Search results

1 – 10 of over 4000
Article
Publication date: 20 July 2023

Elaheh Hosseini, Kimiya Taghizadeh Milani and Mohammad Shaker Sabetnasab

This research aimed to visualize and analyze the co-word network and thematic clusters of the intellectual structure in the field of linked data during 1900–2021.

Abstract

Purpose

This research aimed to visualize and analyze the co-word network and thematic clusters of the intellectual structure in the field of linked data during 1900–2021.

Design/methodology/approach

This applied research employed a descriptive and analytical method, scientometric indicators, co-word techniques, and social network analysis. VOSviewer, SPSS, Python programming, and UCINet software were used for data analysis and network structure visualization.

Findings

The top ranks of the Web of Science (WOS) subject categorization belonged to various fields of computer science. Besides, the USA was the most prolific country. The keyword ontology had the highest frequency of co-occurrence. Ontology and semantic were the most frequent co-word pairs. In terms of the network structure, nine major topic clusters were identified based on co-occurrence, and 29 thematic clusters were identified based on hierarchical clustering. Comparisons between the two clustering techniques indicated that three clusters, namely semantic bioinformatics, knowledge representation, and semantic tools were in common. The most mature and mainstream thematic clusters were natural language processing techniques to boost modeling and visualization, context-aware knowledge discovery, probabilistic latent semantic analysis (PLSA), semantic tools, latent semantic indexing, web ontology language (OWL) syntax, and ontology-based deep learning.

Originality/value

This study adopted various techniques such as co-word analysis, social network analysis network structure visualization, and hierarchical clustering to represent a suitable, visual, methodical, and comprehensive perspective into linked data.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 11 September 2024

Selim Ahmed, Ujjal Yaman Chowdhury, Dewan Mehrab Ashrafi, Musfiq Mannan Choudhury, Rafiuddin Ahmed and Rubina Ahmed

The present study investigates the customers' behavioural intention to use voice-based artificial intelligence (AI) to find the appropriate hotels and resorts in an emerging…

Abstract

Purpose

The present study investigates the customers' behavioural intention to use voice-based artificial intelligence (AI) to find the appropriate hotels and resorts in an emerging nation. This study determines the influences of information quality, system quality, privacy, and novelty value on attitude and behavioural intention to use voice-based artificial intelligence to obtain the appropriate information and find the location of the hotels and resorts.

Design/methodology/approach

This study used a purposive sampling method for collecting data from the respondents, who are customers of the hotels and resorts in Bangladesh. A self-administered survey questionnaire was used to obtain responses from 378 respondents. After collecting the data, the reliability and validity of the constructs and hypotheses were tested via partial least squares structural equation modelling (PLS-SEM).

Findings

The findings of the study indicate that information quality, system quality, privacy and novelty value have a positive and significant impact on attitude and behavioural intention to use voice-based AI assistant services in an emerging nation. However, system quality does not significantly influence behavioural intention to use voice-based AI assistant but it has an indirect significant influence on behavioural intention through the mediation effect of attitude.

Practical implications

The study’s findings provide essential guidelines for practitioners to understand the impacts of information quality, system quality, privacy, and novelty value on attitude and behavioural intention to use voice-based artificial intelligence to find the appropriate hotels and resorts to meet customers' needs and expectations.

Originality/value

This study contributes to the existing literature on technology adoption by highlighting the interconnectedness of various factors influencing users' behavioural intentions. The study’s focus on an emerging nation provides a valuable theoretical contribution. It highlights that user perceptions and attitudes towards technology adoption may differ from those in developed nations due to unique contextual factors.

Details

Journal of Hospitality and Tourism Insights, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 14 July 2023

Soumya Mohapatra, Banda Sainath, Anirudh K.C., Hminghlui Lal, Nithin Raj K., Gunjan Bhandari, Joan Nyika and Sendhil R.

Blockchain technology (BCT), since its emergence touted to be disruptive, is gaining momentum, especially in the agri-food system owing to its multiple benefits.

Abstract

Purpose

Blockchain technology (BCT), since its emergence touted to be disruptive, is gaining momentum, especially in the agri-food system owing to its multiple benefits.

Design/methodology/approach

The authors attempted to conduct a systematic bibliometric visualization analysis of the BCT in the agri-food system. The analysis investigated the list of countries and institutions that conducted research on BCT in agriculture, growth trend analysis in research publications, bibliographic coupling of journals using the VOSviewer tool, and the countries and institutions researching BCT.

Findings

The authors discovered that China, the USA and India were the highly active countries in BCT research and publication. However, India has only limited research collaboration with other countries as compared to China and the USA. The keyword analysis indicates the role of BCT in order to maintain the transparency of the supply chain by means of protecting the privacy of the personal data of the stakeholders.

