Search results

1 – 10 of 498
Open Access
Article
Publication date: 30 May 2024

Heng Zhang, Hongxiu Li, Chenglong Li and Xinyuan Lu

The purpose of this study is to examine how the interplay of stressor (e.g. fear of missing out, FoMO) and strains (e.g. perceived social overload, communication overload…

Abstract

Purpose

The purpose of this study is to examine how the interplay of stressor (e.g. fear of missing out, FoMO) and strains (e.g. perceived social overload, communication overload, information overload and system feature overload) in social networking sites (SNS) use can contribute to users’ SNS fatigue from a configurational view.

Design/methodology/approach

Data were collected among 363 SNS users in China via an online survey, and fuzzy-set qualitative comparative analysis (fsQCA) was applied in this study to scrutinize the different combinations of FoMO and overload that contribute to the same outcome of SNS fatigue.

Findings

Six combinations of casual conditions were identified to underlie SNS fatigue. The results showed that FoMO, perceived information overload and system feature overload are the core conditions that contribute to SNS fatigue when combined with other types of overloads.

Originality/value

The current work supplements the research findings on SNS fatigue by identifying the configurations contributing to SNS fatigue from the joint effects of stressor (FoMO) and strain (perceived social overload, communication overload, information overload and system feature overload) and by providing explanations for SNS fatigue from the configurational perspective.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 28 February 2023

Faten Hamad, Maha Al-Fadel and Ahmed Maher Khafaga Shehata

Technological advancement has forced academic libraries to change their traditional services and routines by adopting emerging technologies to respond to the changing information…

Abstract

Purpose

Technological advancement has forced academic libraries to change their traditional services and routines by adopting emerging technologies to respond to the changing information needs of their users who are now more technologically inclined and prefer to access information remotely and in a timely manner. Smart technologies are the recent trends in academic libraries. This research aims to investigate the level of smart information service implementation at academic libraries in Jordan. It also aimed to investigate the correlation between the level of smart information services offered by the libraries and the level of digital competencies among the library staff.

Design/methodology/approach

This research is designed using survey design to collect comprehensive information from the study participants. A questionnaire was disseminated to 340 respondents, and 246 questionnaires were returned and were suitable for analysis with a response rate of 72.4%.

Findings

The results indicated a moderate level of smart information service offered by academic libraries, as well as a moderate level of digital skills associated with the advocacy of smart information services. The results also indicated a strong and positive relationship between the level of smart information services at the investigated libraries and the level of digital competencies among the librarians.

Practical implications

The findings will help other academic libraries understand how to respond to the emergent change in users’ information-seeking behavior by understanding their available human resources competencies and the requirement to undergo this emergent change.

Originality/value

This paper provides insights and practical solutions for academic libraries in response to global information trends based on users’ behaviors. This research was conducted in Jordan as one of the developing countries and hence it provides insights of the situation there. It will help academic libraries in Jordan and the region to handle and cope with the challenges associated with technology acceptance based on its staff level of digital competencies. The contribution of this research that it was done in a developing country where progress in the filed can be considered slow because of many factors, mainly economics, where institutions focus on essential library objectives, which are information resources development and databases subscriptions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 4/5
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1830

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 16 January 2024

Ville Jylhä, Noora Hirvonen and Jutta Haider

This study addresses how algorithmic recommendations and their affordances shape everyday information practices among young people.

1121

Abstract

Purpose

This study addresses how algorithmic recommendations and their affordances shape everyday information practices among young people.

Design/methodology/approach

Thematic interviews were conducted with 20 Finnish young people aged 15–16 years. The material was analysed using qualitative content analysis, with a focus on everyday information practices involving online platforms.

Findings

The key finding of the study is that the current affordances of algorithmic recommendations enable users to engage in more passive practices instead of active search and evaluation practices. Two major themes emerged from the analysis: enabling not searching, inviting high trust, which highlights the how the affordances of algorithmic recommendations enable the delegation of search to a recommender system and, at the same time, invite trust in the system, and constraining finding, discouraging diversity, which focuses on the constraining degree of affordances and breakdowns associated with algorithmic recommendations.

