Search results

1 – 10 of 446
Article
Publication date: 8 September 2023

Mokhalles Mohammad Mehdi, Arshan Kler and Lubna Nafees

This study aims to empirically examine the factors that affect mobile loyalty (m-loyalty) and its influence on customer reuse intention towards mobile instant messaging services…

Abstract

Purpose

This study aims to empirically examine the factors that affect mobile loyalty (m-loyalty) and its influence on customer reuse intention towards mobile instant messaging services. This study identified measurement items to assess the business users and individual users reuse intention towards mobile instant messaging services and test the relationship in the conceptual model. This study bridges a literature gap focusing on m-loyalty and its impact on customer reuse intention, which has not received attention previously.

Design/methodology/approach

To evaluate the influence of the factors, this study identified and extracted the items from past literature to develop the survey instrument. This study surveyed 600 respondents including business users and individual users from the Delhi-National Capital Region of India and applied the structural equation modelling to test the conceptual model.

Findings

The results revealed that satisfaction and m-loyalty have a direct effect on the business users and individual users’ reuse intention of mobile instant messaging services. This study found that satisfaction, usability, perceived value, commitment, trust and m-loyalty influence on business users reuse intention. This study indicate that enjoyment has an insignificant relationship on m-loyalty for business users followed by usability and enjoyment has an insignificant relationship on m-loyalty for individual users. Further, female gender does not moderate the relationship between satisfaction and business users reuse intention. The cognitive absorption and the unified theory of acceptance and use of technology (UTAUT) theories supported evaluating the association between the factors in the context of business and individual users reuse intention of mobile instant messaging service.

Research limitations/implications

The empirical findings imply that all the factors except enjoyment have directly influenced the business users reuse intention of mobile instant messaging. The significant influence of usability factor on the business users reuse intention towards mobile instant messaging is the major variation between the validated models of business and individual samples. The results of influencing factors of m-loyalty and its impact on customer reuse intention are associated with cognitive absorption and the UTAUT theories.

Practical implications

Focus on these factors can be beneficial for the business users, managers, mobile instant messaging service providers and application developers to increase customer loyalty and reuse intention for the mobile instant messaging services. This research will facilitate mobile instant messaging service providers to keep their services market relevant and focus on user satisfaction in building applications for loyalty.

Originality/value

This research identified measurement items from earlier literature to identify, analyze and verify the relevance of these factors in m-loyalty and customer reuse intention of mobile instant messaging services and fill the gap in customer reuse intention of mobile instant messaging services literature.

Details

Journal of Business & Industrial Marketing, vol. 39 no. 1
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 31 January 2024

Rufai Ahmad, Sotirios Terzis and Karen Renaud

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Abstract

Purpose

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Design/methodology/approach

In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example was coded using established guidelines from the literature to identify the persuasion principles, and the URL construction techniques employed.

Findings

The principles of social proof, liking and authority were the most widely used in MIM phishing, followed by scarcity and reciprocity. Most phishing examples use three persuasion principles, often a combination of authority, liking and social proof. In contrast to email phishing but similar to vishing, the social proof principle was the most commonly used in MIM phishing. Phishers implement the social proof principle in different ways, most commonly by claiming that other users have already acted (e.g. crafting messages that indicate the sender has already benefited from the scam). In contrast to email, retail and fintech companies are the most commonly targeted in MIM phishing. Furthermore, phishers created deceptive URLs using multiple URL obfuscation techniques, often using spoofed domains, to make the URL complex by adding random characters and using homoglyphs.

Originality/value

The insights from this study provide a theoretical foundation for future research on the psychological aspects of phishing in MIM apps. The study provides recommendations that software developers should consider when developing automated anti-phishing solutions for MIM apps and proposes a set of MIM phishing awareness training tips.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 March 2024

Devon Jefferson

This paper’s objective is to provide a systematic literature review of the contextual factors affecting downward communication from supervisors to subordinates in the audit…

Abstract

Purpose

This paper’s objective is to provide a systematic literature review of the contextual factors affecting downward communication from supervisors to subordinates in the audit environment. In addition, this review identifies emerging research themes and directions for future research.

Design/methodology/approach

I accomplish this review’s objectives by leveraging communication literature to establish a framework to identify and synthesize contextual factors affecting downward communication in the audit environment. The review identifies 50 published articles in the last 20 years from leading accounting and auditing journals.

