Search results
1 – 10 of over 1000Sonia Virginia Moreira, Nélia R. Del Bianco and Cézar F. Martins
The expansion of connectivity on a national scale in Brazil, whether through mobile Internet or fixed broadband, is described as one of the factors that can lead to social and…
Abstract
The expansion of connectivity on a national scale in Brazil, whether through mobile Internet or fixed broadband, is described as one of the factors that can lead to social and economic benefits for large parts of the population who do not have a network connection. It can also help to reduce poverty by improving the infrastructure of services and increasing Internet use for education purposes. It also provides people with the ability to communicate with online administrative services – local, regional, and national. In Brazil, the main difficulty facing an effective universalization of telecommunications has been limitations in accessing services. This chapter demonstrates the relevance of small Internet providers for the expansion of fixed broadband in less commercially attractive regions (in terms of subscribers, income, and distance) who have been growing over recent years and are now present in 70% of Brazilian municipalities and whose role is paramount to reducing the digital divide.
Details
Keywords
Stefanie Fella and Christoph Ratay
Recently emerged Packaging-as-a-Service (PaaS) systems adopt aspects of access-based services and triadic frameworks, which have typically been treated as conceptually separate…
Abstract
Purpose
Recently emerged Packaging-as-a-Service (PaaS) systems adopt aspects of access-based services and triadic frameworks, which have typically been treated as conceptually separate. The purpose of this paper is to investigate the implications of blending the two in what we call “access-based triadic systems,” by empirically evaluating intentions to adopt PaaS systems for takeaway food among restaurants and consumers.
Design/methodology/approach
We derived relevant attributes of PaaS systems from a qualitative pre-study with restaurants and consumers. Next, we conducted two factorial survey experiments with restaurants (N = 176) and consumers (N = 245) in Germany to quantitatively test the effects of those system attributes on their adoption intentions.
Findings
This paper highlights that the role of access-based triadic system providers as both the owners of shared assets and the operators of a triadic system is associated with a novel set of challenges and opportunities: System providers need to attract a critical mass of business and end customers while balancing asset protection and system complexity. At the same time, asset ownership introduces opportunities for improved quality control and differentiation from competition.
Originality/value
Conceptually, this paper extends research on access-based services and triadic frameworks by describing an unexplored hybrid form of non-ownership consumption we call “access-based triadic systems.” Empirically, this paper addresses the need to account for the demands of two distinct target groups in triadic systems and demonstrates how factorial survey experiments can be leveraged in this field.
Details
Keywords
Andrea Herrera and Sonia Camacho
This paper aims to empirically investigate how knowledge coordination is carried out within and across expert teams in the outsourcing service desk context from the standpoint of…
Abstract
Purpose
This paper aims to empirically investigate how knowledge coordination is carried out within and across expert teams in the outsourcing service desk context from the standpoint of the information and communication technologies (ICT) provider.
Design/methodology/approach
The authors draw on an embedded case study to unravel the mechanisms used by expert teams to achieve knowledge coordination. Data collection included semi-structured interviews and document analysis over eight months.
Findings
Four groups of coordination mechanisms were found according to their nature and role in helping MESA achieve its organizational goals. The authors also identified how this set of mechanisms responds to the task-resource dependency and how it evolves over time to provide reliable ICT services. Furthermore, the analysis of four knowledge coordination dimensions inside each group uncovers the complexity of coordination in the studied context, with the “who” dimension being predominant across the groups. The analysis further reveals that the content (what) and mode of coordination (how) of each group respond to elements in the knowledge coordination process relevant for the different stages of the ICT service delivery process.
Originality/value
The case study addresses how people in outsourced services coordinate their knowledge to manage the interdependencies among the involved organizations and thus, achieving their goals. This study extends previous research that had analyzed the consequences of knowledge coordination for providers and customers by delving into the mechanisms used in this process from the provider’s point of view.
Details
Keywords
Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…
Abstract
Purpose
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.
Design/methodology/approach
Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.
Findings
Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.
Originality/value
Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.
Details
Keywords
Christian Kowalkowski, Jochen Wirtz and Michael Ehret
Technology-enabled business-to-business (B2B) services contribute the largest share to GDP growth and are fundamental for an economy’s value creation. This article aims to…
Abstract
Purpose
Technology-enabled business-to-business (B2B) services contribute the largest share to GDP growth and are fundamental for an economy’s value creation. This article aims to identify key service- and digital technology-driven B2B innovation modes and proposes a research agenda for further exploration.
Design/methodology/approach
This conceptual paper adopts a techno-demarcation view on service innovation, encompassing three core dimensions: service offering (the service product, or the “what”), service process (the “how”) and service ecosystem (the “who/for whom”). It delineates the implications of three digital technologies – the internet-of-things (IoT), intelligent automation (IA) and digital platforms – for service innovation across these core dimensions in B2B markets.
