Search results

1 – 10 of 10
Open Access
Article
Publication date: 2 January 2024

Renata Monteiro Martins, Sofia Batista Ferraz and André Francisco Alcântara Fagundes

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information…

Abstract

Purpose

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information control on privacy concerns (PC) and, consequently, in consumers’ willingness to disclose personal information online. The authors also propose to test the mediation role of trust between PCs and willingness to disclose information. Trust is not a predictor of PC but a causal mechanism – considering that the focus is to understand consumers’ attitudes and behavior regarding the virtual environment (not context-specific) (Martin, 2018).

Design/methodology/approach

The authors developed a survey questionnaire based on the constructs that compose the proposed model to collect data from 864 respondents. The survey questionnaire included the following scales: internet usage expertise from Ohanian (1990); perceived risk, attitude toward information control, trust and willingness to disclose personal information online from Malhotra et al. (2004); and PC from Castañeda and Montoro (2007). All items were measured on a Likert seven-point scale (1 = totally disagree; 7 = totally agree). To obtain Westin’s attitudinal categories toward privacy, respondents answered Westin’s three-item privacy index. For data analysis, the authors applied covariance-based structural equation modeling.

Findings

First, the proposed model explains the drivers of consumers’ disposition to provide personal information at a level that surpasses specific contexts (Martin, 2018), bringing the analysis to consumers’ level and considering their general perceptions toward data privacy. Second, the findings provide inputs to propose a better definition of Westin’s attitudinal categories toward privacy, which used to be defined only by individuals’ information privacy perception. Consumers’ perceptions about their abilities in using the internet, the risks, their beliefs toward information control and trust also help to delimitate and distinguish the fundamentalists, the pragmatics and the unconcerned.

Research limitations/implications

Some limitations weigh the theoretical and practical implications of this study. The sample size of pragmatic and unconcerned respondents was substantially smaller than that of fundamentalists. It might be explained by applying Westin’s self-report index to classify the groups according to their score regarding PCs. Most individuals affirm having a great concern for their data privacy but still provide online information for the benefit of personalization – known as the privacy paradox (Zeng et al., 2021). It leads to another limitation of this research, given the lack of measures that classify respondents by considering their actual behavior toward privacy.

Practical implications

PC emerges as an important predictor of consumer trust and willingness to disclose their data online, and trust also influences this disposition. Managers need to implement actions that effectively reduce consumers’ concerns about privacy and increase their trust in the company – e.g. adopting a clear and transparent policy on how the data collected is stored, treated, protected and used to benefit the consumer. Regarding the perception of risk, if managers convince consumers that the data collected on the internet is protected, they tend to be less concerned about privacy.

Social implications

The results suggest different aspects influencing the willingness to disclose personal information online, including different responses considering consumers’ PCs. Through their policies and legislation, the authors understand that governments must be attentive to this aspect, establishing regulations that protect consumers’ data in the virtual environment. In addition to regulatory policies, education campaigns can be carried out for both consumers and managers to raise the discussion about privacy and the availability of information in the online environment, demonstrating the importance of protecting personal data to benefit the government, consumers and organizations.

Originality/value

Although there is increasing research on consumers’ privacy, studies have not considered their attitudinal classifications – high, moderate and low concern – as moderators of willingness to disclose information online. Researchers have also increased attention to the antecedents of PCs and disclosure of information but overlooked possible mechanisms that explain the relationship between them.

Details

RAUSP Management Journal, vol. 59 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Article
Publication date: 21 March 2024

Thamaraiselvan Natarajan, P. Pragha, Krantiraditya Dhalmahapatra and Deepak Ramanan Veera Raghavan

The metaverse, which is now revolutionizing how brands strategize their business needs, necessitates understanding individual opinions. Sentiment analysis deciphers emotions and…

Abstract

Purpose

The metaverse, which is now revolutionizing how brands strategize their business needs, necessitates understanding individual opinions. Sentiment analysis deciphers emotions and uncovers a deeper understanding of user opinions and trends within this digital realm. Further, sentiments signify the underlying factor that triggers one’s intent to use technology like the metaverse. Positive sentiments often correlate with positive user experiences, while negative sentiments may signify issues or frustrations. Brands may consider these sentiments and implement them on their metaverse platforms for a seamless user experience.

Design/methodology/approach

The current study adopts machine learning sentiment analysis techniques using Support Vector Machine, Doc2Vec, RNN, and CNN to explore the sentiment of individuals toward metaverse in a user-generated context. The topics were discovered using the topic modeling method, and sentiment analysis was performed subsequently.

