Search results
1 – 10 of over 6000Yu-Wei Chang and I-Jen Li
This study explored the influence of Dervin’s sensemaking methodology (SMM).
Abstract
Purpose
This study explored the influence of Dervin’s sensemaking methodology (SMM).
Design/methodology/approach
Citation context analysis was used to identify the most influential SMM concepts in 948 articles citing 34 SMM-related studies by Dervin that were published between 1983 and 2017. Moreover, the bibliometric method and content analysis were incorporated to examine the disciplines and research topics influenced by the SMM-related studies and the role of cited content in SMM-related studies.
Findings
The influence of SMM is concentrated in information behavior research in the field of library and information science (LIS). The 1992 book chapter From the mind’s eye of the user was most frequently cited, followed by the first SMM study from 1983; 14 of the 18 content categories were relevant to SMM. “Sensemaking,” at the core of SMM, was the most influential cited concept, primarily cited from the 1983 SMM-related study. Although the SMM was developed as a research method, it has not been primarily applied to design research methods in other studies.
Originality/value
This study explored the interdisciplinary influence of Dervin’s SMM from several aspects and demonstrated the complex information dynamics between SMM-related works and citing articles.
Details
Keywords
Yi Zhang, Tianqi Zhang, Hang Zhou and Jian Qin
People usually try to avoid uncertainty. Recently, however, uncertainty has become an emerging marketing tool in the hedonic product industry. In the case of blind box…
Abstract
Purpose
People usually try to avoid uncertainty. Recently, however, uncertainty has become an emerging marketing tool in the hedonic product industry. In the case of blind box consumption, for example, the consumers become addicted to the uncertainty created by businesses, leading to repeat purchases and even indulgences. Previous research has, yet, to focus on the impact of uncertainty on indulgence and the role of emotions.
Design/methodology/approach
This paper constructs and validates a chain mediation model of uncertainty triggering indulgent consumption based on the information gap theory, positive emotion theory and uncertainty resolution theory and examines the difference between resolved and unresolved uncertainty. This study also explores differences in the impact of whether uncertainty is resolved on emotions. The uncertainty-resolved group elicited a more positive emotional response than the uncertainty-unresolved group, leading to a more indulgent consumption.
Findings
The results of three studies show that uncertainty influences indulgent consumption through curiosity and positive emotion, and that curiosity and positive emotion play separate and chain mediating roles between uncertainty and indulgent consumption, respectively. We validate our central hypothesis with questionnaires among blind box consumer groups, examining the moderating role of perceived luck and risk preferences.
Originality/value
The findings shed new light on firms' use of uncertainty to promote consumer purchases.
Details
Keywords
Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang
This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…
Abstract
Purpose
This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.
Design/methodology/approach
This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.
Findings
First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.
Originality/value
The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.
Details
Keywords
Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar
This paper aims to identify the critical success factors in improving information security in Ghanaian firms.
Abstract
Purpose
This paper aims to identify the critical success factors in improving information security in Ghanaian firms.
Design/methodology/approach
Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).
Findings
The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.
Research limitations/implications
The authors discussed the implications of the authors’ findings for research, practice and policy.
Social implications
The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.
Originality/value
This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.
Details
Keywords
Arfah Habib Saragih and Syaiful Ali
This paper aims to study the impact of the adoption of eXtensible Business Reporting Language (XBRL) on corporate tax avoidance.
Abstract
Purpose
This paper aims to study the impact of the adoption of eXtensible Business Reporting Language (XBRL) on corporate tax avoidance.
Design/methodology/approach
This paper used a quantitative method with panel data regression models using a sample of firms listed on the Indonesia Stock Exchange from 2011 to 2018.
Findings
The regression results demonstrate that XBRL implementation does not have any impact on corporate tax avoidance. The results indicate that tax avoidance is not reduced following XBRL adoption. This report shows unexpected and unfavourable outcomes of XBRL financial reporting in a developing country.
Research limitations/implications
This study employs a sample of firms from one emerging country only.
Practical implications
The study proposes several implications for using XBRL in tax reporting, which may help the tax authorities reduce tax avoidance. Regulators need to develop adequate taxonomies with standardized extensions related to tax information in the XBRL format. They include tax tags from financial statements and tax tags from the disclosure section, to gain more comprehensive corporate tax information.
Originality/value
This study proposes and tests an explanation for the effect of XBRL adoption on corporate tax avoidance in the context of a developing country.
Details
Keywords
Zijun Mao and Yuqian Zhu
The study focuses on influential factors of collaboration on government data security by the Chinese government.
Abstract
Purpose
The study focuses on influential factors of collaboration on government data security by the Chinese government.
Design/methodology/approach
The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.
Findings
The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.
Originality/value
The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.
Details
Keywords
The paper seeks to introduce the “critical open access literacy” construct as a holistic approach to confront the challenges in open access (OA) as a dimension of scholarly…
Abstract
Purpose
The paper seeks to introduce the “critical open access literacy” construct as a holistic approach to confront the challenges in open access (OA) as a dimension of scholarly communication.
