Search results

1 – 10 of 23
Article
Publication date: 10 August 2010

Qing Yang, Hongwei Wang, Wan Hu and Wang Lijuan

In the grid‐based simulation, the resource application needed is distributed in the grid environment as grid service, and time management is a key problem in the simulation…

360

Abstract

Purpose

In the grid‐based simulation, the resource application needed is distributed in the grid environment as grid service, and time management is a key problem in the simulation system. Grid workflow provides convenience for grid user to management and executes grid services. But it emphasizes process and no time‐management, so a temporally constrained grid workflow model is pointed out based on grid flow with temporally constraint to schedule resources and manage time.

Design/methodology/approach

The temporally constrained grid workflow model is distributed model: the federate has local temporal constraints and interactive temporal constraints among federates. The problem to manage time is a temporally distributed constraint satisfaction problem given deadline time and duration time of grid services. Multi‐asynchronous weak‐commitment search (AWS) algorithm is an approach to resolve DCSP, so a practical example of a simulation project‐based grid system was presented to introduce application of Multi‐AWS algorithm.

Findings

The temporally constrained grid workflow is based temporal reasoning and grid workflow description about grid services.

Originality/value

The new problem about scheduling resources and managing time in the grid‐based simulation is pointed out; and the approach to resolve the problem is applied into a practical example.

Details

Kybernetes, vol. 39 no. 8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 5 June 2009

A. Zorotheos and E. Kafeza

The purpose of this paper is to examine whether the internet users' privacy concerns (concerns for information privacy, CFIP) and perceived privacy control (PPC) affect their…

1392

Abstract

Purpose

The purpose of this paper is to examine whether the internet users' privacy concerns (concerns for information privacy, CFIP) and perceived privacy control (PPC) affect their willingness to use internet web places in order to transact. A theoretical model is introduced that describes how users' CFIP and PPC may affect their willingness to transact through web places when personal information must be disclosed in order to accomplish the transaction.

Design/methodology/approach

The research model is empirically tested using data collected with a survey that include items for each of the constructs of the model. The survey is administrated to 190 internet users and resulted in 142 usable responses through questionnaires. In order to test the hypotheses, multidimensional regression analysis is used.

Findings

The findings indicate that both users' CFIP and users' PPC (some dimensions of them) have direct impact not only to users' trust toward the web site as expected but also to the willingness to transact through the internet when personal information needs to be disclosed.

Research limitations/implications

In this paper, an introductory analysis is conducted in order to preliminary test the validity and credibility of the research model. In this first approach, the multidimensional regression analysis is used. Currently, the paper deals with the use of structural equation modeling in order to better test the research model. The research could be conducted also online in order to investigate users' behavior under real circumstances.

Practical implications

The more users know about their personal information the less willing they are to make purchases through internet. Moreover, if web places improve their mechanisms and procedures that correct better the inaccuracies and the errors in the users' stored personal data then users' willingness to retrieve information from web sites improves too.

Originality/value

Existing studies constitute the basic theoretical framework but until now there is not a model that connects both users' CFIP and users' PPC with the willingness to transact through the internet and with users' trust upon the web sites.

Details

Direct Marketing: An International Journal, vol. 3 no. 2
Type: Research Article
ISSN: 1750-5933

Keywords

Book part
Publication date: 25 June 2012

Rüdiger Breitschwerdt, Rick Iedema, Sebastian Robert, Alexander Bosse and Oliver Thomas

Purpose – Harnessing the advantage of mobile information technology (IT) solutions at the point of care and contributing to patients' safety by involving…

Abstract

Purpose – Harnessing the advantage of mobile information technology (IT) solutions at the point of care and contributing to patients' safety by involving them.

Design/methodology/approach – International collaboration between specialists in health communication processes and information management and systems.

Methods used – Case studies, design science.

Findings – User-friendly portable IT applications going beyond documentation of patient records and administration require an understanding of complex communication processes between patients and the different caregivers. Home care increasingly faces structural deficits to be mitigated by integration of IT solutions. Platforms chosen in combination with services should be well established. How to implement this must be scrutinized by comprehensive research as initiated here. Preliminary results indicate potentials for novel mobile applications.

Practical implications – Contribution to increasing patients' safety by developing mobile solutions to support health care. Those may also contribute to cost savings in health care.

Social implications – Health care experiences an increasing significance for Western industrialized countries because of demographic developments. Care generally shifts from inpatient to outpatient settings; the global shortage of qualified nurses becomes even more prevailing. More support, among others by IT and enhanced interprofessional communication, is demanded for an improved quality and efficiency of care processes.

Originality/value – Mutual approach benefits from the partner's understanding of complex interactions among clinicians, health services, and patients: the ability to design, monitor, and evaluate research strategies integrating care (information) needs is invaluable when applying creative technology solutions within health care domain.