Originality/value

This study contributes new knowledge regarding the ways in which algorithmic recommendations shape the information practices in young people's everyday lives specifically addressing the constraining nature of affordances.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 3 June 2022

Dan Wu and Shutian Zhang

Good abandonment behavior refers to users obtaining direct answers via search engine results pages (SERPs) without clicking any search result, which occurs commonly in mobile…

Abstract

Purpose

Good abandonment behavior refers to users obtaining direct answers via search engine results pages (SERPs) without clicking any search result, which occurs commonly in mobile search. This study aims to better understand users' good abandonment behavior and perception, and then construct a good abandonment prediction model for mobile search with improved performance.

Design/methodology/approach

In this study, an in situ user mobile search experiment (N = 43) and a crowdsourcing survey (N = 1,379) were conducted. Good abandonment behavior was analyzed from a quantitative perspective, exploring users' search behavior characteristics from four aspects: session and query, SERPs, gestures and eye-tracking data.

Findings

Users show less engagement with SERPs in good abandonment, spending less time and using fewer gestures, and they pay more visual attention to answer-like results. It was also found that good abandonment behavior is often related to users' perceived difficulty of the searching tasks and trustworthiness in the search engine. A good abandonment prediction model in mobile search was constructed with a high accuracy (97.14%).

Originality/value

This study is the first to explore eye-tracking characteristics of users' good abandonment behavior in mobile search, and to explore users' perception of their good abandonment behavior. Visual attention features are introduced into good abandonment prediction in mobile search for the first time and proved to be important predictors in the proposed model.

Details

Library Hi Tech, vol. 42 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 December 2023

Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…

Abstract

Purpose

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.

Design/methodology/approach

This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.

Findings

The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.

Research limitations/implications

Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.

Practical implications

The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.

Social implications

This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.

Originality/value

This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.

Details

Information & Computer Security, vol. 32 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 March 2023

Daniel Mican and Dan-Andrei Sitar-Taut

The current study aims to empirically analyze the influence of different information sources, together with the persuasiveness of recommender systems (RSs) on the consumer’s…

Abstract

Purpose

The current study aims to empirically analyze the influence of different information sources, together with the persuasiveness of recommender systems (RSs) on the consumer’s purchase intention (PI). It also expands the research on RSs from the point of view of consumer behavior and psychology, considering perceived usefulness and relevance. In addition, it analyzes how different types of personalized recommendations, along with non-personalized ones, influence PI.

Design/methodology/approach

The proposed model has been validated using partial least squares structural equation modeling (PLS-SEM), based on the data collected from 597 online shoppers.

Findings

This study proves that both information search and RSs influence PI, being complementary rather than mutually exclusive. Recommender systems’ findings indicate that the PI is primarily influenced by the perceived relevance of RSs, the information provided by manufacturers and reviews. Moreover, only the influence of the perceived usefulness of personalized recommendations strongly affects PI. Conversely, non-personalized recommendations do not affect PI.

Practical implications

Developers should focus on increasing the perceived usefulness and relevance of RSs. Thus, they could adopt the hybridization of RSs with the aggregation of both personal shopping behavior and social network contacts. It should integrate information signals from multiple sources to include sentiment extracted from reviews or links to the manufacturer’s page. Furthermore, the recommendation of discounted products must be only for products preferred by customers, because only these influence the PI.

Originality/value

This research provides a structural model that examines together, for the first time, the influence on the PI of the main RSs and sources of information.

Details

Kybernetes, vol. 53 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 20 November 2023

Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain and Mahdi Nasrullah Al-Ameen

The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…

Abstract

Purpose

The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and privacy of people in the digital environment. However, inappropriate use of these tools can lead to unexpected consequences that are preventable. Hence, it is significant to examine why users do not understand the security tools.

Design/methodology/approach

The authors conducted a qualitative study with 40 participants in the USA to investigate the prevalent misconceptions of people regarding security tools, their perceptions of data access and the corresponding impact on their usage behavior and data protection strategies.

Findings

While security vulnerabilities are often rooted in people’s internet usage behavior, this study examined user’s mental models of the internet and unpacked how the misconceptions about security tools relate to those mental models.

