Hong Ling

Hong Ling
  • Fudan University

About

59
Publications
8,759
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,134
Citations
Current institution
Fudan University

Publications

Publications (59)
Article
The urgent decline of global progress towards achieving the Sustainable Development Goals (SDGs) in the post-COVID-19 era necessitates immediate action in the field of smart cities. This paper proposes a new framework to assess the performance of global smart cities, emphasizing the vitality and potential of sustainability-oriented smartness for gl...
Chapter
This article opens up the black box of innovation and examines the relationship between functional diversity in software teams and the often neglected dimension of innovation – speed, over the two phases of innovation: creativity and idea implementation. By combining information processing view and social identity theory, the authors hypothesize th...
Article
The popularity of mobile dating applications has reconstructed how people initiate new romantic relationships. Photo attractiveness, the most prominent information provided in the online dating context before social interactions, has attracted considerable attention but reached inconsistent conclusions. By considering the location, gender, and attr...
Article
Full-text available
Mild cognitive impairment (MCI) is a very unstable transition state between normal aging and dementia. Due to lack of accurate treatment and with high risk of dementia transformation, early diagnosis and intervention of MCI has become very important. In view of the limitations of current MCI screening methods dominated by neuropsychological testing...
Article
This article opens up the black box of innovation and examines the relationship between functional diversity in software teams and the often neglected dimension of innovation - speed, over the two phases of innovation: Creativity and idea implementation. By combining information processing view and social identity theory, the authors hypothesize th...
Conference Paper
Full-text available
Driven by the ubiquitous ICTs, mobile/virtual working came into prevalence and enabled contemporary knowledge workers to work anytime, anywhere. However, some companies recently ended the work-from-home policy and required employees of " presenteeism" , since they believed that employees would be more collaborative and innovative when they were tog...
Conference Paper
The interactive essence of Web2.0 impacts news industry: users are extensively engaged in content creation and value contribution, yet a growing concern is that users’ interaction may amplify the negativity bias, resulting in a worrying media environment such that negative news drive out positive news. Focusing on interactive spiral of online news,...
Article
In the mobile age, protecting users' information from privacy-invasive apps becomes increasingly critical. To precaution users against possible privacy risks, a few Android app stores prominently disclose app permission requests on app download pages. Focusing on this emerging practice, this study investigates the effects of contextual cues (percei...
Article
The prevalence of mobile applications poses a new challenge in privacy protection. To address privacy concerns, prior studies have identified the direct effects of contextual cues but few have revealed their interaction effects. In reality, contextual cues do not appear in isolation, existence of multiple contextual cues introduces an extra complex...
Article
Creativity in the use of information systems (IS) is critical to the performance and long-term success of organizations. Building on an organizational ambidexterity perspective, we investigate ambidexterity in IS usage which is defined as the capacity to simultaneously achieve exploitative usage and explorative usage at a workgroup level. This pape...
Conference Paper
Full-text available
Integrating research work and latest insights from the popular press on users' SNS switching, this study considers the role of trend and fatigue in why people switch from a SNS. Specifically, we employ a PPM framework as a theoretical foundation, and enrich it with constructs derived from juxtaposing recent practitioner insights and relevant litera...
Article
In the age of mobile commerce, users receive floods of commercial messages. How do users judge the relevance of such information? Is their relevance judgment affected by contextual factors, such as location and time? How do message content and contextual factors affect users' privacy concerns? With a focus on mobile ads, we propose a research model...
Article
Full-text available
Recent Information Systems (IS) publications reveal an emerging interest in studying post-acceptance system usage behaviors. This paper extends the exploitation versus exploration construct to define a new typology of post-acceptance usage behaviors and defines ambidexterity as the capacity to simultaneously achieve exploitative usage and explorati...
Conference Paper
Operational risk measurement is one of the most important research areas of risk management in recent years. Compared with the traditional qualitative methods, quantitative measurement methods of operational risk will be more accuracy. In this paper, According to the Basel III advanced measurement approach, we generate the frequent and severity dis...
Conference Paper
Full-text available
Recent Information Systems (IS) publications reveal an emerging interest in studying post-acceptance system usage behaviors. An individual's coworkers can be important sources of help in overcoming knowledge barriers constraining deep use of a complex system, and such interactions with others can determine an employee's ability to influence system...
Article
Firms face significant risk when they adopt digital supply chain systems to transact and coordinate with their partners. Drawn upon modular systems theory, this study proposes that system modularity mitigates the risk of adopting digital supply chain systems and therefore motivates firms to digitize more of their supply chain operations. The study...
Article
