Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 16 April 2024

Daria Arkhipova, Marco Montemari, Chiara Mio and Stefano Marasca

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The…

Abstract

Purpose

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The changes the authors are interested in are linked to technology-driven innovations in managerial decision-making and in organizational structures. In addition, the paper highlights research gaps and opportunities for future research.

Design/methodology/approach

The authors adopted a grounded theory literature review method (Wolfswinkel et al., 2013) to achieve the study’s aims.

Findings

The authors identified four research themes that describe the changes in the management accounting profession due to technology-driven innovations: structured vs unstructured data, human vs algorithm-driven decision-making, delineated vs blurred functional boundaries and hierarchical vs platform-based organizations. The authors also identified tensions mentioned in the literature for each research theme.

Originality/value

Previous studies display a rather narrow focus on the role of digital technologies in accounting work and new competences that management accountants require in the digital era. By contrast, the authors focus on the broader technology-driven shifts in organizational processes and structures, which vastly change how accounting information is collected, processed and analyzed internally to support managerial decision-making. Hence, the paper focuses on how management accountants can adapt and evolve as their organizations transition toward a digital environment.

Details

Meditari Accountancy Research, vol. 32 no. 7
Type: Research Article
ISSN: 2049-372X

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1106

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 23 April 2024

Maja Krtalić and Lilach Alon

This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It…

Abstract

Purpose

This theoretical paper introduces a conceptual framework for Personal Cultural Heritage Management (PCHM), derived from prior research on migrants' information practices. It elaborates on the literature background and the development of the PCHM framework, highlighting the role of personal information management (PIM) and personal collections in the creation, access and utilization of cultural heritage information.

Design/methodology/approach

The study describes and explains the construction of the PCHM framework as a structured and self-motivated approach to personal heritage and identity learning.

Findings

Following the theoretical background and assumptions, along with the presentation of the key building blocks, the paper describes the key components of the framework, outlines their definitions and provides examples.

Research limitations/implications

Theoretically, PCHM extends the current literature by encapsulating processes and actions employed by individuals to manage personal collections for cultural identity purposes, thereby underscoring the critical role personal collections play in both preserving and communicating cultural heritage.

Practical implications

PCHM can guide the development of support systems and policies to enhance cultural continuity and integration, thus empowering individuals to navigate their cultural identities confidently.

Originality/value

The PCHM framework creates a unique intersection between PIM and cultural heritage, providing a new perspective for understanding the dynamic evolution and formation of cultural identity among migrants.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 19 April 2024

Chin Wei Liew and Nor Aziati Abdul Hamid

This study aims to collect empirical data and observe the type of influences that were causing impact to the implementation of information technology governance (ITG) mechanisms…

Abstract

Purpose

This study aims to collect empirical data and observe the type of influences that were causing impact to the implementation of information technology governance (ITG) mechanisms in Malaysia’s technical universities. This study enhanced the understanding on the status of ITG implementation and revealed internal and external influences that were shaping the types of ITG mechanisms implemented within universities and present a new perspective through the lens of resource-based view and continuous improvement.

Design/methodology/approach

This study focused on two Malaysia’s technical universities belongs under same university’s network. Five IT leaders involved in the implementations of ITG from each university were interviewed. Qualitative content analysis was used as the main analyzing method to extract categories and themes from the transcripts. Final results were produced after multiple efforts of refining categories and themes in ITG implementations.

Findings

The findings revealed that both Malaysia’s technical universities had more soundly implementations in structure mechanisms than relational and process mechanisms. The shaping of implemented mechanisms was influenced by environment surrounding the universities, internally and externally. The findings proposed that the internal and external factors are best addressed with the growth of internal ITG expertise.

Research limitations/implications

This research was conducted on two of Malaysia’s technical universities that were under a university network. Although both universities had presented the exact trend in the type of ITG mechanisms implemented in the universities, more empirical data were needed to further solidify the findings from this study. Other than that, the major respondents for this research were middle-level IT officers and leaders in the universities. Further research could be conducted specifically on top-level managements to further understand the point of views of top managements in the aspect of ITG mechanisms implementations in universities.

Originality/value

This study discussed how each factor could influence the types of ITG mechanisms implemented in Malaysia’s technical universities and concluded the attentions needed to improve the overall environment for ITG implementations in universities through the lens of resource-based view and continuous improvement.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 7 February 2023

Yalan Yan, Siyu Xin and Xianjin Zha

Knowledge transfer which refers to the communication of knowledge from a source so that it is learned and applied by a recipient has long been a challenge for knowledge…

Abstract

Purpose

Knowledge transfer which refers to the communication of knowledge from a source so that it is learned and applied by a recipient has long been a challenge for knowledge management. The purpose of this study is to understand influencing factors of transactive memory system (TMS) and knowledge transfer.

