Search results

1 – 10 of over 6000
Article
Publication date: 5 January 2024

Yu-Wei Chang and I-Jen Li

This study explored the influence of Dervin’s sensemaking methodology (SMM).

Abstract

Purpose

This study explored the influence of Dervin’s sensemaking methodology (SMM).

Design/methodology/approach

Citation context analysis was used to identify the most influential SMM concepts in 948 articles citing 34 SMM-related studies by Dervin that were published between 1983 and 2017. Moreover, the bibliometric method and content analysis were incorporated to examine the disciplines and research topics influenced by the SMM-related studies and the role of cited content in SMM-related studies.

Findings

The influence of SMM is concentrated in information behavior research in the field of library and information science (LIS). The 1992 book chapter From the mind’s eye of the user was most frequently cited, followed by the first SMM study from 1983; 14 of the 18 content categories were relevant to SMM. “Sensemaking,” at the core of SMM, was the most influential cited concept, primarily cited from the 1983 SMM-related study. Although the SMM was developed as a research method, it has not been primarily applied to design research methods in other studies.

Originality/value

This study explored the interdisciplinary influence of Dervin’s SMM from several aspects and demonstrated the complex information dynamics between SMM-related works and citing articles.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 5 February 2024

Yi Zhang, Tianqi Zhang, Hang Zhou and Jian Qin

People usually try to avoid uncertainty. Recently, however, uncertainty has become an emerging marketing tool in the hedonic product industry. In the case of blind box…

Abstract

Purpose

People usually try to avoid uncertainty. Recently, however, uncertainty has become an emerging marketing tool in the hedonic product industry. In the case of blind box consumption, for example, the consumers become addicted to the uncertainty created by businesses, leading to repeat purchases and even indulgences. Previous research has, yet, to focus on the impact of uncertainty on indulgence and the role of emotions.

Design/methodology/approach

This paper constructs and validates a chain mediation model of uncertainty triggering indulgent consumption based on the information gap theory, positive emotion theory and uncertainty resolution theory and examines the difference between resolved and unresolved uncertainty. This study also explores differences in the impact of whether uncertainty is resolved on emotions. The uncertainty-resolved group elicited a more positive emotional response than the uncertainty-unresolved group, leading to a more indulgent consumption.

Findings

The results of three studies show that uncertainty influences indulgent consumption through curiosity and positive emotion, and that curiosity and positive emotion play separate and chain mediating roles between uncertainty and indulgent consumption, respectively. We validate our central hypothesis with questionnaires among blind box consumer groups, examining the moderating role of perceived luck and risk preferences.

Originality/value

The findings shed new light on firms' use of uncertainty to promote consumer purchases.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 15 June 2023

Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…

Abstract

Purpose

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.

Design/methodology/approach

This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.

Findings

First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.

Originality/value

The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 2024

Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Abstract

Purpose

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Design/methodology/approach

Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).

Findings

The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.

Research limitations/implications

The authors discussed the implications of the authors’ findings for research, practice and policy.

Social implications

The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.

Originality/value

This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 March 2022

Arfah Habib Saragih and Syaiful Ali

This paper aims to study the impact of the adoption of eXtensible Business Reporting Language (XBRL) on corporate tax avoidance.

Abstract

Purpose

This paper aims to study the impact of the adoption of eXtensible Business Reporting Language (XBRL) on corporate tax avoidance.

Design/methodology/approach

This paper used a quantitative method with panel data regression models using a sample of firms listed on the Indonesia Stock Exchange from 2011 to 2018.

Findings

The regression results demonstrate that XBRL implementation does not have any impact on corporate tax avoidance. The results indicate that tax avoidance is not reduced following XBRL adoption. This report shows unexpected and unfavourable outcomes of XBRL financial reporting in a developing country.

Research limitations/implications

This study employs a sample of firms from one emerging country only.

Practical implications

The study proposes several implications for using XBRL in tax reporting, which may help the tax authorities reduce tax avoidance. Regulators need to develop adequate taxonomies with standardized extensions related to tax information in the XBRL format. They include tax tags from financial statements and tax tags from the disclosure section, to gain more comprehensive corporate tax information.

Originality/value

This study proposes and tests an explanation for the effect of XBRL adoption on corporate tax avoidance in the context of a developing country.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 9 February 2024

Dijana Šobota

The paper seeks to introduce the “critical open access literacy” construct as a holistic approach to confront the challenges in open access (OA) as a dimension of scholarly…

Abstract

Purpose

The paper seeks to introduce the “critical open access literacy” construct as a holistic approach to confront the challenges in open access (OA) as a dimension of scholarly communication.

