Search results

1 – 10 of 804
Article
Publication date: 8 September 2023

Mokhalles Mohammad Mehdi, Arshan Kler and Lubna Nafees

This study aims to empirically examine the factors that affect mobile loyalty (m-loyalty) and its influence on customer reuse intention towards mobile instant messaging services…

Abstract

Purpose

This study aims to empirically examine the factors that affect mobile loyalty (m-loyalty) and its influence on customer reuse intention towards mobile instant messaging services. This study identified measurement items to assess the business users and individual users reuse intention towards mobile instant messaging services and test the relationship in the conceptual model. This study bridges a literature gap focusing on m-loyalty and its impact on customer reuse intention, which has not received attention previously.

Design/methodology/approach

To evaluate the influence of the factors, this study identified and extracted the items from past literature to develop the survey instrument. This study surveyed 600 respondents including business users and individual users from the Delhi-National Capital Region of India and applied the structural equation modelling to test the conceptual model.

Findings

The results revealed that satisfaction and m-loyalty have a direct effect on the business users and individual users’ reuse intention of mobile instant messaging services. This study found that satisfaction, usability, perceived value, commitment, trust and m-loyalty influence on business users reuse intention. This study indicate that enjoyment has an insignificant relationship on m-loyalty for business users followed by usability and enjoyment has an insignificant relationship on m-loyalty for individual users. Further, female gender does not moderate the relationship between satisfaction and business users reuse intention. The cognitive absorption and the unified theory of acceptance and use of technology (UTAUT) theories supported evaluating the association between the factors in the context of business and individual users reuse intention of mobile instant messaging service.

Research limitations/implications

The empirical findings imply that all the factors except enjoyment have directly influenced the business users reuse intention of mobile instant messaging. The significant influence of usability factor on the business users reuse intention towards mobile instant messaging is the major variation between the validated models of business and individual samples. The results of influencing factors of m-loyalty and its impact on customer reuse intention are associated with cognitive absorption and the UTAUT theories.

Practical implications

Focus on these factors can be beneficial for the business users, managers, mobile instant messaging service providers and application developers to increase customer loyalty and reuse intention for the mobile instant messaging services. This research will facilitate mobile instant messaging service providers to keep their services market relevant and focus on user satisfaction in building applications for loyalty.

Originality/value

This research identified measurement items from earlier literature to identify, analyze and verify the relevance of these factors in m-loyalty and customer reuse intention of mobile instant messaging services and fill the gap in customer reuse intention of mobile instant messaging services literature.

Details

Journal of Business & Industrial Marketing, vol. 39 no. 1
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 31 January 2024

Rufai Ahmad, Sotirios Terzis and Karen Renaud

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Abstract

Purpose

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Design/methodology/approach

In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example was coded using established guidelines from the literature to identify the persuasion principles, and the URL construction techniques employed.

Findings

The principles of social proof, liking and authority were the most widely used in MIM phishing, followed by scarcity and reciprocity. Most phishing examples use three persuasion principles, often a combination of authority, liking and social proof. In contrast to email phishing but similar to vishing, the social proof principle was the most commonly used in MIM phishing. Phishers implement the social proof principle in different ways, most commonly by claiming that other users have already acted (e.g. crafting messages that indicate the sender has already benefited from the scam). In contrast to email, retail and fintech companies are the most commonly targeted in MIM phishing. Furthermore, phishers created deceptive URLs using multiple URL obfuscation techniques, often using spoofed domains, to make the URL complex by adding random characters and using homoglyphs.

Originality/value

The insights from this study provide a theoretical foundation for future research on the psychological aspects of phishing in MIM apps. The study provides recommendations that software developers should consider when developing automated anti-phishing solutions for MIM apps and proposes a set of MIM phishing awareness training tips.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 March 2024

Devon Jefferson

This paper’s objective is to provide a systematic literature review of the contextual factors affecting downward communication from supervisors to subordinates in the audit…

Abstract

Purpose

This paper’s objective is to provide a systematic literature review of the contextual factors affecting downward communication from supervisors to subordinates in the audit environment. In addition, this review identifies emerging research themes and directions for future research.

Design/methodology/approach

I accomplish this review’s objectives by leveraging communication literature to establish a framework to identify and synthesize contextual factors affecting downward communication in the audit environment. The review identifies 50 published articles in the last 20 years from leading accounting and auditing journals.

