Search results

1 – 10 of over 2000
Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 September 2021

Hamid Reza Nikkhah and Rajiv Sabherwal

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC…

Abstract

Purpose

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.

Design/methodology/approach

This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).

Findings

This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.

Originality/value

With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 15 May 2023

Phoebe Yueng-Hee Sia, Siti Salina Saidin and Yulita Hanum P. Iskandar

Considering the limited understanding of determinants influencing the adoption of smart mobile tourism app (SMTA) featuring augmented reality (AR) and big data analytics (BDA)…

Abstract

Purpose

Considering the limited understanding of determinants influencing the adoption of smart mobile tourism app (SMTA) featuring augmented reality (AR) and big data analytics (BDA), privacy concern (PC) and the risk of privacy information disclosure (PI) have threatened SMTA adoption. This study aims to propose an expanded consumer acceptance and use of information technology (UTAUT2) model by including new contextual components, integrated with privacy calculus theory (PCT) model to examine the determinants influencing behavioural intention (BI) to use SMTA.

Design/methodology/approach

Personal innovativeness (IN) and privacy information disclosure (PI) are incorporated in UTAUT2 model to determine its effect on SMTA featuring AR and BDA technologies from smart perspective. Both privacy concern (PC) and privacy risk (PR) derived from PCT model are also included to determine its influences on an individual's willingness to disclose privacy information for better-personalised services. We collected responses from 392 targeted participants, resulting in a strong response rate of 84.66%. These responses were analysed statistically using structural equation modeling in both SPSS 22.0 and SmartPLS 3.0.

Findings

Findings showed that personal innovativeness (IN), habit (HT) and performance expectancy (PE) significantly affect behavioural intention (BI) while privacy concern (PC) significantly affect privacy information disclosure (PI) to use SMTA. In contrast, effort expectancy (EE), hedonic motivation (HM) and privacy information disclosure (PI) had no significant effects on behavioural intention (BI) while privacy risk (PR) had no significant effects on privacy information disclosure (PI) to use SMTA.

Originality/value

The study findings help tourism practitioners in better comprehending recent trends of SMTA adoption for establishing targeted marketing strategies on apps to improve service quality. In addition, it enables app development companies acquire app users’ preferences to enhance their app development for leading app usage.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 15 February 2024

Susmita Saha and Md. Roknuzzaman

The major objectives of this study are to explore the perceptions of library practitioners towards IoT and to suggest directions for its proper application in university libraries…

Abstract

Purpose

The major objectives of this study are to explore the perceptions of library practitioners towards IoT and to suggest directions for its proper application in university libraries of Bangladesh.

Design/methodology/approach

The study conducted an online questionnaire-based survey of library practitioners working at university libraries in Bangladesh in addition to an email interview with ten librarians. A sample size of 310 library practitioners was obtained using the convenience sampling technique for the survey. Non-parametric tests were performed to examine the differences in demographics and perspectives on IoT, as well as the potential benefits and challenges of IoT deployment in libraries.

Findings

A total of 178 valid surveys were completed, and the results indicate that 147 (82.6%) library practitioners have varied degrees of IoT understanding and positive attitudes about IoT applications in libraries. The study identified RFID, wireless technologies, cloud computing, mobile apps, artificial intelligence and semantic search as major IoT enablers. Tracking, book reservation, circulation, user identification, service marketing, selection of resources, information networking and resource sharing, etc. are the main areas of a library where IoT may be applied. The integration of IoT has the potential to transform conventional libraries into smart libraries. However, there are some challenges that Bangladeshi university libraries must overcome to take use of the prospects emerged from IoT.

Research limitations/implications

The study would encourage Bangladeshi librarians adopting IoT-based library and information services and provide guidelines for its successful implementation.

Originality/value

The study is a pioneering effort from Bangladesh’s perspective which portrays the original opinions and perceptions of library practitioners regarding IoT applications in university libraries of Bangladesh.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

101

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 January 2020

Sabine Khalil and Maksim Belitski

This paper aims to investigate the role of dynamic capabilities in the Information Technology (IT) Governance view framework and explores the relationship between three domains of…

2177

Abstract

Purpose

This paper aims to investigate the role of dynamic capabilities in the Information Technology (IT) Governance view framework and explores the relationship between three domains of IT governance (Strategy, Management and Operations) and firm performance.

Design/methodology/approach

In this study, the authors used a mixed methods approach and using a survey instrument and its validation with interviews, to collect data from 134 successful European SMEs in the multi-country setting of Belgium, Bulgaria, Denmark, Spain and the UK.

Findings

The findings show that various IT governance mechanisms function as dynamic capabilities and are directly associated with firm performance. The impact of each mechanism is different.

Originality/value

This study highlights the relationship between IT governance acumens and organisational performance. It contributes to the field of IT Governance Framework in management, and the results may be generalisable to wider economies and different organisation types.