Research limitations/implications

More research related to the implementation of BCT in livestock, fishery and agro-forestry sector is recommended.

Social implications

The case examined is of particular interest as it is concerned with efficient supply chain management.

Originality/value

This study adds value and evidence to the scope and benefits of BCT by providing a comprehensive literature review, with a special focus on the opportunities and challenges concerned with implementation of BCT in the Indian agri-food system.

Highlights

  1. Blockchain technology (BCT) – a promising tool to resolve issues in agriculture supply chain.

  2. BCT ensures transparency and protection of information along the supply chain transactions.

  3. China, the USA and India are the highly active countries in BCT research and publication.

  4. Multiple potential benefits to stakeholders are attributed to the BCT in the agri-food system.

  5. The key challenge is to bridge the digital gap between developed and developing nations.

  6. Future research on BCT should aim at easing and undistorted competition among stakeholders.

Blockchain technology (BCT) – a promising tool to resolve issues in agriculture supply chain.

BCT ensures transparency and protection of information along the supply chain transactions.

China, the USA and India are the highly active countries in BCT research and publication.

Multiple potential benefits to stakeholders are attributed to the BCT in the agri-food system.

The key challenge is to bridge the digital gap between developed and developing nations.

Future research on BCT should aim at easing and undistorted competition among stakeholders.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 15 July 2024

Zhucheng Shao

The rise of virtual streamers in live streaming commerce has gained momentum, driven by the increasing prevalence of human–computer interactivity and artificial intelligence…

Abstract

Purpose

The rise of virtual streamers in live streaming commerce has gained momentum, driven by the increasing prevalence of human–computer interactivity and artificial intelligence. However, achieving its broader adoption necessitates a comprehensive understanding of consumers' intention to switch from conventional human streamers to virtual streamer services as alternatives. To bridge this knowledge gap, this study endeavours to introduce and substantiate an asymmetric model incorporating innovation barriers, shopping motivations and personalities, shedding light on consumers' intention to switch.

Design/methodology/approach

An online survey was conducted in the United Kingdom and analysed using a comprehensive approach that integrates Necessary Conditions Analysis (NCA), Artificial Neural Networks (ANNs) and fuzzy-set Qualitative Comparative Analysis (fsQCA).

Findings

The results unveiled six configurations of arrangements, each of them characterised by a unique combination of causation.

Originality/value

In knowledge, this study presents a significant contribution by revealing both the determinants that stimulate or hamper the desire to switch based on consumer-centric perspectives. In practice, this study is critical for helping practitioners overcome difficulties related to adoption and make educated judgements when promoting virtual streamers and developing marketing strategies in live streaming commerce.

Details

Journal of Research in Interactive Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 16 August 2022

Rofikoh Rokhim, Iin Mayasari, Permata Wulandari and Handrix Chris Haryanto

The purpose of this study is to examine the effect of extrinsic aspects of the technology acceptance model, namely, information quality, functionality, accessibility, user…

Abstract

Purpose

The purpose of this study is to examine the effect of extrinsic aspects of the technology acceptance model, namely, information quality, functionality, accessibility, user interface design, system quality, functionality, facilitating conditions and computer playfulness as well as intrinsic aspects, namely, perceived self-efficacy, enjoyment and learning goals. orientation on perceived usefulness and perceived ease of use in the context of the learning management system (LMS) as a system to support employee learning and development. This study also analyzes the effect of perceived ease of use on perceived usefulness and analyzes the effect of these two variables on the intention to adopt a LMS. This study included 3,205 respondents who are employees of banking companies in Indonesia and who used the LMS for their learning and self-development needs during the COVID-19 pandemic.

Design/methodology/approach

This research is a quantitative study that uses online surveys to collect data and partial least squares statistical tools to analyze survey data.

Findings

The results showed that accessibility alone had no effect on perceived usefulness and perceived ease of use, while enjoyment had no effect on the intention to use LMS and perceived ease of use and functionality had no effect on the intention to use LMS.

Research limitations/implications

This research focuses on the concept of technology acceptance with extrinsic and intrinsic aspects. This research context involves employees working in the banking sector with the adoption of the LMS.

Practical implications

LMS in banking companies can be optimized by providing online training and reducing the operational costs of employee training. By using LMS, companies can offer online courses to employees and track progress in distance learning, become a learning choice and information dissemination during the pandemic and also support future business continuity.

Originality/value

This study focuses on testing the technology adoption model on LMSs in the banking sector by adding extrinsic aspects, namely, system quality, facilitating conditioning, computer playfulness and user interface design, and combining intrinsic aspects, namely, perceived self-efficacy, enjoyment and learning goal orientation.