Design/methodology/approach
The paper first introduces the concepts of information literacy (IL) and OA in the context of transformations in the scholarly information environment. Via a theoretical-analytical exercise on the basis of a literature review of the intersections between the two concepts and of the criticisms of OA, the paper discusses the role of critical IL in addressing the challenges in OA and lays the theoretical-conceptual groundwork for the critical OA literacy construct.
Findings
The structural nature of the challenges and transformations in the scholarly information environment require new foci and pedagogical practices in library and information studies. A more holistic, critical and integrative approach to OA is warranted, which could effectively be achieved through the re-conceptualization of IL.
Practical implications
The paper specifies the avenues for putting the theoretical conceptualizations of critical OA literacy into practice by identifying possible foci for IL instruction alongside a transformed role for librarians.
Originality/value
The paper extends deliberations on the role of critical IL for scholarly communication and attempts to advance the research fields of the two domains by proposing a new construct situated at the junction of OA and IL.
Details
Keywords
Yuho Okita, Takao Kaneko, Hiroaki Imai, Monique Nair and Kounosuke Tomori
Goal setting is a crucial aspect of client-centered practice in occupational therapy (OT) for mental health conditions. However, it remains to be seen how goal-setting has been…
Abstract
Purpose
Goal setting is a crucial aspect of client-centered practice in occupational therapy (OT) for mental health conditions. However, it remains to be seen how goal-setting has been delivered in mental health, particularly the OT process. The purpose of this scoping review was to explore the nature and extent of goal setting delivered in mental health and informed OT practice.
Design/methodology/approach
The authors followed the guidelines of Arksey and O’Malley (2005) and searched three databases using key search terms: “mental disorder,” “goal setting,” and “occupational therapy” and their synonyms.
Findings
After excluding duplicate records, the authors initially screened 883 records and resulted in 20 records in total after the screening process. Most of the identified articles used goal-setting delivered by both a health professional and a client (n = 14), and focused on people with schizophrenia or schizoaffective disorder (n = 13), but three interventions were delivered by occupational therapists. Further research needs on goal-setting in mental health OT, exploring the reliability and validity of different goal-setting strategies and investigating the effectiveness of goal-setting for promoting behavior change and client engagement across various mental health conditions and settings.
Research limitations/implications
The scoping review has some limitations, such as not investigating the validity and reliability of goal-setting strategies identified, and excluding conference papers and non-English articles.
Originality/value
This scoping review presents a mapping of how goal-setting has been delivered in mental health and informed OT practice. The findings suggest limited research in OT and highlight the need for more studies to address the evidence gap in individualized client-centered OT.
Details
Keywords
Mohan Thite and Ramanathan Iyer
Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…
Abstract
Purpose
Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.
Design/methodology/approach
The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.
Findings
The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.
Originality/value
The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.
Details
Keywords
Muneeb Afzal, Johnny Kwok Wai Wong and Alireza Ahmadian Fard Fini
Request for information (RFI) documents play a pivotal role in seeking clarifications in construction projects. However, perceived as inevitable “non-value adding” tasks, they…
Abstract
Purpose
Request for information (RFI) documents play a pivotal role in seeking clarifications in construction projects. However, perceived as inevitable “non-value adding” tasks, they harbour risks like schedule delays and increased project costs, underlining the importance of strategic RFI management in construction projects. Despite this, a lack of literature dissecting RFI processes impedes a full understanding of their intricacies and impacts. This study aims to bridge the gap through a comprehensive literature review, delving into RFI intricacies and implications, while emphasising the necessity for strategic RFI management to prevent project risks.
Design/methodology/approach
This research study systematically reviews RFI-related papers published between 2000 and 2023. Accordingly, the review discusses key themes related to RFI management, yielding best practices for industry stakeholders and highlighting research directions and gaps in the body of knowledge.
Findings
Present RFI management platforms exhibit deficiencies and lack analytics essential for streamlined RFI processing. Complications arise in building information modelling (BIM)-enabled projects due to software disparities and interoperability hurdles. The existing body of knowledge heavily relies on manual content analysis, an impractical approach for the construction industry. The proposed research direction involves automated comprehension of unstructured RFI content using advanced text mining and natural language processing techniques, with the potential to greatly elevate the efficiency of RFI processing.
Originality/value
The study extends the RFI literature by providing novel insights into the problemetisation with the RFI process, offering a holistic understanding and best practices to minimise adverse effects. Additionally, the paper synthesises RFI processes in traditional and BIM-enabled project settings, maps a causal-loop diagram to identify associated issues and summarises approaches for extracting knowledge from the unstructured content of RFIs. The outcomes of this review stand to offer invaluable insights to both industry practitioners and researchers, enabling and promoting the refinement of RFI processes within the construction domain.
Details