Details

European Business Review, vol. 32 no. 2
Type: Research Article
ISSN: 0955-534X

Keywords

Article
Publication date: 2 November 2018

Teck Ming Tan, Jari Salo, Jouni Juntunen and Ashish Kumar

The study aims to investigate the psychological mechanism that motivates consumers to pay more for a preferred brand that reflects their actual or ideal self-concept, by examining…

2600

Abstract

Purpose

The study aims to investigate the psychological mechanism that motivates consumers to pay more for a preferred brand that reflects their actual or ideal self-concept, by examining the shift in attention between consumer’s present, future, and past moments.

Design/methodology/approach

First, in a survey setting, the study identifies the relationship between temporal focus and self-congruence. Subsequently, we conduct three experiments to capture the effects of temporal focus on brand preference and willingness to pay (WTP). In these experiments, we manipulate consumers’ self-congruence and temporal focus.

Findings

The findings show that consumers with a present focus (distant future and distant past foci) tend to evaluate a brand more preferably when the brand serves to reflect their actual (ideal) selves. However, in the absence of present focus consumers’ WTP is more for a brand that reflects their ideal selves.

Research limitations/implications

The study does not have an actual measure on consumers’ WTP; instead we use single-item measure.

Practical implications

This study sheds new light on branding strategy. The results suggest that authentic and aspirational branding strategies are relevant to publicly consumed products. Brand managers could incorporate consumers’ temporal focus into branding strategy that could significantly influence consumer preference and WTP for their brands.

Originality/value

This study expands our understanding of brand usage imagery congruity by showing that temporal focus is an important determinant of self-congruence. In this regard, this study empirically investigates the relationship of temporal focus, self-congruence, brand preference, and WTP. It further reveals that mere brand preference does not necessarily lead consumers to pay more for symbolic brands.

Details

European Journal of Marketing, vol. 53 no. 1
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 18 September 2023

Maria Elisavet Balta, Thanos Papadopoulos and Konstantina Spanaki

This paper aims to draw on the Dynamic Capabilities View to discuss how small and medium enterprises (SMEs) use digital technologies to develop digital capabilities that will…

Abstract

Purpose

This paper aims to draw on the Dynamic Capabilities View to discuss how small and medium enterprises (SMEs) use digital technologies to develop digital capabilities that will enable them to change their current business model and trajectory, that is, to pivot-within turbulent environments, and subsequently to survive and grow.

Design/methodology/approach

The authors collected and analysed qualitative data from 26 SMEs in South-East England that have used digital technologies to pivot during the pandemic. The data was collected via in-depth semi-structured interviews. The authors analysed the data by creating first-order concepts, second-order themes, and aggregating dimensions.

Findings

The findings suggest that (1) digital technologies enable pivoting by facilitating the creation of the following digital capability types: “digital sensing”, “digital seizing” and “digital transforming”; (2) Each of these digital capability types is underpinned by micro-foundations (sub-capabilities) and shaped by the digital culture of the organisation. (3) these capabilities are triggered by the turbulent environment and the existing digital technologies, and are shaped by the digital culture.

Originality/value

The authors contribute to the literature of digital entrepreneurship as the authors illustrate (1) how the micro-foundations of digital capabilities, as facilitated by digital technologies, assist pivoting; and (2) the process from key activities during pivoting to second-order themes that represent micro-foundations to digital (dynamic) capabilities for pivoting in turbulent environments. The study highlights the importance of digital pivoting for businesses in the UK Southeast that have many aspirations for growth and innovation, whilst striving to address multiple challenges including digital divide and literacy, inflation and cost of living crisis, as well as supply chain issues.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 30 no. 2/3
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 29 March 2021

Ramaraj Palanisamy and Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…

500

Abstract

Purpose

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?

Design/methodology/approach

These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.

Findings

The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.

Research limitations/implications

The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.

Practical implications

The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.

Social implications

Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.

Originality/value

This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 18 January 2013

Soebhaash Dihal, Harry Bouwman, Mark de Reuver, Martijn Warnier and Christer Carlsson

The purpose of this conceptual paper is to explore the meaning of cloud computing for mobile communication. The paper answers the question “what is mobile cloud computing?” and

3102

Abstract

Purpose

The purpose of this conceptual paper is to explore the meaning of cloud computing for mobile communication. The paper answers the question “what is mobile cloud computing?” and how is it related to the generic cloud computing concept?

Design/methodology/approach

This is an explanatory conceptual paper, based on literature review and exploring potential use cases, focused on the use of mobile cloud for service, platform or infrastructure access. The authors exclude the discussion of the traditional cloud concept in back office processes of telecom operators, and service providers.

Findings

Where cloud computing is focused on pooling of resources, mobile technology is focused on pooling and sharing of resources locally enabling alternative use cases for mobile infrastructure, platforms and service delivery. The paper discusses relevant concepts and offers examples of use cases.

Research limitations/implications

The value of mobile cloud solutions is not yet explicit, but needs further attention. Research should focus on the relation between mobile cloud computing, platforms and eco systems. From a user perspective the willingness to share pooled resources needs further attention.

Practical implications

Mobile cloud computing offers the possibility that disruptive applications might impact the mobile eco system; reinforcing or weakening business models of core players like handset providers, telecom operators, and service providers.

Originality/value

A lot of attention is paid to cloud computing and to platform discussions, papers on mobile cloud are scarce. This paper offers the current state of the art and a research outlook.

1 – 10 of over 2000