Search results

1 – 10 of over 4000
Article
Publication date: 12 April 2022

Syed Sardar Muhammad, Bidit Lal Dey, Sharifah Faridah Syed Alwi, Muhammad Mustafa Kamal and Yousra Asaad

Despite consumers' widespread use of social media platforms, there is scant research on the underlying factors that influence their willingness to share digital footprints on…

1120

Abstract

Purpose

Despite consumers' widespread use of social media platforms, there is scant research on the underlying factors that influence their willingness to share digital footprints on social media. The purpose of this study is to address this research gap by examining consumers' cognitive and affective attitudes simultaneously.

Design/methodology/approach

This research used quantitative method by using online survey administered to a sample of 733 social media users.

Findings

The findings indicate both cognitive and affective attitudes jointly influence consumers' behavioural intentions with trust as a key construct mediating the relationship between attitudinal antecedents and consumers' willingness to share digital footprints on social media.

Research limitations/implications

This study contributes to the information systems (IS) literature by offering a comprehensive framework constituting the joint attitudinal components as antecedents to consumers' behavioural intention for sharing digital footprints while trust works as a mediator.

Practical implications

This paper has important managerial implications. It helps marketers and IS managers in profiling consumers, understanding consumption patterns, sharing of digital footprints, which are useful for effective market segmentation, product development and future design of social media platforms. It informs social media providers of the importance of not only focussing on functional aspects but also underscores the essence of paying attention to consumers' affect towards social media platforms, especially trust.

Originality/value

The paper presents an original framework that explains the influence of joint attitudinal components on behavioural intention, with trust as a mediator.

Details

Information Technology & People, vol. 36 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 August 2018

Marina Micheli, Christoph Lutz and Moritz Büchi

This conceptual contribution is based on the observation that digital inequalities literature has not sufficiently considered digital footprints as an important social…

6240

Abstract

Purpose

This conceptual contribution is based on the observation that digital inequalities literature has not sufficiently considered digital footprints as an important social differentiator. The purpose of the paper is to inspire current digital inequality frameworks to include this new dimension.

Design/methodology/approach

Literature on digital inequalities is combined with research on privacy, big data and algorithms. The focus on current findings from an interdisciplinary point of view allows for a synthesis of different perspectives and conceptual development of digital footprints as a new dimension of digital inequality.

Findings

Digital footprints originate from active content creation, passive participation and platform-generated data. The literature review shows how different social groups may experience systematic advantages or disadvantages based on their digital footprints. A special emphasis should be on those at the margins, for example, users of low socioeconomic background.

Originality/value

By combining largely independent research fields, the contribution opens new avenues for studying digital inequalities, including innovative methodologies to do so.

Details

Journal of Information, Communication and Ethics in Society, vol. 16 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 10 March 2021

Yair Levy and Ruti Gafni

This paper aims to introduce the concept of cybersecurity footprint.

1201

Abstract

Purpose

This paper aims to introduce the concept of cybersecurity footprint.

Design/methodology/approach

Characteristics of cybersecurity footprint are presented based on documented cases, and the domino effect of cybersecurity is illustrated. Organizational and individual cybersecurity footprints are outlined. Active and passive – digital vs cybersecurity footprints are then reviewed. Taxonomy of aware/unaware vs active/passive cybersecurity footprints are presented, followed by brief discussion of the implications for future research.

Findings

The concept of cybersecurity footprint is defined, and the evidence from prior cyber incidents is shown to emphasize the concept. Smaller organizations may have a large cybersecurity footprint, whereas larger organizations may have smaller one. Cyberattacks are focusing on the individuals or small organizations that are in the supply chain of larger organizations causing the domino effect.

Practical implications

Implications of cybersecurity footprint to individuals, organizations, societies and governments are discussed. The authors present organizations with ways to lower cybersecurity footprint along with recommendations for future research.

Social implications

Cybersecurity has a significant social implication worldwide, as the world is becoming cyber dependent. With the authors’ introduction of the cybersecurity footprint concept and call to further understand how organizations can measure and reduce it, the authors envision it as another perspective of assessing cyber risk and further help mitigate future cyber incidents.

Originality/value

This paper extends the existing information and computer security body of knowledge on the concept of cybersecurity footprint with illustrated cases.

Article
Publication date: 23 May 2022

Caihua Yu, Tonghui Lian, Hongbao Geng and Sixin Li

This paper gathers tourism digital footprint from online travel platforms, choosing social network analysis method to learn the structure of destination networks and to probe into…

Abstract

Purpose

This paper gathers tourism digital footprint from online travel platforms, choosing social network analysis method to learn the structure of destination networks and to probe into the features of tourist flow network structure and flow characteristics in Guilin of China.

