Search results

1 – 10 of 169
Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 24 May 2023

Siqi Hu, Carol Hsu and Zhongyun Zhou

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional…

Abstract

Purpose

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional methods, the present study leveraged an “event” lens and dimensionalized employees' perceptions into three sub-dimensions: perceived novelty, perceived disruption and perceived criticality. Moreover, this research went a step further by examining how pedagogical and communication approaches to a SETA program affect employees' perceptions of the program. This study then investigated whether – and if so, how – these approaches impact employees' perceptions of the SETA program and their subsequent commitment to it.

Design/methodology/approach

Utilizing a factorial-based scenario survey, this study empirically tested a model of the above relationships via covariance-based structural equation modeling.

Findings

The results of this research showed that pedagogical approaches were more effective than communication approaches and that employees' perceptions of the SETA program accounted for a large variance in their commitment to SETA.

Originality/value

First, this research deepens understanding of the protection of information assets by elaborating on the different approaches that organizations can take to encourage employees' commitment to SETA. Second, the study enriches the SETA literature by theorizing a SETA program as an organizational “event”, which represents a major shift from the conventional approach. Third, the study adds to the theoretical knowledge of the event lens by extending it to the SETA context and investigating the relationship among three event strength components.

Article
Publication date: 19 April 2024

Yingying Yu, Wencheng Su, Zhangping Lu, Guifeng Liu and Wenjing Ni

Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity…

Abstract

Purpose

Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity experiences and shape immersive activity experiences. Therefore, this study aims to explore the association between the olfactory elements of library space and users’ olfactory perception, providing a foundation for the practical design of olfactory space in libraries.

Design/methodology/approach

Using the olfactory perception semantic differential experiment method, this study collected feedback on the emotional experience of olfactory stimuli from 56 participants in an academic library. From the perspective of environmental psychology, the dimensions of pleasure, control and arousal of users’ olfactory perception in the academic library environment were semantically and emotionally described. In addition, the impact of fatigue state on users’ olfactory perception was analyzed through statistical methods to explore the impact path of individual physical differences on olfactory perception.

Findings

It was found that users’ olfactory perception in the academic library environment is likely semantically described from the dimensions of pleasure, arousal and control. These dimensions mutually influence users’ satisfaction with olfactory elements. Moreover, there is a close correlation between pleasure and satisfaction. In addition, fatigue states may impact users’ olfactory perception. Furthermore, users in a high-fatigue state may be more sensitive to the arousal of olfactory perception.

Originality/value

This article is an empirical exploration of users’ perception of the environmental odors in libraries. The experimental results of this paper may have practical implications for the construction of olfactory space in academic libraries.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 23 February 2024

Teresa Fernandes and Rodrigo Oliveira

Social media has become an inescapable part of our lives. However, recent research suggests that excessive use of social media may lead to fatigue and users’ disengagement. This…

Abstract

Purpose

Social media has become an inescapable part of our lives. However, recent research suggests that excessive use of social media may lead to fatigue and users’ disengagement. This study aims to examine which brand-related factors contribute to social media fatigue (SMF) and its subsequent role on driving lurking behaviors, particularly among young consumers.

Design/methodology/approach

Based on survey data from 282 young users of social media, a holistic model of brand-related drivers and outcomes of SMF was tested, emphasizing the contribution of brands’ social media presence to users’ disengagement.

Findings

Research shows that branded content overload and irrelevance, as well as branded ads intrusiveness significantly impact SMF, which in turn plays a mediating role between brand-related drivers and lurking behaviors. The authors further conclude that the impact of SMF on lurking is stronger for users who follow a larger set of brands.

Originality/value

The study contributes to social media research by addressing its “dark side” and empirically validating the role of brands’ social media presence in developing young users’ fatigue and disengagement. The study further adds to the scant literature on SMF, which was mostly developed outside the branding field. Research also provides valuable insights to brands on how to improve their social media performance.