Details

Health Information Technology in the International Context
Type: Book
ISBN: 978-1-78052-859-5

Keywords

Open Access
Article
Publication date: 23 December 2022

W. Alec Cram and Rissaile Mouajou-Kenfack

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications…

Abstract

Purpose

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications varies widely, including differences in the level of detail, apportioning of blame, compensation and corrective action. This study seeks to identify patterns contained within cybersecurity incident notifications by constructing a typology of organizational responses.

Design/methodology/approach

Based on a detailed review of 1,073 global cybersecurity incidents occurring during 2020, the authors obtained and qualitatively analyzed 451 customer notifications.

Findings

The results reveal three distinct organizational response types associated with the level of detail contained within the notification (full transparency, guarded and opacity), as well as three response types associated with the benefitting party (customer interest, balanced interest and company interest).

Originality/value

This work extends past classifications of cybersecurity incident notifications and provides a template of possible notification approaches that could be adopted by organizations.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 30 October 2018

Vladlena Benson, Jean-Noel Ezingeard and Chris Hand

Social media users’ purchasing behaviour is yet to be fully understood by research. The purpose of this paper is to investigate how purchase intention is affected by social media…

2865

Abstract

Purpose

Social media users’ purchasing behaviour is yet to be fully understood by research. The purpose of this paper is to investigate how purchase intention is affected by social media user traits, cognitive factors (such as perceived control and trust) and individual beliefs, such as risk propensity and trustworthiness.

Design/methodology/approach

The authors propose and empirically test a model of purchase intention on social platforms. The study of over 500 active social media users finds the links between risk propensity, trust, technical efficacy and perceived control and explores the moderating effect of age and gender.

Findings

Purchase intention on social platforms is influenced by demographic factors, cognitive factors and beliefs. Both age and gender moderate the effects of beliefs and cognitive factors: age is a determinant of purchase intention for men, while beliefs are significant for younger women and cognitive factors are significant for older women.

Research limitations/implications

This study involved a cross-sectional design via online survey of social networking users. Gender differences in purchase intentions are found which are, in turn, influenced by age. Further empirical testing of social purchase intention could include less experienced users or non-users.

Practical implications

The results of this study provide guidance for SNS providers and technology developers in social networking commerce in terms of the different drivers of purchase intention.

Originality/value

Social media users’ purchasing behaviour is yet to be fully understood. The study shows that purchase intention antecedents vary between genders and age groups of users. The identified connection between users’ perceptions of social networking sites (SNS) usage of personal information and purchase behaviour has an impact on the likelihood of user engagement in social transactions.

Details

Information Technology & People, vol. 32 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 6 June 2019

Ali Bassam Mahmoud, Nicholas Grigoriou, Leonora Fuxman, Dieu Hack-Polay, Fatina Bassam Mahmoud, Eiad Yafi and Shehnaz Tehseen

This study aims to assess consumers’ beliefs in three Middle Eastern Arab countries regarding attitudinal and behavioural responses towards permission-based direct email marketing…

2882

Abstract

Purpose

This study aims to assess consumers’ beliefs in three Middle Eastern Arab countries regarding attitudinal and behavioural responses towards permission-based direct email marketing (hereafter DEM) and the moderating role of gender in the hypothesised path model.

Design/methodology/approach

Structural equation modelling was used to test the hypothesised path model by using data collected from 829 respondents.

Findings

The findings show that attitude was found to fully mediate the relationship between beliefs and behavioural responses towards permission-based DEM. Gender moderates the relationship between beliefs and attitudes and responses to permission-based DEM. Notably, female respondents were found to react more actively when exposed to permission-based DEM.

Research limitations/implications

Further qualitative research is needed to learn more about how and why individuals develop behavioural intentions in certain ways towards opt-in DEM. In addition, neuropsychology approaches such as eye-tracking are endorsed for future research to gain more insights and conquer biases associated with self-reporting procedures in countries where such technologies are deemed as legal and ethical to be used with human subjects.

Practical implications

Advertisers promoting products and services in the Middle Eastern Arab context should take further steps to enhance the quality of information (including cultural sensitiveness) and the perceived entertainment value that could be delivered to consumers through permission-based DEM, especially for female internet users. Additionally, this study highly recommends the double opt-in approach to permission-based DEM.

Originality/value

To the best of the authors’ knowledge, this is the first attempt to address the gender role as a moderator of the path depicting the effectiveness of permission-based DEM approach in the Middle East (Arab counties) from beliefs to behavioural responses via attitudes.

Details

Journal of Research in Interactive Marketing, vol. 13 no. 2
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 26 August 2019

Ibrahim M. Al-Jabri, Mustafa I. Eid and Amer Abed

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder…

1483

Abstract

Purpose

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer’s willingness to disclose personal information (WTD) to online firms on e-commerce websites.

Design/methodology/approach

Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia.

Findings

The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure.

Research limitations/implications

The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information.

Originality/value

The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 October 2020

Min Zhang, Lu Wang, Ran Wang and Jingjing Xiong

In the mobile internet era, the path and mechanism of hospital patient-perceived quality have been changed radically. The purpose of this study is to develop a scale that…

Abstract

Purpose

In the mobile internet era, the path and mechanism of hospital patient-perceived quality have been changed radically. The purpose of this study is to develop a scale that adequately captures the characteristics of hospital service quality from the patient’s perspective under the background of the mobile internet.