Findings

This study consolidates research findings on downward communication under two primary contextual factors: (1) message and (2) channel. Findings indicate that empirical research examining communication in audit is fragmented and limited. Studies examining the message focus heavily on its content and treatment in the areas of feedback, nonverbal cues, and fraud brainstorming, and a handful of additional studies examine the effectiveness of the channel in these areas. Additional research is needed to understand a broader set of supervisor–subordinate communication practices, including those that are computer-mediated, and their effect on subordinate auditors’ judgments and behaviors in the contemporary audit environment.

Originality/value

Much of the audit literature examining communication to date is topic-versus construct-based, making it difficult to see how the research findings relate to one another. This review is the first to synthesize the literature to provide academics recommendations for a way forward, and inform practitioners of communication practices whereby supervisors can be trained to improve audit quality.

Details

Journal of Accounting Literature, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-4607

Keywords

Open Access
Article
Publication date: 17 October 2023

Divaries Cosmas Jaravaza, Joshua Risiro, Paul Mukucha and Nomuhle Jaravaza

The main purpose of the study was to synthesise the role of COVID-19 social media messages and indigenous religious beliefs on public health promotion initiatives among rural…

Abstract

Purpose

The main purpose of the study was to synthesise the role of COVID-19 social media messages and indigenous religious beliefs on public health promotion initiatives among rural consumers in Zimbabwe.

Design/methodology/approach

A qualitative approach was adopted. Population consisting of 15 interviews and six focus groups was purposively sampled from Manicaland, Mashonaland Central and Masvingo provinces in Zimbabwe. A thematic approach was used to present and analyse the data.

Findings

Rural consumers believed WhatsApp messages posted by people whom they know or influential personnel like health workers. Credibility of WhatsApp messages was enhanced through its ability to send videos and audios. Teachings and indoctrination by indigenous churches and misinformation were found to be an impediment in believing COVID-19 WhatsApp messages and vaccination by rural consumers. Faith healers in indigenous churches used various practices and artefacts like holy water, stone pebbles, clay pots, flags and wooden rods to pray and treat patients suffering from COVID-19 and other ailments.

Practical implications

Social media messages, religious teachings and indoctrination may be a hindrance to rural consumers in adopting government public health promotion initiatives; hence, public health professionals need prior emic understanding and co-option of local leadership in vaccination campaigns.

Originality/value

This study outstretches the theoretical landscape in consumer behaviour and also practical contribution to health practitioners and marketers on breaking indigenous religious barriers and social media misconceptions on vaccination uptake through promotional strategies earmarked for rural consumers.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 18 no. 1
Type: Research Article
ISSN: 1750-6123

Keywords

Open Access
Article
Publication date: 4 April 2023

Orlando Troisi, Anna Visvizi and Mara Grimaldi

Digitalization accelerates the need of tourism and hospitality ecosystems to reframe business models in line with a data-driven orientation that can foster value creation and…

4504

Abstract

Purpose

Digitalization accelerates the need of tourism and hospitality ecosystems to reframe business models in line with a data-driven orientation that can foster value creation and innovation. Since the question of data-driven business models (DDBMs) in hospitality remains underexplored, this paper aims at (1) revealing the key dimensions of the data-driven redefinition of business models in smart hospitality ecosystems and (2) conceptualizing the key drivers underlying the emergence of innovation in these ecosystems.

Design/methodology/approach

The empirical research is based on semi-structured interviews collected from a sample of hospitality managers, employed in three different accommodation services, i.e. hotels, bed and breakfast (B&Bs) and guesthouses, to explore data-driven strategies and practices employed on site.

Findings

The findings allow to devise a conceptual framework that classifies the enabling dimensions of DDBMs in smart hospitality ecosystems. Here, the centrality of strategy conducive to the development of data-driven innovation is stressed.

Research limitations/implications

The study thus developed a conceptual framework that will serve as a tool to examine the impact of digitalization in other service industries. This study will also be useful for small and medium-sized enterprises (SMEs) managers, who seek to understand the possibilities data-driven management strategies offer in view of stimulating innovation in the managers' companies.

Originality/value

The paper reinterprets value creation practices in business models through the lens of data-driven approaches. In this way, this paper offers a new (conceptual and empirical) perspective to investigate how the hospitality sector at large can use the massive amounts of data available to foster innovation in the sector.