Findings

The results revealed that the users had a positive notion about the experience and orientation of the metaverse while having a negative attitude towards the economy, data, and cyber security. The accuracy of each model has been analyzed, and it has been concluded that CNN provides better accuracy on an average of 89% compared to the other models.

Research limitations/implications

Analyzing sentiment can reveal how the general public perceives the metaverse. Positive sentiment may suggest enthusiasm and readiness for adoption, while negative sentiment might indicate skepticism or concerns. Given the positive user notions about the metaverse’s experience and orientation, developers should continue to focus on creating innovative and immersive virtual environments. At the same time, users' concerns about data, cybersecurity and the economy are critical. The negative attitude toward the metaverse’s economy suggests a need for innovation in economic models within the metaverse. Also, developers and platform operators should prioritize robust data security measures. Implementing strong encryption and two-factor authentication and educating users about cybersecurity best practices can address these concerns and enhance user trust.

Social implications

In terms of societal dynamics, the metaverse could revolutionize communication and relationships by altering traditional notions of proximity and the presence of its users. Further, virtual economies might emerge, with virtual assets having real-world value, presenting both opportunities and challenges for industries and regulators.

Originality/value

The current study contributes to research as it is the first of its kind to explore the sentiments of individuals toward the metaverse using deep learning techniques and evaluate the accuracy of these models.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 20 March 2023

Kudakwashe Chirambwi

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and…

Abstract

Purpose

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and contention on the superiority given to positivist and interpretivist research designs when doing fieldwork in war situations, hence there is a need to use integrated data generation techniques. The combined effect of severe limitations of movement for both the researcher and researched fragmented data because of polarized views about the causes of the war and unpredictable events that make information hard to come by militate against systematic, organised and robust data generation. The purpose of this paper, therefore, is to make fieldwork researchers understand significant research problems unique to war zones.

Design/methodology/approach

This research was guided by the postmodernist mode of thought which challenges standardised research traditions. Fieldwork experiences in Cabo suggest the need to use the composite strategies that rely on the theoretical foundation of integrative and creative collection of data when doing research in violent settings.

Findings

The fieldwork experiences showed that the standardised, conventional and valorised positivist and ethnographic research strategies may not sufficiently facilitate understanding of the dynamics of war. There should not be firm rules, guidelines or regulations governing the actions of the researcher in conflict. As such, doing research in violent settings require reflexivity, flexibility and creativity in research strategies that respond to rapid changes. Research experiences in Mozambique show the need to use blended methods that include even less structured methodologies.

Originality/value

Fieldwork experiences in Cabo challenges researchers who cling to standardised research traditions which often hamper awareness of new postmodernist mode of thought applicable to war settings. It is essential to study the nature of African armed conflicts by combining creativity and flexibility in the selection of research strategies.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 13 April 2023

Chunmei Gan, Hongxiu Li and Yong Liu

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of…

Abstract

Purpose

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of social cognitive theory (SCT).

Design/methodology/approach

Based on SCT, this study puts forward a theoretical model incorporating habit, excessive use and negative emotions to predict social media discontinuance behavior. The proposed research model was empirically tested with 465 responses collected from WeChat users in China via an online survey. WeChat is one of the most popular social media in China. However, WeChat also faces the challenges of reduced or terminated usage among its users. Partial least squares structural equation modeling (PLS-SEM) technique was used to analyze the data.

Findings

The research results in this study show that habit exerts a negative effect on social media discontinuance behavior, while exhaustion and regret have positive influences. In addition, habit positively affects excessive use, which further leads to negative emotions of social media exhaustion and regret. Moreover, gender moderates the relationship between habit and social media discontinuance behavior.

Originality/value

This study adds to the literature of information system (IS) use lifecycle by investigating user behavioral changes regarding a transition from habituated to excessive use and further to discontinuance behavior. This study also helps elucidate the complex role of habit by explaining social media discontinuance from the social cognitive view. Furthermore, this study advances the current understanding of gender difference in social media discontinuance in the Chinese context. The study also offers insights to practitioners on how to prevent individuals from discontinuing their use of social media.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 6 October 2023

Renata Konrad, Solomiya Sorokotyaha and Daniel Walker

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…

Abstract

Purpose

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.

Design/methodology/approach

This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.

Findings

Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.

Originality/value

Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 7 April 2023

Arindam Bhattacharjee and Anita Sarkar

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…

Abstract

Purpose

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.