Findings

This study consolidates research findings on downward communication under two primary contextual factors: (1) message and (2) channel. Findings indicate that empirical research examining communication in audit is fragmented and limited. Studies examining the message focus heavily on its content and treatment in the areas of feedback, nonverbal cues, and fraud brainstorming, and a handful of additional studies examine the effectiveness of the channel in these areas. Additional research is needed to understand a broader set of supervisor–subordinate communication practices, including those that are computer-mediated, and their effect on subordinate auditors’ judgments and behaviors in the contemporary audit environment.

Originality/value

Much of the audit literature examining communication to date is topic-versus construct-based, making it difficult to see how the research findings relate to one another. This review is the first to synthesize the literature to provide academics recommendations for a way forward, and inform practitioners of communication practices whereby supervisors can be trained to improve audit quality.

Details

Journal of Accounting Literature, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-4607

Keywords

Article
Publication date: 5 September 2023

Daniel Kusaila and Natalie Gerhart

Technology-enabled communication used in workplace settings includes nuanced tools such as emojis, that are interpreted differently by different populations of people. This paper…

Abstract

Purpose

Technology-enabled communication used in workplace settings includes nuanced tools such as emojis, that are interpreted differently by different populations of people. This paper aims to evaluate the use of emojis in work environments, particularly when they are used sarcastically.

Design/methodology/approach

This research uses a survey method administered on MTurk. Overall, 200 participants were included in the analysis. Items were contextualized from prior research and offered on a seven-point Likert scale.

Findings

Females are better able to understand if an emoji is used sarcastically. Additionally, older employees are more capable of interpreting sarcasm than younger employees. Finally, understanding of emojis has a negative relationship with frustration, indicating that when users understand emojis are being used sarcastically, frustration is reduced.

Research limitations/implications

This research is primarily limited by the survey methodology. Despite this, it provides implications for theory of mind and practical understanding of emoji use in professional settings. This research indicates emojis are often misinterpreted in professional settings.

Originality/value

The use of emojis is becoming commonplace. The authors show the use of emojis in a professional setting creates confusion, and in some instances can lead to frustration. This work can help businesses understand how best to manage employees with changing communication tools.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 21 November 2023

Diab M. Al-Badayneh, Anis Ben Brik and Amr Elwakad

This study aims to examine social determinants and social strains of cyberbullying victimization among expatriate populations in high-income countries such as Qatar. The authors…

Abstract

Purpose

This study aims to examine social determinants and social strains of cyberbullying victimization among expatriate populations in high-income countries such as Qatar. The authors argue that expatriate students will be exposed to stains and pressures due to several factors, such as feeling alienated, lonely, homesick, insecure and helpless. This study examines a partial assumption of general strain theory (GST), which posits that expats’ cyberbullying victimization can create negative stimuli that lead to negative feelings and, as a result, to delinquent behavior. The delinquent behavior can be seen as a coping method in encountering strains. Logistic regression analysis is applied (using SPSS v. 21) to test the hypothesis that the victimization of expats’ cyberbullying could lead to strain and delinquency.

Design/methodology/approach

A sample of 2,428 expatriate students (46% males and 54% females) was randomly selected from seven public schools in Qatar. The average number of siblings in the household was 2.7. Around 10.8% of the sample reported victimization by cyberbullying. Most came from intact families (80.6%) compared to 19.4 living in broken homes. Concerning the birth order of the student in the family, 25% of the sample were firstborn, and 20% were middle-born. Students’ mother relationships were higher than students’ father relationships (69% vs 51%, respectively). Fathers were higher in undergraduate education than mothers (60% vs 49%, respectively). Considering that 58% of women did not have a job, most fathers work in administrative positions (47% in administrative work and 39% in professional positions) as opposed to mothers’ positions (15% and 21%, respectively). The survey was distributed among expatriate students by trained researchers, teachers and social workers in public schools. The researchers explained the purpose of the study, confidentiality and potential risks and provided directions for completing the survey. Parents and their children provided signed informed consent before participation, following the institutional review boards of Qatar University’s Human Subject Research Committee and the Ministry of Social Development. The victimization of cyberbullying is measured at the dichotomy level by asking a general cyberbullying question (In the last 12 months, had you been bullied by other students using mobile messages, email, voice or video messages? Responses were 1 – yes and 0 – no). A definition of cyberbullying was included in the questionnaire. Independent measures are as follows: (1) demographic variables: gender, belief, health, number of friends and exposure to violence; (2) family variables: delinquent family, coercive parenting, family relations, family disputes, father absence and family ties; (3) school variables: school satisfaction, school violence, student fighting, teachers' violence, school truancy and going late to school; (4) imprudent behavior: smoking, alcohol, not using a seat belt, gambling, stealing less than 100 QR, chewing tobacco, stimuli, volatile drugs, sexual harassment, throwing garbage out of the car, cheating, vandalism and victimization.

