Search results

1 – 5 of 5
Expert briefing
Publication date: 24 April 2024

AI promises to drive economic efficiencies across sectors, improve the delivery of critical services such as healthcare, democratise access to knowledge and skills, and tighten…

Details

DOI: 10.1108/OXAN-DB286624

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 22 December 2022

Reihaneh Alsadat Tabaeeian, Behzad Hajrahimi and Atefeh Khoshfetrat

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Abstract

Purpose

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Design/methodology/approach

This study used Scopus and PubMed databases for scientific records identification. A systematic review of the literature structured by PRISMA guidelines was conducted on 37 included papers published between 2009 and 2019. A qualitative approach was used to synthesize insights into using telemedicine by primary care professionals.

Findings

Three barriers were identified and classified: system quality, data quality and service quality barriers. System complexity in terms of usability, system unreliability, security and privacy concerns, lack of integration and inflexibility of systems-in-use are related to system quality. Data quality barriers are data inaccuracy, data timeliness issues, data conciseness concerns and lack of data uniqueness. Finally, service reliability concerns, lack of technical support and lack of user training have been categorized as service quality barriers.

Originality/value

This review identified and mapped emerging themes of barriers to the use of telemedicine systems. This paper also through a new conceptualization of telemedicine use from perspectives of the primary care professionals contributes to informatics literature and system usage practices.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 17 August 2023

P.S. JosephNg

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that…

53

Abstract

Purpose

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used.

Design/methodology/approach

The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees.

Findings

The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here.

Research limitations/implications

This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand.

Practical implications

To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Social implications

To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Originality/value

The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 12 June 2023

Mark Anthony Camilleri

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking…

Abstract

Purpose

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to critically review the extant literature to investigate how, why, where and when the Metaverse can be used for educational purposes. This study also discusses opportunities, challenges and risks related to this disruptive technology.

Design/methodology/approach

A Preferred Reporting Items for Systematic Reviews and Meta-Analyses rigorous protocol is used to search, extract, scrutinize and synthesize content from high-impact articles focused on the use of the Metaverse technology in the realms of education. Afterwards, this study theorizes on the costs and benefits of using this interactive technology with students.

Findings

A number of researchers are already experimenting with virtual technologies that are very similar to the Metaverse, in different contexts. This research indicates that most students are lured by immersive multi-sensory three-dimensional environments as well as by virtual reality applications that could simulate real-life situations and provide engaging experiences with virtual representations of people, places and objects. On the other hand, this study reveals that educators ought to consider the potential pitfalls of the Metaverse, including privacy breaches and security risks, as well as possible addictions and the development of mental health issues, among others.

Practical implications

Students and educators can use the Metaverse to catapult themselves in a simulated digital universe that could reconfigure their sensory inputs, definitions of space, time and points of access to information. This research calls for the development of regulatory instruments, including sound principles, guidelines and procedures that are intended to safeguard and protect Metaverse users.

Originality/value

This contribution implies that there is scope for educators to continue developing the Metaverse’s virtual spaces to improve their students’ motivations, aptitudes and learning outcomes. This study clarifies that the use of the Metaverse in education can create infinite possibilities to enhance their knowledge, competences and abilities through its immersive applications. Yet this paper also raises awareness about possible challenges in the short term as well on other risks associated to the prolonged use of this captivating technology.

Details

Interactive Technology and Smart Education, vol. 21 no. 2
Type: Research Article
ISSN: 1741-5659

Keywords

1 – 5 of 5