Search results

1 – 10 of over 3000
Article
Publication date: 23 April 2024

Maja Krtalić and Lilach Alon

This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It…

Abstract

Purpose

This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It elaborates on the literature background and the development of the PCHM framework, highlighting the role of personal information management (PIM) and personal collections in the creation, access and utilization of cultural heritage information.

Design/methodology/approach

The study describes and explains the construction of the PCHM framework as a structured and self-motivated approach to personal heritage and identity learning.

Findings

Following the theoretical background and assumptions, along with the presentation of the key building blocks, the paper describes the key components of the framework, outlines their definitions and provides examples.

Research limitations/implications

Theoretically, PCHM extends the current literature by encapsulating processes and actions employed by individuals to manage personal collections for cultural identity purposes, thereby underscoring the critical role personal collections play in both preserving and communicating cultural heritage.

Practical implications

PCHM can guide the development of support systems and policies to enhance cultural continuity and integration, thus empowering individuals to navigate their cultural identities confidently.

Originality/value

The PCHM framework creates a unique intersection between PIM and cultural heritage, providing a new perspective for understanding the dynamic evolution and formation of cultural identity among migrants.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 11 December 2023

Hao Sun and Kaede Sano

Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether…

Abstract

Purpose

Smart tourism has become an inevitable trend in future tourism development. However, despite significant investment in its technological foundation, little is known about whether and when tourists are willing to be involved in smart tourism. This study explores tourists' willingness to contribute to smart tourism development by empirically examining their intention to share personal information and use smart technology.

Design/methodology/approach

Based on construal level theory (CLT), a 2 (far/near spatial distance) × 2 (gain/loss persuasive information frame) × 2 (altruistic/egoistic value orientation) laboratory experiment with different contextual features was designed to examine tourists' willingness to contribute to smart tourism.

Findings

Tourists are most willing to share personal information and use smart technologies when spatial distance aligns with information framing, spatial distance aligns with value orientation and information framing aligns with value orientation.

Practical implications

This study provides essential insights for destination management organizations (DMOs) about tourists' perceptions of smart tourism, enabling DMOs to develop more precise marketing strategies to encourage tourists to contribute to smart tourism development and enrich tourists' travel experiences.

Originality/value

This study enriches theoretical knowledge of DMOs' boundaries in encouraging tourists to contribute to smart tourism and provides critical insights into future smart tourism development for researchers and practitioners.

Details

Journal of Hospitality and Tourism Insights, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 4 June 2024

Ana Alina Tudoran

This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).

Abstract

Purpose

This study aims to analyze and synthesize literature on consumer privacy-related behavior and intelligent device-to-device interactions within the Internet of Things (IoT).

Design/methodology/approach

We conducted a systematic review using Elsevier’s Scopus database, focusing on studies published in English from 2000 to 2023. The review targeted articles within selected social sciences and business disciplines, specifically concerning consumer behavior in IoT contexts.

Findings

We categorized the privacy literature into three thematic clusters: legislation and policy, business implications and consumer behavior. Within the consumer behavior cluster, our analysis indicates a shift from general Internet and e-commerce privacy concerns prior to 2016, toward issues related to advertising and policy between 2017 and 2018, and increasingly toward pronounced concerns in technological systems, particularly IoT, from 2019 onwards. We identify eight distinct areas of privacy concern within IoT and propose a framework that links antecedents and privacy concerns to subsequent attitudes and behaviors. This framework highlights varying patterns of information disclosure and bridges theoretical constructs with empirical research in IoT privacy.

Originality/value

Originality lies in enhancing the Antecedents-Privacy Concerns-Outcomes (APCO) macro-model by integrating diverse theoretical perspectives on technological and individual-specific antecedents, alongside privacy concerns and beliefs. This comprehensive integration enriches the framework, enabling it to predict and categorize consumer behavior in IoT environments more effectively. The revised model provides a robust tool for understanding privacy-related behavior within the IoT, significantly enriching its theoretical relevance and practical applicability.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 9 January 2024

Ananda Dwitha Yuniar

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…

Abstract

Purpose

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.

Design/methodology/approach

This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.

Findings

The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.

Originality/value

This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 19 January 2024

Ming Li and Jing Liang

Knowledge adoption is the key to effective knowledge exchange in virtual question-and-answer (Q&A) communities. Although previous studies have examined the effects of knowledge…

Abstract

Purpose

Knowledge adoption is the key to effective knowledge exchange in virtual question-and-answer (Q&A) communities. Although previous studies have examined the effects of knowledge content, knowledge source credibility and the personal characteristics of knowledge seekers on knowledge adoption in virtual Q&A communities from a static perspective, the impact of answer deviation on knowledge adoption has rarely been explored from a context-based perspective. The purpose of this study is to explore the impact of two-way deviation on knowledge adoption in virtual Q&A communities, with the aim of expanding the understanding of knowledge exchange and community management.

Design/methodology/approach

The same question and the same answerer often yield multiple answers. Knowledge seekers usually read multiple answers to make adoption decisions. The impact of deviations among answers on knowledge seekers' knowledge adoption is critical. From a context-based perspective, a research model of the impact of the deviation of horizontal and vertical answers on knowledge adoption is established based on the heuristic-systematic model (HSM) and empirically examined with 88,287 Q&A data points and answerer data collected from Zhihu. Additionally, the moderation effects of static factors such as answerer reputation and answer length are examined.