Design/methodology/approach

The paper first introduces the concepts of information literacy (IL) and OA in the context of transformations in the scholarly information environment. Via a theoretical-analytical exercise on the basis of a literature review of the intersections between the two concepts and of the criticisms of OA, the paper discusses the role of critical IL in addressing the challenges in OA and lays the theoretical-conceptual groundwork for the critical OA literacy construct.

Findings

The structural nature of the challenges and transformations in the scholarly information environment require new foci and pedagogical practices in library and information studies. A more holistic, critical and integrative approach to OA is warranted, which could effectively be achieved through the re-conceptualization of IL.

Practical implications

The paper specifies the avenues for putting the theoretical conceptualizations of critical OA literacy into practice by identifying possible foci for IL instruction alongside a transformed role for librarians.

Originality/value

The paper extends deliberations on the role of critical IL for scholarly communication and attempts to advance the research fields of the two domains by proposing a new construct situated at the junction of OA and IL.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 19 January 2024

Yuho Okita, Takao Kaneko, Hiroaki Imai, Monique Nair and Kounosuke Tomori

Goal setting is a crucial aspect of client-centered practice in occupational therapy (OT) for mental health conditions. However, it remains to be seen how goal-setting has been…

1049

Abstract

Purpose

Goal setting is a crucial aspect of client-centered practice in occupational therapy (OT) for mental health conditions. However, it remains to be seen how goal-setting has been delivered in mental health, particularly the OT process. The purpose of this scoping review was to explore the nature and extent of goal setting delivered in mental health and informed OT practice.

Design/methodology/approach

The authors followed the guidelines of Arksey and O’Malley (2005) and searched three databases using key search terms: “mental disorder,” “goal setting,” and “occupational therapy” and their synonyms.

Findings

After excluding duplicate records, the authors initially screened 883 records and resulted in 20 records in total after the screening process. Most of the identified articles used goal-setting delivered by both a health professional and a client (n = 14), and focused on people with schizophrenia or schizoaffective disorder (n = 13), but three interventions were delivered by occupational therapists. Further research needs on goal-setting in mental health OT, exploring the reliability and validity of different goal-setting strategies and investigating the effectiveness of goal-setting for promoting behavior change and client engagement across various mental health conditions and settings.

Research limitations/implications

The scoping review has some limitations, such as not investigating the validity and reliability of goal-setting strategies identified, and excluding conference papers and non-English articles.

Originality/value

This scoping review presents a mapping of how goal-setting has been delivered in mental health and informed OT practice. The findings suggest limited research in OT and highlight the need for more studies to address the evidence gap in individualized client-centered OT.

Details

Irish Journal of Occupational Therapy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-8819

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 9 January 2024

Muneeb Afzal, Johnny Kwok Wai Wong and Alireza Ahmadian Fard Fini

Request for information (RFI) documents play a pivotal role in seeking clarifications in construction projects. However, perceived as inevitable “non-value adding” tasks, they…

Abstract

Purpose

Request for information (RFI) documents play a pivotal role in seeking clarifications in construction projects. However, perceived as inevitable “non-value adding” tasks, they harbour risks like schedule delays and increased project costs, underlining the importance of strategic RFI management in construction projects. Despite this, a lack of literature dissecting RFI processes impedes a full understanding of their intricacies and impacts. This study aims to bridge the gap through a comprehensive literature review, delving into RFI intricacies and implications, while emphasising the necessity for strategic RFI management to prevent project risks.

Design/methodology/approach

This research study systematically reviews RFI-related papers published between 2000 and 2023. Accordingly, the review discusses key themes related to RFI management, yielding best practices for industry stakeholders and highlighting research directions and gaps in the body of knowledge.

Findings

Present RFI management platforms exhibit deficiencies and lack analytics essential for streamlined RFI processing. Complications arise in building information modelling (BIM)-enabled projects due to software disparities and interoperability hurdles. The existing body of knowledge heavily relies on manual content analysis, an impractical approach for the construction industry. The proposed research direction involves automated comprehension of unstructured RFI content using advanced text mining and natural language processing techniques, with the potential to greatly elevate the efficiency of RFI processing.

Originality/value

The study extends the RFI literature by providing novel insights into the problemetisation with the RFI process, offering a holistic understanding and best practices to minimise adverse effects. Additionally, the paper synthesises RFI processes in traditional and BIM-enabled project settings, maps a causal-loop diagram to identify associated issues and summarises approaches for extracting knowledge from the unstructured content of RFIs. The outcomes of this review stand to offer invaluable insights to both industry practitioners and researchers, enabling and promoting the refinement of RFI processes within the construction domain.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

1 – 10 of over 6000