Search results

1 – 10 of over 171000
Article
Publication date: 23 May 2023

Irfan Ali and Nosheen Fatima Warraich

Although, smartphones have facilitated users to keep their personal information, nonetheless, less has been investigated about factors affecting personal information management…

Abstract

Purpose

Although, smartphones have facilitated users to keep their personal information, nonetheless, less has been investigated about factors affecting personal information management (PIM) practices. Therefore, this study aims to investigate how personal innovativeness, perceived ease of use (PEOU) and mobile self-efficacy affect PIM (e.g. finding/re-finding, keeping, organizing and maintaining) practices.

Design/methodology/approach

Quantitative research design was used in this study. The authors collected data from 222 students of information management from public sector universities using a questionnaire. PLS modeling technique was used to analyze data.

Findings

The authors noted that personal innovativeness significantly impacts finding/refinding information, whereas it insignificantly affects keeping, organizing and maintaining information practices. In addition, smartphone PEOU significantly influences information finding and refinding, information keeping and organizing information, whereas insignificantly influences information maintaining. Moreover, mobile self-efficacy was noted to be significantly associated with finding and refinding information, information keeping, information organizing and information maintaining.

Originality/value

This research is an important contribution to the body of existing literature, as it proposed an integrated model based on constructs extracted from Technology Acceptance Model (TAM), Social Cognitive Theory, personal innovativeness and PIM. This study also has practical significance because the findings of this study would be helpful for smartphone application developers and LIS school directors to design programs for information literacy.

Open Access
Article
Publication date: 3 October 2022

Williams Ezinwa Nwagwu and Antonia Bernadette Donkor

The study examined the personal information management (PIM) challenges encountered by faculty in six universities in Ghana, their information refinding experiences and the…

Abstract

Purpose

The study examined the personal information management (PIM) challenges encountered by faculty in six universities in Ghana, their information refinding experiences and the perceived role of memory. The study tested the hypothesis that faculty PIM performance will significantly differ when the differences in the influence of personal factors (age, gender and rank) on their memory are considered.

Design/methodology/approach

The study was guided by a sample survey design. A questionnaire designed based on themes extracted from earlier interviews was used to collect quantitative data from 235 faculty members from six universities in Ghana. Data analysis was undertaken with a discrete multivariate Generalized Linear Model to investigate how memory intermediates in the relationship between age, gender and rank, and, refinding of stored information.

Findings

The paper identified two subfunctions of refinding (Refinding 1 and Refinding 2) associated with self-confidence in information re-finding, and, memory (Memory 1 and Memory 2), associated with the use of complimentary frames to locate previously found and stored information. There were no significant multivariate effects for gender as a stand-alone variable. Males who were aged less than 39 could refind stored information irrespective of the memory class. Older faculty aged 40–49 who possess Memory 1 and senior lecturers who possess Memory 2 performed well in refinding information. There was a statistically significant effect of age and memory; and rank and memory.

Research limitations/implications

This study was limited to faculty in Ghana, whereas the study itself has implications for demographic differences in PIM.

Practical implications

Identifying how memory mediates the role of personal factors in faculty refinding of stored information will be necessary for the efforts to understand and design systems and technologies for enhancing faculty capacity to find/refind stored information.

Social implications

Understanding how human memory can be augmented by technology is a great PIM strategy, but understanding how human memory and personal factors interplay to affect PIM is more important.

Originality/value

PIM of faculty has been extensively examined in the literature, and limitations of memory has always been identified as a constraint. Human memory has been augmented with technology, although the outcome has been very minimal. This study shows that in addition to technology augmentation, personal factors interplay with human memory to affect PIM. Discrete multivariate Generalized Linear Model applied in this study is an innovative way of addressing the challenges of assimilating statistical methodologies in psychosocial disciplines.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 22 April 2022

Maja Krtalic and Kingsley T. Ihejirika

This paper explores personal collection management and use in the context of migration. The paper further investigates how migrants use items in personal collections to reflect…

Abstract

Purpose

This paper explores personal collection management and use in the context of migration. The paper further investigates how migrants use items in personal collections to reflect their self-identity and learn about their heritage.

Design/methodology/approach

Interviews were used to collect data from 14 immigrants in New Zealand.

Findings

Findings show how migrants perceive the value of their personal collections, manage their personal collections during migration and use their personal collections as instruments of identity formation, self-awareness, and connections to cultural heritage.

Originality/value

Insights presented in this study increase an understanding of the critical role personal information plays in the migration and integration process.

