Search results
1 – 10 of over 251000Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior…
Abstract
Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior of E-payment systems that employ smart card technology becomes a research area that is of particular value and interest to both IS researchers and professionals. However, research interest focuses mostly on why a smart card-based E-payment system results in a failure or how the system could have grown into a success. This signals the fact that researchers have not had much opportunity to critically review a smart card-based E-payment system that has gained wide support and overcome the hurdle of critical mass adoption. The Octopus in Hong Kong has provided a rare opportunity for investigating smart card-based E-payment system because of its unprecedented success. This research seeks to thoroughly analyze the Octopus from technology adoption behavior perspectives.
Cultural impacts on adoption behavior are one of the key areas that this research posits to investigate. Since the present research is conducted in Hong Kong where a majority of population is Chinese ethnicity and yet is westernized in a number of aspects, assuming that users in Hong Kong are characterized by eastern or western culture is less useful. Explicit cultural characteristics at individual level are tapped into here instead of applying generalization of cultural beliefs to users to more accurately reflect cultural bias. In this vein, the technology acceptance model (TAM) is adapted, extended, and tested for its applicability cross-culturally in Hong Kong on the Octopus. Four cultural dimensions developed by Hofstede are included in this study, namely uncertainty avoidance, masculinity, individualism, and Confucian Dynamism (long-term orientation), to explore their influence on usage behavior through the mediation of perceived usefulness.
TAM is also integrated with the innovation diffusion theory (IDT) to borrow two constructs in relation to innovative characteristics, namely relative advantage and compatibility, in order to enhance the explanatory power of the proposed research model. Besides, the normative accountability of the research model is strengthened by embracing two social influences, namely subjective norm and image. As the last antecedent to perceived usefulness, prior experience serves to bring in the time variation factor to allow level of prior experience to exert both direct and moderating effects on perceived usefulness.
The resulting research model is analyzed by partial least squares (PLS)-based Structural Equation Modeling (SEM) approach. The research findings reveal that all cultural dimensions demonstrate direct effect on perceived usefulness though the influence of uncertainty avoidance is found marginally significant. Other constructs on innovative characteristics and social influences are validated to be significant as hypothesized. Prior experience does indeed significantly moderate the two influences that perceived usefulness receives from relative advantage and compatibility, respectively. The research model has demonstrated convincing explanatory power and so may be employed for further studies in other contexts. In particular, cultural effects play a key role in contributing to the uniqueness of the model, enabling it to be an effective tool to help critically understand increasingly internationalized IS system development and implementation efforts. This research also suggests several practical implications in view of the findings that could better inform managerial decisions for designing, implementing, or promoting smart card-based E-payment system.
Details
Keywords
Fredrik Karlsson, Joachim Åström and Martin Karlsson
The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge…
Abstract
Purpose
The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.
Design/methodology/approach
Results are based on a literature review of information security culture research published between 2000 and 2013 (December).
Findings
This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.
Research limitations/implications
Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.
Practical implications
Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.
Originality/value
Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.
Details
Keywords
This systematic literature review aims to elaborate on the research progress and features of information source preferences to help other researchers attain a more comprehensive…
Abstract
Purpose
This systematic literature review aims to elaborate on the research progress and features of information source preferences to help other researchers attain a more comprehensive understanding of the field.
Design/methodology/approach
Following a systematic review protocol, 139 research articles from 11 academic databases were analyzed.
Findings
Overall, five separate results were obtained: first, information source horizon theory is the main theoretical foundation of information source preferences research, while other theories have been applied less. Second, information source preference research has strong context sensitivity and involves health, work, consumption, learning, survival and development and emergencies. Third, preference criteria can be summarized into three categories: information characteristics, user characteristics, needs characteristics and corresponding specific criteria. Fourth, information source preferences are influenced by both internal and external factors, including five specific aspects, namely demographics, the user's cognition, the user's affection, capital and contextual factors. Fifth, this field is dominated by quantitative methods and an information horizon mapping method could be applied more.
Originality/value
This study is the first to reveal the general picture of information source preferences. It also elaborates on the characteristics of this field and presents potential development directions.
Details
Keywords
To review the provision of research methods teaching across UK institutions teaching accredited information and/or library science postgraduate programmes.
