Search results
1 – 10 of over 9000
To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.
Abstract
Purpose
To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.
Design/methodology/approach
Descriptive quantitative analysis and qualitative content analysis of 2,663 posts submitted to seven Reddit threads discussing a conspiracy operation, that is, the damage of the Nord Stream gas pipelines in September 2022. It was examined how the participants of online discussion assess the credibility of information constitutive of conspiracy theories speculating about (1) suspected actors responsible for the damage, (2) their motives and (3) the ways in which the damage was made. The credibility assessments focussed on diverse sources offering information about the above three factors.
Findings
The participants assessed the credibility of information by drawing on four main criteria: plausibility of arguments, honesty in argumentation, similarity to one's beliefs and provision of evidence. Most assessments were negative and indicated doubt about the informational believability of conspiracy theories about the damage. Of the information sources referred to in the discussion, the posts submitted by fellow participants, television programmes and statements provided by governmental organizations were judged most critically, due to implausible argumentation and advocacy of biased views.
Research limitations/implications
As the study focuses on a sample of posts dealing with conspiracy theories about a particular event, the findings cannot be generalized to concern the informational credibility conspiracy narratives.
Originality/value
The study pioneers by providing an in-depth analysis of the nature of credibility assessments by focussing on information constitutive of conspiracy theories.
Details
Keywords
Zhaohua Deng, Jiaxin Xue, Tailai Wu and Zhuo Chen
Sharing project information is critical for the success of medical crowdfunding campaigns. However, few users share medical crowdfunding projects on their social networks, and the…
Abstract
Purpose
Sharing project information is critical for the success of medical crowdfunding campaigns. However, few users share medical crowdfunding projects on their social networks, and the sharing behavior of medical crowdfunding projects on social networking sites has not been well studied. Therefore, this study explored the factors and potential mechanisms influencing users’ sharing behaviors on networking sites.
Design/methodology/approach
A research model was developed based on the attribution-affect model of helping and social capital theory. Data were collected using a longitudinal survey. Partial least squares structural equation modeling was used to analyze the collected data. We conducted post hoc analyses to validate the results of the quantitative analysis.
Findings
The analysis results verified the effects of perceived external attribution, perceived uncontrollable attributions, and perceived unstable attributions on sympathy and identified the effect of sympathy and social characteristics of medical crowdfunding users on sharing behavior.
Originality/value
This research provides a comprehensive theoretical understanding of users’ sharing behavior characteristics and provides implications for enhancing the efficiency of medical crowdfunding activities.
Details
Keywords
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
Yajun Guo, Huifang Ma, Jiahua Zhou, Yanchen Chen and Yiming Yuan
This article aims to understand users' information needs in the metaverse communities and to analyze the similarities and differences between their information needs and those of…
Abstract
Purpose
This article aims to understand users' information needs in the metaverse communities and to analyze the similarities and differences between their information needs and those of users in Internet communities.
Design/methodology/approach
This study conducted semi-structured interviews with users in the metaverse communities to gather raw data. Grounded theory research methods were employed to code and analyze the collected interview data, resulting in the extraction of 40 initial concepts, 15 subcategories and 5 main categories. Based on Maslow’s hierarchy of needs theory, this paper constructs the hierarchical model of users' information needs in the metaverse communities. It compares the differences between users' information needs in the metaverse and Internet fields.
Findings
The user’s information needs in the metaverse communities are divided into two types: deficiency needs and growth needs. Deficiency needs have two levels. The first level is the demand for basic information resources. The second level is the users demand for information assistance. Growth needs have three levels. The first level is the need for information interactions. The second level is the need for community rules. The ownership information in the community rules can provide proof of user status, assets and so on. The third level is the need for users to contribute and share their own created information content.
Originality/value
This article presents the latest research data from in-depth interviews with users in the metaverse communities. It aims to help builders and managers of metaverse communities understand users' information needs and improve the design of virtual communities.
