Search results

1 – 10 of 417
Open Access
Article
Publication date: 12 December 2023

Cristina A. Huertas-Abril and Francisco Javier Palacios-Hidalgo

Considering the potential of Collaborative International Online Learning (COIL) for cross-boundaries interacting and collaborating effectively, this study aims to explore the…

Abstract

Purpose

Considering the potential of Collaborative International Online Learning (COIL) for cross-boundaries interacting and collaborating effectively, this study aims to explore the intercultural awareness of pre-service language teachers after participating in a COIL project.

Design/methodology/approach

Following a quantitative research approach and an exploratory cross-sectional method, the authors administered a 13-item questionnaire to unveil the perceptions of 64 future language teachers from Spain after their online experience with counterparts from the USA.

Findings

Participants consider that COIL may have enhanced their intercultural and global awareness and equipped them with valuable skills and knowledge for the future, being women more positive than men. Moreover, the results also suggest that those participants who have not traveled abroad consider COIL to be a good opportunity to compensate for the lack of knowledge or experience with other cultures resulting from not having had the opportunity to visit other countries.

Practical implications

COIL needs to be seen as a powerful tool to promote global learning, intercultural understanding and the development of skills among students that will be vital for success in today’s interconnected world. Nevertheless, universities and teacher training centers need to rethink the preparation of future teachers for the increasing demands to prepare students for the requirements of the global world, and to do so, they need to consider that COIL may offer them significant benefits.

Originality/value

This work offers an interesting exploration of teachers’ attitudes toward COIL, providing insights into the potential of online collaboration for developing intercultural awareness.

Details

Journal for Multicultural Education, vol. 18 no. 1/2
Type: Research Article
ISSN: 2053-535X

Keywords

Article
Publication date: 15 April 2024

Aswathy Sreenivasan and Suresh M.

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…

Abstract

Purpose

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.

Design/methodology/approach

The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.

Findings

By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Book part
Publication date: 19 March 2024

Catherine Sandoval and Patrick Lanthier

This chapter analyzes the link between the digital divide, infrastructure regulation, and disaster planning and relief through a case study of the flood in San Jose, California…

Abstract

This chapter analyzes the link between the digital divide, infrastructure regulation, and disaster planning and relief through a case study of the flood in San Jose, California triggered by the Anderson dam’s overtopping in February 2017 and an examination of communication failures during the 2018 wildfire in Paradise, California. This chapter theorizes that regulatory decisions construct social and disaster vulnerability. Rooted in the Whole Community approach to disaster planning and relief espoused by the United Nations and the Federal Emergency Management Agency, this chapter calls for leadership to end the digital divide. It highlights the imperative of understanding community information needs and argues for linking strategies to close the digital divide with infrastructure and emergency planning. As the Internet’s integration into society increases, the digital divide diminishes access to societal resources including disaster aid, and exacerbates wildfire, flood, pandemic, and other risks. To mitigate climate change, climate-induced disaster, protect access to social services and the economy, and safeguard democracy, it argues for digital inclusion strategies as a centerpiece of community-centered infrastructure regulation and disaster relief.

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

Keywords

Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 19 December 2023

Md Rokonuzzaman, Abdullah Alhidari, Ahasan Harun, Audhesh Paswan and Derrick D'Souza

Hoping to increase the productivity of their employees, firms provide and expect their employees to use approved mobile apps. However, despite an intuitive appeal, the…

Abstract

Purpose

Hoping to increase the productivity of their employees, firms provide and expect their employees to use approved mobile apps. However, despite an intuitive appeal, the relationship between information technology usage and productivity is still seen as paradoxical. This study examines the relationship between employees' experience and engagement with business mobile apps provided by employers and its effects on employee work productivity.

Design/methodology/approach

Data from respondents who use employer-provided business apps were used to test the hypotheses. Measurement-corrected latent scores extracted from the PLS measurement evaluation were used in regression-centric assessment using PROCESS.

Findings

Results indicate that employee-users’ experience-based attributions of the business app, i.e. customization, performance quality and compatibility, have positive effects on productivity mediated by participation intensity. Further, work type (retail vs non-retail) and the depth of the employee user’s experience moderate experience-based attributions' indirect effects on productivity.

Originality/value

Unlike previous studies delving into this topic, this study focuses solely on the mediation and moderation effects for hypothesis testing. Specifically, this study investigates effects conditional on work type (retail vs non-retail), which the authors believe has significant implications for retailing. These findings have interesting implications for both future research and managers.

Details

Industrial Management & Data Systems, vol. 124 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 8 April 2024

Amaresh Panda and Sanjay Mohapatra

Abstract

Details

The Online Healthcare Community
Type: Book
ISBN: 978-1-83549-141-6

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1044

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 2 January 2024

Muvhulawa Matumba and Mogiveny Rajkoomar

Globally, mobile technology is a significant factor influencing how libraries are changing the ways of delivering services to today’s users. This paper aims to explore academic…

Abstract

Purpose

Globally, mobile technology is a significant factor influencing how libraries are changing the ways of delivering services to today’s users. This paper aims to explore academic librarians’ perceptions of the usefulness of mobile technology in delivering library services and the efforts required for its successful adoption.

Design/methodology/approach

The study was conducted within an interpretive paradigm. The research objectives were underpinned by the unified theory of acceptance and use of technology as a theoretical framework. Data were collected through semi-structured interviews and analyses using NVIVO for thematic analysis.

Findings

Results show that, in general, academic librarians support the use of mobile technology to provide services such as access to eBooks and Journals, Online Public Access Catalogue, Bookmyne application, information literacy consultations and training. Library managers, fellow librarians and users were identified as encouraging the adoption of mobile technology to enhance library services. The paper further confirms that the successful adoption of mobile technology requires some effort. However, due to some of the challenges presented in the study, a majority of respondents felt that their libraries are not yet ready to fully embrace mobile technology the way it is envisioned in today’s world.

Practical implications

The study endeavours to address the divergence between students and academic librarians’ viewpoints regarding the application of mobile technology in the provision of library services.

Originality/value

This paper highlights numerous ways that academic librarians could adopt and embrace mobile technology, which can benefit both academic libraries and other institutions of higher learning. The knowledge presented in this paper could assist academic librarians in assessing their institutions’ vulnerabilities, challenges and strengths in using mobile technologies to provide library services.

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 417