Findings

Findings showed that n = 255, 10.8% of the expats’ sample N = 2,428 reported victimization of cyberbullying, of whom 46% were males and 54% were females. A total of 24% of the victims of cyberbullying were males, and 5.8% were females. About a third of the sample were cyberbullying perpetrators (n = 716, 29.5%). Victims of cyberbullying came from intact families (62.4%) compared to broken families (37.6%). A round third of the victims reported the absence of a father during their childhood (n = 78, 31.7%). Most of the victims came from a typical community compared to the delinquent community (71.2% vs 28.2%). About a third of the victims reported it was easy to talk with the father when needed (32% compared to 42.7%), who said it was easy. More than half of the victims do not use seat belts. A low percentage of them were gambling (n = 68, 27% or 2.9% of the total sample). Regarding escaping imprudent and delinquent behaviors, findings showed that a third and more than a tenth of the cyberbullying were smokers and alcoholics (n = 69, 27.4% and n = 42, 16.7% respectively). Moreover, among the most serious, widely spread student problems, around a quarter of the victims reported using chewing tobacco (Sweeka is the local name) (n = 54, 21.4%). Finally, drug use among victims was more than a tenth of them (n = 41, 16.3%). About a quarter of the victims reported stealing less than 100 QR (n = 67, 26.8% or 2.9% of the total sample). Concerning the crimes committed by victims, findings showed that more than forth of them committed assault (n = 71, 28.3%), student fights (n = 202, 80.8%), school violence (n = 117, 46.6%) and half of the victims (50.2%) were also victims of face-to-face bullying. Little below half of the sample was exposed to violence (n = 120, 48.6%) and was the victim of violence in the past 12 months (n = 100, 40.8%). A significant gender differences was found in the victimization of cyberbullying (1 = yes, 0 = no) (a = 000). Moreover, significant mean differences were found between expatriates student victimization of cyberbullying at (a = 000) in all strain variables. Using binary regression analysis to examine the equality of probability of being a victim of cyberbullying as accounted for by the independent variables, the model’s predictability was 89.4%. The Hosmer and Lemeshow test and omnibus tests support the model’s fit (a = 000). Nagelkerke R2 shows that the stain variables accounted for 24% of the variance in the expat's student victimization of cyberbullying.

Research limitations/implications

Conceptualization and determination of what constitutes cyberbullying from the criminal law perspective are needed. Cyberbullying is defined as a form of violence and crime involving new technologies (Sun et al., 2016, p. 62). Policymakers should provide accessible and equitable access to the criminal justice system, the integration of expatriates and the provision of support services to avoid delinquency.

Practical implications

A social cohesion, inclusion and well-being policy is needed for expatriate students and their families in Qatar. In particular, cultural diversity policy and programs, a source of strength and enrichment should be promoted in educational settings. Social inclusion and cultural diversity programs could ease the alienation and marginalization that expatriate students may encounter in their host societies to prevent stains and negative emotions that lead to delinquency and criminal behaviors. Access to support services without discrimination to avoid health and psychological strains and risk factors. This includes but is not limited to avoidance of stigmatization, embarrassment, sense of helplessness, humiliation and other negative feelings toward expatriates. Awareness and promotion of cultural diversity values are needed to enhance cultural acceptance to reduce victimization among the expatriate population. Criminal law and security implications conceptualization and determination of what constitutes cyberbullying from the criminal law perspective are needed. Cyberbullying is a form of violence and crime involving new technologies (Sun et al., 2016). Policymakers should provide accessible and equitable access to the criminal justice system, integrating expatriates and providing support services to avoid delinquency. There is a pressing need for further research within the realm of crime and law to establish the precise legal boundaries surrounding cyberbullying and to delineate the potential scope for legislative measures aimed at safeguarding against victimization in Qatar. Although the state of Qatar has taken steps to address cyberbullying by incorporating it into relevant legal frameworks, there remains a gap in terms of specifically targeting cyberbullying involving children and adolescents. Despite the introduction of the new Cybercrime Prevention Law, the issue of cyberbullying among these vulnerable groups is not adequately addressed.

