Search results

1 – 10 of over 1000

Abstract

Details

Ethical AI Surveillance in the Workplace
Type: Book
ISBN: 978-1-83753-772-3

Article
Publication date: 27 June 2023

Esra Istek and Chinaza Solomon Ironsi

Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted…

Abstract

Purpose

Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted language learning in language teaching, this study decides to incorporate a context-analysis-practice-exploration lesson-planning framework with mobile learning to improve the receptive skills of learners. This step is necessary on the recommendation by scholarly research that while implementing technology, teacher training, digital literacy and expertise, incorporating good teaching practices and lesson planning frameworks may assist in yielding positive results.

Design/methodology/approach

This study decides to utilize a mixed-method research design through an experimental approach to elicit information from 90 EFL students concerning the effectiveness of incorporating the context-analysis-practice-exploration framework in a mobile-leaning mode instructional delivery to improve their reading and listening skills.

Findings

After collecting and analyzing data, the study found that while the participants perceived enhanced-mobile learning to make lessons enjoyable, integrating this framework and m-learning improved their reading skills. This study used notable findings to make pedagogical conclusions on the objective of this study.

Originality/value

This study contributes through empirical evidence on the effectiveness of incorporating mobile learning and a responsive lesson planning framework towards improving English as a foreign language learners' learning outcome. Besides, this study is the first to probe and unpack the effectiveness of a responsive lesson-planning framework in language education.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Book part
Publication date: 16 January 2024

Ayodeji E. Oke and Seyi S. Stephen

In the effort to procure solutions to emerging challenges faced in the construction industry, construction stakeholders implemented the use of several technologies in construction…

Abstract

In the effort to procure solutions to emerging challenges faced in the construction industry, construction stakeholders implemented the use of several technologies in construction operations from the onset of project planning to completion. Cyber technology introduced into construction brought about the inclusion of wearable technology, mobile devices, apps, project management software, drones, 3D printers, robotics, etc. to enhance output as the industry tends towards that which is sustainable. This chapter identified benefits, barriers and other related cyber technology interactions within the scope of delivering projects that are of standard, budget and quality at the same time. The conclusion gave a summary of the whole chapter for further comprehension.

Details

A Digital Path to Sustainable Infrastructure Management
Type: Book
ISBN: 978-1-83797-703-1

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 30 December 2022

Hao Chen and Yufei Yuan

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…

Abstract

Purpose

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.

Design/methodology/approach

The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).

Findings

The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.

Originality/value

First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.

Article
Publication date: 9 August 2021

Mohammed Abbas and Adnan Alghail

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It…

Abstract

Purpose

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole.

Design/methodology/approach

This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP.

Findings

The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization.

Practical implications

For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations.

Originality/value

This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 53 no. 4
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 15 June 2023

Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…

Abstract

Purpose

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.

Design/methodology/approach

This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.

Findings

First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.

Originality/value

The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 9 June 2023

Mary Rice

Leading up to and now living amid the Covid-19 pandemic, teachers are faced with strong incentives, even pressure to adopt and use digital technologies. Previous research has…

Abstract

Leading up to and now living amid the Covid-19 pandemic, teachers are faced with strong incentives, even pressure to adopt and use digital technologies. Previous research has focused on teaching with digital technologies as a matter of believing in their importance and receiving specific preparation for integration strategies. Further, teaching with technologies must appear “seamless” during instruction to not distract from what is regarded to be the more important subject matter knowledge. In this chapter, I review and problematize digital instruction focused on convincing teachers to integrate strategies that use digital technologies in a “seamless” way and then propose an alternative view emphasizing posthumanist, relational views of integrating digital technologies.

Book part
Publication date: 29 May 2023

Shekhar Ashok Pawar and Hemant Palivela

Purpose: Small and medium enterprises (SMEs) are the most significant contributors to maximum employment generation, the gross domestic product (GDP) of many countries, and the…

Abstract

Purpose: Small and medium enterprises (SMEs) are the most significant contributors to maximum employment generation, the gross domestic product (GDP) of many countries, and the overall global economy. It is also evident that cyber threats are becoming a big challenge for SMEs, which is directly impacting global economy.

Methodology: Existing research inputs were accessed to understand current cyber threats for SMEs and their cybersecurity posture. Additionally, this research has collected the latest insights by taking direct inputs from SMEs and conducting a well-designed research survey. It has provided a few direct inputs to designing solutions for the SME segment. For analysis and recommendations, cybersecurity best practices and core cybersecurity concepts are considered at the centre of the solution.

Findings: Implementing existing cybersecurity standards or frameworks is not easy for SMEs, as they generally have limited resources and different priorities for their business when it comes to the implementation of any cybersecurity controls. Currently, many cybersecurity standards are not able to support the implementation of business domain-specific controls.

Practical implications: Along with the research findings shared in this chapter, as a resolution to the problems faced by SMEs, the authors will propose a new framework as a solution. This framework is designed using core concepts of cybersecurity such as confidentiality, integrity, and availability (CIA triad) as well as defence in depth (DiD) mechanisms in each layer of organisation. The authors will also share a high-level idea about how reliable artificial intelligence-based software can help identify recommended controls for particular SMEs.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-83753-416-6

Keywords

Content available
Book part
Publication date: 16 January 2024

Ayodeji E. Oke and Seyi S. Stephen

Abstract

Details

A Digital Path to Sustainable Infrastructure Management
Type: Book
ISBN: 978-1-83797-703-1

1 – 10 of over 1000