Search results

1 – 10 of 339
Article
Publication date: 27 June 2023

Esra Istek and Chinaza Solomon Ironsi

Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted…

Abstract

Purpose

Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted language learning in language teaching, this study decides to incorporate a context-analysis-practice-exploration lesson-planning framework with mobile learning to improve the receptive skills of learners. This step is necessary on the recommendation by scholarly research that while implementing technology, teacher training, digital literacy and expertise, incorporating good teaching practices and lesson planning frameworks may assist in yielding positive results.

Design/methodology/approach

This study decides to utilize a mixed-method research design through an experimental approach to elicit information from 90 EFL students concerning the effectiveness of incorporating the context-analysis-practice-exploration framework in a mobile-leaning mode instructional delivery to improve their reading and listening skills.

Findings

After collecting and analyzing data, the study found that while the participants perceived enhanced-mobile learning to make lessons enjoyable, integrating this framework and m-learning improved their reading skills. This study used notable findings to make pedagogical conclusions on the objective of this study.

Originality/value

This study contributes through empirical evidence on the effectiveness of incorporating mobile learning and a responsive lesson planning framework towards improving English as a foreign language learners' learning outcome. Besides, this study is the first to probe and unpack the effectiveness of a responsive lesson-planning framework in language education.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 15 June 2023

Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…

Abstract

Purpose

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.

Design/methodology/approach

This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.

Findings

First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.

Originality/value

The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 15 April 2024

Aswathy Sreenivasan and Suresh M.

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…

Abstract

Purpose

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.

Design/methodology/approach

The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.

Findings

By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 23 May 2023

Shahbaz Sharif, Omaima Munawar Albadry, Muhammad Kashif Durrani and Muhammad Hamid Shahbaz

Employees are driven and motivated to exercise knowledge-based resources as a result of leadership. Therefore, this study aims to examine the effect of authentic leadership on…

Abstract

Purpose

Employees are driven and motivated to exercise knowledge-based resources as a result of leadership. Therefore, this study aims to examine the effect of authentic leadership on organizational commitment and tacit and explicit knowledge-sharing behaviors in Saudi non-profit organizations (NPOs). The study also aims to explore authentic leadership’s direct and indirect impact on tacit and explicit knowledge-sharing behaviors via organizational commitment.

Design/methodology/approach

The study used a quantitative research design by distributing a survey questionnaire among 415 employees. A total of 300 responses were collected during the survey questionnaire data collection.

Findings

The results showed that authentic leadership significantly and positively influenced organizational commitment and tacit and explicit knowledge sharing. Additionally, organizational commitment significantly and positively mediated the relationship between authentic leadership and tacit knowledge sharing, and there was partial mediation. However, organizational commitment failed to mediate the relationship between authentic leadership and explicit knowledge sharing.

Practical implications

The management of Saudi NPOs should focus on developing knowledge capital resources for employees who work in an organization to get a competitive advantage.

Originality/value

The study made a novel contribution that the Saudi NPOs should promote tacit and explicit knowledge-sharing but focus more on explicit knowledge sharing.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 19 September 2023

Adebowale Jeremy Adetayo

This research aims to explore the integration of Bing Chat, an artificial intelligence (AI)-powered conversational assistant, into academic libraries and its potential impact on…

297

Abstract

Purpose

This research aims to explore the integration of Bing Chat, an artificial intelligence (AI)-powered conversational assistant, into academic libraries and its potential impact on reference services.

Design/methodology/approach

This study analyzes existing literature to investigate the integration of Bing Chat in academic libraries. This research focuses on its features, capabilities and implications for enhancing user experiences and addressing information needs.

Findings

The findings highlight that Bing Chat’s conversational interface facilitates more dynamic and context-aware reference interactions, fostering user empowerment and personalized learning pathways. The integration of Bing Chat with existing library resources enhances resource discovery, navigational assistance and engagement with visual content. However, challenges related to accuracy, privacy and algorithmic bias require careful consideration.

Originality/value

This research contributes to the literature by providing an in-depth exploration of Bing Chat’s integration into academic libraries, emphasizing its transformative potential for reference services. This study addresses ethical and social dimensions associated with AI-driven tools in library environments, offering insights into ensuring fairness, privacy and user trust.

Details

Library Hi Tech News, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0741-9058

Keywords

Access

Year

Last 12 months (339)

Content type

Earlycite article (339)
1 – 10 of 339