Search results
1 – 10 of 159Mudit Gera, Dharminder Kumar Batra and Vinod Kumar
This paper aims to understand the scholarly contributions to mobile advertising by analyzing the publishing trend from 2001 to 2022 from the documents indexed in the Scopus…
Abstract
Purpose
This paper aims to understand the scholarly contributions to mobile advertising by analyzing the publishing trend from 2001 to 2022 from the documents indexed in the Scopus database.
Design/methodology/approach
A total of 348 documents were selected for analysis published between 2001 and 2022. The garnered data was examined using a bibliometric domain mapping analysis technique using computer-aided software R and VOSviewer and manually exploring the articles.
Findings
The results of this study discover the most prolific authors in the mobile advertising domain and other seminal works carried out by productive researchers in the field of mobile advertising. The journals in which most instrumental research studies have been published are also identified. Moreover, the co-citation, bibliometric coupling and co-occurrence analysis of literature are also carried out to draw themes concerning mobile advertising research that have been identified and categorized.
Research limitations/implications
This research analyzed a singular, exclusive database, “Scopus,” which limited the sectoral scope of publications. Since the present research uses bibliometric analysis, these studies cannot conduct sentiment analysis of the chosen studies.
Practical implications
Marketing professionals looking after technological advancements may use this study to understand the broad scope of mobile advertising applicability across diverse domains and discuss the trade-offs that may address significant bottlenecks in mobile advertising applications.
Originality/value
To the best of the authors’ knowledge, this paper is one of the latest attempts in recent times to understand the research work in mobile advertising using a bibliometric domain analysis approach.
Details
Keywords
Faten Hamad, Maha Al-Fadel and Ahmed Maher Khafaga Shehata
Technological advancement has forced academic libraries to change their traditional services and routines by adopting emerging technologies to respond to the changing information…
Abstract
Purpose
Technological advancement has forced academic libraries to change their traditional services and routines by adopting emerging technologies to respond to the changing information needs of their users who are now more technologically inclined and prefer to access information remotely and in a timely manner. Smart technologies are the recent trends in academic libraries. This research aims to investigate the level of smart information service implementation at academic libraries in Jordan. It also aimed to investigate the correlation between the level of smart information services offered by the libraries and the level of digital competencies among the library staff.
Design/methodology/approach
This research is designed using survey design to collect comprehensive information from the study participants. A questionnaire was disseminated to 340 respondents, and 246 questionnaires were returned and were suitable for analysis with a response rate of 72.4%.
Findings
The results indicated a moderate level of smart information service offered by academic libraries, as well as a moderate level of digital skills associated with the advocacy of smart information services. The results also indicated a strong and positive relationship between the level of smart information services at the investigated libraries and the level of digital competencies among the librarians.
Practical implications
The findings will help other academic libraries understand how to respond to the emergent change in users’ information-seeking behavior by understanding their available human resources competencies and the requirement to undergo this emergent change.
Originality/value
This paper provides insights and practical solutions for academic libraries in response to global information trends based on users’ behaviors. This research was conducted in Jordan as one of the developing countries and hence it provides insights of the situation there. It will help academic libraries in Jordan and the region to handle and cope with the challenges associated with technology acceptance based on its staff level of digital competencies. The contribution of this research that it was done in a developing country where progress in the filed can be considered slow because of many factors, mainly economics, where institutions focus on essential library objectives, which are information resources development and databases subscriptions.
Details
Keywords
Phoebe Yueng-Hee Sia, Siti Salina Saidin and Yulita Hanum P. Iskandar
Considering the limited understanding of determinants influencing the adoption of smart mobile tourism app (SMTA) featuring augmented reality (AR) and big data analytics (BDA)…
Abstract
Purpose
Considering the limited understanding of determinants influencing the adoption of smart mobile tourism app (SMTA) featuring augmented reality (AR) and big data analytics (BDA), privacy concern (PC) and the risk of privacy information disclosure (PI) have threatened SMTA adoption. This study aims to propose an expanded consumer acceptance and use of information technology (UTAUT2) model by including new contextual components, integrated with privacy calculus theory (PCT) model to examine the determinants influencing behavioural intention (BI) to use SMTA.
