Search results
1 – 10 of over 3000This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It…
Abstract
Purpose
This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It elaborates on the literature background and the development of the PCHM framework, highlighting the role of personal information management (PIM) and personal collections in the creation, access and utilization of cultural heritage information.
Design/methodology/approach
The study describes and explains the construction of the PCHM framework as a structured and self-motivated approach to personal heritage and identity learning.
Findings
Following the theoretical background and assumptions, along with the presentation of the key building blocks, the paper describes the key components of the framework, outlines their definitions and provides examples.
Research limitations/implications
Theoretically, PCHM extends the current literature by encapsulating processes and actions employed by individuals to manage personal collections for cultural identity purposes, thereby underscoring the critical role personal collections play in both preserving and communicating cultural heritage.
Practical implications
PCHM can guide the development of support systems and policies to enhance cultural continuity and integration, thus empowering individuals to navigate their cultural identities confidently.
Originality/value
The PCHM framework creates a unique intersection between PIM and cultural heritage, providing a new perspective for understanding the dynamic evolution and formation of cultural identity among migrants.
Details
Keywords
Hao Sun and Kaede Sano
Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether…
Abstract
Purpose
Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether and when tourists are willing to be involved in smart tourism. This study explores tourists' willingness to contribute to smart tourism development by empirically examining their intention to share personal information and use smart technology.
Design/methodology/approach
Based on construal level theory (CLT), a 2 (far/near spatial distance) × 2 (gain/loss persuasive information frame) × 2 (altruistic/egoistic value orientation) laboratory experiment with different contextual features was designed to examine tourists' willingness to contribute to smart tourism.
Findings
Tourists are most willing to share personal information and use smart technologies when spatial distance aligns with information framing, spatial distance aligns with value orientation and information framing aligns with value orientation.
Practical implications
This study provides essential insights for destination management organizations (DMOs) about tourists' perceptions of smart tourism, enabling DMOs to develop more precise marketing strategies to encourage tourists to contribute to smart tourism development and enrich tourists' travel experiences.
Originality/value
This study enriches theoretical knowledge of DMOs' boundaries in encouraging tourists to contribute to smart tourism and provides critical insights into future smart tourism development for researchers and practitioners.
Details
Keywords
This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).
Abstract
Purpose
This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).
Design/methodology/approach
We conducted a systematic review using Elsevier’s Scopus database, focusing on studies published in English from 2000 to 2023. The review targeted articles within selected social sciences and business disciplines, specifically concerning consumer behavior in IoT contexts.
Findings
We categorized the privacy literature into three thematic clusters: legislation and policy, business implications and consumer behavior. Within the consumer behavior cluster, our analysis indicates a shift from general Internet and e-commerce privacy concerns prior to 2016, toward issues related to advertising and policy between 2017 and 2018, and increasingly toward pronounced concerns in technological systems, particularly IoT, from 2019 onwards. We identify eight distinct areas of privacy concern within IoT and propose a framework that links antecedents and privacy concerns to subsequent attitudes and behaviors. This framework highlights varying patterns of information disclosure and bridges theoretical constructs with empirical research in IoT privacy.
Originality/value
Originality lies in enhancing the Antecedents-Privacy Concerns-Outcomes (APCO) macro-model by integrating diverse theoretical perspectives on technological and individual-specific antecedents, alongside privacy concerns and beliefs. This comprehensive integration enriches the framework, enabling it to predict and categorize consumer behavior in IoT environments more effectively. The revised model provides a robust tool for understanding privacy-related behavior within the IoT, significantly enriching its theoretical relevance and practical applicability.
Details
Keywords
Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…
Abstract
Purpose
Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.
Design/methodology/approach
This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.
Findings
The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.
Originality/value
This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740
Details
Keywords
Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…
Abstract
Purpose
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.
Design/methodology/approach
An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.
Findings
The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.
Originality/value
This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.
Details
Keywords
Ming Li and Jing Liang
Knowledge adoption is the key to effective knowledge exchange in virtual question-and-answer (Q&A) communities. Although previous studies have examined the effects of knowledge…
Abstract
Purpose
Knowledge adoption is the key to effective knowledge exchange in virtual question-and-answer (Q&A) communities. Although previous studies have examined the effects of knowledge content, knowledge source credibility and the personal characteristics of knowledge seekers on knowledge adoption in virtual Q&A communities from a static perspective, the impact of answer deviation on knowledge adoption has rarely been explored from a context-based perspective. The purpose of this study is to explore the impact of two-way deviation on knowledge adoption in virtual Q&A communities, with the aim of expanding the understanding of knowledge exchange and community management.
Design/methodology/approach
The same question and the same answerer often yield multiple answers. Knowledge seekers usually read multiple answers to make adoption decisions. The impact of deviations among answers on knowledge seekers' knowledge adoption is critical. From a context-based perspective, a research model of the impact of the deviation of horizontal and vertical answers on knowledge adoption is established based on the heuristic-systematic model (HSM) and empirically examined with 88,287 Q&A data points and answerer data collected from Zhihu. Additionally, the moderation effects of static factors such as answerer reputation and answer length are examined.