Details

European Journal of Innovation Management, vol. 26 no. 7
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 21 November 2023

Diab M. Al-Badayneh, Anis Ben Brik and Amr Elwakad

This study aims to examine social determinants and social strains of cyberbullying victimization among expatriate populations in high-income countries such as Qatar. The authors…

Abstract

Purpose

This study aims to examine social determinants and social strains of cyberbullying victimization among expatriate populations in high-income countries such as Qatar. The authors argue that expatriate students will be exposed to stains and pressures due to several factors, such as feeling alienated, lonely, homesick, insecure and helpless. This study examines a partial assumption of general strain theory (GST), which posits that expats’ cyberbullying victimization can create negative stimuli that lead to negative feelings and, as a result, to delinquent behavior. The delinquent behavior can be seen as a coping method in encountering strains. Logistic regression analysis is applied (using SPSS v. 21) to test the hypothesis that the victimization of expats’ cyberbullying could lead to strain and delinquency.

Design/methodology/approach

A sample of 2,428 expatriate students (46% males and 54% females) was randomly selected from seven public schools in Qatar. The average number of siblings in the household was 2.7. Around 10.8% of the sample reported victimization by cyberbullying. Most came from intact families (80.6%) compared to 19.4 living in broken homes. Concerning the birth order of the student in the family, 25% of the sample were firstborn, and 20% were middle-born. Students’ mother relationships were higher than students’ father relationships (69% vs 51%, respectively). Fathers were higher in undergraduate education than mothers (60% vs 49%, respectively). Considering that 58% of women did not have a job, most fathers work in administrative positions (47% in administrative work and 39% in professional positions) as opposed to mothers’ positions (15% and 21%, respectively). The survey was distributed among expatriate students by trained researchers, teachers and social workers in public schools. The researchers explained the purpose of the study, confidentiality and potential risks and provided directions for completing the survey. Parents and their children provided signed informed consent before participation, following the institutional review boards of Qatar University’s Human Subject Research Committee and the Ministry of Social Development. The victimization of cyberbullying is measured at the dichotomy level by asking a general cyberbullying question (In the last 12 months, had you been bullied by other students using mobile messages, email, voice or video messages? Responses were 1 – yes and 0 – no). A definition of cyberbullying was included in the questionnaire. Independent measures are as follows: (1) demographic variables: gender, belief, health, number of friends and exposure to violence; (2) family variables: delinquent family, coercive parenting, family relations, family disputes, father absence and family ties; (3) school variables: school satisfaction, school violence, student fighting, teachers' violence, school truancy and going late to school; (4) imprudent behavior: smoking, alcohol, not using a seat belt, gambling, stealing less than 100 QR, chewing tobacco, stimuli, volatile drugs, sexual harassment, throwing garbage out of the car, cheating, vandalism and victimization.

Findings

Findings showed that n = 255, 10.8% of the expats’ sample N = 2,428 reported victimization of cyberbullying, of whom 46% were males and 54% were females. A total of 24% of the victims of cyberbullying were males, and 5.8% were females. About a third of the sample were cyberbullying perpetrators (n = 716, 29.5%). Victims of cyberbullying came from intact families (62.4%) compared to broken families (37.6%). A round third of the victims reported the absence of a father during their childhood (n = 78, 31.7%). Most of the victims came from a typical community compared to the delinquent community (71.2% vs 28.2%). About a third of the victims reported it was easy to talk with the father when needed (32% compared to 42.7%), who said it was easy. More than half of the victims do not use seat belts. A low percentage of them were gambling (n = 68, 27% or 2.9% of the total sample). Regarding escaping imprudent and delinquent behaviors, findings showed that a third and more than a tenth of the cyberbullying were smokers and alcoholics (n = 69, 27.4% and n = 42, 16.7% respectively). Moreover, among the most serious, widely spread student problems, around a quarter of the victims reported using chewing tobacco (Sweeka is the local name) (n = 54, 21.4%). Finally, drug use among victims was more than a tenth of them (n = 41, 16.3%). About a quarter of the victims reported stealing less than 100 QR (n = 67, 26.8% or 2.9% of the total sample). Concerning the crimes committed by victims, findings showed that more than forth of them committed assault (n = 71, 28.3%), student fights (n = 202, 80.8%), school violence (n = 117, 46.6%) and half of the victims (50.2%) were also victims of face-to-face bullying. Little below half of the sample was exposed to violence (n = 120, 48.6%) and was the victim of violence in the past 12 months (n = 100, 40.8%). A significant gender differences was found in the victimization of cyberbullying (1 = yes, 0 = no) (a = 000). Moreover, significant mean differences were found between expatriates student victimization of cyberbullying at (a = 000) in all strain variables. Using binary regression analysis to examine the equality of probability of being a victim of cyberbullying as accounted for by the independent variables, the model’s predictability was 89.4%. The Hosmer and Lemeshow test and omnibus tests support the model’s fit (a = 000). Nagelkerke R2 shows that the stain variables accounted for 24% of the variance in the expat's student victimization of cyberbullying.