Details

VINE Journal of Information and Knowledge Management Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 July 2024

Garret Murray, Malin Falkeling and Shang Gao

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Abstract

Purpose

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Design/methodology/approach

A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.

Findings

Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.

Research limitations/implications

This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.

Originality/value

This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 July 2024

Luzuko Tekeni and Reinhardt A. Botha

As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting…

Abstract

Purpose

As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting their home networking devices, which are vulnerable to attack. To this end, this paper aims to examine the motivating factors that drive South African fibre users to protect their home networking devices.

Design/methodology/approach

Using the protection motivation theory as the primary framework, a measurement instrument comprising 53 questionnaire items was developed to measure 13 constructs. The study collected empirical data from a sample of 392 South African home fibre users and evaluated the research model using structural equation modelling.

Findings

The evaluation showed a good fit, with 12 out of 15 predicted hypotheses being accepted for the final research model, contributing to the understanding of the factors that motivate home users to protect their home networking devices.

Originality/value

To the best of the authors’ knowledge, this study is the first to model the factors that drive South African home fibre users to protect their home networking devices. Knowing these factors could help home internet service providers and security software vendors of home products to develop security interventions that could assist home fibre users to secure their home networking devices.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 August 2024

Wilson K.S. Leung, Sally P.M. Law, Man Lai Cheung, Man Kit Chang, Chung-Yin Lai and Na Liu

There are two main objectives in this study. First, we aim to develop a set of constructs for health task management support (HTMS) features to evaluate which health-related tasks…

Abstract

Purpose

There are two main objectives in this study. First, we aim to develop a set of constructs for health task management support (HTMS) features to evaluate which health-related tasks are supported by mobile health application (mHealth app) functions. Second, drawing on innovation resistance theory (IRT), we examine the impacts of the newly developed HTMS dimensions on perceived usefulness, alongside other barrier factors contributing to technology anxiety.

Design/methodology/approach

Using a mixed-method research design, this research seeks to develop new measurement scales that reflect how mHealth apps support older adults’ health-related needs based on interviews. Subsequently, data were collected from older adults and exploratory factor analysis was used to confirm the validity of the new scales. Partial least squares structural equation modeling (PLS-SEM) was used to analyze survey data from 602 older adults.

Findings

The PLS-SEM results indicated that medical management task support, dietary task support, and exercise task support were positively associated with perceived usefulness, while perceived complexity and dispositional resistance to change were identified as antecedents of technology anxiety. Perceived usefulness and technology anxiety were found to positively and negatively influence adoption intention, respectively.

Originality/value

This study enriches the information systems literature by developing a multidimensional construct that delineates how older adults’ health-related needs can be supported by features of mHealth apps. Drawing on IRT, we complement the existing literature on resistance to innovation by systematically examining the impact of five types of barriers on technology anxiety.

Article
Publication date: 6 June 2024

Dien Van Tran, Phuong Van Nguyen, Demetris Vrontis, Sam Thi Ngoc Nguyen and Phuong Uyen Dinh

Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and…

Abstract

Purpose

Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and other related habits. These activities are considered cybersecurity behaviors. Government social media (GSM) accounts are increasingly used to educate employees about cybersecurity risks. To support the effectiveness of cybersecurity practices in government organizations, the purpose of this study is to investigate the impacts of GSM and organizational policy compliance on employees’ cybersecurity awareness, motivation and behaviors.

Design/methodology/approach

Data were obtained by administering a questionnaire survey to public personnel in Vietnam. A total of 330 valid responses were obtained, and the research hypotheses were tested using partial least squares–structural equation modeling.

Findings

First, cybersecurity awareness enhances information protection motivation and employee protective behavior. Second, GSM has positive impacts on cybersecurity knowledge and information protection motivation. Third, there is a strong positive association between information protection motivation and employee protective behavior. Finally, while organizational compliance significantly increases cybersecurity awareness, its impact on employee protective behavior is ind irect.

Originality/value

This research enhances the literature on the behavioral dimension of cybersecurity. The primary objective of this study is to assess the influence of cybersecurity awareness on protective behaviors rather than intents and attitudes alone. Furthermore, this research integrates protection motivation theory and cultivation theory to provide a more thorough assessment of cybersecurity awareness and protective behavior. By investigating the impact of GSM on the level of cybersecurity awareness among employees within government organizations, this study provides valuable insights into the efficacy of recent governmental initiatives aimed at fostering cybersecurity.

Details

Journal of Asia Business Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1558-7894

Keywords

1 – 10 of over 4000