Social implications

Social implication includes but is not limited to avoidance of stigmatization, embarrassment, sense of helplessness, humiliation and other negative feelings towards expatriate. Awareness and promotion of cultural diversity values is needed to enhance cultural acceptance to reduce victimization among expatriate population.

Originality/value

The present study examines some strain theory assumptions and the victimization of the cyberbullying expatriate population. This study tests a partial assumption of GST, which states that the expatriate population’s exposure to the victimization of cyberbullying can lead to negative stimuli that, in return, create negative feelings and, as a result, imprudent and delinquent behavior. The cyberbullying behavior can be seen as an escaping and coping method in encountering strains. This study underscores the presence of cyberbullying within high schools among expatriate students, exerting significant effects on their personal, social and emotional behaviors. The novel insights gleaned from this investigation contribute substantively to the comprehension of both the pervasiveness and repercussions of cyberbullying on the well-being of expatriate students. This contribution is particularly vital, given the dearth of research in the field, largely attributable to the growing dependence of students on the internet for various cyber activities. This study examines a partial assumption of GST (in non-Western country). Moreover, it uses an advanced statistical analysis and large sample.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Open Access
Article
Publication date: 17 October 2023

Divaries Cosmas Jaravaza, Joshua Risiro, Paul Mukucha and Nomuhle Jaravaza

The main purpose of the study was to synthesise the role of COVID-19 social media messages and indigenous religious beliefs on public health promotion initiatives among rural…

Abstract

Purpose

The main purpose of the study was to synthesise the role of COVID-19 social media messages and indigenous religious beliefs on public health promotion initiatives among rural consumers in Zimbabwe.

Design/methodology/approach

A qualitative approach was adopted. Population consisting of 15 interviews and six focus groups was purposively sampled from Manicaland, Mashonaland Central and Masvingo provinces in Zimbabwe. A thematic approach was used to present and analyse the data.

Findings

Rural consumers believed WhatsApp messages posted by people whom they know or influential personnel like health workers. Credibility of WhatsApp messages was enhanced through its ability to send videos and audios. Teachings and indoctrination by indigenous churches and misinformation were found to be an impediment in believing COVID-19 WhatsApp messages and vaccination by rural consumers. Faith healers in indigenous churches used various practices and artefacts like holy water, stone pebbles, clay pots, flags and wooden rods to pray and treat patients suffering from COVID-19 and other ailments.

Practical implications

Social media messages, religious teachings and indoctrination may be a hindrance to rural consumers in adopting government public health promotion initiatives; hence, public health professionals need prior emic understanding and co-option of local leadership in vaccination campaigns.

Originality/value

This study outstretches the theoretical landscape in consumer behaviour and also practical contribution to health practitioners and marketers on breaking indigenous religious barriers and social media misconceptions on vaccination uptake through promotional strategies earmarked for rural consumers.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 18 no. 1
Type: Research Article
ISSN: 1750-6123

Keywords

Article
Publication date: 13 September 2023

Liang Ma and Xin Zhang

Work interruptions (WIs) due to social media are becoming more and more common in the daily lives of organizations. However, the relationship between WI and work performance of…

Abstract

Purpose

Work interruptions (WIs) due to social media are becoming more and more common in the daily lives of organizations. However, the relationship between WI and work performance of employees is still unclear. This study aims to investigate the effects of WIs due to social media on employees' work performance in terms of different mechanisms; it also considers the moderating role of social media usage.

Design/methodology/approach

Using the jobs demands-resource (JD-R) model, this paper proposes a research model to investigate the effects of WIs on employee work performance from the perspective of the enabling mechanism and burden mechanism. Structural equation modeling (SEM) was used to analyze the data of 444 employees.

Findings

The results show that (1) with regard to the enabling mechanism path, WI has a positive effect on employees' sense of belonging, which further has a positive effect on employees' work performance; (2) with regard to the burden mechanism path, WI has a positive effect on employees' interruption overload; however, the effect of employee interruption overload on employees' work performance is not significant, and (3) social media used for either work or social purposes can strengthen the relationship between WI and interruption overload, while social media used for work-related purposes can reduce the relationship between WI and a sense of belonging.