Research limitations/implications

Conceptualization and determination of what constitutes cyberbullying from the criminal law perspective are needed. Cyberbullying is defined as a form of violence and crime involving new technologies (Sun et al., 2016, p. 62). Policymakers should provide accessible and equitable access to the criminal justice system, the integration of expatriates and the provision of support services to avoid delinquency.

Practical implications

A social cohesion, inclusion and well-being policy is needed for expatriate students and their families in Qatar. In particular, cultural diversity policy and programs, a source of strength and enrichment should be promoted in educational settings. Social inclusion and cultural diversity programs could ease the alienation and marginalization that expatriate students may encounter in their host societies to prevent stains and negative emotions that lead to delinquency and criminal behaviors. Access to support services without discrimination to avoid health and psychological strains and risk factors. This includes but is not limited to avoidance of stigmatization, embarrassment, sense of helplessness, humiliation and other negative feelings toward expatriates. Awareness and promotion of cultural diversity values are needed to enhance cultural acceptance to reduce victimization among the expatriate population. Criminal law and security implications conceptualization and determination of what constitutes cyberbullying from the criminal law perspective are needed. Cyberbullying is a form of violence and crime involving new technologies (Sun et al., 2016). Policymakers should provide accessible and equitable access to the criminal justice system, integrating expatriates and providing support services to avoid delinquency. There is a pressing need for further research within the realm of crime and law to establish the precise legal boundaries surrounding cyberbullying and to delineate the potential scope for legislative measures aimed at safeguarding against victimization in Qatar. Although the state of Qatar has taken steps to address cyberbullying by incorporating it into relevant legal frameworks, there remains a gap in terms of specifically targeting cyberbullying involving children and adolescents. Despite the introduction of the new Cybercrime Prevention Law, the issue of cyberbullying among these vulnerable groups is not adequately addressed.

Social implications

Social implication includes but is not limited to avoidance of stigmatization, embarrassment, sense of helplessness, humiliation and other negative feelings towards expatriate. Awareness and promotion of cultural diversity values is needed to enhance cultural acceptance to reduce victimization among expatriate population.

Originality/value

The present study examines some strain theory assumptions and the victimization of the cyberbullying expatriate population. This study tests a partial assumption of GST, which states that the expatriate population’s exposure to the victimization of cyberbullying can lead to negative stimuli that, in return, create negative feelings and, as a result, imprudent and delinquent behavior. The cyberbullying behavior can be seen as an escaping and coping method in encountering strains. This study underscores the presence of cyberbullying within high schools among expatriate students, exerting significant effects on their personal, social and emotional behaviors. The novel insights gleaned from this investigation contribute substantively to the comprehension of both the pervasiveness and repercussions of cyberbullying on the well-being of expatriate students. This contribution is particularly vital, given the dearth of research in the field, largely attributable to the growing dependence of students on the internet for various cyber activities. This study examines a partial assumption of GST (in non-Western country). Moreover, it uses an advanced statistical analysis and large sample.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 13 November 2023

Tareq Na’el Al-Tawil and Salam Abdallah

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Abstract

Purpose

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Design/methodology/approach

The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.

Findings

Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.

Originality/value

The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 December 2023

Manoj Kumar Verma and Mayank Yuvaraj

In recent years, instant messaging platforms like WhatsApp have gained substantial popularity in both academic and practical domains. However, despite this growth, there is a lack…

Abstract

Purpose

In recent years, instant messaging platforms like WhatsApp have gained substantial popularity in both academic and practical domains. However, despite this growth, there is a lack of a comprehensive overview of the literature in this field. The primary purpose of this study is to bridge this gap by analyzing a substantial dataset of 12,947 articles retrieved from the Dimensions.ai, database spanning from 2011 to March 2023.

Design/methodology/approach

To achieve the authors' objective, the authors employ bibliometric analysis techniques. The authors delve into various bibliometric networks, including citation networks, co-citation networks, collaboration networks, keywords and bibliographic couplings. These methods allow for the uncovering of the social and conceptual structures within the academic discourse surrounding WhatsApp.