Details

Journal of Documentation, vol. 79 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 11 May 2021

Wenhong Zhou, Linxu Dai, Yujie Zhang and Chuanling Wen

In this study, specific measures adopted by the social media platforms in China supporting personal information management are investigated via surveys targeting such platforms…

1163

Abstract

Purpose

In this study, specific measures adopted by the social media platforms in China supporting personal information management are investigated via surveys targeting such platforms. The purpose of this paper is to find out how social media platforms understand information management, and from which aspects and through what specific methods they provide support for information management, which contributes to understanding the issues and strategies associated with personal information management on social media.

Design/methodology/approach

The dimensions and specific contents of the current platform support provided for information management are clearly defined by performing qualitative text analysis based on the content obtained from 11 platform policies published by five representative Chinese social media platforms.

Findings

How social media platforms support personal information management on creation, collection, utilisation, sharing, storage, protection, removal and modification is identified. By analysing the status quo of support provided by the Chinese social media platform, some issues are proposed for discussion. Improved normative management is required to address the coexistence of multivalued information and management risks. However, the user rights are limited because the platform policies tend to be more focused on the perspective of the social media platform. Furthermore, the platform policy contents regarding information management are incomplete, and the applicability of these policies should be improved.

Originality/value

This study seeks to contribute to personal information management on social media from the perspective of platform support. The perspective from the platforms as the service providers supporting information management also helps identify information management challenges and potential strategies. Furthermore, combining with the personal information management perspective, this study provides a background understanding of information management under a social collaborative framework for platforms, authorities, users and memory institutions.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-06-2020-0249

Details

Online Information Review, vol. 46 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 7 January 2021

Maja Krtalic

This paper presents findings from a study that explored why and how long-settled immigrants, their descendants and family members seek and use information about their country of…

Abstract

Purpose

This paper presents findings from a study that explored why and how long-settled immigrants, their descendants and family members seek and use information about their country of origin and how they manage personal information about their cultural heritage legacy.

Design/methodology/approach

15 semi-structured interviews were conducted with participants from the Croatian community in New Zealand.

Findings

The main findings reveal two categories of information needs related to a home country: internally motivated and externally motivated. Information is accessed through a network of family and friends, cultural societies and embassies. These information sources are perceived as reliable and trustworthy, and able to offer an interpretation of information along with access to information. The findings highlight the value of personal collections as information sources and the impact of personal information management practices on preserving and sharing information about one's cultural heritage.

Originality/value

This article contributes to the discussion about information needs and practices of immigrant communities by offering arguments that focus on (1) long-settled immigrants, their descendants and family members, and (2) seeking information about home country culture and heritage, and (3) the role of personal collections and personal information management in maintaining personal cultural heritage. The results of this study may be of use to libraries, archives and museums in designing and offering their services to expatriates of their country and immigrants in their country, and to the wider information management sector developing services in personal information management.

Article
Publication date: 2 November 2021

Lei Huang, Jingyi Zhou, Jiecong Lin and Shengli Deng

In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought…

1320

Abstract

Purpose

In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big data technology. Furthermore, people’s views on personal information leakage and privacy protection are varied, playing an important role in the legal process of personal information protection. Therefore, this paper aims to propose a semi-qualitative method based framework to reveal the subjective patterns about information leakage and privacy protection and further provide  practical implications for interested party.

Design/methodology/approach

Q method is a semi-qualitative methodology which is designed for identifying typologies of perspectives. In order to have a comprehensive understanding of users’ viewpoints, this study incorporates LDA & TextRank method and other information extraction technologies to capture the statements from large-scale literature, app reviews, typical cases and survey interviews, which could be regarded as the resource of the viewpoints.

Findings

By adopting the Q method that aims for studying subjective thought patterns to identify users’ potential views, the authors have identified three categories of stakeholders’ subjectivities: macro-policy sensitive, trade-offs and personal information sensitive, each of which perceives different risk and affordance of information leakage and importance and urgency of privacy protection. All of the subjectivities of the respondents reflect the awareness of the issue of information leakage, that is, the interested parties like social network sites are unable to protect their full personal information, while reflecting varied resistance and susceptibility of disclosing personal information for big data technology applications.

Originality/value

The findings of this study provide an overview of the subjective patterns on the information leakage issue. Being the first to incorporate the Q method to study the views of personal information leakage and privacy protection, the research not only broadens the application field of the Q method but also enriches the research methods for personal information protection. Besides, the proposed LDA & TextRank method in this paper alleviates the limitation of statements resource in the Q method.

Details

Aslib Journal of Information Management, vol. 74 no. 5
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 2 November 2015

Xiaomi An, Wenlin Bai, Hepu Deng, Shuyang Sun, Yu Dong, Wenrui Zhong and Jufang Hu

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in…

Abstract

Purpose

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China through comprehensively considering the multi-disciplinary perspective of personal information protection and management with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in today’s networked environments. There are different perspectives on what personal information protection and management is about, why and how personal information should be protected and managed in the literature. Little, however, is known about the relationships between these multiple perspectives and their implications to personal information protection and management in the real-world practice.