Design/methodology/approach

Drawing on the theories of communication visibility, social distance and flow, this study develops a research model. Then, data are collected from users of the social media mobile App. Partial least squares-structural equation modeling (PLS-SEM) is employed to analyze data.

Findings

TMS is a valid second-order construct in the social media mobile app context, which is more reflected by credibility. Meanwhile, communication visibility and social distance each have positive effects on TMS which further has a positive effect on knowledge transfer. Flow has a positive effect on knowledge transfer.

Practical implications

Developers of the mobile App should carefully consider the role of information and communication technology (ICT) in supporting TMS and knowledge transfer. They should consider recommendation algorithm so that the benefit of communication visibility can be retained. They should design the feature to classify users based on similarity so as to stimulate users' feeling of close social distance. They should keep on improving features based on users' holistic experience.

Originality/value

This study incorporates the perspectives of communication visibility, social distance and flow to understand TMS and knowledge transfer, presenting a new lens for research.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 17 February 2023

Hugo Martinelli Watanuki and Renato de Oliveira Moraes

The purpose of this paper is to identify the practices that owners of public profiles in social networking sites can leverage to actively build online reputation and to evaluate…

Abstract

Purpose

The purpose of this paper is to identify the practices that owners of public profiles in social networking sites can leverage to actively build online reputation and to evaluate the impact of the adoption of such practices on the initial formation of trust toward these individuals when they are presented as new virtual work partners.

Design/methodology/approach

A theoretical model was developed and an experiment with 233 participants was utilized to assess the model using partial least squares structural equation modeling.

Findings

The results suggest that individuals can build their online reputations in public profiles of social networking sites via a series of practices of self-disclosure of information and that the adoption of these practices has significant effects on the initial formation of trust toward the profile owner in virtual work contexts. Categorization mechanisms such as stereotyping, unit grouping and reputation categorization have been found to contribute to the initial formation of trust, both from an affect and cognition-based perspectives.

Originality/value

Little is known about the information disclosure practices in public profiles of social networking sites that new work partners can adopt to facilitate the formation of trust between them before they start working together. This study has contributed to the existing body of literature by clarifying these practices and the relative importance of online reputation to the initial formation of trust during the outset of a new virtual work relationship.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 18 April 2023

Changyu Wang, Jin Yan, Lijing Huang and Ningyue Cao

Drawing on information foraging theory and the SERVQUAL model, this study built a research model to investigate the roles of middle-aged and elderly short-video creators' online…

Abstract

Purpose

Drawing on information foraging theory and the SERVQUAL model, this study built a research model to investigate the roles of middle-aged and elderly short-video creators' online attributes in attracting short-video viewers to be their followers.

Design/methodology/approach

Taking Douyin (a famous short-video platform in China) as an example, this study used a sequential triangulation mixed-methods approach (quantitative → qualitative) to examine the proposed model by investigating both creators and viewers.

Findings

Viewers who clicked the “like” button for the middle-aged and elderly creators' videos are more likely to follow the creators. Viewers will believe that middle-aged and elderly creators who received more likes are more popular. Thus, middle-aged and elderly creators with more likes usually have more followers. Viewers usually believe that middle-aged and elderly creators who more frequently publish professional and high-quality videos have invested more effort and who have official verification also have a high level of authority and are recognized by the platform. Thus, middle-aged and elderly creators with more professional videos and verification usually have more followers. Moreover, verification, the number of videos and the professionalism of videos can enhance the transformation of viewers who liked middle-aged and elderly creators' videos into their followers, and thus strengthen the positive relationship between the number of likes and the number of followers; however, the number of bio words will have an opposite effect.

Practical implications

These findings have implications for platform managers, middle-aged and elderly creators and the brands aiming to develop a “silver economy” by attracting more followers.

Originality/value

This study researches short-video platforms by using a mixed-methods approach to develop an understanding of viewers' decision-making when following middle-aged and elderly creators based on information foraging theory and the SERVQUAL model from the perspectives of both short-video creators and viewers.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 19 April 2024

Tarek Taha Kandil

This study aims to develop the alleviating bullwhip effects framework (ABEF) replenishment rules, and bullwhip, inventory fluctuations and customer service fulfilment rates were…

Abstract

Purpose

This study aims to develop the alleviating bullwhip effects framework (ABEF) replenishment rules, and bullwhip, inventory fluctuations and customer service fulfilment rates were examined. In addition, automated smoothing and replenishment rules can alleviate supply chain bullwhip effects. This study aims to understand the current artificial intelligence (AI) implementation practice in alleviating bullwhip effects in supply chain management. This study aimed to develop a system for writing reviews using a systematic approach.

