do users judge the relevance of such information? Is their relevance judgment affected by contextual factors, such as location and time? How do message content and contextual factors affect users' privacy concerns? With a focus on mobile ads, we propose a research model...
Recent Information Systems (IS) publications reveal an emerging interest in studying post-acceptance system usage behaviors. This paper extends the exploitation versus exploration construct to define a new typology of post-acceptance usage behaviors and defines ambidexterity as the capacity to simultaneously achieve exploitative usage and explorati...
Operational risk measurement is one of the most important research areas of risk management in recent years. Compared with the traditional qualitative methods, quantitative measurement methods of operational risk will be more accuracy. In this paper, According to the Basel III advanced measurement approach, we generate the frequent and severity dis...
Recent Information Systems (IS) publications reveal an emerging interest in studying post-acceptance system usage behaviors. An individual's coworkers can be important sources of help in overcoming knowledge barriers constraining deep use of a complex system, and such interactions with others can determine an employee's ability to influence system...
Firms face significant risk when they adopt digital supply chain systems to transact and coordinate with their partners. Drawn upon modular systems theory, this study proposes that system modularity mitigates the risk of adopting digital supply chain systems and therefore motivates firms to digitize more of their supply chain operations. The study...
In hypercompetitive and turbulent environments, enterprise agility (EA) is an important determinant of firm success to achieve a competitive edge. EA is the ability of firms to accurately identify and understand opportunities and threats in the changing market, and to make quick and effective response to them by dynamically adjusting resources and...
Firms face significant risk when they adopt digital supply chain systems to transact and coordinate with their partners. Drawn upon modular systems theory, this study proposes that system modularity mitigates the risk of adopting digital supply chain systems and therefore motivates firms to digitize more of their supply chain operations. The study...
Mining generalized frequent item sets is one of important research area in data mining. Because not only the taxonomy data is widely exist, but also the information provided by the generalized frequent item sets is richer and valuable than the traditional frequent item sets. Like the traditional mining, the number of the generalized frequent item s...
As a spread phenomenon, tacit knowledge integration has been attracting more attention because of the embeddedness in social activities and interactions. Our works, as a complement to previous research, investigate tacit knowledge integration based on social networks from transactive memory systems (TMS) perspective. We focus on ties dimension (exp...
Although information system researchers have long recognized the possibility for collective-level information system use patterns and outcomes to emerge from individual-level IT use behavior, few have empirical the key factors involved in this individual-collective innovative use process. This study builds a research model drawing on the concepts t...
Mining generalized frequent itemsets is one of the most important research areas in data mining. Not only does the taxonomy data widely exist, but the information provided by the generalized frequent itemsets is richer and more valuable than the traditional frequent itemsets. Like traditional mining, the number of generalized frequent itemsets is a...
With the advanced knowledge economy, much attention has been placed on knowledge integration because of human beings' cognitive limits. As a spread phenomenon, tacit knowledge integration has becoming a hot topic because of the embedness in social activities and interactions. Previous literatures have advocated the direct effect of social networks...
Recent information systems (IS) publications reveal an emerging interest in studying post-acceptance system usage behaviors. Compared to adoption and initial use, understanding of IS post-acceptance use is still at its early stage. To further develop knowledge about this phenomenon, this study reviews a variety of post-acceptance usage and ambidext...
Supply chain flexibility is of paramount significance in present hypercompetitive market. Whereas the role of inter-organisational trust remains a major concern for organisations, few attentions have been given its effect on supply chain flexibility. Based on the relational view of the firm, the study examines the mediated role of three relational...
Tacit knowledge integration which has been receiving more and more attention in the management literature is embedded in societal activities and interactions. Social networks (SN), as the prior channel of knowledge search and transmission has been applied broadly in knowledge management. With the tendency of increasing interest in knowledge managem...
Methods for evaluating and effectively managing the security behavior of employees.
Using a research context of electronic supply chain management (e-SCM) systems, this paper studies how IT governance influences the strategic risk-taking of organizations. We develop a theoretical framework to capture how the allocation of decision rights to the IT unit influences two determinants of risk taking, risk perception and risk propensity...
Information technology (IT) is a driver and enabler of change, which business value is achieved by process change, but literatures about IT business value creating have been largely confined to economical level, industry level, and firm level. Disquisitions on mechanism of IT business value are scarcely, especially form process perspective, which h...
We develop an ambidexterity perspective of process management's influence on organizational adaptation. Drawing upon the idea that dynamic capabilities are process-based compe- tence of firms and are rooted in both exploitative and explorative activities, we argue that business process practices must simulta- neous emphasize process efficiency whic...
The objective of this study is to understand how the company's risk-taking decisions in IT adoption are influenced by the decision right of its IT unit. The study builds a theoretical framework capturing how the IT unit's decision right influences two determinants of risk taking, perceived risk and risk propensity. This framework also illustrates h...
The virtual enterprise (VE) partner selec-tion, which is a business process through-out the whole business operation, is criti-cal for the VE operation. But it is often affected by many factors from politics, economics, social status, psychology and culture background. And the relationship development between the host-enterprise and the guest-enter...
