Search results

1 – 10 of 378
Open Access
Article
Publication date: 26 January 2024

Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila and Juho Hamari

In recent years, there has been significant interest in adopting XR (extended reality) technologies such as VR (virtual reality) and AR (augmented reality), particularly in…

2062

Abstract

Purpose

In recent years, there has been significant interest in adopting XR (extended reality) technologies such as VR (virtual reality) and AR (augmented reality), particularly in retail. However, extending activities through reality-mediation is still mostly believed to offer an inferior experience due to their shortcomings in usability, wearability, graphical fidelity, etc. This study aims to address the research gap by experimentally examining the acceptance of metaverse shopping.

Design/methodology/approach

This study conducts a 2 (VR: with vs. without) × 2 (AR: with vs. without) between-subjects laboratory experiment involving 157 participants in simulated daily shopping environments. This study builds a physical brick-and-mortar store at the campus and stocked it with approximately 600 products with accompanying product information and pricing. The XR devices and a 3D laser scanner were used in constructing the three XR shopping conditions.

Findings

Results indicate that XR can offer an experience comparable to, or even surpassing, traditional shopping in terms of its instrumental and hedonic aspects, regardless of a slightly reduced perception of usability. AR negatively affected perceived ease of use, while VR significantly increased perceived enjoyment. It is surprising that the lower perceived ease of use appeared to be disconnected from the attitude toward metaverse shopping.

Originality/value

This study provides important experimental evidence on the acceptance of XR shopping, and the finding that low perceived ease of use may not always be detrimental adds to the theory of technology adoption as a whole. Additionally, it provides an important reference point for future randomized controlled studies exploring the effects of technology on adoption.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 11 April 2023

Xingchen Zhou, Pei-Luen Patrick Rau and Zhuoni Jie

This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.

Abstract

Purpose

This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.

Design/methodology/approach

This study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels.

Findings

This study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust.

Originality/value

This study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

144

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 June 2023

Manaf Al-Okaily

The purpose of this study is to gain empirical insights into whether accounting information systems (AIS) usage matters among Jordanian small and medium-sized enterprises (SMEs…

Abstract

Purpose

The purpose of this study is to gain empirical insights into whether accounting information systems (AIS) usage matters among Jordanian small and medium-sized enterprises (SMEs) during the period of COVID-19 pandemic.

Design/methodology/approach

The suggested research model in the current study is based on the extending technology acceptance model (TAM) to test the antecedents’ factors that impact on AIS usage among SMEs. To test the proposed research model, partial least squares structural equation modeling (PLS-SEM) was used.

Findings

The empirical findings revealed all postulated hypotheses were accepted except H3. Contrary to what is expected, the empirical outcomes confirmed that perceived compatibility does not affect the perceived usefulness of AIS, and hence, the related hypothesis was rejected.

Originality/value

The results of the current research could be beneficial to a number of managers (owners) to obtain a better understanding of the benefits of AIS success usage among Jordanian SMEs performance during crises time as the COVID-19 pandemic crisis.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 18 July 2023

Karrar Khalaf Jabbar Allami, Faozi A. Almaqtari, Hamood Mohammed Al-Hattami and Ritu Sapra

This study aims to investigate the factors associated with the intention to use information technology in audit (ITIA) in Iraq.

Abstract

Purpose

This study aims to investigate the factors associated with the intention to use information technology in audit (ITIA) in Iraq.

Design/methodology/approach

The study uses a quantitative approach based on a questionnaire survey of 186 respondents. The study population includes respondents who are board members, senior executives, internal auditors and information technology (IT) assistants in various Iraqi organizations from different sectors. Structural equation modeling has been used to estimate the results.

Findings

The findings exhibit that most auditors in Iraq use basic IT software. However, among several specialized and advanced IT audit software packages, only generalized audit software is used by about 20%. The results also indicate that social factors significantly and positively impact auditors’ and practitioners’ perceptions of ITIA use. Moreover, the results reveal that companies and auditors who use or audit complex accounting systems perceive higher benefits and intent to adopt ITIA. However, the results report that organizational support, professional support, competency and IT education have an insignificant effect on ITIA adoption.

Originality/value

The originality of the present research lies in several aspects. First, the research study focuses specifically on Iraq, which is an emerging and less developed country influenced by social and economic. This research context provides a unique perspective and contributes to the understanding of ITIA adoption in less developed countries. The study investigates how external factors, including social and external pressure and the support of government professional bodies, affect the adoption of ITIA. Further, it assesses the influence of firms’ specific factors such as management support, level of competency and complexity of accounting information systems. Second, the study uses a quantitative approach with a questionnaire survey from various Iraqi organizations and sectors. The specific sample composition adds originality by capturing insights from different levels of organizational hierarchy and diverse professional backgrounds. Third, the findings shed light on the current IT usage in auditing practices in Iraq, highlighting that most auditors use basic IT software and the limited adoption of specialized IT audit software packages. Finally, the study’s originality is also reflected in its contribution to expanding knowledge on the perceived benefits and challenges associated with ITIA adoption in less developed countries. By emphasizing the need for broader awareness of emerging technology-enabled auditing software and considering the unique characteristics of less developed countries, the research provides valuable insights and implications for practitioners, policymakers and researchers.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 22 June 2023

Javaid Ahmad Wagay and Saurabh Dutta

This paper focuses on the use of e-resources by research scholars and post-graduate students at Kashmir University. The main aim is to determine the use of e-resources, users…

Abstract

Purpose

This paper focuses on the use of e-resources by research scholars and post-graduate students at Kashmir University. The main aim is to determine the use of e-resources, users skills in handling e-resources and the purpose of their use. Further, this paper aims to highlight the problems faced by research scholars and post-graduate students in accessing e-resources.