In hypercompetitive and turbulent environments, enterprise agility (EA) is an important determinant of firm success to achieve a competitive edge. EA is the ability of firms to accurately identify and understand opportunities and threats in the changing market, and to make quick and effective response to them by dynamically adjusting resources and...
Article
Firms face significant risk when they adopt digital supply chain systems to transact and coordinate with their partners. Drawn upon modular systems theory, this study proposes that system modularity mitigates the risk of adopting digital supply chain systems and therefore motivates firms to digitize more of their supply chain operations. The study...
Conference Paper
Mining generalized frequent item sets is one of important research area in data mining. Because not only the taxonomy data is widely exist, but also the information provided by the generalized frequent item sets is richer and valuable than the traditional frequent item sets. Like the traditional mining, the number of the generalized frequent item s...
Article
As a spread phenomenon, tacit knowledge integration has been attracting more attention because of the embeddedness in social activities and interactions. Our works, as a complement to previous research, investigate tacit knowledge integration based on social networks from transactive memory systems (TMS) perspective. We focus on ties dimension (exp...
Article
Although information system researchers have long recognized the possibility for collective-level information system use patterns and outcomes to emerge from individual-level IT use behavior, few have empirical the key factors involved in this individual-collective innovative use process. This study builds a research model drawing on the concepts t...
Conference Paper
Mining generalized frequent itemsets is one of the most important research areas in data mining. Not only does the taxonomy data widely exist, but the information provided by the generalized frequent itemsets is richer and more valuable than the traditional frequent itemsets. Like traditional mining, the number of generalized frequent itemsets is a...
Chapter
With the advanced knowledge economy, much attention has been placed on knowledge integration because of human beings' cognitive limits. As a spread phenomenon, tacit knowledge integration has becoming a hot topic because of the embedness in social activities and interactions. Previous literatures have advocated the direct effect of social networks...
Article
Recent information systems (IS) publications reveal an emerging interest in studying post-acceptance system usage behaviors. Compared to adoption and initial use, understanding of IS post-acceptance use is still at its early stage. To further develop knowledge about this phenomenon, this study reviews a variety of post-acceptance usage and ambidext...
Article
Supply chain flexibility is of paramount significance in present hypercompetitive market. Whereas the role of inter-organisational trust remains a major concern for organisations, few attentions have been given its effect on supply chain flexibility. Based on the relational view of the firm, the study examines the mediated role of three relational...
Article
Tacit knowledge integration which has been receiving more and more attention in the management literature is embedded in societal activities and interactions. Social networks (SN), as the prior channel of knowledge search and transmission has been applied broadly in knowledge management. With the tendency of increasing interest in knowledge managem...
Article
Full-text available
Methods for evaluating and effectively managing the security behavior of employees.
Article
Using a research context of electronic supply chain management (e-SCM) systems, this paper studies how IT governance influences the strategic risk-taking of organizations. We develop a theoretical framework to capture how the allocation of decision rights to the IT unit influences two determinants of risk taking, risk perception and risk propensity...
Article
Information technology (IT) is a driver and enabler of change, which business value is achieved by process change, but literatures about IT business value creating have been largely confined to economical level, industry level, and firm level. Disquisitions on mechanism of IT business value are scarcely, especially form process perspective, which h...
Article
We develop an ambidexterity perspective of process management's influence on organizational adaptation. Drawing upon the idea that dynamic capabilities are process-based compe- tence of firms and are rooted in both exploitative and explorative activities, we argue that business process practices must simulta- neous emphasize process efficiency whic...
Conference Paper
The objective of this study is to understand how the company's risk-taking decisions in IT adoption are influenced by the decision right of its IT unit. The study builds a theoretical framework capturing how the IT unit's decision right influences two determinants of risk taking, perceived risk and risk propensity. This framework also illustrates h...
Article
Full-text available
The virtual enterprise (VE) partner selec-tion, which is a business process through-out the whole business operation, is criti-cal for the VE operation. But it is often affected by many factors from politics, economics, social status, psychology and culture background. And the relationship development between the host-enterprise and the guest-enter...
Article
The virtual exhibition (VEx), which generally is the collaborative partnership between service partners in value chains, has shown a great market potential for it's significant low-costing, much convenience, less limitation of physical distance and time phase, and rich expressions of the contents, especially in the context of the current internatio...
Conference Paper
IT business value remains a burning topic in IS field, yet limited investigation has been undertaken in supply chain context. From an interorganizational relationship-specific view, a path model of IT business value realization in supply chain context is developed and tested, with three kinds of relational assets involving interorganizational IT in...
Conference Paper