Findings
The negative binomial regression results show that the content and emotion deviation of horizontal answers negatively affect knowledge seekers' knowledge adoption. The content deviation of vertical answers is negatively associated with knowledge adoption, while the emotion deviation of vertical answers is positively related to knowledge adoption. Moreover, answerer reputation positively moderates the negative effect of the emotion deviation of horizontal answers on knowledge adoption. Answer length weakens the negative correlation between the content deviation of horizontal and vertical answers and knowledge adoption.
Originality/value
This study extends previous research on knowledge adoption from a static perspective to a context-based perspective. Moreover, information deviation is expanded from a one-way variable to a two-way variable. The combined effects of static and contextual factors on knowledge adoption are further uncovered. This study can not only help knowledge seekers identify the best answers but also help virtual Q&A community managers optimize community design and operation to reduce the cost of knowledge search and improve the efficiency of knowledge exchange.
Details
Keywords
Elia Rigamonti, Benedetta Colaiacovo, Luca Gastaldi and Mariano Corso
This paper analyzes employees’ perceptions of data collection processes for human resource analytics (HRA). More specifically, we study the effect that information sharing…
Abstract
Purpose
This paper analyzes employees’ perceptions of data collection processes for human resource analytics (HRA). More specifically, we study the effect that information sharing practices have on employees’ attributions (i.e. benevolent vs malevolent) through the perceived legitimacy of data collection and monitoring processes. Moreover, we investigate whether employees’ emotional reaction (i.e. fear of datafication) depends on their perceived legitimacy and attributions.
Design/methodology/approach
The research is based on a sample of 259 employees operating for an Italian consulting firm that developed and implemented HRA processes in the last 3 years. The hypothesized model has been tested using structural equation modeling (SEM) on Stata 14.
Findings
This paper demonstrates the mediating role of perceived legitimacy in the relationship between information sharing practices and employees’ benevolent and malevolent attributions about data collection and monitoring processes for HRA practices. Results also reveal that perceived legitimacy predicts employees’ fear of datafication, with benevolent attributions that partially mediate this relationship.
Practical implications
This research indicates that employees perceive, try to make sense of and emotionally react to HRA processes. Moreover, we reveal the crucial role of information sharing practices and perceived legitimacy in determining employees’ attributions and emotional reactions to data collection and monitoring processes.
Originality/value
Combining human resource (HR) attributions, HR system strength, information processing and signaling theories, this work explores employees’ perception, attributive processes and emotional reactions to data collection processes for HRA practices.
Details
Keywords
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…
Abstract
Purpose
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.
Design/methodology/approach
Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.
Findings
Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.
Originality/value
This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.
Details
Keywords
Yuehua Zhao, Linyi Zhang, Chenxi Zeng, Yidan Chen, Wenrui Lu and Ningyuan Song
This study aims to address the growing importance of online health information (OHI) and the associated uncertainty. Although previous research has explored factors influencing…
Abstract
Purpose
This study aims to address the growing importance of online health information (OHI) and the associated uncertainty. Although previous research has explored factors influencing the credibility of OHI, results have been inconsistent. Therefore, this study aims to identify the essential factors that influence the perceived credibility of OHI by conducting a meta-analysis of articles published from 2010 to 2022. The study also aims to examine the moderating effects of demographic characteristics, study design and the platforms where health information is located.
Design/methodology/approach
Based on the Prominence-Interpretation Theory (PIT), a meta-analysis of 25 empirical studies was conducted to explore 12 factors related to information content and source, social interaction, individual and media affordance. Moderators such as age, education level, gender of participants, sample size, platforms and research design were also examined.
Findings
Results suggest that all factors, except social support, have significant effects on the credibility of OHI. Among them, argument quality had the strongest correlation with credibility and individual factors were also found to be relevant. Moderating effects indicate that social support was significantly moderated by age and education level. Different sample sizes may lead to variations in the role of social endorsement, while personal involvement was moderated by sample size, platform and study design.
Originality/value
This study enriches the application of PIT in the health domain and provides guidance for scholars to expand the scope of research on factors influencing OHI credibility.
Details
Keywords
Minghong Chen, Xiumei Huang and Xianjun Qi
In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to…
Abstract
Purpose
In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to empirically explore privacy behavior of social media users by developing a theoretical model based on privacy calculus theory.
Design/methodology/approach
Privacy risks, conceptualized as natural risks and integrated risks, were proposed to affect the intention of privacy disclosure and protection. The model was validated through a hybrid approach of structural equation modeling (SEM)-artificial neural network (ANN) to analyze the data collected from 527 effective responses.
Findings
The results from the SEM analysis indicated that social interaction and perceived enjoyment were strong determinants of perceived benefits, which in turn played a dominant role in the intention to disclose the privacy in social media. Similarly, trust and privacy invasion experience were significantly related to perceived risks that had the most considerable effect on users’ privacy protection intention. And the following ANN models revealed consistent relationships and rankings with the SEM results.
Originality/value
This study broadened the application perspective of privacy calculus theory to identify both linear and non-linear effects of privacy risks and privacy benefits on users’ intention to disclose or protect their privacy by using a state-of-the-art methodological approach combining SEM and ANN.
Details