Search results

1 – 10 of over 8000
Article
Publication date: 6 June 2019

Ali Bassam Mahmoud, Nicholas Grigoriou, Leonora Fuxman, Dieu Hack-Polay, Fatina Bassam Mahmoud, Eiad Yafi and Shehnaz Tehseen

This study aims to assess consumers’ beliefs in three Middle Eastern Arab countries regarding attitudinal and behavioural responses towards permission-based direct email marketing…

2907

Abstract

Purpose

This study aims to assess consumers’ beliefs in three Middle Eastern Arab countries regarding attitudinal and behavioural responses towards permission-based direct email marketing (hereafter DEM) and the moderating role of gender in the hypothesised path model.

Design/methodology/approach

Structural equation modelling was used to test the hypothesised path model by using data collected from 829 respondents.

Findings

The findings show that attitude was found to fully mediate the relationship between beliefs and behavioural responses towards permission-based DEM. Gender moderates the relationship between beliefs and attitudes and responses to permission-based DEM. Notably, female respondents were found to react more actively when exposed to permission-based DEM.

Research limitations/implications

Further qualitative research is needed to learn more about how and why individuals develop behavioural intentions in certain ways towards opt-in DEM. In addition, neuropsychology approaches such as eye-tracking are endorsed for future research to gain more insights and conquer biases associated with self-reporting procedures in countries where such technologies are deemed as legal and ethical to be used with human subjects.

Practical implications

Advertisers promoting products and services in the Middle Eastern Arab context should take further steps to enhance the quality of information (including cultural sensitiveness) and the perceived entertainment value that could be delivered to consumers through permission-based DEM, especially for female internet users. Additionally, this study highly recommends the double opt-in approach to permission-based DEM.

Originality/value

To the best of the authors’ knowledge, this is the first attempt to address the gender role as a moderator of the path depicting the effectiveness of permission-based DEM approach in the Middle East (Arab counties) from beliefs to behavioural responses via attitudes.

Details

Journal of Research in Interactive Marketing, vol. 13 no. 2
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 12 October 2018

Stuti Saxena

The paper aims to “re-use” the Open Government Data (OGD) published by the Election Commission of India (ECI). Bihar’s performance across General Elections, 2014, and Bihar…

Abstract

Purpose

The paper aims to “re-use” the Open Government Data (OGD) published by the Election Commission of India (ECI). Bihar’s performance across General Elections, 2014, and Bihar Legislative Assembly Elections, 2015, is compared, wherein the role of contestants’ demographic profiles in determining their vote share is being investigated.

Design/methodology/approach

Hypotheses are derived based on the impact of contestants’ demographic profiles (age, marital status, social category, political party affiliation, educational qualification, availing telephone and email facility, criminal antecedents) on their vote share. Following a quantitative approach, multiple regression and logistic regression are used to draw inferences from the data contestants’ affidavits – sourced from the ECI website.

Findings

Results show that contestants’ demographic profiles impact their vote share in the elections. While the ECI website is a viable source for re-using the data available there, data are not available in a user-friendly format and this leads to difficulty in being re-used by different stakeholders.

Originality/value

Academic research on OGD re-use is negligible, and the present study seeks to contribute towards extant literature by underlining the significance of re-using OGD by drawing inferences from the data accessible via ECI.

Details

foresight, vol. 20 no. 5
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 18 July 2008

Junaidah Hashim

The purpose of this study is to identify learning barriers in information communication technology (ICT) adoption among working women in Malaysia. Regardless of gender, it would…

4006

Abstract

Purpose

The purpose of this study is to identify learning barriers in information communication technology (ICT) adoption among working women in Malaysia. Regardless of gender, it would be advantageous for all individuals in today's society to acquire basic ICT skills. Despite significant growth in ICT professionals during the last two decades, there remains a gender imbalance, particularly in developing countries such as Malaysia.

Design/methodology/approach

The study uses a self‐developed questionnaire to measure the learning barriers and ICT adoption. The survey instrument was developed from the constructs used in the individual innovativeness theory and theory of perceived attributes. The questionnaires were administered face‐to‐face to a total of 315 working women, who participated as respondents in this study.