Originality/value

Based on the findings, this study offers recommendations highlighting the design aspects of security tools that need careful attention from researchers and industry practitioners, to alleviate users’ misconceptions and provide them with accurate conceptual models toward the desired use of security tools.

Details

Information & Computer Security, vol. 32 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 April 2022

Dessy Harisanty, Nove E. Variant Anna, Tesa Eranti Putri, Aji Akbar Firdaus and Nurul Aida Noor Azizi

This study investigates the level of artificial intelligence (AI) awareness among library leaders, practitioners and scientists of Indonesian academic libraries to elucidate the…

2338

Abstract

Purpose

This study investigates the level of artificial intelligence (AI) awareness among library leaders, practitioners and scientists of Indonesian academic libraries to elucidate the benefits of AI implementation and its necessary infrastructure and challenges.

Design/methodology/approach

The study adopted a purposive sampling technique to select the 38 participants and thematic analysis to analyze the data, identifying eight themes: understanding of AI, AI adoption, benefits of AI, competencies needed to support AI, facilities to support AI, factors supporting AI adoption, AI-inhibiting factors and expectations of AI.

Findings

Different viewpoints provided full awareness among library stakeholders and sufficient information to begin AI initiatives in Indonesian libraries as leaders, practitioners and scientists had a favorable, open and encouraging outlook on AI.

Research limitations/implications

The study does not investigate variations in perspectives between the participants, but it examines their understanding of AI and elaborates the results into the concept of an intelligent library. Moreover, this study only uses samples from academic libraries.

Practical implications

Libraries can take these results into consideration before implementing AI, especially in technology and facilities, librarian competency with regard to AI and leadership roles in AI projects.

Social implications

Library boards and library associations can use this research as a source to create guidelines about AI implementation in academic libraries.

Originality/value

The study addresses the gap in the research on university libraries' readiness and awareness to implement AI, especially in developing countries.

Details

Library Hi Tech, vol. 42 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 3 April 2024

Md Sajjad Hosain and Mohammad Afsar Kamal

With the increasing use of Internet and mobile handsets, mobile-based electronic payment apps (MEPAs) are becoming very popular around the world due to having various advantages…

Abstract

Purpose

With the increasing use of Internet and mobile handsets, mobile-based electronic payment apps (MEPAs) are becoming very popular around the world due to having various advantages. The intention of this exploratory study is to investigate the role/impact of selected factors in adopting three MEPAs of China: Wechat, Alipay and UnionPay based on the extended technology acceptance model (ETAM). After conducting a thorough and careful literature review, this study identified and divided seven such factors into three broad categories: (1) technological factors: perceived ease of use (PEU) and perceived usefulness (PU); (2) personal factors: perceived trust (PT), perceived privacy (PP) and perceived risk (PR); and (3) social factors: social influence (SI) and peer influence (PI) that were assumed to affect the intention to adopt MEPAs (IAMEPAs).

Design/methodology/approach

1,597 Chinese individuals were selected through purposive sampling technique who regularly used MEPAs at the time of collecting data. For collecting primary data from the selected respondents, a cross-sectional survey instrument was used. The study utilized IBM SPSS 25 for descriptive statistics and a second generation covariance-based structural equation modeling (CB-SEM) technique through AMOS 25 for testing the hypothesized relationships.

Findings

From statistical analysis, it was identified that five factors: PEU, PU, PT, SI and PI have significant positive impact on the dependent variable, IAMEPAs while PR and PP have insignificant influence on IAMEPAs.

Originality/value

This is one of the studies ever conducted to discover the factors that can have impact on the adoption of MEPAs using ETAM. It is strongly expected that this exploratory study can motivate the scholars to commence additional investigations regarding this increasingly popular financial technology (Fin-Tech). In addition, it can be anticipated that the MEPA service providers can widen their service effectiveness according to the users’ opinion reflected in this study. Furthermore, policymakers involved with Fin-Tech can also formulate and implement effective policies and guidelines based on the empirical outcomes.

Details

Journal of Contemporary Marketing Science, vol. 7 no. 2
Type: Research Article
ISSN: 2516-7480

Keywords

Access

Year

Last week (498)

Content type

Article (498)
1 – 10 of 498