Details
Keywords
Víctor Martínez-Molés, Carmen Pérez-Cabañero and Amparo Cervera-Taulet
The purpose of this paper is to assess the effects of presence on users’ information processing in mediated visualizations using immersive virtual reality (VR) and websites…
Abstract
Purpose
The purpose of this paper is to assess the effects of presence on users’ information processing in mediated visualizations using immersive virtual reality (VR) and websites, focusing on information understanding and cognitive load. The impact of user interfaces on users’ perception of presence is also tested.
Design/methodology/approach
A between-subjects laboratory experiment using two user interfaces – immersive VR and website – is carried out. It is complemented by a self-administered survey on the participants.
Findings
The current results indicate that an immersive VR interface improves tourists’ information processing by producing a heightened sense of presence. The results confirm that presence facilitates tourists’ information processing by increasing information understanding and decreasing cognitive load. Finally, a negative relationship between cognitive load and information understanding is obtained.
Practical implications
VR user interfaces are not only visually appealing but also cognitively optimized. Immersive VR devices can be introduced in the specific sale process of cruise trips through both offline channels (physical stores and travel agencies) and online channels to facilitate tourists’ information processing during the prepurchase phase.
Originality/value
The primary contribution lies in the integration of the theory of presence with two influential information processing frameworks, namely, cognitive load theory and cognitive fit theory. This integration provides a holistic perspective on how user interfaces influence consumer information processing in the unique context of cruise tourism, particularly during the stage of a prepurchase information search.
Details
Keywords
Liu Yang, Nannan Yu, Xuesong Li and Jian Wang
In public health emergencies, seeking confirmed cases’ activity trajectory information (CCATI) is crucial to the public’s efforts to combat the epidemic. The public can stabilize…
Abstract
Purpose
In public health emergencies, seeking confirmed cases’ activity trajectory information (CCATI) is crucial to the public’s efforts to combat the epidemic. The public can stabilize their sentiments and mitigate the risk of cross-infection by obtaining CCATI. We investigated the factors influencing users' intentions to seek CCATI to enhance the government’s risk communication capabilities and improve information platform services.
Design/methodology/approach
We analyzed how information ecological factors affect the intention to seek CCATI through perceived value. Data was collected from 429 Chinese citizens during the fourth wave of the coronavirus disease 2019 (COVID-19) pandemic. We used the structural equation model technology and bootstrap mediation effect test to examine the model.
Findings
Information understandability, information relevance, perceived severity and perceived vulnerability directly and positively affect the intention of seeking CCATI. While, the above relationships are also partially mediated by emotional value and functional value. Social support directly and negatively affects the intention of seeking CCATI, while the relationship is also partially mediated by emotional value and functional value. Curiosity directly and positively affects the intention of seeking CCATI, while the relationship is also partially mediated by emotional value. The relationship between the quality of the search service and the intention of seeking CCATI is not significant, instead, it is fully mediated by functional value. The influence effect of information relevance on the intention of seeking CCATI is the greatest, followed by perceived vulnerability. The mediating effect of functional value is higher than emotional value.
Practical implications
The findings may help governments enhance their risk communication capabilities and improve epidemic prevention and control measures, enhancing the appeal of information platforms.
Originality/value
We focused on CCATI, an area with limited scholarly attention. We analyzed CCATI-seeking factors using an information ecology theory, introducing perceived value as a mediator, thus offering novel perspectives and models.
Details
Keywords
Yafei Feng, Yongqiang Sun, Nan Wang and Xiao-Liang Shen
Sharing co-owned information on social network platforms has become a common and inevitable phenomenon. However, due to the uniqueness of co-owned information, the privacy…
Abstract
Purpose
Sharing co-owned information on social network platforms has become a common and inevitable phenomenon. However, due to the uniqueness of co-owned information, the privacy calculus theory based on a single information owner cannot explain co-owned information disclosure. Therefore, this study tries to investigate the underlying mechanism of users’ co-owned information disclosure from a collective privacy calculus perspective.
Design/methodology/approach
Through a survey of 740 participants, covariance-based structural equation modeling (CB-SEM) was used to verify the proposed model and hypotheses.