The virtual exhibition (VEx), which generally is the collaborative partnership between service partners in value chains, has shown a great market potential for it's significant low-costing, much convenience, less limitation of physical distance and time phase, and rich expressions of the contents, especially in the context of the current internatio...
IT business value remains a burning topic in IS field, yet limited investigation has been undertaken in supply chain context. From an interorganizational relationship-specific view, a path model of IT business value realization in supply chain context is developed and tested, with three kinds of relational assets involving interorganizational IT in...
E-tailers refer to small and medium size enterprises or individual entrepreneurs primarily conducting businesses on online shopping platforms. Although many works on e-marketplaces have been done, theory-driven studies that explain e-tailers' source of competitiveness are relatively scarce. The current work developed an integrative theoretical mode...
Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice,...
Practically, business activities that have traditionally been conducted via physical mechanisms are being conducted virtually by means of computer technologies. Computer Supported Cooperative Work (CSCW) has been receiving more and more attention both in academia and industry of recent years. However, socio-technical influences on process performan...
With the advance of information and communication technologies (ICTs), business works that have traditionally been conducted via physical mechanisms are being conducted virtually by electronic media, also named e-Work. Virtual processes of e-Work have been receiving more and more attention both in management literature and practice of industry. How...
High level performance and process design depend on management's ability to integrate fragmented pockets of specialized knowledge. This organization's integrative capability has important implications for knowledge integration of modern enterprise. This paper proposes a theoretical framework to probe socio-technical influences on knowledge integrat...
Supply chain Flexibility is of paramount significance in present hypercompetitive market. Whereas the role of inter-organizational trust remains a major concern for organizations, few attentions have been given its effect on supply chain flexibility. Based on relational view of the firm, the study examines the mediated role of various relational as...
Incentives may affect users' behavior. It is critical to study how users' perception and intention are affected by the incentives. This study presents an extended technology acceptance model (TAM) that integrates incentives into TAM to investigate what determines user mobile commerce acceptance. We apply this model to the case of a GPS-based taxi-d...
Users may use a mobile service in various contexts. It is critical to study how users' perceptions and intentions are affected by context. We discuss the definition and structure of context, then propose a contextual acceptance model of mobile commerce based on TAM. We apply this model to the case of a GPS-based taxi-dispatching system. Preliminary...
Context-awareness has been a key enabler for providing users with customized services in mobile commerce. Based on the three models, we propose a context-aware service reasoning mechanism framework. It is divided into 3 phases which are needs discovery, service looking-up and solution selecting. 1) needs discovery: system discovers user's needs, ac...
Context-aware computing is expected to be a key enabler for customized provision of fast-growing mobile services. The growth on the number and diversity of mobile services makes current approach and practice of service selection inadequate. In this study, we present a context-aware service selection engine which integrates rule-based reasoning (RBR...
To solve the verification problem of workflow process structure, after reviewing related research papers, semantic deduce-based workflow verification method is proposed. Through process structure verification equal theorem, the proposed method firstly transforms a cyclic workflow process into an acyclic one; and then generates all instance graphs o...
Location-based service (LBS) is often quoted as one of the killer applications of mobile commerce. The LBS, especially the GPS dispatching system, is often adopted by taxi operators for fleet management, but there is no theoretical analysis on the real value of location information for dispatching services. This paper presents four types of dispatc...
Today, the development of information technology has led business process reengineering (BPR) into an age of inter-organizational BPR: rethinking and redesigning business processes at both the enterprise and supply chain level. Meanwhile, growth in BPR results in the popularity of business modeling techniques. The rapidly growing number of techniqu...
The sampling distribution of the information content (entropy) of the priority vector of a consistent pairwise comparison judgment matrix, PCJM(n) using the Analytic Hierarchy Process (AHP) is studied by Noble and Sanchez, where n is the number of criteria associated with the matrix. They concluded simulation experiments with sample size of 1000 an...
In this paper, we use Saaty''s Eigenvector Method and the Power Method as well as =1, 2, , 9, 1/2, 1/3, , 1/9} and -={1,2, ,9,1, 1/2, ,1/9} as the sets from which the pairwise comparison judgments are assigned at random to examine the variation in the values determined for the mean random consistency index. By extensive simulation analysis, we foun...
Several AHP researchers have addressed the problem of computing the mean random consistency index( MRCI(n)). No one, to our knowledge, determined the sampling distribution of the random consistency index, (RCI(n)), of the pairwise comparison judgment matrix of dimension n. RCI(n) is the basis for defining the MRCI(n) and the consistency ratio, CR(n...
Chinese faculty and students in universities are just as capable of using e-learning as their U.S. counterparts but are more reluctant to do so. The attitude of faculty and students seems to be the determining factor - Chinese are more comfortable with the traditional objectivist model where an instructor professes and students are taught. In the U...
Tacit knowledge is the source of knowledge creation, but the organization and retrieval of tacit knowledge using IT has not been discussed much. In this paper, we defined Internal Knowledge Evolution Network (IKEN) to describe the knowledge evolution process from tacit to explicit, and applied the Case-Based Reasoning (CBR) integrating with Direct-...