Abstract
Purpose
To review the provision of research methods teaching across UK institutions teaching accredited information and/or library science postgraduate programmes.
Design/methodology/approach
Content analysis of institutional web sites was undertaken followed by telephone interviews with research method tutors. Information was obtained on what, how and when research methods are taught, the type of coursework expected, the usage of virtual learning environments and discussion boards, the key texts, electronic sources, other teaching materials recommended to students and the emphasis placed on quantitative versus qualitative methods.
Findings
All institutions in the UK teach research methods on LIS‐accredited programmes. Research methods modules have different weighting, are taught in various formats, short and fat, long and thin, and cover a variety of topics. Some tutors place more emphasis on qualitative techniques than qualitative methods, while for others it is the other way around. Most stress the practical side of doing research. The use of virtual learning environments and discussion boards feature prominently in some institutions for the teaching of research methods.
Research implications
This research will provide impetus for some institutions to modify their research methods teaching provision.
Originality/value
The sharing of knowledge and innovative teaching practices for research methods.
Details
Keywords
The purpose of this paper is to advocate for a clearer and less fragmentary use of qualitative research in the increasingly interdisciplinary research setting of information…
Abstract
Purpose
The purpose of this paper is to advocate for a clearer and less fragmentary use of qualitative research in the increasingly interdisciplinary research setting of information science.
Design/methodology/approach
The paper performs a textual analysis of more than 500 peer‐reviewed articles to assess information science's involvement with qualitative research. The paper undertakes historical criticism to trace qualitative research in the reviews of information science for the last three decades.
Findings
Authors are unclear and lax in their uses of basic research terms. Authors do not account for qualitative research's characteristics, methods, and contributions to information science's bodies of knowledge. Only 4.3 percent of published articles mention their contributions to information science's literature whereas 5.6 percent mention qualitative method(s) in their abstracts. Publications do not show (intra‐)collaboration between areas of information science. Information science's contributions to the theoretical discussions of the wider scientific community are lacking.
Originality/value
The paper discusses afresh information science's qualitative research. The paper suggests a tighter and long‐term investment of information science in qualitative research and the formation of the information science's own theorists and theory‐illumined practitioners. The paper puts forth some practical recommendations.
Details
Keywords
The purpose of this short reflection is to allow for an informed use of both phenomenography and phenomenology in information studies and cognate fields.
Abstract
Purpose
The purpose of this short reflection is to allow for an informed use of both phenomenography and phenomenology in information studies and cognate fields.
Design/methodology/approach
The paper apprises uses of phenomenography found particularly in accounts of information literacy commonly describing phenomenography as distinct from phenomenology.
Findings
Both phenomenography and phenomenology continue to hold much credence in methods applied across scores of academic fields, with information studies being among those in the vanguard. Claims displaying differences of phenomenography from phenomenology are misleading and incomplete descriptions of phenomenology.
Originality/value
The paper presents newer materials on the origins of phenomenography and phenomenology to advocate for tighter relationships between and clearer applications of these methods in information studies and beyond.
Details
Keywords
Jia Tina Du, Qing Ke, Clara M. Chu, Helen Partridge and Dandan Ma
This scoping review article examined research on information behavior in communities over the past two decades (2000–2023). The review aims to uncover the characteristics and…
Abstract
Purpose
This scoping review article examined research on information behavior in communities over the past two decades (2000–2023). The review aims to uncover the characteristics and types of communities studied, the featured information behaviors, and the research methods employed.
Design/methodology/approach
The PRISMA-ScR guidelines were followed to conduct this review. Five databases were selected to search for relevant empirical research. A total of 57 studies met the inclusion criteria for review. Thematic synthesis was used to analyze the multidimensional findings of included studies.
Findings
A steady increase in the number of articles is evident in the past two decades. The review suggests that information behavior in community studies involved collaboration from other disciplines, such as public health and business management. More than half of the communities studied are virtual communities (56.1%), followed by communities of identity, professional communities and support communities, communities of interest, geographic communities, and academic communities. There are overlaps among these categories. Information sharing (63.2%) and information seeking (57.9%) were the most studied behavior of communities, followed by information use, information needs, and information judgment. Questionnaires (38.6%) and interviews (35.1%) were the most commonly used data collection techniques in studying information behavior in communities. It is noteworthy that eleven (19.3%) mentioned utilizing community-engaged approaches.
