Search results

1 – 10 of over 53000
Book part
Publication date: 9 October 1996

Bryce Allen

Abstract

Details

Information Tasks: Toward a User-centered Approach to Information Systems
Type: Book
ISBN: 978-1-84950-801-8

Article
Publication date: 8 August 2016

Natalie Pang and Debbie Pei Chin Goh

Building on studies examining the role of social media in contemporary forms of collective action and social movements, the purpose of this paper is to investigate the link…

1956

Abstract

Purpose

Building on studies examining the role of social media in contemporary forms of collective action and social movements, the purpose of this paper is to investigate the link between prior informational use of social media and individualized collective action.

Design/methodology/approach

In total, 220 participants were surveyed in real-time during a protest against overpopulation in Singapore.

Findings

Social media use was significant in disseminating information about the protest, and reflecting perceived personal relevance for specific issues. The authors found mixed motivations for attending the protest, significantly shaped by social proximity to organizers and personal relevance.

Originality/value

The authors address research gaps in the link between social media use and individualized collective action, and real-time data collection during a protest. It is often difficult to study this link, given that social media may not be always the only platform used prior to a protest by participants. The case discussed here provides a unique opportunity for this to be addressed: the protest was not publicized by local mainstream media prior to the event and social media was the only place for both activists and the public to find and disseminate information about the protest. In other words, how participants used social media had a direct and meaningful impact on their participation in the protest.

Details

Online Information Review, vol. 40 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 5 April 2021

Dirk P. Snyman and Hennie Kruger

This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.

Abstract

Purpose

This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.

Design/methodology/approach

Information security behavioural threshold analysis is used as the theoretical foundation for the proposed framework. The suitability of the proposed framework is evaluated based on two sets of qualitative measures (general frameworks and information security frameworks) which were identified from literature. The successful evaluation of the proposed framework, guided by the identified evaluation measures, is presented in terms of positive practical applications, as well as positive peer review and publication of the underlying theory.

Findings

A methodology to formalise a framework to analyse group behaviour in information security can successfully be applied in a practical environment. This application takes the framework from only a theoretical conceptualisation to an implementable solution to evaluate and positively influence information security group behaviour.

Practical implications

Behavioural threshold analysis is identified as a practical mechanism to evaluate information security group behaviour. The suggested framework, as implemented in a management decision support system (DSS), allows practitioners to assess the security behaviour and awareness in their organisation. The resulting information can be used to exert an influence for positive change in the information security of the organisation.

Originality/value

A novel conceptual mapping of two sets of qualitative evaluation measures is presented and used to evaluate the proposed framework. The resulting framework is made practical through its encapsulation in a DSS.

Details

Information & Computer Security, vol. 29 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 July 2020

Remigiusz Sapa

The principal aim of the present study was to identify and model the subject structure of the research area on collaborative information behaviour (CIB).

Abstract

Purpose

The principal aim of the present study was to identify and model the subject structure of the research area on collaborative information behaviour (CIB).

Design/methodology/approach

A qualitative, inductive and exploratory approach was adopted, and the method of thematic analysis was used. This study was based on the analysis of 79 publications selected from the Library, Information Science and Technology Abstracts (LISTA) database in April 2019.

Findings

Collaborative and collective information behaviours were differentiated, and the subject structure of the CIB research area was identified to contain collaborative activities oriented to both information access and content, their various conditions, means of conducting, experiences of selected communities and metascientific research on the area itself.

Research limitations/implications

The limitations result primarily from relying on the research material selected from the database (LISTA) focussed mainly on the issues of library and information science.

Originality/value

This study contributes by proposing an original model of the CIB research area representing its subject structure and providing a coherent list of subjects of interest to CIB researchers. Hopefully, it will also contribute to the harmonisation of terminology related to this research area and thus facilitate communication between CIB researchers and accelerate the cumulative development of scientific knowledge on CIB.

Article
Publication date: 12 June 2017

Dirk Snyman and Hennie Kruger

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

Abstract

Purpose

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

Design/methodology/approach

Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour.

Findings

Initial experimental results show that behavioural threshold analysis is feasible in the context of information security and may provide useful guidelines on how to construct information security awareness programmes.