Findings

The findings revealed that the working women in Malaysia possess only average level of ICT skills. They seldom use the internet and e‐mail at their workplace or at home, they do not face serious learning barriers with respect to ICT, and they have complexity as their innovation characteristics. However, they are innovators in the adopters' categories. The combined variance in the characteristics of learning barriers, ICT skills, and ICT usage amounted to 70 per cent in innovation characteristics.

Practical implications

This study reduces the knowledge gap regarding the identification of learning barriers, ICT skills, and ICT usage as predictors of ICT adoption among working women in Malaysia. These factors have been overlooked by some previous researchers. This study also calls attention to the fact that employers and training agencies that are responsible to provide ICT training to women employees must understand and employ the proper learning approaches and methods that ought to be used in adult training and education. Malaysian women are able to adopt an innovation with a high degree of uncertainty at the time of adoption, and it is believed that with correct and suitable training schemes Malaysian working women can acquire appropriate ICT skills and become competent in using ICT at the workplace. With managerial skills and ICT‐based competencies, the working women would have a lot more knowledge seeking skills, increased access to up‐to‐date information, be effective in decision making, and establish networking and linkages. With this they will stand a better chance for promotion and advancement.

Originality/value

The sample of this study is unique. This study was conducted in a multi‐ethnic, multi‐cultural and multi‐lingual society. Malaysia presents an interesting case study on working women because it is a society undergoing rapid changes from its strong traditional religious and cultural norms to modern values about women.

Details

Gender in Management: An International Journal, vol. 23 no. 5
Type: Research Article
ISSN: 1754-2413

Keywords

Article
Publication date: 11 February 2019

Mutlaq Jalimid Alotaibi, Steven Furnell and Nathan Clarke

It is widely acknowledged that non-compliance of employees with information security polices is one of the major challenges facing organisations. This paper aims to propose a…

Abstract

Purpose

It is widely acknowledged that non-compliance of employees with information security polices is one of the major challenges facing organisations. This paper aims to propose a model that is intended to provide a comprehensive framework for raising the level of compliance amongst end-users, with the aim of monitoring, measuring and responding to users’ behaviour with an information security policy.

Design/methodology/approach

The proposed model is based on two main concepts: a taxonomy of the response strategy to non-compliant behaviour and a compliance points system. The response taxonomy comprises two categories: awareness raising and enforcement of the security policy. The compliance points system is used to reward compliant behaviour and penalise non-compliant behaviour.

Findings

A prototype system has been developed to simulate the proposed model and work as a real system that responds to the behaviour of users (reflecting both violations and compliance behaviour). In addition, the model has been evaluated by interviewing experts from academic and industry. They considered the proposed model to offers a novel approach for managing end users’ behaviour with the information security policies.

Research limitations/implications

Psychological factors were out of the research scope at this stage. The proposed model may have some psychological impacts upon users; therefore, this issue needs to be considered by studying the potential impacts and the best solutions.

Originality/value

Users being compliant with the information security policies of their organisation is the key to strengthen information security. Therefore, when employees have a good level of compliance with security policies, this positively affects the overall security of an organisation.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 June 2001

Thomas Jackson, Ray Dawson and Darren Wilson

The use of email by employees at the Danwood Group was studied and it was found that the interrupt effect from emails is more than generally believed. Employees allowed themselves…

1377

Abstract

The use of email by employees at the Danwood Group was studied and it was found that the interrupt effect from emails is more than generally believed. Employees allowed themselves to be interrupted almost as frequently as telephone calls and the common reaction to the arrival of an email is to react almost as quickly as they would respond to telephone calls. This means the interrupt effect is comparable with that of a telephone call. The recovery time from an email interruption was found to be significantly less than the published recovery time for telephone calls. It is to be concluded, therefore, that while Email is still less disruptive than the telephone, the way the majority of users handle their incoming email has been shown to give far more interruption than expected. By analysing the data captured the authors have been able to create recommendations for a set of guidelines for email usage within the workplace that will increase employee efficiency by reducing the prominence of interruptions, restricting the use of email‐to‐all messages, setting‐up the email application to display three lines of the email and to check for email less frequently. It is recommended that training should be given to staff on how to use email more effectively to increase employee productivity.

