Institution
Tilburg University
Education•Tilburg, Noord-Brabant, Netherlands•
About: Tilburg University is a education organization based out in Tilburg, Noord-Brabant, Netherlands. It is known for research contribution in the topics: Population & Context (language use). The organization has 5550 authors who have published 22330 publications receiving 791335 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This article proposed a taxonomy of variation and a common motivational process underlying people's reactions to threats, and found that there are common motivational processes that underlie the similar reactions to all of these diverse kinds of threats.
Abstract: The social psychological literature on threat and defense is fragmented. Groups of researchers have focused on distinct threats, such as mortality, uncertainty, uncontrollability, or meaninglessness, and have developed separate theoretical frameworks for explaining the observed reactions. In the current chapter, we attempt to integrate old and new research, proposing both a taxonomy of variation and a common motivational process underlying people’s reactions to threats. Following various kinds of threats, people often turn to abstract conceptions of reality—they invest more extremely in belief systems and worldviews, social identities, goals, and ideals. We suggest that there are common motivational processes that underlie the similar reactions to all of these diverse kinds of threats. We propose that (1) all of the threats present people with discrepancies that immediately activate basic neural processes related to anxiety. (2) Some categories of defenses are more proximal and symptom-focused, and result directly from anxious arousal and heightened attentional vigilance associated with anxious states. (3) Other kinds of defenses operate more distally and mute anxiety by activating approach-oriented states. (4) Depending on the salient dispositional and situational affordances, these distal, approach-oriented reactions vary in the extent to which they (a) resolve the original discrepancy or are merely palliative; (b) are concrete or abstract; (c) are personal or social. We present results from social neuroscience and standard social psychological experiments that converge on a general process model of threat and defense.
337 citations
••
TL;DR: Wang et al. as mentioned in this paper developed a model that explains how a set of CMC tools (i.e., instant messaging, message box, feedback system) facilitate repeat transactions with sellers by building swift guanxi and trust through interactivity and presence with sellers.
Abstract: The concept of guanxi (i.e., a close and pervasive interpersonal relationship) has received little attention in the literature on online marketplaces, perhaps due to their impersonal nature. However, we propose that computer-mediated communication (CMC) technologies can mimic traditional interactive face-to-face communications, thus enabling a form of guanxi in online marketplaces. Extending the literature on traditional guanxi, we herein introduce the concept of swift guanxi, conceptualized as the buyer's perception of a swiftly formed interpersonal relationship with a seller, which consists of mutual understanding, reciprocal favors, and relationship harmony.
Integrating theories of CMC and guanxi, we develop a model that explains how a set of CMC tools (i.e., instant messaging, message box, feedback system) facilitate repeat transactions with sellers by building swift guanxi and trust through interactivity and presence (social presence and telepresence) with sellers. Longitudinal data from 338 buyers in TaoBao, China's leading online marketplace, support our structural model, showing that the buyers' effective use of CMC tools enable swift guanxi and trust by enhancing the buyers' perceptions of interactivity and presence. In turn, swift guanxi and trust predict buyers' repurchase intentions and their actual repurchases from sellers. We discuss the implications of swift guanxi in online marketplaces with the aid of CMC technologies.
337 citations
••
TL;DR: This survey paper starts with a critical analysis of various performance metrics for supply chain management (SCM), used by a specific manufacturing company, and summarizes how economic theory treats multiple performance metrics.
Abstract: This survey paper starts with a critical analysis of various performance metrics for supply chain management (SCM), used by a specific manufacturing company. Then it summarizes how economic theory treats multiple performance metrics. Actually, the paper proposes to deal with multiple metrics in SCM via the balanced scorecard — which measures customers, internal processes, innovations, and finance. To forecast how the values of these metrics will change — once a supply chain is redesigned — simulation may be used. This paper distinguishes four simulation types for SCM: (i) spreadsheet simulation, (ii) system dynamics, (iii) discrete-event simulation, and (iv) business games. These simulation types may explain the bullwhip effect, predict fill rate values, and educate and train users. Validation of simulation models requires sensitivity analysis; a statistical methodology is proposed. The paper concludes with suggestions for a possible research agenda in SCM. A list with 50 references for further study is included.
337 citations
•
TL;DR: The authors used industry-level data on firms' dependence on external finance for 36 industries and 56 countries to examine this question and found that countries with better-developed financial systems have higher export shares and trade balances in industries that use more external finance.
Abstract: Does financial development translate into a comparative advantage in industries that use more external finance? The author uses industry-level data on firms' dependence on external finance for 36 industries and 56 countries to examine this question. It is shown that countries with better-developed financial systems have higher export shares and trade balances in industries that use more external finance. These results are robust to the use of alternative measures of external dependence and financial development and are not due to reverse causality or simultaneity bias.
335 citations
••
01 Jan 2016TL;DR: Latent class analysis (LCA) and latent profile analysis (LPA) as mentioned in this paper are techniques that aim to recover hidden groups from observed data, which are similar to clustering techniques but more flexible because they are based on an explicit model of the data, and allow to account for the fact that the recovered groups are uncertain.
Abstract: Latent class analysis (LCA) and latent profile analysis (LPA) are techniques that aim to recover hidden groups from observed data. They are similar to clustering techniques but more flexible because they are based on an explicit model of the data, and allow you to account for the fact that the recovered groups are uncertain. LCA and LPA are useful when you want to reduce a large number of continuous (LPA) or categorical (LCA) variables to a few subgroups. They can also help experimenters in situations where the treatment effect is different for different people, but we do not know which people. This chapter explains how LPA and LCA work, what assumptions are behind the techniques, and how you can use R to apply them.
335 citations
Authors
Showing all 5691 results
Name | H-index | Papers | Citations |
---|---|---|---|
David M. Fergusson | 127 | 474 | 55992 |
Johan P. Mackenbach | 120 | 783 | 56705 |
Henning Tiemeier | 108 | 866 | 48604 |
Allen N. Berger | 106 | 382 | 65596 |
Thorsten Beck | 99 | 373 | 62708 |
Luc Laeven | 93 | 355 | 36916 |
William J. Baumol | 85 | 460 | 49603 |
Michael H. Antoni | 84 | 431 | 21878 |
Russell Spears | 84 | 336 | 31609 |
Wim Meeus | 81 | 445 | 22646 |
Daan van Knippenberg | 80 | 223 | 25272 |
Wolfgang Karl Härdle | 79 | 783 | 28934 |
Aaron Cohen | 78 | 412 | 66543 |
Jan-Benedict E.M. Steenkamp | 74 | 178 | 36059 |
Geert Hofstede | 72 | 126 | 103728 |