E-tailers refer to small and medium size enterprises or individual entrepreneurs primarily conducting businesses on online shopping platforms. Although many works on e-marketplaces have been done, theory-driven studies that explain e-tailers' source of competitiveness are relatively scarce. The current work developed an integrative theoretical mode...
Conference Paper
Full-text available
Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice,...
Article
Practically, business activities that have traditionally been conducted via physical mechanisms are being conducted virtually by means of computer technologies. Computer Supported Cooperative Work (CSCW) has been receiving more and more attention both in academia and industry of recent years. However, socio-technical influences on process performan...
Article
With the advance of information and communication technologies (ICTs), business works that have traditionally been conducted via physical mechanisms are being conducted virtually by electronic media, also named e-Work. Virtual processes of e-Work have been receiving more and more attention both in management literature and practice of industry. How...
Article
High level performance and process design depend on management's ability to integrate fragmented pockets of specialized knowledge. This organization's integrative capability has important implications for knowledge integration of modern enterprise. This paper proposes a theoretical framework to probe socio-technical influences on knowledge integrat...
Article
Supply chain Flexibility is of paramount significance in present hypercompetitive market. Whereas the role of inter-organizational trust remains a major concern for organizations, few attentions have been given its effect on supply chain flexibility. Based on relational view of the firm, the study examines the mediated role of various relational as...
Conference Paper
Incentives may affect users' behavior. It is critical to study how users' perception and intention are affected by the incentives. This study presents an extended technology acceptance model (TAM) that integrates incentives into TAM to investigate what determines user mobile commerce acceptance. We apply this model to the case of a GPS-based taxi-d...
Conference Paper
Users may use a mobile service in various contexts. It is critical to study how users' perceptions and intentions are affected by context. We discuss the definition and structure of context, then propose a contextual acceptance model of mobile commerce based on TAM. We apply this model to the case of a GPS-based taxi-dispatching system. Preliminary...
Conference Paper
Context-awareness has been a key enabler for providing users with customized services in mobile commerce. Based on the three models, we propose a context-aware service reasoning mechanism framework. It is divided into 3 phases which are needs discovery, service looking-up and solution selecting. 1) needs discovery: system discovers user's needs, ac...
Conference Paper
Context-aware computing is expected to be a key enabler for customized provision of fast-growing mobile services. The growth on the number and diversity of mobile services makes current approach and practice of service selection inadequate. In this study, we present a context-aware service selection engine which integrates rule-based reasoning (RBR...
Conference Paper
To solve the verification problem of workflow process structure, after reviewing related research papers, semantic deduce-based workflow verification method is proposed. Through process structure verification equal theorem, the proposed method firstly transforms a cyclic workflow process into an acyclic one; and then generates all instance graphs o...
Article
Full-text available
Location-based service (LBS) is often quoted as one of the killer applications of mobile commerce. The LBS, especially the GPS dispatching system, is often adopted by taxi operators for fleet management, but there is no theoretical analysis on the real value of location information for dispatching services. This paper presents four types of dispatc...
Article
Today, the development of information technology has led business process reengineering (BPR) into an age of inter-organizational BPR: rethinking and redesigning business processes at both the enterprise and supply chain level. Meanwhile, growth in BPR results in the popularity of business modeling techniques. The rapidly growing number of techniqu...
Article
The sampling distribution of the information content (entropy) of the priority vector of a consistent pairwise comparison judgment matrix, PCJM(n) using the Analytic Hierarchy Process (AHP) is studied by Noble and Sanchez, where n is the number of criteria associated with the matrix. They concluded simulation experiments with sample size of 1000 an...
Article
In this paper, we use Saaty''s Eigenvector Method and the Power Method as well as =1, 2, , 9, 1/2, 1/3, , 1/9} and -={1,2, ,9,1, 1/2, ,1/9} as the sets from which the pairwise comparison judgments are assigned at random to examine the variation in the values determined for the mean random consistency index. By extensive simulation analysis, we foun...
Article
Several AHP researchers have addressed the problem of computing the mean random consistency index( MRCI(n)). No one, to our knowledge, determined the sampling distribution of the random consistency index, (RCI(n)), of the pairwise comparison judgment matrix of dimension n. RCI(n) is the basis for defining the MRCI(n) and the consistency ratio, CR(n...
Article
Full-text available
Chinese faculty and students in universities are just as capable of using e-learning as their U.S. counterparts but are more reluctant to do so. The attitude of faculty and students seems to be the determining factor - Chinese are more comfortable with the traditional objectivist model where an instructor professes and students are taught. In the U...
Article
Tacit knowledge is the source of knowledge creation, but the organization and retrieval of tacit knowledge using IT has not been discussed much. In this paper, we defined Internal Knowledge Evolution Network (IKEN) to describe the knowledge evolution process from tacit to explicit, and applied the Case-Based Reasoning (CBR) integrating with Direct-...

Network

Cited By