Findings
Digital technology has immense potential ramifications for value creation by reshaping all three core dimensions of service innovation. Specifically, IoT can transform physical resources into reconfigurable service products, IA can augment and automate a rapidly expanding array of service processes, while digital platforms provide the technical and organizational infrastructure for the integration of resources and stakeholders within service ecosystems.
Originality/value
This study suggests an agenda with six themes for further research, each linked to one or more of the three service innovation dimensions. They are (1) new recurring revenue models, (2) service innovation in the metaverse, (3) scaling up service innovations, (4) ecosystem innovations, (5) power dependency and lock-in effects and (6) security and responsibility in digital domains.
Details
Keywords
Minh Tri Ha, Khoa Tien Tran, Georgia Sakka and Zafar Uddin Ahmed
This study aims to examine the impact of perceived risk dimensions, confirmation, perceived usefulness and perceived ease of use on user satisfaction and their continuance…
Abstract
Purpose
This study aims to examine the impact of perceived risk dimensions, confirmation, perceived usefulness and perceived ease of use on user satisfaction and their continuance intention to use mobile payments across Vietnam based on the extended technology continuance theory (TCT).
Design/methodology/approach
This study used an online questionnaire-based survey design to collect data from 417 respondents using judgmental and snowball sampling techniques. The respondents in this survey are personal users of mobile payments across Vietnam. Data analyses and hypothesis testing were carried out using the partial least squares structural equation modeling.
Findings
The findings demonstrate that physical risk, time loss risk, opportunity cost risk, confirmation, perceived ease of use and perceived usefulness are important elements influencing consumers’ satisfaction toward continuance intentions to use mobile payment services. Satisfaction is also significantly associated with continuance intentions to use mobile payments across Vietnam. Other relationships, including functional risk, social risk, financial risk and information risk are not significantly related to satisfaction. These results are expected to be useful for mobile payment service providers. Understanding the factors mentioned in this study enables mobile payment service providers to improve their offerings strategically and then motivate their clients to keep using mobile payments.
Originality/value
The work is among the very few bodies of empirical research to investigate the continuance intention to use mobile payments using the extended TCT by incorporating the various dimensions of perceived risk construct in the fintech sector to develop a research model for this study. Furthermore, combining with perceived risk dimensions, this study expands the TCT model’s mobile app to the fintech sector, and advances the understanding of the use of the extended TCT in the fintech sector and adds to the theory.
Details
Keywords
Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…
Abstract
Purpose
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.
Design/methodology/approach
The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.
Findings
The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).
Originality/value
This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.
Details
Keywords
Muhammad Sabbir Rahman, Md Afnan Hossain, Md Rifayat Islam Rushan, Hasliza Hassan and Vishal Talwar
The mental healthcare is experiencing an ever-growing surge in understanding the consumer (e.g., patient) engagement paradox, aiming to vouch for the quality of care. Despite this…
Abstract
Purpose
The mental healthcare is experiencing an ever-growing surge in understanding the consumer (e.g., patient) engagement paradox, aiming to vouch for the quality of care. Despite this surge, scant attention has been given in academia to conceptualize and empirically investigate this particular aspect. Thus, drawing on the Stimulus-Organism-Response (S-O-R) paradigm, the study explores how patients engage with healthcare service providers and how they perceive the quality of the healthcare services.
Design/methodology/approach
Data were collected from 279 respondents, and the derived conceptual model was tested by using Smart PLS 3.2.7 and PROCESS. To complement the findings of partial least squares (PLS)-based structural equation modeling (SEM), the present study also applied fuzzy set qualitative comparative analysis (fsQCA) to identify the necessary and sufficient conditions to explore substitute conjunctive paths that emerge.
Findings
Findings show that patients’ perceived intimacy (PI), cohesion and privacy enhance the quality of mental healthcare service providers. The results also suggest that patients’ PI, cohesion and privacy have indirect effects on the perceived quality of care (PQC) by the service providers through consumer engagement. The fsQCA results derive that the relationship among conditions leading to patients’ perception of the quality of care in regard to mental healthcare service providers is complex and is best reflected as multiple and conjectural causation configurations.
Research limitations/implications
The findings from this research contribute to the advancement of studies on patients’ experiences by empirically examining the unique dynamics of interaction between consumers (patients) and mental healthcare service providers, thereby enriching both the literature on social interactions and the understanding of the consumer–provider relationship.
Practical implications
The results of this study provide practical implications for mental healthcare service providers on how to combine the study variables to enhance the quality of care and satisfy more patients.
Originality/value
A significant research gap has ascertained the inter-relationship between PI, cohesion, privacy, engagement and PQC from the perspective of mental healthcare service providers. This research is one of the primary studies from a managerial and methodological standpoint. The study contributes by combining symmetric and asymmetric statistical tools in service marketing and healthcare research. Furthermore, the application of fsQCA helps to understand the interactions that might not be immediately obvious through traditional symmetric methods.
Details
Keywords
Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…
Abstract
Purpose
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.
Design/methodology/approach
This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.
Findings
This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.
Originality/value
Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.
Details