Design/methodology/approach

The methodology for the present study consists of three parts: Part 1 deals with the systematic review process. In Part 2, the study applies social network analysis (SNA) to the fourth phase of the systematic review process. In Part 3, the author discusses developing research clusters to analyse the research state more granularly. Systematic literature reviews synthesize scientific evidence through repeatable, transparent and rigorous procedures. By using this approach, you can better interpret and understand the data. The author used two databases (EBSCO and World of Science) for unbiased analysis. In addition, systematic reviews follow preferred reporting items for systematic reviews and meta-analyses.

Findings

The study uses UCINET6 software to analyse the data. The study found that specific topics received high centrality (more attention) from scholars when it came to the study topic. Contrary to this, others experienced low centrality scores when using NETDRAW visualization graphs and dynamic capability clusters. Comprehensive analyses are used for the study’s comparison of clusters.

Research limitations/implications

This study used a journal publication as the only source of information. Peer-reviewed journal papers were eliminated for their lack of rigorousness in evaluating the state of practice. This paper discusses the bullwhip effect of digital technology on supply chain management. Considering the increasing use of “AI” in their publications, other publications dealing with sensor integration could also have been excluded. To discuss the top five and bottom five topics, the author used magazines and tables.

Practical implications

The study explores the practical implications of smoothing the bullwhip effect through AI systems, collaboration, leadership and digital skills. Artificial intelligence is rapidly becoming a preferred tool in the supply chain, so management must understand the opportunities and challenges associated with its implementation. Furthermore, managers should consider how AI can influence supply chain collaboration concerning trust and forecasting to smooth the bullwhip effect.

Social implications

Digital leadership and addressing the digital skills gap are also essential for the success of AI systems. According to the framework, it is necessary to balance AI performance and accountability. As a result of the framework and structured management approach, the author can examine the implications of AI along the supply chain.

Originality/value

The study uses a systematic literature review based on SNA to analyse how AI can alleviate the bullwhip effects of supply chain disruption and identify the focused and the most important AI topics related to the bullwhip phenomena. SNA uses qualitative and quantitative methodologies to identify research trends, strengths, gaps and future directions for research. Salient topics for reviewing papers were identified. Centrality metrics were used to analyse the contemporary topic’s importance, including degree, betweenness and eigenvector centrality. ABEF is presented in the study.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 13 April 2023

Chunmei Gan, Hongxiu Li and Yong Liu

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of…

Abstract

Purpose

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of social cognitive theory (SCT).

Design/methodology/approach

Based on SCT, this study puts forward a theoretical model incorporating habit, excessive use and negative emotions to predict social media discontinuance behavior. The proposed research model was empirically tested with 465 responses collected from WeChat users in China via an online survey. WeChat is one of the most popular social media in China. However, WeChat also faces the challenges of reduced or terminated usage among its users. Partial least squares structural equation modeling (PLS-SEM) technique was used to analyze the data.

Findings

The research results in this study show that habit exerts a negative effect on social media discontinuance behavior, while exhaustion and regret have positive influences. In addition, habit positively affects excessive use, which further leads to negative emotions of social media exhaustion and regret. Moreover, gender moderates the relationship between habit and social media discontinuance behavior.

Originality/value

This study adds to the literature of information system (IS) use lifecycle by investigating user behavioral changes regarding a transition from habituated to excessive use and further to discontinuance behavior. This study also helps elucidate the complex role of habit by explaining social media discontinuance from the social cognitive view. Furthermore, this study advances the current understanding of gender difference in social media discontinuance in the Chinese context. The study also offers insights to practitioners on how to prevent individuals from discontinuing their use of social media.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 February 2024

Yaxi Liu, Chunxiu Qin, Yulong Wang and XuBu Ma

Exploratory search activities are ubiquitous in various information systems. Much potentially useful or even serendipitous information is discovered during the exploratory search…

Abstract

Purpose

Exploratory search activities are ubiquitous in various information systems. Much potentially useful or even serendipitous information is discovered during the exploratory search process. Given its irreplaceable role in information systems, exploratory search has attracted growing attention from the information system community. Since few studies have methodically reviewed current publications, researchers and practitioners are unable to take full advantage of existing achievements, which, in turn, limits their progress in this field. Through a literature review, this study aims to recapitulate important research topics of exploratory search in information systems, providing a research landscape of exploratory search.

Design/methodology/approach

Automatic and manual searches were performed on seven reputable databases to collect relevant literature published between January 2005 and July 2023. The literature pool contains 146 primary studies on exploratory search in information system research.

Findings

This study recapitulated five important topics of exploratory search, namely, conceptual frameworks, theoretical frameworks, influencing factors, design features and evaluation metrics. Moreover, this review revealed research gaps in current studies and proposed a knowledge framework and a research agenda for future studies.

Originality/value

This study has important implications for beginners to quickly get a snapshot of exploratory search studies, for researchers to re-align current research or discover new interesting issues, and for practitioners to design information systems that support exploratory search.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

1 – 10 of over 1000