Findings
The results show that personal benefit, others’ benefit and relationship benefit promote users’ co-owned information disclosure by positively affecting personal distributive fairness and others’ distributive fairness perception. Meanwhile, personal privacy risk and others’ privacy risk prevent users’ co-owned information disclosure by negatively affecting personal distributive fairness and others’ distributive fairness perception. Besides, others’ information ownership perception enhances the positive effect of others’ distributive fairness perception on co-owned information disclosure intention. Furthermore, others’ information ownership strengthens the mediating role of others’ distributive fairness.
Research limitations/implications
The findings of this study enrich the research scope of information disclosure and privacy calculus theory and help social network platform developers design collective privacy protection functions.
Originality/value
This study develops a collective privacy calculus model to understand users’ co-owned information disclosure on social network platforms, confirming the mediating role of collective distributive fairness and the moderating role of others’ information ownership perception in the process of collective privacy calculus.
Details
Keywords
Tung-Cheng Lin and Mei-Ling Yeh
The ecosystem concept has attracted attention in information system research to explain business competition, innovation and many other emerging phenomena. Existing studies focus…
Abstract
Purpose
The ecosystem concept has attracted attention in information system research to explain business competition, innovation and many other emerging phenomena. Existing studies focus more on a single ecosystem type or a single ecosystem goal and pay little attention to the ecosystem’s evolution. The objective of the study is to investigate the factors that impact the evolution of the information ecosystem (IE) to gain a better understanding of strategic thinking.
Design/methodology/approach
The IE involves many actors, so the multi-case study approach is conducted with purposeful sampling to recruit all the significant ecosystem actors. The collected qualitative data are analyzed by coding data, exploring data relationships and structuring pattern steps; institutional theory is used as a theoretical framework.
Findings
The results demonstrate that industry practices, laws and regulations, new actors and the mimetic pressure of outsourcers drive the growth of the ecosystem. Strategy intention, cost pressure and normative pressure all contribute to the IE’s evolution.
Originality/value
The concept of ecosystems has attracted attention in information system research. The study investigates the factors contributing to the evolution of the IE from an institutional theory perspective. Our suggestion is that new players can find a niche in offering information technology (IT)/ information services (IS)-related solutions to survive in the ecosystem; however, they need to pay attention to the normative pressure.
Details
Keywords
Jing Liang, Ming Li and Xuanya Shao
The purpose of this study is to explore the impact of online reviews on answer adoption in virtual Q&A communities, with an eye toward extending knowledge exchange and community…
Abstract
Purpose
The purpose of this study is to explore the impact of online reviews on answer adoption in virtual Q&A communities, with an eye toward extending knowledge exchange and community management.
Design/methodology/approach
Online reviews contain rich cognitive and emotional information about community members regarding the provided answers. As feedback information on answers, it is crucial to explore how online reviews affect answer adoption. Based on signaling theory, a research model reflecting the influence of online reviews on answer adoption is established and empirically examined by using secondary data with 69,597 Q&A data and user data collected from Zhihu. Meanwhile, the moderating effects of the informational and emotional consistency of reviews and answers are examined.
Findings
The negative binomial regression results show that both answer-related signals (informational support and emotional support) and answerers-related signals (answerers’ reputations and expertise) positively impact answer adoption. The informational consistency of reviews and answers negatively moderates the relationships among information support, emotional support and answer adoption but positively moderates the effect of answerers’ expertise on answer adoption. Furthermore, the emotional consistency of reviews and answers positively moderates the effect of information support and answerers’ reputations on answer adoption.
Originality/value
Although previous studies have investigated the impacts of answer content, answer source credibility and personal characteristics of knowledge seekers on answer adoption in virtual Q&A communities, few have examined the impact of online reviews on answer adoption. This study explores the impacts of informational and emotional feedback in online reviews on answer adoption from a signaling theory perspective. The results not only provide unique ideas for community managers to optimize community design and operation but also inspire community users to provide or utilize knowledge, thereby reducing knowledge search costs and improving knowledge exchange efficiency.
Details
Keywords
Garret Murray, Malin Falkeling and Shang Gao
The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
Abstract
Purpose
The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
Design/methodology/approach
A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.
Findings
Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.
Research limitations/implications
This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.
Originality/value
This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.
Details