Design/methodology/approach

A multi-methods approach is adopted in the study, including a comprehensive review of the related literature, a content analysis of the relevant laws, polices, standards, a multi-cases study of the relevant network services providers and an online survey of the Chinese citizens who are the end-users of the networked services to adequately achieve the objective of this study. The concept map building technique is used as a tool for conducting the meta-synthesis of the findings from multiple data resources in the development of a comprehensive concept map for personal information protection and management.

Findings

This study rationalizes the importance of the identification of personal information for adequate protection and effective management. It identifies five perspectives on personal information protection and management, namely, law, economics, sociology, information technology and information resources management for their applications at the organizational level. Five types of personal information are identified in the study for protection and management, namely, identifiable personal information, personal identity information, personal moral right information, personal civil right and interest information and personal business and transaction information. An integrated approach consisting of risk control, security control and users control is proposed for personal information protection and management in the provision of networked services in China. The study shows that not enough attention has been paid to the personal information protection and management from multi-disciplinary perspectives with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in the literature. There is a lack of understanding of what, why and how personal information is protected and managed in real-world practices in China.

Practical implications

The investigation of the issues of personal information protection and management with respect to the relevant laws, polices, standards, networked services and organizations can lead to a better understanding of what, why and how personal information is protected and managed in real-world practices in China. The development of a comprehensive concept map for personal information protection and management can be used as an effective guideline for the formulation and implementation of appropriate strategies and policies in individual organizations for providing their stakeholders with quality-networked services in today’s highly connected network environment in China.

Originality/value

The paper is the first step of a comprehensive study on the protection and management of personal information for the provision of networked services in China. It provides a solid foundation for further research with respect to the personal information protection and management. It is the first of this kind of studies to answer the questions of what types of personal information needed to be protected, why and how they should be protected in conformity with laws, regulations, polices, standards and the needs of networked services and business activities of organizations.

Details

The Electronic Library, vol. 33 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 23 April 2024

Maja Krtalić and Lilach Alon

This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It…

Abstract

Purpose

This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It elaborates on the literature background and the development of the PCHM framework, highlighting the role of personal information management (PIM) and personal collections in the creation, access and utilization of cultural heritage information.

Design/methodology/approach

The study describes and explains the construction of the PCHM framework as a structured and self-motivated approach to personal heritage and identity learning.

Findings

Following the theoretical background and assumptions, along with the presentation of the key building blocks, the paper describes the key components of the framework, outlines their definitions and provides examples.

Research limitations/implications

Theoretically, PCHM extends the current literature by encapsulating processes and actions employed by individuals to manage personal collections for cultural identity purposes, thereby underscoring the critical role personal collections play in both preserving and communicating cultural heritage.

Practical implications

PCHM can guide the development of support systems and policies to enhance cultural continuity and integration, thus empowering individuals to navigate their cultural identities confidently.

Originality/value

The PCHM framework creates a unique intersection between PIM and cultural heritage, providing a new perspective for understanding the dynamic evolution and formation of cultural identity among migrants.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Book part
Publication date: 18 September 2006

Bradley J. Alge, Jerald Greenberg and Chad T. Brinsfield

We present a model of organizational monitoring that integrates organizational justice and information privacy. Specifically, we adopt the position that the formation of…

Abstract

We present a model of organizational monitoring that integrates organizational justice and information privacy. Specifically, we adopt the position that the formation of invasiveness and unfairness attitudes is a goal-driven process. We employ cybernetic control theory and identity theory to describe how monitoring systems affect one's ability to maintain a positive self-concept. Monitoring provides a particularly powerful cue that directs attention to self-awareness. People draw on fairness and privacy relevant cues inherent in monitoring systems and embedded in monitoring environments (e.g., justice climate) to evaluate their identities. Discrepancies between actual and desired personal and social identities create distress, motivating employees to engage in behavioral self-regulation to counteract potentially threatening monitoring systems. Organizational threats to personal identity goals lead to increased invasiveness attitudes and a commitment to protect and enhance the self. Threats to social identity lead to increased unfairness attitudes and lowered commitment to one's organization. Implications for theory and research on monitoring, justice, and privacy are discussed along with practical implications.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-84950-426-3

Article
Publication date: 9 October 2023

Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…

Abstract

Purpose

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.

Design/methodology/approach

This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.

Findings

The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.

Research limitations/implications

The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.

Practical implications

This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.

Originality/value

This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 171000