Originality/value

First, this paper contributes to the WI literature by clarifying how WI affects employees' work performance through different mechanisms, namely the enabling mechanism and the burden mechanism. Second, this paper contributes to the WI literature by revealing a boundary condition, namely social media use, between WI and a sense of belonging and between WI and employees' interruption overload.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 22 September 2023

Luminita Hurbean, Louie H.M. Wong, Carol XJ Ou, Robert M. Davison and Octavian Dospinescu

The authors investigate the relationship between instant messenger (IM) use and work performance, mediated by interruptions and two key indicators of the stress associated with…

Abstract

Purpose

The authors investigate the relationship between instant messenger (IM) use and work performance, mediated by interruptions and two key indicators of the stress associated with technology use: overload and complexity.

Design/methodology/approach

The authors validate this research model using partial least squares structural equation modelling (PLS-SEM) with data collected through a survey of 416 working professionals.

Findings

The data reveal that while IM use contributes minimally to work interruptions and to a greater extent to technological complexity, these two constructs fully mediate the direct influence of IM use at work on technology overload, and meanwhile significantly and directly contribute to work performance.

Research limitations/implications

This research provides theoretical insights into the deployment of IM and its actual impacts in the workplace. To improve the generalisation of the findings, the authors call for more IM-related research in other countries, with more native theories and various methodologies in this domain.

Practical implications

The level of stress generated through IM use is moderate, considering IM is not a significant contributor to work interruptions. Thus, despite the potential negative effects of IM communication, the positive effects of using IM at work prevail. As a result, the technology can be promoted as long as employees, their managers and the organisation as a whole are well prepared. Employees can transfer skills and behaviour from the personal setting to their work environment and thus may find an intrinsic motivation to make better use of the IM technology at work.

Originality/value

The authors argue that this research model is novel for its perspective on evaluating the actual impacts of IM use at work instead of the reasons of using it. The authors conceptualise the process to explain how IM contributes to interruptions and other technostress indicators in the working context, and the impact on performance. Contrary to some prior research, the authors find that overall IM applications do not have a negative impact on work performance, and instead may enhance it.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 13 November 2023

Tareq Na’el Al-Tawil and Salam Abdallah

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Abstract

Purpose

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Design/methodology/approach

The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.

Findings

Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.

Originality/value

The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 December 2023

Manoj Kumar Verma and Mayank Yuvaraj

In recent years, instant messaging platforms like WhatsApp have gained substantial popularity in both academic and practical domains. However, despite this growth, there is a lack…

Abstract

Purpose

In recent years, instant messaging platforms like WhatsApp have gained substantial popularity in both academic and practical domains. However, despite this growth, there is a lack of a comprehensive overview of the literature in this field. The primary purpose of this study is to bridge this gap by analyzing a substantial dataset of 12,947 articles retrieved from the Dimensions.ai, database spanning from 2011 to March 2023.

Design/methodology/approach

To achieve the authors' objective, the authors employ bibliometric analysis techniques. The authors delve into various bibliometric networks, including citation networks, co-citation networks, collaboration networks, keywords and bibliographic couplings. These methods allow for the uncovering of the social and conceptual structures within the academic discourse surrounding WhatsApp.

Findings

The authors' analysis reveals several significant findings. Firstly, the authors observe a remarkable and continuous growth in the number of academic studies dedicated to WhatsApp over time. Notably, two prevalent themes emerge: the impact of coronavirus disease 2019 (COVID-19) and the role of WhatsApp in the realm of social media. Furthermore, the authors' study highlights diverse applications of WhatsApp, including its utilization in education and learning, as a communication tool, in medical education, cyberpsychology, security, psychology and behavioral learning.

Originality/value

This paper contributes to the field by offering a comprehensive overview of the scholarly research landscape related to WhatsApp. The findings not only illuminate the burgeoning interest in WhatsApp among researchers but also provide insights into the diverse domains where WhatsApp is making an impact. The analysis of bibliometric networks offers a unique perspective on the social and conceptual structures within this field, shedding light on emerging trends and influential research. This study thus serves as a valuable resource for scholars, practitioners and policymakers seeking to navigate the evolving landscape of WhatsApp research. The study will also be useful for researchers interested in conducting bibliometric analysis using Dimensions.ai, a free database.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 804