Design/methodology/approach

The digital footprint of tourists can be applied to study the behaviors and laws of digital footprint. This research contributes to improving the understanding of demand-driven network relationships among tourist attractions in a destination.

Findings

(1) Yulong River, Yangshuo West Street, Longji Terraced Fields, Silver Rock and Four Lakes are the divergent and agglomerative centers of tourist flow, which are the top tourist attractions for transiting tourists. (2) The core-periphery structure of the network is clearly stratified. More specifically, the core nodes in the network are prominent and the core area of the network has weak interaction with the peripheral area. (3) There are eight cohesive subgroups in the network structure, which contains certain differences in the radiation effects.

Originality/value

This research aims at exploring the spatial network structure characteristics of tourism flows in Guilin by analyzing the online footprints of tourists. It takes a good try to analyze the application of network footprint with the research of tourism flow characteristics, and also provides a theoretical reference for the design of tourist routes and the cooperative marketing among various attractions.

Details

Data Technologies and Applications, vol. 57 no. 1
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 3 June 2014

Steve North and John Jason Oliver

The purpose of this paper is to provide an overview of the key strategic questions that need to be considered when evaluating whether or not to extend a company’s reach across…

1319

Abstract

Purpose

The purpose of this paper is to provide an overview of the key strategic questions that need to be considered when evaluating whether or not to extend a company’s reach across multiple digital platforms.

Design/methodology/approach

The viewpoint presented in this paper reflects both the practical experience of conceiving, launching and implementing a multi-platform digital strategy, combined with an academic insight into branding and strategic resource allocation and management.

Findings

Before extending the digital footprint, executives need to consider several key questions that will impact on the relative success of their digital strategy.

Practical implications

A digital strategy that extends a company’s reach across multiple platforms needs to be considered in terms of delivering against corporate- and business-level strategy to be effective.

Originality/value

This paper presents a unique combination of practical experience fused with academic knowledge on the key questions that should be considered to successfully design and implement a multi-platform digital strategy.

Details

Strategic Direction, vol. 30 no. 7
Type: Research Article
ISSN: 0258-0543

Keywords

Article
Publication date: 22 June 2022

Nilaya Murthy and Santosh Gopalkrishnan

The purpose of this study is to find out if there is a sequence or pattern to digital frauds and whether the openness quotient of any individual has a meaningful role to play in…

1032

Abstract

Purpose

The purpose of this study is to find out if there is a sequence or pattern to digital frauds and whether the openness quotient of any individual has a meaningful role to play in them becoming victims of digital frauds. The legal and regulatory angle of digital frauds and relief measures for social media openness and frauds are discussed to examine the connection between openness, identity data, visibility, vulnerability, digital frauds and social media sharing of information.

Design/methodology/approach

This study is empirical and investigative research. Primary data was collected via questionnaires circulated among participants from various age groups to understand the implications of different demographic factors such as age, websites used, profiles created and data shared on the internet, social media and e-commerce websites.

Findings

The results exhibit that the openness factor does affect vulnerability and has an influence on the risk and legal component of inclination towards digital frauds.

Practical implications

This research study results in bridging the gap by increasing the level of understanding and awareness in users toward achieving proactive and regulated behaviour and comprehending the violation of various acts of digital frauds and its implications, especially in the Indian banking sector.

Originality/value

This study will be beneficial to all individuals alike in understanding the implications of excessive openness toward digital platforms and evaluating generic and legal solutions to avoid becoming victims of digital fraud.

Details

International Journal of Law and Management, vol. 64 no. 4
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 3 November 2023

Efe Imiren, Paul Lassalle, Samuel Mwaura and Katerina Nicolopoulou

This paper, through empirical evidence, presents a framework for exploring how entrepreneurs navigate the challenges of building legitimacy in a digital context. In so doing, this…

Abstract

Purpose

This paper, through empirical evidence, presents a framework for exploring how entrepreneurs navigate the challenges of building legitimacy in a digital context. In so doing, this paper goes beyond the seemingly forgone conclusion that legitimacy is important for the entrepreneur's success by focusing on the contextualised mechanisms through which digital legitimacy is built.

Design/methodology/approach

Empirical findings are drawn from semi-structured interviews conducted with 21 digital entrepreneurs in Nigeria, a leading example of the West African context and analysed using a phenomenological approach.

Findings

The paper shows how digital entrepreneurs in a non-Western context draw on an aspect of legitimation in the digital space, and in particular, highlights three mechanisms via which this takes place, namely: digital shielding, digital curating and digital networking. Presented via an inductive approach, the three mechanisms described in the paper provide a scaffold for thinking about and understanding entrepreneurial legitimacy within a contextual framework, which incorporates institutional, cultural and digital dimensions.