Design/methodology/approach
Personal innovativeness (IN) and privacy information disclosure (PI) are incorporated in UTAUT2 model to determine its effect on SMTA featuring AR and BDA technologies from smart perspective. Both privacy concern (PC) and privacy risk (PR) derived from PCT model are also included to determine its influences on an individual's willingness to disclose privacy information for better-personalised services. We collected responses from 392 targeted participants, resulting in a strong response rate of 84.66%. These responses were analysed statistically using structural equation modeling in both SPSS 22.0 and SmartPLS 3.0.
Findings
Findings showed that personal innovativeness (IN), habit (HT) and performance expectancy (PE) significantly affect behavioural intention (BI) while privacy concern (PC) significantly affect privacy information disclosure (PI) to use SMTA. In contrast, effort expectancy (EE), hedonic motivation (HM) and privacy information disclosure (PI) had no significant effects on behavioural intention (BI) while privacy risk (PR) had no significant effects on privacy information disclosure (PI) to use SMTA.
Originality/value
The study findings help tourism practitioners in better comprehending recent trends of SMTA adoption for establishing targeted marketing strategies on apps to improve service quality. In addition, it enables app development companies acquire app users’ preferences to enhance their app development for leading app usage.
Details
Keywords
Since banks do not sell tangible products, they rely heavily on customer interactions and retention, which requires service quality, customer satisfaction and customer loyalty…
Abstract
Purpose
Since banks do not sell tangible products, they rely heavily on customer interactions and retention, which requires service quality, customer satisfaction and customer loyalty. Banks must innovate and develop new services and expand customer engagement efforts beyond stores, kiosks, direct mail and websites to include social media, mobile applications and location-based services in order to meet their customers’ growing demands. A multi-channel strategy that integrates the offline and online presences of banks can increase quality, customer satisfaction and loyalty. This paper aimed to use a service quality scale to: (1) examine the association between service quality and customer satisfaction; (2) examine the association between customer satisfaction and customer loyalty; (3) examine the indirect association between service quality and customer loyalty through customer satisfaction; and (4) examine the mediation effect of multi-channel integration quality in the relationships between service quality, customer satisfaction and customer loyalty.
Design/methodology/approach
The data was obtained from banks in Saudi Arabia. The analysis was based on an online survey of 265 Saudi bank customers. The multi-channel integration quality model and Statistical Package for the Social Sciences (SPSS) were used to test the proposed hypothesis and conduct the analysis.
Findings
The results found that there was a statistically significant link between service quality and customer satisfaction in the Saudi banking industry. Service quality did not directly affect customer loyalty. When multi-channel integration quality was moderate to high, service quality affected customer loyalty through customer satisfaction. For service quality and customer loyalty in the Saudi banking sector to be achieved, customers must be satisfied, but also the bank’s brand must manage the quality of integration channels provided to them with care, and thus branding plays a key role in achieving customer loyalty in the Saudi banking sector.
Originality/value
The academic community has provided little evidence to support how the relationships between constructs such as service quality, customer satisfaction, customer loyalty and multi-channel integration quality apply to the Saudi banking sector. A conceptual framework was proposed to show how these constructs affect the Saudi banking sector. An empirical study was conducted to see how the framework held up in banking settings. The conceptual framework serves to advance the fields of business and management and banking and their respected literature, as well as advance the understanding of multi-channel integration in boosting customer satisfaction and loyalty through high service quality in the Saudi banking sector.
Details
Keywords
The purpose of the current research is to present an explanatory framework for how people selectively attend to privacy-related news information about LBA depending on the extent…
Abstract
Purpose
The purpose of the current research is to present an explanatory framework for how people selectively attend to privacy-related news information about LBA depending on the extent to which they know about LBA already as well as their appraisals of privacy threats and efficacy.
Design/methodology/approach
The proposed model was tested using structural equation modeling based on a total of 522 useable responses obtained from an online survey.
Findings
The results revealed two different approaches to information exposure: (1) people choose to seek out privacy-related news articles when their persuasion knowledge and perceived threat level are high, whereas (2) they tend to avoid such information when perceived threats accompany fear as well as psychological discomfort, or when they believe that they are knowledgeable about LBA practices and highly capable of protecting their privacy.
Originality/value
With the development of real-time location-tracking technologies, the practice of LBA is becoming increasingly popular. As such, however, concerns about data collection and privacy are also on the rise, garnering a great deal of media attention. Despite the importance and constant stream of news reports on the subject, a comprehensive understanding of consumers' privacy assessments and information consumption remains underexamined. By incorporating the persuasion knowledge model and extended parallel process model, the current research presents an explanatory framework for consumers' privacy perceptions and information choice.
