Search results

1 – 10 of 397
Article
Publication date: 27 June 2023

Esra Istek and Chinaza Solomon Ironsi

Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted…

Abstract

Purpose

Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted language learning in language teaching, this study decides to incorporate a context-analysis-practice-exploration lesson-planning framework with mobile learning to improve the receptive skills of learners. This step is necessary on the recommendation by scholarly research that while implementing technology, teacher training, digital literacy and expertise, incorporating good teaching practices and lesson planning frameworks may assist in yielding positive results.

Design/methodology/approach

This study decides to utilize a mixed-method research design through an experimental approach to elicit information from 90 EFL students concerning the effectiveness of incorporating the context-analysis-practice-exploration framework in a mobile-leaning mode instructional delivery to improve their reading and listening skills.

Findings

After collecting and analyzing data, the study found that while the participants perceived enhanced-mobile learning to make lessons enjoyable, integrating this framework and m-learning improved their reading skills. This study used notable findings to make pedagogical conclusions on the objective of this study.

Originality/value

This study contributes through empirical evidence on the effectiveness of incorporating mobile learning and a responsive lesson planning framework towards improving English as a foreign language learners' learning outcome. Besides, this study is the first to probe and unpack the effectiveness of a responsive lesson-planning framework in language education.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 15 June 2023

Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…

Abstract

Purpose

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.

Design/methodology/approach

This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.

Findings

First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.

Originality/value

The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 12 December 2023

Cristina A. Huertas-Abril and Francisco Javier Palacios-Hidalgo

Considering the potential of Collaborative International Online Learning (COIL) for cross-boundaries interacting and collaborating effectively, this study aims to explore the…

Abstract

Purpose

Considering the potential of Collaborative International Online Learning (COIL) for cross-boundaries interacting and collaborating effectively, this study aims to explore the intercultural awareness of pre-service language teachers after participating in a COIL project.

Design/methodology/approach

Following a quantitative research approach and an exploratory cross-sectional method, the authors administered a 13-item questionnaire to unveil the perceptions of 64 future language teachers from Spain after their online experience with counterparts from the USA.

Findings

Participants consider that COIL may have enhanced their intercultural and global awareness and equipped them with valuable skills and knowledge for the future, being women more positive than men. Moreover, the results also suggest that those participants who have not traveled abroad consider COIL to be a good opportunity to compensate for the lack of knowledge or experience with other cultures resulting from not having had the opportunity to visit other countries.

Practical implications

COIL needs to be seen as a powerful tool to promote global learning, intercultural understanding and the development of skills among students that will be vital for success in today’s interconnected world. Nevertheless, universities and teacher training centers need to rethink the preparation of future teachers for the increasing demands to prepare students for the requirements of the global world, and to do so, they need to consider that COIL may offer them significant benefits.

Originality/value

This work offers an interesting exploration of teachers’ attitudes toward COIL, providing insights into the potential of online collaboration for developing intercultural awareness.

Details

Journal for Multicultural Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-535X

Keywords

Article
Publication date: 15 April 2024

Aswathy Sreenivasan and Suresh M.

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…

Abstract

Purpose

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.

Design/methodology/approach

The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.

Findings

By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 February 2023

Nadia Safura Zabidin, Sheila Belayutham and Che Khairil Izam Che Ibrahim

The purpose of this study is to explore the knowledge, attitude and practices (KAP) of Industry 4.0 between the academicians and industry players in construction engineering…

Abstract

Purpose

The purpose of this study is to explore the knowledge, attitude and practices (KAP) of Industry 4.0 between the academicians and industry players in construction engineering, further suggesting a mechanism to narrow the gap between the distinct parties.

Design/methodology/approach

This study was conducted through structured online and face-to-face interviews, using KAP survey, and semi-structured interviews. This constructive research was conducted among Malaysian construction industry players and academicians from the construction engineering department in public universities.

Findings

The findings exhibit the similarities and differences of KAP between academics and industry on Industry 4.0 in construction engineering. In general, both categories of respondents have displayed more similarities than differences in all aspects, except for knowledge. The better knowledge profile of Industry 4.0 among the academicians reflects the nature of the academic works that constantly seek new knowledge, thus suggesting the establishment of an industry-academic (I-A) knowledge equilibrium framework to leverage the knowledge profile between both parties.

Research limitations/implications

This exploratory study that showcases the perspective of the academia and industry practitioners on Industry 4.0 acts as a cornerstone for bridging the gap between the two distinct sectors within the same field.

Practical implications

The gap between the academic and industry was highlighted, further establishing the I-A knowledge equilibrium framework that could also be applied to other fields of study.

Originality/value

The originality of this paper was the profiling of the KAP of Industry 4.0 for the academicians and industry players in construction engineering, further distinguishing the gap between both parties.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 19 April 2023

Adobi Jessica Timiyo and Samuel Foli

This paper aims to systematically review the literature on knowledge leakage through social networks in the past decade to find existing gaps, identify potential risk factors…

Abstract

Purpose

This paper aims to systematically review the literature on knowledge leakage through social networks in the past decade to find existing gaps, identify potential risk factors while, ultimately, proposing ways of mitigating these factors.

Design/methodology/approach

This study adopted Preferred Reporting Items for Systematic reviews and Meta-Analysis as guide for searching relevant scholarly publications. Subject-specific and -related research papers were obtained from three databases, namely, Scopus, Web of Science and EBSCOhost. The review data was generated from the search results while adopting specific criteria to either accept or reject a particular publication during the search process.

Findings

Technological, operational and human knowledge factors are some of the risks resulting from knowledge leakage. Highlights of the paper include strategies for mitigating these factors, including continuous training, creating awareness, banning social media usage at work and reinforcing nondisclosure policies. This study also found potential gaps from the literature, categorized as topical, geographical, industrial, theoretical, methodological and conceptual gaps while proposing ways of addressing these gaps using specific research questions. These questions set the direction for future studies on knowledge leakage and social networks.

Originality/value

Implications of the findings are laid out, particularly the idea of developing actionable managerial plans for preventing knowledge leakage from occurring in organizations in the first place. The systematic, rigorous, transparent and methodological procedures used throughout the entire research process strongly suggest that the findings and conclusions are legitimate. While the findings were not drawn arbitrarily, they potentially offer windows of opportunities for bridging the six potential gaps identified in this paper.

Details

VINE Journal of Information and Knowledge Management Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5891

Keywords

1 – 10 of 397