Details

Journal of Systems and Information Technology, vol. 5 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 31 December 2018

Ramakrishnan Raman, Sandeep Bhattacharya and Dhanya Pramod

Research questions that this paper attempts to answer are – do the features in general email communication have any significance to a teaching faculty member leaving the business…

1751

Abstract

Purpose

Research questions that this paper attempts to answer are – do the features in general email communication have any significance to a teaching faculty member leaving the business school? Do the sentiments expressed in email communication have any significance to a teaching faculty member leaving the business school? Do the stages mentioned in the transtheoretical model have any relevance to the email behaviour of an individual when he or she goes through the decision process leading to the decision to quit? The purpose of this paper is to study email patterns and use predictive analytics to correlate with the real-world situation of leaving the business school.

Design/methodology/approach

The email repository (2010–2017) of 126 teaching faculty members who were associated with a business school as full-time faculty members is the data set that was used for the research. Of the 126 teaching faculty members, 42 had left the business school during this time frame. Correlation analysis, word count analysis and sentiment analysis were executed using “R” programming, and sentiment “R” package was used to understand the sentiment and its association in leaving the business school. From the email repository, a rich feature set of data was extracted for correlation analysis to discover the features which had strong correlation with the faculty member leaving the business school. The research also used data-logging tools to extract aggregated statistics for word frequency counts and sentiment features.

Findings

Those faculty members who decide to leave are involved more in external communication and less in internal communications. Also, those who decide to leave initiate fewer email conversations and opt to forward emails to colleagues. Correlation analysis shows that negative sentiment goes down, as faculty members leave the organisation and this is in contrary to the existing review of literature. The research also shows that the triggering point or the intention to leave is positively correlated to the downward swing of the emotional valence (positive sentiment). A number of email features have shown change in patterns which are correlated to a faculty member quitting the business school.

Research limitations/implications

Faculty members of only one business school have been considered and this is primary due to cost, privacy and complexities involved in procuring and handling the data. Also, the reasons for exhibiting the sentiments and their root cause have not been studied. Also the designation, roles and responsibilities of faculty members have not been taken into consideration.

Practical implications

Business schools all over India always have a challenge to recruit good faculty members who can take up research activities, teach and also shoulder administrative responsibilities. Retaining faculty members and keeping attrition levels low will help business schools to maintain the standards of excellence that they aspire. This research is immensely useful for business school, which can use email analytics in predicting the intention of the faculty members leaving their business school.

Originality/value

Although past studies have studied attrition, this study uses predictive analytics and maps it to the intention to quit. This study helps business schools to predict the chance of faculty members leaving the business school which is of immense value, as appropriate measures can be taken to retain and restrict attrition.

Details

Benchmarking: An International Journal, vol. 26 no. 1
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 17 March 2012

Laura Marulanda‐Carter and Thomas W. Jackson

The purpose of this paper is to explore the effect of e‐mail interruptions on tasks and to explore the concept of e‐mail addiction within the workplace.

1301

Abstract

Purpose

The purpose of this paper is to explore the effect of e‐mail interruptions on tasks and to explore the concept of e‐mail addiction within the workplace.

Design/methodology/approach

Data were collected from a large car rental company in the UK. The first collection method involved observing the effects of simulated e‐mail interruptions on seven employees by measuring the interrupt handling time, the interrupt recovery time, and the additional time required to complete the task given the number of interruptions. The second part of the study involved a questionnaire sent to 100 employees to capture addictive characteristics in employees' e‐mail communication behaviour.

Findings

E‐mail interruptions have a negative time impact upon employees and show that both interrupt handling and recovery time exist. A typical task takes one third longer than undertaking a task with no e‐mail interruptions. The questionnaire data show clinical characteristics classify 12 per cent of e‐mail addicts, and behavioural characteristics classify 15 per cent of e‐mail addicts in the workplace.

Research limitations/implications

Observation was constrained by the timeframes and availability of the participating organisation. Measuring an employee receiving e‐mail interruptions over a greater time period might achieve a more comprehensive understanding of the impact.

Originality/value

The small study is the first to determine the impact of e‐mail interruptions on work tasks by observing employees, and to present a method to determine e‐mail addiction. By understanding these factors, organisations can manage workflow strategies to improve employee efficiency and effectiveness.