Practical implications

Threshold analysis may contribute in a number of ways to information security, e.g. identification of security issues that are susceptible to peer pressure and easily influenced by peer behaviour; serve as a countermeasure against security fatigue; contribute to the economics of information security awareness programmes; track progress of security awareness campaigns; and provide a new measure for determining the importance of security awareness issues.

Originality/value

This paper describes the very first experiment to test the behavioural threshold analysis concepts in the context of information security.

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 October 2020

Yuxiang Chris Zhao, Yan Zhang, Jian Tang and Shijie Song

In the domain of information science, affordance is a relatively new concept that deserves further exploration. It may serve as a bridge to narrow the research-practice gap that…

1174

Abstract

Purpose

In the domain of information science, affordance is a relatively new concept that deserves further exploration. It may serve as a bridge to narrow the research-practice gap that has persisted in information studies. Building upon previous research, we call for a broader concept of affordance that would help researchers understand information practices from an ecological perspective.

Design/methodology/approach

The study focuses on conceptualizing affordances for information practices in order to theorize engagement among people, technology, and sociocultural environments. We develop a hierarchical model and a component model to illustrate how key tenets of affordances can be linked with the decomposition of activities and its mechanism. Following this, we describe an illustrative case of a popular Chinese cloud-based music platform to demonstrate the utility of our conceptual frameworks in guiding studies of information practices.

Findings

The study proposes to shift the focus of technology affordances, which highlights the features and functions of particular technologies, to the affordances for practices that are enacted through technology and social construction within a sociocultural environment. The illustrative case of the cloud-based music platform shows that the proposed models can provide a structured view of operations, actions and motives for music information practices. The processes of internalization and externalization offer insight into the decomposition of information practice as a chain of activity-action-operation.

Originality/value

This study contributes to the literature on theorizing engagement among people, technology and sociocultural environments through the theoretical lens of affordances and sheds new light on the challenges of information practice.

Details

Journal of Documentation, vol. 77 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 2 September 2014

Jenna Hartel

The liberal arts hobby is a leisure pursuit that entails the systematic and fervent pursuit of knowledge for its own sake. The purpose of this paper is to introduce the liberal…

1440

Abstract

Purpose

The liberal arts hobby is a leisure pursuit that entails the systematic and fervent pursuit of knowledge for its own sake. The purpose of this paper is to introduce the liberal arts hobby as a setting for information behavior research.

Design/methodology/approach

The method of interdisciplinary translation work is used to relate existing research from the specialties of leisure studies, adult education, and information behavior. Drawing from leisure studies, the liberal arts hobby is presented within the context of the serious leisure perspective, a theoretical framework of leisure. Also, relevant research.

Findings

The basic informational features of the liberal arts hobby and adult learning project are discussed in terms of three issues of current interest within information behavior scholarship. The issues are: first, social metatheory and the ideal level of analysis; second, time and information behavior; and third, information behavior in pleasurable and profound contexts.

Research limitations/implications

Research into everyday life, serious leisure and hobbies is extended and methodological tools are provided.

Practical implications

Information professionals, such as public librarians or systems designers, will have a better understanding of the information experience of a popular hobby group and be better able to meet their information needs.

Social implications

Awareness and understanding of the liberal arts hobby will be increased across the field of information science, thereby creating a better alignment between the field and society.

Originality/value

The paper is the first to establish an interdisciplinary starting point for information behavior research in the liberal arts hobby.

Details

Journal of Documentation, vol. 70 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 26 August 2021

John Thorley, Jose Arturo Garza-Reyes and Anthony Anosike

Over the last decade, circular economy (CE) has gathered interest from both industrialists and academics alike. Whilst CE research is widespread in such areas as supply chain and…

Abstract

Purpose

Over the last decade, circular economy (CE) has gathered interest from both industrialists and academics alike. Whilst CE research is widespread in such areas as supply chain and larger organisations, there is limited research into how small to medium enterprises (SMEs) can prepare for adopting CE. There is no comprehensive readiness model for SMEs adopting CE. The purpose of this paper is to explore the literature on change readiness and generate knowledge to fill this gap by developing a conceptual model to measure change readiness for SMEs' adopting CE.