Details

Young Consumers, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-3616

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1793

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Article
Publication date: 2 February 2023

Lai-Wan Wong, Garry Wei-Han Tan, Keng-Boon Ooi and Yogesh Dwivedi

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has…

1298

Abstract

Purpose

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has accelerated, it also raises some trust challenges. Literature on trust in AI is scant, especially regarding the vulnerabilities faced by different stakeholders to inform policy and practice. This work proposes a framework to understand the use of AI technologies from the perspectives of institutional and the self to understand the formation of trust in the mandated use of AI-based technologies in travelers.

Design/methodology/approach

An empirical investigation using partial least squares-structural equation modeling was employed on responses from 209 users. This paper considered factors related to the self (perceptions of self-threat, privacy empowerment, trust propensity) and institution (regulatory protection, corporate privacy responsibility) to understand the formation of trust in AI use for travelers.

Findings

Results showed that self-threat, trust propensity and regulatory protection influence trust in users on AI use. Privacy empowerment and corporate responsibility do not.

Originality/value

Insights from the past studies on AI in travel and tourism are limited. This study advances current literature on affordance and reactance theories to provide a better understanding of what makes travelers trust the mandated use of AI technologies. This work also demonstrates the paradoxical effects of self and institution on technologies and their relationship to trust. For practice, this study offers insights for enhancing adoption via developing trust.

Details

Internet Research, vol. 34 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 6 March 2024

Qiuchen Zhao, Xue Li, Junchao Hu, Yuehui Jiang, Kun Yang and Qingyuan Wang

The purpose of this paper is to determine the ultra-high cycle fatigue behavior and ultra-slow crack propagation behavior of selective laser melting (SLM) AlSi7Mg alloy under…

Abstract

Purpose

The purpose of this paper is to determine the ultra-high cycle fatigue behavior and ultra-slow crack propagation behavior of selective laser melting (SLM) AlSi7Mg alloy under as-built conditions.

Design/methodology/approach

Constant amplitude and two-step variable amplitude fatigue tests were carried out using ultrasonic fatigue equipment. The fracture surface of the failure specimen was quantitatively analyzed by scanning electron microscope (SEM).

Findings

The results show that the competition of surface and interior crack initiation modes leads to a duplex S–N curve. Both manufacturing defects (such as the lack of fusion) and inclusions can act as initially fatal fatigue microcracks, and the fatigue sensitivity level decreases with the location, size and type of the maximum defects.

Originality/value

The research results play a certain role in understanding the ultra-high cycle fatigue behavior of additive manufacturing aluminum alloys. It can provide reference for improving the process parameters of SLM technology.

Details

International Journal of Structural Integrity, vol. 15 no. 2
Type: Research Article
ISSN: 1757-9864

Keywords

Article
Publication date: 19 April 2023

Parisa Heidari Aqagoli, Ali Safari and Arash Shahin

The purpose of this paper is to determine the attractiveness or unattractiveness of cyberloafing in the workplace using Q methodology and the Kano model.

Abstract

Purpose

The purpose of this paper is to determine the attractiveness or unattractiveness of cyberloafing in the workplace using Q methodology and the Kano model.

Design/methodology/approach

The perception of employees towards cyberloafing was investigated based on Q methodology, and then they were prioritized using Kano model. Ten IT companies were selected for the case study. In this study, a mixed method was used. First, 30 participants were interviewed. Next, after extracting the comments, Q-matrix was presented to 30 participants and they completed the matrix cells. Finally, Kano questionnaire was designed using the items obtained from Q methodology and distributed among 30 participants.

Findings

Q methodology led to nine perceptions, and the priorities of Kano model were proponents of increasing employees' dependence on the internet, economic thinkers, the indifferent, dissatisfied, proponents of receiving information, self-control proponents, the profit-minded, mind destroyer and satisfaction-oriented. Cyberloafing is considered unattractiveness with adverse effects. The combination of Q methodology and Kano model can improve the analysis of the results.

Originality/value

This study is one of the few studies in which Q methodology is improved by Kano model. In the past, Q methodology alone examined people’s perception, but by combining these two methods, it is determined which perception is more satisfying and which one is more important, and then a general result can be reached.

Details

International Journal of Organizational Analysis, vol. 32 no. 2
Type: Research Article
ISSN: 1934-8835

Keywords

1 – 10 of 169