Findings

The negative binomial regression results show that the content and emotion deviation of horizontal answers negatively affect knowledge seekers' knowledge adoption. The content deviation of vertical answers is negatively associated with knowledge adoption, while the emotion deviation of vertical answers is positively related to knowledge adoption. Moreover, answerer reputation positively moderates the negative effect of the emotion deviation of horizontal answers on knowledge adoption. Answer length weakens the negative correlation between the content deviation of horizontal and vertical answers and knowledge adoption.

Originality/value

This study extends previous research on knowledge adoption from a static perspective to a context-based perspective. Moreover, information deviation is expanded from a one-way variable to a two-way variable. The combined effects of static and contextual factors on knowledge adoption are further uncovered. This study can not only help knowledge seekers identify the best answers but also help virtual Q&A community managers optimize community design and operation to reduce the cost of knowledge search and improve the efficiency of knowledge exchange.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 22 May 2024

Elia Rigamonti, Benedetta Colaiacovo, Luca Gastaldi and Mariano Corso

This paper analyzes employees’ perceptions of data collection processes for human resource analytics (HRA). More specifically, we study the effect that information sharing…

Abstract

Purpose

This paper analyzes employees’ perceptions of data collection processes for human resource analytics (HRA). More specifically, we study the effect that information sharing practices have on employees’ attributions (i.e. benevolent vs malevolent) through the perceived legitimacy of data collection and monitoring processes. Moreover, we investigate whether employees’ emotional reaction (i.e. fear of datafication) depends on their perceived legitimacy and attributions.

Design/methodology/approach

The research is based on a sample of 259 employees operating for an Italian consulting firm that developed and implemented HRA processes in the last 3 years. The hypothesized model has been tested using structural equation modeling (SEM) on Stata 14.

Findings

This paper demonstrates the mediating role of perceived legitimacy in the relationship between information sharing practices and employees’ benevolent and malevolent attributions about data collection and monitoring processes for HRA practices. Results also reveal that perceived legitimacy predicts employees’ fear of datafication, with benevolent attributions that partially mediate this relationship.

Practical implications

This research indicates that employees perceive, try to make sense of and emotionally react to HRA processes. Moreover, we reveal the crucial role of information sharing practices and perceived legitimacy in determining employees’ attributions and emotional reactions to data collection and monitoring processes.

Originality/value

Combining human resource (HR) attributions, HR system strength, information processing and signaling theories, this work explores employees’ perception, attributive processes and emotional reactions to data collection processes for HRA practices.

Details

Journal of Organizational Effectiveness: People and Performance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2051-6614

Keywords

Article
Publication date: 27 February 2024

Nofie Iman

Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…

Abstract

Purpose

Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.

Design/methodology/approach

Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.

Findings

Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.

Originality/value

This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 14 March 2024

Yuehua Zhao, Linyi Zhang, Chenxi Zeng, Yidan Chen, Wenrui Lu and Ningyuan Song

This study aims to address the growing importance of online health information (OHI) and the associated uncertainty. Although previous research has explored factors influencing…

168

Abstract

Purpose

This study aims to address the growing importance of online health information (OHI) and the associated uncertainty. Although previous research has explored factors influencing the credibility of OHI, results have been inconsistent. Therefore, this study aims to identify the essential factors that influence the perceived credibility of OHI by conducting a meta-analysis of articles published from 2010 to 2022. The study also aims to examine the moderating effects of demographic characteristics, study design and the platforms where health information is located.

Design/methodology/approach

Based on the Prominence-Interpretation Theory (PIT), a meta-analysis of 25 empirical studies was conducted to explore 12 factors related to information content and source, social interaction, individual and media affordance. Moderators such as age, education level, gender of participants, sample size, platforms and research design were also examined.

Findings

Results suggest that all factors, except social support, have significant effects on the credibility of OHI. Among them, argument quality had the strongest correlation with credibility and individual factors were also found to be relevant. Moderating effects indicate that social support was significantly moderated by age and education level. Different sample sizes may lead to variations in the role of social endorsement, while personal involvement was moderated by sample size, platform and study design.

Originality/value

This study enriches the application of PIT in the health domain and provides guidance for scholars to expand the scope of research on factors influencing OHI credibility.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 17 May 2024

Minghong Chen, Xiumei Huang and Xianjun Qi

In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to…

Abstract

Purpose

In the paradox of personalized services and privacy risks, what factors influence users’ decisions is considered an interesting issue worth exploring. The current study aims to empirically explore privacy behavior of social media users by developing a theoretical model based on privacy calculus theory.

Design/methodology/approach

Privacy risks, conceptualized as natural risks and integrated risks, were proposed to affect the intention of privacy disclosure and protection. The model was validated through a hybrid approach of structural equation modeling (SEM)-artificial neural network (ANN) to analyze the data collected from 527 effective responses.

Findings

The results from the SEM analysis indicated that social interaction and perceived enjoyment were strong determinants of perceived benefits, which in turn played a dominant role in the intention to disclose the privacy in social media. Similarly, trust and privacy invasion experience were significantly related to perceived risks that had the most considerable effect on users’ privacy protection intention. And the following ANN models revealed consistent relationships and rankings with the SEM results.

Originality/value

This study broadened the application perspective of privacy calculus theory to identify both linear and non-linear effects of privacy risks and privacy benefits on users’ intention to disclose or protect their privacy by using a state-of-the-art methodological approach combining SEM and ANN.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Access

Year

Last 6 months (3265)

Content type

Earlycite article (3265)
1 – 10 of over 3000