Design/methodology/approach

This study is based on a comprehensive literature review of change readiness models and frameworks. The paper reviews publications from Science Direct, Web of Science, Emerald, Scopus and Google Scholar. The readiness for change models and frameworks from the selected publications are evaluated and synthesised to develop a comprehensive conceptual model for change readiness for SMEs adopting a circular economy.

Findings

A readiness conceptual model is developed by incorporating several factors as precursors to readiness, i.e. individual/collective difference, structural, contextual factors and related barriers. Eleven factors make up the individual/collective difference. Three factors make up the structural and contextual factors.

Practical implications

This paper develops a conceptual model that can aid academics and practitioners in better understanding SMEs readiness to adopt CE.

Originality/value

This paper makes a unique contribution by proposing a comprehensive conceptual model of readiness for SMEs adopting CE.

Details

Benchmarking: An International Journal, vol. 29 no. 4
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 9 July 2018

Dirk P. Snyman, Hennie Kruger and Wayne D. Kearney

The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.

Abstract

Purpose

The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.

Design/methodology/approach

Behavioural threshold analysis is used to test for the presence of the lemming effect in information security behaviour. Paradoxical behaviour may be caused by the influential nature of the lemming effect. The lemming effect is presented as a possible cause of the privacy paradox.

Findings

The behavioural threshold analysis indicates that the lemming effect is indeed present in information security behaviour and may lead to paradoxical information security behaviour.

Practical implications

The analysis of the lemming effect can be used to assist companies in understanding the way employees influence each other in their behaviour in terms of security. By identifying possible problem areas, this approach can also assist in directing their information security education endeavours towards the most relevant topics.

Originality/value

This research describes the first investigation of the lemming effect in information security by means of behavioural threshold analysis in practice.

Details

Information & Computer Security, vol. 26 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 October 2019

Hamilton Coimbra Carvalho and Jose Afonso Mazzon

This paper aims to expose the inadequacy of social marketing to tackle complex social problems, while proposing an expansion in the discipline’ conceptual repertoire. The goal is…

Abstract

Purpose

This paper aims to expose the inadequacy of social marketing to tackle complex social problems, while proposing an expansion in the discipline’ conceptual repertoire. The goal is to incorporate complexity tools, in particular from the system dynamics field, and the promotion of mindware within a true transdisciplinary paradigm.

Design/methodology/approach

This paper uses literature review to support the proposed theoretical development. It also presents a short case study.

Findings

Most problems that plague our modern societies have a distinctive complex nature that is not amenable to traditional social marketing interventions. Social marketing has simplified the problem of bringing about societal change by thinking that upstream social actors can be influenced in the same way as downstream individuals. This paper shows that this is not the case while proposing a framework to close this gap.

Research limitations/implications

The proposed framework is a theoretical one. It depends on further refinements and actual application to wicked problems.

Practical implications

Complex social problems – or wicked problems – remain widespread in modern societies. Moreover, they are getting worse over time. The paper presents a proposal to redefine the limits of the social marketing discipline so it can be more useful to tackle such problems. Practical approaches such as measuring the success of mindware in the marketplace of ideas are implied in the proposed framework.

Social implications

The increase in complexity of social problems has not been accompanied by an evolution in the discipline of social marketing. The lack of proper conceptual tools has prevented the discipline from contributing to tackling these problems effectively. Some interventions may actually worsen the underlying problems, as illustrated in the paper.

Originality/value

This paper identifies two major gaps associated with the social marketing discipline, in particular the lack of complexity and systems thinking and the forsaking of ideas (mindware) as a legitimate goal of the discipline. This realization corroborates the claim that boundaries among disciplines are often artificial, hindering the proper understanding of complex social problems. In turn, only the use of adequate conceptual lenses makes it possible to devise interventions and programs that tackle actual causes (instead of symptoms) of complex social problems.

Details

Journal of Social Marketing, vol. 10 no. 1
Type: Research Article
ISSN: 2042-6763

Keywords

1 – 10 of over 53000