Details
Keywords
Bidyut Hazarika, Utkarsh Shrivastava, Vivek Kumar Singh and Alan Rea
The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented…
Abstract
Purpose
The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented technologies that reduce reliance on physical currencies, such as e-commerce sites and contactless payments. This study aims to examine the users’ attitudes and behaviors toward mobile payments. The focus is on identifying the most effective techniques and approaches that businesses can use to encourage user adoption of mobile payments.
Design/methodology/approach
This study uses survey data from 396 active mobile payment users across the mid-west region of the USA to test the proposed hypothesis. The snowball sampling approach is used to sample the participants for the data collection. This study uses partial least squares structural equation modeling to test the ten hypotheses proposed in this study.
Findings
This study finds that organizational commitment and privacy customization can significantly overcome users’ protective attitudes toward mobile payments during the pandemic. In addition, providing users with privacy customization options can significantly encourage self-disclosure, which is crucial for transaction authentication and fraud detection.
Originality/value
Envisioned in the backdrop of the COVID pandemic, this is one of the earliest studies investigating the role of privacy customization, self-disclosure and organizational commitment on mobile payment adoption.
Details
Keywords
Annette Mills, Nelly Todorova and Jing Zhang
Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS…
Abstract
Purpose
Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.
Design/methodology/approach
Drawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.
Findings
The results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.
Originality/value
The study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.
Details
Keywords
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal and Martin Reisslein
Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…
Abstract
Purpose
Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long latencies that hinder modern low-latency applications. In order to flexibly support the computing demands of users, cloud computing is evolving toward a continuum of cloud computing resources that are distributed between the end users and a distant data center. The purpose of this review paper is to concisely summarize the state-of-the-art in the evolving cloud computing field and to outline research imperatives.
Design/methodology/approach
The authors identify two main dimensions (or axes) of development of cloud computing: the trend toward flexibility of scaling computing resources, which the authors denote as Flex-Cloud, and the trend toward ubiquitous cloud computing, which the authors denote as Ubi-Cloud. Along these two axes of Flex-Cloud and Ubi-Cloud, the authors review the existing research and development and identify pressing open problems.
Findings
The authors find that extensive research and development efforts have addressed some Ubi-Cloud and Flex-Cloud challenges resulting in exciting advances to date. However, a wide array of research challenges remains open, thus providing a fertile field for future research and development.
Originality/value
This review paper is the first to define the concept of the Ubi-Flex-Cloud as the two-dimensional research and design space for cloud computing research and development. The Ubi-Flex-Cloud concept can serve as a foundation and reference framework for planning and positioning future cloud computing research and development efforts.
Details
Keywords
Localization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of…
Abstract
Purpose
Localization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of nodes has become a significant study where multiple features on distance model are implicated on predictive and heuristic model for each set of localization parameters that govern the design on energy minimization with proposed adaptive threshold gradient feature (ATGF) model. A received signal strength indicator (RSSI) model with node estimated features is implicated with localization problem and enhanced with hybrid cumulative approach (HCA) algorithm for node optimizations with distance predicting.
Design/methodology/approach
Using a theoretical or empirical signal propagation model, the RSSI (known transmitting power) is converted to distance, the received power (measured at the receiving node) is converted to distance and the distance is converted to RSSI (known receiving power). As a result, the approximate distance between the transceiver node and the receiver may be determined by measuring the intensity of the received signal. After acquiring information on the distance between the anchor node and the unknown node, the location of the unknown node may be determined using either the trilateral technique or the maximum probability estimate approach, depending on the circumstances using federated learning.
Findings
Improvisation of localization for wireless sensor network has become one of the prime design features for estimating the different conditional changes externally and internally. One such feature of improvement is observed in this paper, via HCA where each feature of localization is depicted with machine learning algorithms imparting the energy reduction problem for each newer localized nodes in Section 5. All affected parametric features on energy levels and localization problem for newer and extinct nodes are implicated with hybrid cumulative approach as in Section 4. The proposed algorithm (HCA with AGTF) has implicated with significant change in energy levels of nodes which are generated newly and which are non-active for a stipulated time which are mentioned and tabulated in figures and tables in Section 6.
Originality/value
Localization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of nodes has become a significant study where multiple features on distance model are implicated on predictive and heuristic model for each set of localization parameters that govern the design on energy minimization with proposed ATGF model. An RSSI model with node estimated features is implicated with localization problem and enhanced with HCA algorithm for node optimizations with distance predicting.
Details