Originality/value

This paper contributes to the literature on digital entrepreneurship by empirically identifying and theoretically elaborating themes that are important for understanding how entrepreneurs navigate the challenges of digital entrepreneurship and build entrepreneurial legitimacy in complex contexts.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 30 no. 2/3
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 8 December 2020

Konstantina Martzoukou

This paper examines children's development of digital literacy, resilience and citizenship in the online environment, addressing active engagement and participation via cartoon…

4803

Abstract

Purpose

This paper examines children's development of digital literacy, resilience and citizenship in the online environment, addressing active engagement and participation via cartoon videos. Previous research has emphasised the positive role of cartoons in different educational contexts, as important agents of attracting children's attention and interest with opportunities to engage in contextual and collaborative learning.

Design/methodology/approach

The work describes the design and an initial pilot study of the animated cartoon video series, with a group of 30 children in an S1 class, at a secondary school in Scotland as part of workshop addressing digital resilience themes. Children worked individually and in teams in a series of interactive activities, which were evaluated by means of a short questionnaire survey.

Findings

The majority of the children enjoyed the cartoon videos which addressed a story of cyberbullying and, in teams, they chose different copying strategies. Children's verbalisations included expressions of positive feelings when connecting online, linked to socialising, creative and playful activities and they expressed a preference towards speaking to their parents and friends rather than their teachers when dealing with online challenges.

Research limitations/implications

Children not only enjoyed watching the cartoon story but had an interest to learn more about how other children deal with the pressures and challenges of the online world, how to manage their own digital footprint and, particularly, how easy it is to spread personal information online.

Practical implications

Cartoon animations present an opportunity to act as a basis for encouraging children to exchange ideas and engage in dialogue in class and at home by means of creating a point of reference which creates an environment, where pressure is taken away from the “self”. The cartoon character can be the focal point for discussion on issues that may be difficult to address directly and on a personal level because of insecurity or fear.

Social implications

Both teachers and parents have a responsibility to offer support and advice to children and ensure their online safety and resilience. Engaging with children in open further dialogue via fun and interactive cartoon-based activities may help to further explore and understand their perspectives.

Originality/value

The work addresses everyday life issues encountered online and aims to offer educators and parents an engaging and fun series of activities, harnessing the advantages of cartoon video animation as a didactical resource that can utilised as a supplementary learning tool inside the classroom and at home.

Details

Journal of Research in Innovative Teaching & Learning, vol. 15 no. 1
Type: Research Article
ISSN: 2397-7604

Keywords

Article
Publication date: 2 December 2022

Makungu Meriot Chavalala, Surajit Bag, Jan Harm Christiaan Pretorius and Muhammad Sabbir Rahman

The cold supply chain industry is still emerging and digital transformation is in the nascent stage in this industry. This paper argues that there are various barriers to…

Abstract

Purpose

The cold supply chain industry is still emerging and digital transformation is in the nascent stage in this industry. This paper argues that there are various barriers to implementing blockchain technology in the cold supply chain and aims to develop and validate a model for overcoming key barriers to implementing blockchain technology in the cold supply chain.

Design/methodology/approach

The adoption of blockchain technology was proposed through interpretive structural modeling (ISM) and further it is validated using structural equation modeling (SEM).

Findings

In this study, ten key barriers to implementing blockchain technology in the cold supply chain were identified, modelled and analysed. Poor leadership style of top management was found to be the most important barriers to implementing blockchain technology in the cold supply chain. The results of SEM indicate that all the paths are supported. The findings showcase the barriers responsible for the lack of blockchain technology infrastructure that ultimately impacts the cold supply chains.

Practical implications

This study highlights the fact that the fate of blockchain technology infrastructure development depends on the leadership style of top management. Demonstrating good leadership style by top management can help overcome the barriers. A good leader pulls the entire team instead of pushing the team. A good leader can guide the entire team to improve IT governance, financial investment, digital footprint, digital readiness, skills and collaboration with service providers to implement blockchain technology. Not only that, a good leader provides mental strength to the team and helps overcome the fear of implementing blockchain in the cold supply chain. A good leader demonstrates good administrative skills and focus on security and privacy policies.

Originality/value

This is a novel contribution towards analysing the key barriers to implementing blockchain technology in the South African cold supply chain using the integrated ISM–MICMAC and SEM approach.

Details

Journal of Enterprise Information Management, vol. 37 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Content available
Book part
Publication date: 4 October 2024

Abstract

Details

The Emerald Handbook of Fintech
Type: Book
ISBN: 978-1-83753-609-2

1 – 10 of over 4000