Design/methodology/approach

Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.

Findings

Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.

Originality/value

This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 27 March 2024

Yupeng Mou, Yixuan Gong and Zhihua Ding

Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer…

Abstract

Purpose

Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer resistance. Thus, drawing on the user resistance theory, this study explores factors that influence consumers’ resistance to AI and suggests ways to mitigate this negative influence.

Design/methodology/approach

This study tested four hypotheses across four studies by conducting lab experiments. Study 1 used a questionnaire to verify the hypothesis that AI’s “substitute” image leads to consumer resistance to AI; Study 2 focused on the role of perceived threat as an underlying driver of resistance to AI. Studies 3–4 provided process evidence by the way of a measured moderator, testing whether AI with servant communication style and literal language style is resisted less.

Findings

This study showed that AI’s “substitute” image increased users' resistance to AI. This occurs because the substitute image increases consumers’ perceived threat. The study also found that using servant communication and literal language styles in the interaction between AI and consumers can mitigate the negative effects of AI-substituted images.

Originality/value

This study reveals the mechanism of action between AI image and consumers’ resistance and sheds light on how to choose appropriate image and expression styles for AI products, which is important for lowering consumer resistance to AI.

Details

Marketing Intelligence & Planning, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 2 April 2024

Tiera Chante Tanksley

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness…

Abstract

Purpose

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness as the organizing logic and default setting of digital and artificially intelligent technology. This paper centers the voices, experiences and technological innovations of the students, and in doing so, introduces a new type of digital literacy: critical race algorithmic literacy.

Design/methodology/approach

Data for this study include student interviews (called “talk backs”), journal reflections and final technology presentations.

Findings

Broadly, the data suggests that critical race algorithmic literacies prepare Black students to critically read the algorithmic word (e.g. data, code, machine learning models, etc.) so that they can not only resist and survive, but also rebuild and reimagine the algorithmic world.

Originality/value

While critical race media literacy draws upon critical race theory in education – a theorization of race, and a critique of white supremacy and multiculturalism in schools – critical race algorithmic literacy is rooted in critical race technology theory, which is a theorization of blackness as a technology and a critique of algorithmic anti-blackness as the organizing logic of schools and AI systems.

Details

English Teaching: Practice & Critique, vol. 23 no. 1
Type: Research Article
ISSN: 1175-8708

Keywords

Article
Publication date: 1 April 2024

Phuong Thi Nguyen, Michael Kend and Dung Quang Le

This study aims to explore some perceptions related to the suggestion that external auditors will be replaced by audit technologies that use artificial intelligence (AI) tools to…

Abstract

Purpose

This study aims to explore some perceptions related to the suggestion that external auditors will be replaced by audit technologies that use artificial intelligence (AI) tools to make audit judgements when performing the financial statement audits. Digital transformation is revitalising the technologies used by external auditors and their firms; thus, the authors seek to understand what challenges this creates for the auditing profession in Vietnam.

Design/methodology/approach

Through the theoretical lens of new institutionalism theory, this study uses a qualitative approach involving 20 semi-structured interviews conducted with external auditors in Vietnam during 2022. This sample includes the global Big Four, global mid-tier and smaller local Vietnamese audit firms.

Findings

The findings indicate that there is resistance or disagreement with the suggestion that in the future audit technologies using AI tools can replace humans (external auditors). The role of external auditors in the professional services sector will gradually be changed by audit technologies; however, external auditors are unlikely to be replaced by audit technologies that use AI tools based on the responses of the participants. Strict institutional rules that exist in Vietnam would prevent the replacement of (human) external auditors. In the future, external auditors may take on new roles as consultants, with unique skills in classifying and processing data for decision-making processes; however, they will not be completely replaced by technology in the audit space.

Research limitations/implications

This study has limitations that it is based on the data collection from a single developing country, Vietnam; therefore, the generalisability of the findings is limited to Vietnam. Also, the authors sought insights into the future of external audits in Vietnam.

Practical implications

This study highlights the changing role of auditors and institutions. Thus, policymakers, external auditors and auditees in other developing countries would find the findings helpful.

Originality/value

This study provides new perspectives, particularly from local Vietnamese firms, about audit practices that emerge due to high-level technological advancements and then embed themselves into existing audit practices in an emerging economy. Prior studies tended to focus on the global Big Four firms, thus this study contributes by sharing the perceptions of the smaller practitioners also.

Details

Pacific Accounting Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0114-0582

Keywords

1 – 10 of 10