Design/methodology/approach

The survey was conducted through a structured questionnaire circulated among 250 research scholars, both (M.Phil./Ph.D.) and post-graduate students, from different departments of Kashmir University, and the response rate was 80%. Random sample method was used for the selection of respondents and interacting with them. The responses received from the research scholars to 14 questions are presented in the form of tables.

Findings

Major findings of the study reveal that the majority of the students reported using electronic journal resources for various purposes including working on assignments, research proposal writing, literature review writing, research report writing, current awareness and leisurely exploration of ongoing scientific debates through peer-reviewed papers. The challenges encountered in the use of electronic journal resources include a power outage, inadequate bandwidth, slow download speed, inability to access the resources from home, lack of training, lack of awareness, limited access to computers and difficulty in searching. The paper concludes that electronic resources have become an integral part of the information needs of research scholars’ post-graduate students at Kashmir University. Further, it finds that e-resources can be good substitutes for conventional resources, if the access is fast, and more computer terminals are installed to provide fast access to e-resources. Finally, recommendations for improving the use of electronic journal resources are provided.

Practical implications

The paper restrains the study exclusively to use of e-resources by the research scholars and post-graduate students of Kashmir University.

Originality/value

The paper highlights the use of e-resources by research scholars and post-graduate students of Kashmir University and makes some constructive suggestions for the improvement of electronic resources and services. This is the first time an effort has been made to assess the use of electronic resources by post-graduate students at Kashmir University. The study could be used to assess the post-graduate students’ needs for electronic resources at the Kashmir University and other users in higher learning institutions.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 April 2023

Dan Li, Hualong Yang and Zhibin Hu

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have…

Abstract

Purpose

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have investigated the positive effect of gamification competition on users, little research has considered gamification's ineffectiveness and negative effects. In particular, how gamification competition affects users' technological exhaustion remains unclear.

Design/methodology/approach

According to flow theory and related research on gamification, this study discusses the nonlinear relationship between gamification competition and users' technological exhaustion. Furthermore, the authors analyze the moderating effect of user type (socializers and achievers) and users' health condition on this nonlinear relationship. Based on flow theory, the authors propose a series of research hypotheses. To test all research hypotheses, the authors collected information from 407 users via a questionnaire as the data for this study.

Findings

The empirical results found a U-shaped relationship between gamification competition and technological exhaustion. Technological exhaustion gradually decreases as competition increases until reaching the lowest point; after that, technological exhaustion gradually increases as competition increases. Further, being a socializer and health condition play a moderating role in the U-shaped relationship between competition and technological exhaustion.

Originality/value

This study's findings not only enrich the related research in flow theory and gamification, but also contribute to the effective design of gamification in health management platforms.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1106

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 April 2024

Gabriel A. Ogunmola and Ujjwal Das

This paper aims to comprehensively analyze the factors influencing the adoption intentions of the digital rupee, a digital currency, among users in India.

Abstract

Purpose

This paper aims to comprehensively analyze the factors influencing the adoption intentions of the digital rupee, a digital currency, among users in India.

Design/methodology/approach

Drawing upon the Technology Acceptance Model (TAM), the study examines the relationships between cognitive beliefs (perceived usefulness, perceived ease of use, perceived trust, perceived self-efficacy, perceived cost and awareness), affective belief (attitude) and adoption intention of the digital rupee. The study uses a structured questionnaire to collect primary data from 1,707 respondents, which are then analyzed using structural equation modeling.

Findings

The results indicate that perceived usefulness and perceived ease of use significantly impact users' attitudes toward the digital rupee, as well as their adoption intentions. The findings further reveal that perceived trust, perceived self-efficacy, and awareness positively influence attitude and adoption intention. On the other hand, perceived cost exhibits a negative effect on attitude and adoption intention. These results provide empirical evidence on the factors that shape users' attitudes and intentions toward adopting the digital rupee.

Research limitations/implications

The research methodology used in this study ensures rigorous data collection and analysis. The structured questionnaire enabled the collection of detailed information from a large sample of respondents, allowing for robust statistical analysis. The utilization of structural equation modeling facilitated the examination of complex relationships among variables, enhancing the reliability and validity of the findings.

Practical implications

The study's findings offer practical guidance for policymakers, financial institutions and researchers in shaping digital currency regulatory frameworks, tailored financial services and further exploration of adoption dynamics.

Social implications

The research has social implications by potentially influencing the way individuals and communities in India engage with digital currencies, impacting financial inclusion and digital economic participation.

Originality/value

This research contributes to the understanding of the adoption of digital currencies in India and provides valuable insights for policymakers, financial institutions and researchers in the field of digital finance and technology adoption.

Details

Digital Policy, Regulation and Governance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of 378