Search results
1 – 10 of over 6000Chao Zhang, Fang Wang, Yi Huang and Le Chang
This paper aims to reveal the interdisciplinarity of information science (IS) from the perspective of the evolution of theory application.
Abstract
Purpose
This paper aims to reveal the interdisciplinarity of information science (IS) from the perspective of the evolution of theory application.
Design/methodology/approach
Select eight representative IS journals as data sources, extract the theories mentioned in the full texts of the research papers and then measure annual interdisciplinarity of IS by conducting theory co-occurrence network analysis, diversity measure and evolution analysis.
Findings
As a young and vibrant discipline, IS has been continuously absorbing and internalizing external theoretical knowledge and thus formed a high degree of interdisciplinarity. With the continuous application of some kernel theories, the interdisciplinarity of IS appears to be decreasing and gradually converging into a few neighboring disciplines. Influenced by big data and artificial intelligence, the research paradigm of IS is shifting from a theory centered one to a technology centered one.
Research limitations/implications
This study helps to understand the evolution of the interdisciplinarity of IS in the past 21 years. The main limitation is that the data were collected from eight journals indexed by the Social Sciences Citation Index and a small amount of theories might have been omitted.
Originality/value
This study identifies the kernel theories in IS research, measures the interdisciplinarity of IS based on the evolution of the co-occurrence network of theory source disciplines and reveals the paradigm shift being happening in IS.
Details
Keywords
Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila and Juho Hamari
In recent years, there has been significant interest in adopting XR (extended reality) technologies such as VR (virtual reality) and AR (augmented reality), particularly in…
Abstract
Purpose
In recent years, there has been significant interest in adopting XR (extended reality) technologies such as VR (virtual reality) and AR (augmented reality), particularly in retail. However, extending activities through reality-mediation is still mostly believed to offer an inferior experience due to their shortcomings in usability, wearability, graphical fidelity, etc. This study aims to address the research gap by experimentally examining the acceptance of metaverse shopping.
Design/methodology/approach
This study conducts a 2 (VR: with vs. without) × 2 (AR: with vs. without) between-subjects laboratory experiment involving 157 participants in simulated daily shopping environments. This study builds a physical brick-and-mortar store at the campus and stocked it with approximately 600 products with accompanying product information and pricing. The XR devices and a 3D laser scanner were used in constructing the three XR shopping conditions.
Findings
Results indicate that XR can offer an experience comparable to, or even surpassing, traditional shopping in terms of its instrumental and hedonic aspects, regardless of a slightly reduced perception of usability. AR negatively affected perceived ease of use, while VR significantly increased perceived enjoyment. It is surprising that the lower perceived ease of use appeared to be disconnected from the attitude toward metaverse shopping.
Originality/value
This study provides important experimental evidence on the acceptance of XR shopping, and the finding that low perceived ease of use may not always be detrimental adds to the theory of technology adoption as a whole. Additionally, it provides an important reference point for future randomized controlled studies exploring the effects of technology on adoption.
Details
Keywords
Aneta Kucińska-Landwójtowicz, Izabela Dagmara Czabak-Górska, Pedro Domingues, Paulo Sampaio and Carolina Ferradaz de Carvalho
The aim of the article is to determine research areas and to recognize the current direction in the development of maturity models, to indicate the key areas of organizational…
Abstract
Purpose
The aim of the article is to determine research areas and to recognize the current direction in the development of maturity models, to indicate the key areas of organizational maturity models (OMMs) development and their classification as well as to pinpoint research gaps and areas of potential development of OMMs in the context of scientific research and the needs of management practitioners.
Design/methodology/approach
The research was conducted using the literature review method, bibliometric analysis and visual mappings.
Findings
The empirical classification developed in this paper identified 12 categories based on management areas, constituting the criteria for classifying OMMs models, where OMMs are being developed: Information Technology, Project Management, Business Management and Strategy, Human Resource, Ergonomics, Health and Safety Management, Industry 4.0 concept, Knowledge Management, Process Management, Performance Management, Quality Management, Supply Chain Management, Risk Management and Innovation Management.
Research limitations/implications
The main limitation is the analysis in the scope of topic OMMs including solely the Scopus and Thompson Reuters Web of Science database. Another shortcoming is conducting data analysis and classification based on the abstracts of the selected articles.
Originality/value
This work is a starting point to prospect trends for future revolving around the OMMs crossing different databases.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Hao Chen and Yufei Yuan
Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…
Abstract
Purpose
Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.
Design/methodology/approach
The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).
Findings
The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.
Originality/value
First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.
Details
Keywords
Nisha Pradeepa S.P., Asokk D., Prasanna S. and Ansari Sarwar Alam
The concept of ubiquitous assimilation in e-commerce, denoting the seamless integration of technologies into customer shopping experiences, has played a pivotal role in aiding…
Abstract
Purpose
The concept of ubiquitous assimilation in e-commerce, denoting the seamless integration of technologies into customer shopping experiences, has played a pivotal role in aiding e-satisfaction and, consequently, fostering patronage intention. Among these, text-based chatbots are significant innovations. In light of this, the paper aims to develop a conceptual framework and comprehend the patronage behaviour of artificial intelligence-enabled chatbot users by using chatbot usability cues and to determine whether the social presence and flow theories impact e-satisfaction, which leads to users’ patronage intention. The current research provides insights into online travel agencies (OTAs), a crucial segment within the travel and tourism sector. Given the significance of building a loyal clientele and cultivating patronage in this industry, these insights are of paramount importance for achieving sustained profitability and growth.
Design/methodology/approach
The research framework primarily focused on the factors that precede e-satisfaction and patronage intention among chatbot users, which include social presence, flow, perceived anthropomorphism and need for human interaction. The researchers collected the data by surveying 397 OTA chatbot users by using an online questionnaire. The data of this cross-sectional study were analysed using covariance-based structural equation modelling.
Findings
Findings reveal that e-satisfaction is positively linked with patronage intention and the variables of social presence and flow impact e-satisfaction along with chatbot usability cues. There were direct and indirect relations between chatbot usability and e-satisfaction. Moreover, the personal attributes, “need for human interaction” and, “perceived anthropomorphism” were found to moderate relations between chatbot usability cues, social presence and flow.
Originality/value
The impact of chatbot’s usability cues/attributes on e-satisfaction, along with perceived attributes – social presence and flow in the realm of OTAs contributes to the human–chatbot interaction literature. Moreover, the interacting effects of perceived anthropomorphism and the need for human interaction are unique in the current contextual relations.
Details
Keywords
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…
Abstract
Purpose
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.
Design/methodology/approach
A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.
Research limitations/implications
This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.
Originality/value
The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.
Details
Keywords
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…
Abstract
Purpose
The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.
Design/methodology/approach
The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.
Findings
The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.
Originality/value
The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.
Details