Search results

1 – 10 of over 6000
Article
Publication date: 20 November 2023

Chao Zhang, Fang Wang, Yi Huang and Le Chang

This paper aims to reveal the interdisciplinarity of information science (IS) from the perspective of the evolution of theory application.

Abstract

Purpose

This paper aims to reveal the interdisciplinarity of information science (IS) from the perspective of the evolution of theory application.

Design/methodology/approach

Select eight representative IS journals as data sources, extract the theories mentioned in the full texts of the research papers and then measure annual interdisciplinarity of IS by conducting theory co-occurrence network analysis, diversity measure and evolution analysis.

Findings

As a young and vibrant discipline, IS has been continuously absorbing and internalizing external theoretical knowledge and thus formed a high degree of interdisciplinarity. With the continuous application of some kernel theories, the interdisciplinarity of IS appears to be decreasing and gradually converging into a few neighboring disciplines. Influenced by big data and artificial intelligence, the research paradigm of IS is shifting from a theory centered one to a technology centered one.

Research limitations/implications

This study helps to understand the evolution of the interdisciplinarity of IS in the past 21 years. The main limitation is that the data were collected from eight journals indexed by the Social Sciences Citation Index and a small amount of theories might have been omitted.

Originality/value

This study identifies the kernel theories in IS research, measures the interdisciplinarity of IS based on the evolution of the co-occurrence network of theory source disciplines and reveals the paradigm shift being happening in IS.

Details

Journal of Documentation, vol. 80 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 26 January 2024

Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila and Juho Hamari

In recent years, there has been significant interest in adopting XR (extended reality) technologies such as VR (virtual reality) and AR (augmented reality), particularly in…

2084

Abstract

Purpose

In recent years, there has been significant interest in adopting XR (extended reality) technologies such as VR (virtual reality) and AR (augmented reality), particularly in retail. However, extending activities through reality-mediation is still mostly believed to offer an inferior experience due to their shortcomings in usability, wearability, graphical fidelity, etc. This study aims to address the research gap by experimentally examining the acceptance of metaverse shopping.

Design/methodology/approach

This study conducts a 2 (VR: with vs. without) × 2 (AR: with vs. without) between-subjects laboratory experiment involving 157 participants in simulated daily shopping environments. This study builds a physical brick-and-mortar store at the campus and stocked it with approximately 600 products with accompanying product information and pricing. The XR devices and a 3D laser scanner were used in constructing the three XR shopping conditions.

Findings

Results indicate that XR can offer an experience comparable to, or even surpassing, traditional shopping in terms of its instrumental and hedonic aspects, regardless of a slightly reduced perception of usability. AR negatively affected perceived ease of use, while VR significantly increased perceived enjoyment. It is surprising that the lower perceived ease of use appeared to be disconnected from the attitude toward metaverse shopping.

Originality/value

This study provides important experimental evidence on the acceptance of XR shopping, and the finding that low perceived ease of use may not always be detrimental adds to the theory of technology adoption as a whole. Additionally, it provides an important reference point for future randomized controlled studies exploring the effects of technology on adoption.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 18 May 2023

Aneta Kucińska-Landwójtowicz, Izabela Dagmara Czabak-Górska, Pedro Domingues, Paulo Sampaio and Carolina Ferradaz de Carvalho

The aim of the article is to determine research areas and to recognize the current direction in the development of maturity models, to indicate the key areas of organizational…

Abstract

Purpose

The aim of the article is to determine research areas and to recognize the current direction in the development of maturity models, to indicate the key areas of organizational maturity models (OMMs) development and their classification as well as to pinpoint research gaps and areas of potential development of OMMs in the context of scientific research and the needs of management practitioners.

Design/methodology/approach

The research was conducted using the literature review method, bibliometric analysis and visual mappings.

Findings

The empirical classification developed in this paper identified 12 categories based on management areas, constituting the criteria for classifying OMMs models, where OMMs are being developed: Information Technology, Project Management, Business Management and Strategy, Human Resource, Ergonomics, Health and Safety Management, Industry 4.0 concept, Knowledge Management, Process Management, Performance Management, Quality Management, Supply Chain Management, Risk Management and Innovation Management.

Research limitations/implications

The main limitation is the analysis in the scope of topic OMMs including solely the Scopus and Thompson Reuters Web of Science database. Another shortcoming is conducting data analysis and classification based on the abstracts of the selected articles.

Originality/value

This work is a starting point to prospect trends for future revolving around the OMMs crossing different databases.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 1
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 30 December 2022

Hao Chen and Yufei Yuan

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…

Abstract

Purpose

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.

Design/methodology/approach

The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).

Findings

The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.

Originality/value

First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.

Article
Publication date: 12 February 2024

Nisha Pradeepa S.P., Asokk D., Prasanna S. and Ansari Sarwar Alam

The concept of ubiquitous assimilation in e-commerce, denoting the seamless integration of technologies into customer shopping experiences, has played a pivotal role in aiding…

Abstract

Purpose

The concept of ubiquitous assimilation in e-commerce, denoting the seamless integration of technologies into customer shopping experiences, has played a pivotal role in aiding e-satisfaction and, consequently, fostering patronage intention. Among these, text-based chatbots are significant innovations. In light of this, the paper aims to develop a conceptual framework and comprehend the patronage behaviour of artificial intelligence-enabled chatbot users by using chatbot usability cues and to determine whether the social presence and flow theories impact e-satisfaction, which leads to users’ patronage intention. The current research provides insights into online travel agencies (OTAs), a crucial segment within the travel and tourism sector. Given the significance of building a loyal clientele and cultivating patronage in this industry, these insights are of paramount importance for achieving sustained profitability and growth.

Design/methodology/approach

The research framework primarily focused on the factors that precede e-satisfaction and patronage intention among chatbot users, which include social presence, flow, perceived anthropomorphism and need for human interaction. The researchers collected the data by surveying 397 OTA chatbot users by using an online questionnaire. The data of this cross-sectional study were analysed using covariance-based structural equation modelling.

Findings

Findings reveal that e-satisfaction is positively linked with patronage intention and the variables of social presence and flow impact e-satisfaction along with chatbot usability cues. There were direct and indirect relations between chatbot usability and e-satisfaction. Moreover, the personal attributes, “need for human interaction” and, “perceived anthropomorphism” were found to moderate relations between chatbot usability cues, social presence and flow.

Originality/value

The impact of chatbot’s usability cues/attributes on e-satisfaction, along with perceived attributes – social presence and flow in the realm of OTAs contributes to the human–chatbot interaction literature. Moreover, the interacting effects of perceived anthropomorphism and the need for human interaction are unique in the current contextual relations.

Details

Journal of Systems and Information Technology, vol. 26 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1044

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

86

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Article
Publication date: 21 July 2023

Serap Ergün

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…

Abstract

Purpose

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.

Design/methodology/approach

The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.

Findings

The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.

Originality/value

The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.

1 – 10 of over 6000