Originality/value
This is the first scoping review to explore the intersecting constructs of community research and information behavior studies. We call for further research to understand the contextual factors that shape the community’s information environments and to increase awareness of the partnership between communities and researchers.
Details
Keywords
Lettie Y. Conrad and Virginia M. Tucker
Qualitative researchers and information practitioners often investigate questions that probe the underlying mental models, nuanced perspectives, emotions and experiences of their…
Abstract
Purpose
Qualitative researchers and information practitioners often investigate questions that probe the underlying mental models, nuanced perspectives, emotions and experiences of their target populations. The in-depth qualitative interview is a dominant method for such investigations and the purpose of this paper is to demonstrate how incorporating hybrid card-sorting activities into interviews can enable deeper participant reflections and generate rich data sets to increase understanding.
Design/methodology/approach
Following a review of relevant literature, the case illustration presented is a grounded theory study into the student-researcher information experience with personal academic information management. This study uses hybrid card sorting within in-depth, semi-structured interviews, a unique adaptation that extends multi-disciplinary awareness of the benefits of card-sort exercises for qualitative research.
Findings
Emerging from diverse fields, ranging from computer science, engineering, psychology and human–computer interaction, card sorting seeks to illuminate how participants understand and organise concepts. The case illustration draws largely on methods used in interaction design and information architecture. Using either open or fixed designs, or hybrid variations, card-sort activities can make abstract concepts more tangible for participants, offering investigators a new approach to interview questions with the aid of this interactive, object-based technique.
Originality/value
Opening with a comprehensive review of card-sort studies, the authors present an information experience case illustration that demonstrates the rich data generated by hybrid card sorting within qualitative interviews, or interactive interviews. This is followed by discussion of the types of research questions that may benefit from this original method.
Details
Keywords
Huan Zhong, Zhengbiao Han and Preben Hansen
This systematic literature review aims to elaborate the research progress of information practices to help other researchers attain a more holistic and comprehensive understanding…
Abstract
Purpose
This systematic literature review aims to elaborate the research progress of information practices to help other researchers attain a more holistic and comprehensive understanding of the field.
Design/methodology/approach
Following a systematic review protocol, 123 research articles from nine academic databases were included in the analysis.
Findings
Four separate results can be outlined. First, practice theory, social constructionist theory and activity theory are often used as the theoretical basis for the study of information practices. Second, people will engage in specific information practice activities in different external and internal contexts. The external contexts include social and needs contexts. The internal contexts include information source horizons, user's affection and user's cognition. Third, the existing information practice models can be divided into static and dynamic types. These models mainly reflected activities and influencing factors of information practices. Fourth, qualitative methods were the most used in information practice research.
Research limitations/implications
The field of information practices is a vast, expanding research field. This research will focus only on a specific section, namely concepts, activities, contexts and models. Researchers could contribute to exploring the concepts, components and mechanisms of information practices by combining theories from various disciplines, such as sociology and behavioral science.
Originality/value
This is the first study to reveal the general picture of information practices. It also elaborates the characteristics of people's information practices and shows the potential development direction for future research.
Details
Keywords
Tessa Withorn, Carolyn Caffrey, Joanna Messer Kimmitt, Jillian Eslami, Anthony Andora, Maggie Clarke, Nicole Patch, Karla Salinas Guajardo and Syann Lunsford
This paper aims to present recently published resources on library instruction and information literacy providing an introductory overview and a selected annotated bibliography of…
Abstract
Purpose
This paper aims to present recently published resources on library instruction and information literacy providing an introductory overview and a selected annotated bibliography of publications covering all library types.
Design/methodology/approach
This paper introduces and annotates English-language periodical articles, monographs, dissertations, reports and other materials on library instruction and information literacy published in 2018.
Findings
The paper provides a brief description of all 422 sources, and highlights sources that contain unique or significant scholarly contributions.
Originality/value
The information may be used by librarians and anyone interested as a quick reference to literature on library instruction and information literacy.
Details