Design/methodology/approach

Based on previous related research and interviews with focus groups, this paper conceptualized, constructed, refined and tested a multiple-item scale that examined key dimensions of hospital process service quality in the mobile context. To validate this scale, data were collected through two formal surveys in Chinese hospitals and were used to test the reliability and validity of the instrument.

Findings

The final measurement scale contains three dimensions, that is, environment conditions, attitude and behavior and technical convenience. With the help of this quality scale, hospital managers could have a better understanding of patients’ expectations under the new condition and pinpoint appropriate initiatives to fill the service gap.

Originality/value

This study focuses on service quality measurement issues related to the application of mobile internet technology in traditional clinical settings, such as hospitals. This paper develops an original and specific service quality scale that catches the online and offline characteristics of the hospital process in the mobile setting and considers both human-technology interaction and human-human interaction.

Details

International Journal of Quality and Service Sciences, vol. 12 no. 3
Type: Research Article
ISSN: 1756-669X

Keywords

Article
Publication date: 12 October 2012

Evanthia Faliagka, Athanasios Tsakalidis and Giannis Tzimas

The purpose of this paper is to present a novel approach for recruiting and ranking job applicants in online recruitment systems, with the objective to automate applicant…

11392

Abstract

Purpose

The purpose of this paper is to present a novel approach for recruiting and ranking job applicants in online recruitment systems, with the objective to automate applicant pre‐screening. An integrated, company‐oriented, e‐recruitment system was implemented based on the proposed scheme and its functionality was showcased and evaluated in a real‐world recruitment scenario.

Design/methodology/approach

The proposed system implements automated candidate ranking, based on objective criteria that can be extracted from the applicant's LinkedIn profile. What is more, candidate personality traits are automatically extracted from his/her social presence using linguistic analysis. The applicant's rank is derived from individual selection criteria using analytical hierarchy process (AHP), while their relative significance (weight) is controlled by the recruiter.

Findings

The proposed e‐recruitment system was deployed in a real‐world recruitment scenario, and its output was validated by expert recruiters. It was found that with the exception of senior positions that required domain experience and specific qualifications, automated pre‐screening performed consistently compared to human recruiters.

Research limitations/implications

It was found that companies can increase the efficiency of the recruitment process if they integrate an e‐recruitment system in their human resources management infrastructure that automates the candidate pre‐screening process. Interviewing and background investigation of applicants can then be limited to the top candidates identified from the system.

Originality/value

To the best of the authors’ knowledge, this is the first e‐recruitment system that supports automated extraction of candidate personality traits using linguistic analysis and ranks candidates with the AHP.

Article
Publication date: 2 November 2012

Khoutir Bouchbout, Jacky Akoka and Zaia Alimazighi

This paper aims to present a new approach for developing a framework based on a model driven architecture (MDA) for the modelling of technology‐independent collaborative processes.

1370

Abstract

Purpose

This paper aims to present a new approach for developing a framework based on a model driven architecture (MDA) for the modelling of technology‐independent collaborative processes.

Design/methodology/approach

The paper suggests a new collaborative process modelling approach based on an MDA and a metamodelling technique. The research method, based on the design science approach, was started by identifying the characteristics of the collaborative processes, which distinguish them from the classical intraorganizational ones. Then, the generic collaborative business process (CBP) modelling framework is developed based on MDA approach and definition of a set of transformation rules through three layers: business, process, and technical. After that, the core component of the framework was the proposition of a generic CBP metamodel at PIM/MDA level. The specific collaboration participant's business processes (expressed as BPMN model) are generated from the generic CBP model represented as an UML2 Profile activity diagram, which is compliant to CBP metamodel. Finally, as proof‐of‐concept, the architecture of an Eclipse‐based open development platform is developed implementing an e‐Procurement collaborative process.

Findings

The proposed framework for CBP modelling and the generic CBP metamodel contribute towards a more efficient methodology and have consequences for BPM‐related collaboration, facilitating the B2B processes modelling and implementation. In order to demonstrate and evaluate the practical applicability of the framework, the architecture of an Eclipse‐based open development platform is developed implementing a collaborative business application on the basis of an e‐Procurement use case.

Research limitations/implications

There is a need to focus future research efforts on the improvement of the semi‐automatic transformation phase from public to private processes which needs human intervention by adding a suitable interfaces at both sides of the B2B interaction. In addition, the problem of semantic heterogeneities regarding the partner's business process elements (business documents, activity/task names) should be tackled by developing an approach that uses ontology.

Practical implications

Business processes developers find a B2B technology‐independent solution for implementing and using interorganizational information systems.

Originality/value

The paper provides a framework that enables the CBP modelling and integrates a generic CBP metamodel. Currently, to the best of the authors' knowledge, such a generic metamodel and his instantiation have not so far been developed.

1 – 10 of 23