Book part
Publication date: 17 March 2010

Michael P. O’Driscoll, Paula Brough, Carolyn Timms and Sukanlaya Sawang

The impact of technology on the health and well-being of workers has been a topic of interest since computers and computerized technology were widely introduced in the 1980s. Of…

Abstract

The impact of technology on the health and well-being of workers has been a topic of interest since computers and computerized technology were widely introduced in the 1980s. Of recent concern is the impact of rapid technological advances on individuals’ psychological well-being, especially due to advancements in mobile technology that have increased many workers’ accessibility and expected productivity. In this chapter we focus on the associations between occupational stress and technology, especially behavioral and psychological reactions. We discuss some key facilitators and barriers associated with users’ acceptance of and engagement with information and communication technology. We conclude with recommendations for ongoing research on managing occupational health and well-being in conjunction with technological advancements.

Details

New Developments in Theoretical and Conceptual Approaches to Job Stress
Type: Book
ISBN: 978-1-84950-713-4

Article
Publication date: 30 October 2018

Shrawan Kumar Trivedi and Prabin Kumar Panigrahi

Email spam classification is now becoming a challenging area in the domain of text classification. Precise and robust classifiers are not only judged by classification accuracy…

Abstract

Purpose

Email spam classification is now becoming a challenging area in the domain of text classification. Precise and robust classifiers are not only judged by classification accuracy but also by sensitivity (correctly classified legitimate emails) and specificity (correctly classified unsolicited emails) towards the accurate classification, captured by both false positive and false negative rates. This paper aims to present a comparative study between various decision tree classifiers (such as AD tree, decision stump and REP tree) with/without different boosting algorithms (bagging, boosting with re-sample and AdaBoost).

Design/methodology/approach

Artificial intelligence and text mining approaches have been incorporated in this study. Each decision tree classifier in this study is tested on informative words/features selected from the two publically available data sets (SpamAssassin and LingSpam) using a greedy step-wise feature search method.

Findings

Outcomes of this study show that without boosting, the REP tree provides high performance accuracy with the AD tree ranking as the second-best performer. Decision stump is found to be the under-performing classifier of this study. However, with boosting, the combination of REP tree and AdaBoost compares favourably with other classification models. If the metrics false positive rate and performance accuracy are taken together, AD tree and REP tree with AdaBoost were both found to carry out an effective classification task. Greedy stepwise has proven its worth in this study by selecting a subset of valuable features to identify the correct class of emails.

Research limitations/implications

This research is focussed on the classification of those email spams that are written in the English language only. The proposed models work with content (words/features) of email data that is mostly found in the body of the mail. Image spam has not been included in this study. Other messages such as short message service or multi-media messaging service were not included in this study.

Practical implications

In this research, a boosted decision tree approach has been proposed and used to classify email spam and ham files; this is found to be a highly effective approach in comparison with other state-of-the-art modes used in other studies. This classifier may be tested for different applications and may provide new insights for developers and researchers.

Originality/value

A comparison of decision tree classifiers with/without ensemble has been presented for spam classification.

Details

Journal of Systems and Information Technology, vol. 20 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Abstract

Subject area

Enterprise, Strategy

Study level/applicability

This case study documents the history of e-commerce adoption and usage in a fabric and garment manufacturing firm operating in an African country. Lessons drawn from the case could be applied to understanding the achievement of e-commerce benefits through the complex interrelationships between firm-level, national and global resources.

Case overview

The case study presents a summary of e-commerce capabilities in the firm, the key resources developed and actions taken to deploy e-commerce capabilities and the notable benefits obtained through these e-commerce capabilities. The study shows that, first, the ability to access information and communication technology (ICT) infrastructure matters in developing countries, but managerial capabilities matter more. Managerial capabilities enable firms to find external resources (both in-country and globally) to substitute for internal resource deficiencies. Second, intangible social resources – trust, reputation and credibility – play a critical role in determining whether the e-commerce strategies of firms are successful or not.

Expected learning outcomes

An understanding of how managerial capabilities influence the creation of e-commerce capabilities and the achievement of e-commerce benefits, especially in an African or Ghanaian context. Learners can also draw lessons that could be applicable to understanding how a firm's strategic orientation, resource portfolio and the nature of its target market differentiate the extent of integration or adoption and usage of e-commerce in the firm.

Supplementary materials

Teaching notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Details

Emerald Emerging Markets Case Studies, vol. 4 no. 7
Type: Case Study
ISSN: 2045-0621

Keywords

1 – 10 of over 8000