Findings

The authors' analysis reveals several significant findings. Firstly, the authors observe a remarkable and continuous growth in the number of academic studies dedicated to WhatsApp over time. Notably, two prevalent themes emerge: the impact of coronavirus disease 2019 (COVID-19) and the role of WhatsApp in the realm of social media. Furthermore, the authors' study highlights diverse applications of WhatsApp, including its utilization in education and learning, as a communication tool, in medical education, cyberpsychology, security, psychology and behavioral learning.

Originality/value

This paper contributes to the field by offering a comprehensive overview of the scholarly research landscape related to WhatsApp. The findings not only illuminate the burgeoning interest in WhatsApp among researchers but also provide insights into the diverse domains where WhatsApp is making an impact. The analysis of bibliometric networks offers a unique perspective on the social and conceptual structures within this field, shedding light on emerging trends and influential research. This study thus serves as a valuable resource for scholars, practitioners and policymakers seeking to navigate the evolving landscape of WhatsApp research. The study will also be useful for researchers interested in conducting bibliometric analysis using Dimensions.ai, a free database.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 17 March 2023

Baohua Yu and Yick Wah Leung

This study was conducted to achieve the following objectives: (1) determine the differences and reasons for using outgroup OSNs by gender, age and student groups (Mainland and…

Abstract

Purpose

This study was conducted to achieve the following objectives: (1) determine the differences and reasons for using outgroup OSNs by gender, age and student groups (Mainland and Hong Kong [HK] students); (2) uncover the impact of online social networks (OSNs) on the development of Mainland–HK friendships and (3) determine the roles of different OSNs (social networking sites [SNSs] and instant messaging platforms [IMPs]) in the development of intercultural friendships in the real world.

Design/methodology/approach

To explore how OSNs facilitate (or inhibit) intercultural interactions, 198 students completed a questionnaire and 24 students participated in follow-up semi-structured interviews examining the role of OSNs in intercultural friendship development.

Findings

Results revealed that demographic and motivational preferences for using outgroup-OSNs differed among students. Both IMPs and SNSs helped students maintain friendships using little effort, whereas it tended to strengthen their existing social networks, rather than helping to start new friendships. IMPs helped develop a sense of “presence awareness”, strengthening pre-existing friendships and solidifying offline connections. SNSs also assisted students in exploring their shared interests while revealing their values and cultural differences.

Research limitations/implications

The authors’ findings offered empirical evidence on social exchange theory and anxiety-uncertainty management theory regarding the perceived benefit of OSNs on students' friendship development.

Practical implications

The study sheds light on the differences between Mainland Chinese and HK students, including participants' perceptions of different friendship stages.

Originality/value

This study is interested in the roles of different SNSs and IMPs in intercultural friendship development, especially their strengths and weaknesses as perceived by students. Also, the authors are curious about how students select and use IMPs and SNSs differently according to their individual preferences and needs. To the authors’ knowledge, the dynamic link between online communication and intercultural friendship development has not been thoroughly examined in the field of intercultural communication.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 2024

Amy Dorie and David Loranger

The purpose of this study is to investigate characteristics of apparel-related critical incidents that motivate both Generation Z and Y consumers to share electronic word-of-mouth…

Abstract

Purpose

The purpose of this study is to investigate characteristics of apparel-related critical incidents that motivate both Generation Z and Y consumers to share electronic word-of-mouth (eWOM) via specific online channels.

Design/methodology/approach

The current research used an exploratory mixed-methods approach.

Findings

Qualitative findings of critical incidents revealed that the main situations that led to the spread of eWOM involved new purchases (49%), product quality (21%), pricing and promotions (19%), complaints (9%) and brand content (48%). Participants were motivated to spread information about the critical incidents by a desire to connect with friends and family (83%), help others (37%), influence others (48%) and express brand loyalty (32%). Quantitative results indicated significant relationships between critical incidents, motivations and eWOM channel choice.

Research limitations/implications

This study has theoretical implications for apparel researchers attempting to gain insight into critical incidents that motivate consumers to engage in eWOM on specific channels in a positive or negative manner.

Practical implications

These findings are important for marketers as it appears that brand content does an efficient job at driving engagement on SM; marketers need to increase efforts to engage with consumers via feedback on websites, as this is an opportunity to counteract negative experiences and retain consumers’ loyalty.

Originality/value

To the best of the authors’ knowledge, the current research is the first to extend theories of communication and motivation to connect critical incidents with situational intrinsic and extrinsic motivations for spreading eWOM via online channels for Millennial and Generation Z consumers.

Details

Journal of Consumer Marketing, vol. 41 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

1 – 10 of 446