Search results

1 – 10 of 369
Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 December 2023

Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…

Abstract

Purpose

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.

Design/methodology/approach

This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.

Findings

The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.

Research limitations/implications

Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.

Practical implications

The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.

Social implications

This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.

Originality/value

This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…

Abstract

Purpose

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.

Design/methodology/approach

A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.

Findings

The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.

Research limitations/implications

This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.

Practical implications

This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.

Social implications

The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.

Originality/value

This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 11 December 2023

Shamima Yesmin and Md. Atikuzzaman

This study aims to investigate the usability of a public university website for measuring its efficiency, users’ satisfaction or anxiety while searching for and retrieving…

Abstract

Purpose

This study aims to investigate the usability of a public university website for measuring its efficiency, users’ satisfaction or anxiety while searching for and retrieving information through different devices.

Design/methodology/approach

A task-based approach was adopted for the study. Twenty-eight participants were asked to complete 11 information-searching tasks on the website. The participants were divided into two groups. The tasks were carried out by members of each group, using desktop and mobile devices in a rotating fashion. Volunteers observed the participants' actions and recorded information regarding their productivity, time usage (using a timer), satisfaction or annoyance while performing each task. Finally, based on the use of the devices, a comparison was established between the participants' performance accuracy, efficiency and anxiety.

Findings

The study provides an overview of a task-based user experience carried out on the university website using a combination of qualitative and quantitative research methods. According to the results, participants' satisfaction levels were generally high, and their anxiety levels were low while completing the tasks on a mobile device. In comparison to the desktop, it took less time overall to complete all tasks. On the other hand, using a desktop computer (97.1%) resulted in better task completion success rates for participants than using a mobile device (85.7%).

Originality/value

No previous task-based evaluation study of this kind has been conducted to assess the usability of any university website in Bangladesh.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 21 February 2024

Mohd Hafiz Hanafiah, Muhammad Aliff Asyraff, Mohd Noor Ismawi Ismail and Juke Sjukriana

The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the…

Abstract

Purpose

The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the inter-relationship between Gen Z tourist’s perception of M-payment benefits, adoption behaviour, usage risk and future usage intention.

Design/methodology/approach

The sample comprised Malaysian Gen Z individuals (n = 326) who had experience using M-payment methods while travelling outbound. Given the complex nature of the model and the goal to predict and explain relationships within Gen Z's M-payment usage, partial-least square-structural equation modelling was used to assess the study framework and test the proposed relationships.

Findings

This study reveals significant influences on Gen Z tourists' behavioural intentions towards M-payment usage. Perceived benefits, performance expectancy, social influence and perceived trust positively impact behavioural intentions, while effort expectancy exhibits no significant effect. Furthermore, perceived trust is strongly influenced by perceived security, which also positively influences behavioural intentions. A mediated relationship is evident as trust mediating the effect of perceived security on behavioural intentions.

Research limitations/implications

This study’s findings contribute to understanding the intricate relationships influencing Gen Z's M-payment behaviour and underscore trust's pivotal role in mediating the security–behavioural intention relationship.

Originality/value

This study is among the first to consider Mental Accounting Theory and the Unified Theory of Acceptance and Use of Technology as crucial underpinning theories in comprehending the intricate relationships that influence Gen Z travellers' perceptions and behaviours concerning M-payment systems.

Details

Young Consumers, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 6 November 2023

Hoi Ching Cheung, Yan Yin Marco Lo, Dickson K.W. Chiu and Elaine W.S. Kong

This study examines academic librarians' perceptions and attitudes toward Internet of Things (IoT) applications in Hong Kong academic libraries and the problems and possible…

Abstract

Purpose

This study examines academic librarians' perceptions and attitudes toward Internet of Things (IoT) applications in Hong Kong academic libraries and the problems and possible improvements in using IoT technologies to strengthen library services.

Design/methodology/approach

This qualitative research used video conferencing software for semi-structured, one-on-one interviews. Participants were given introductory material about the IoT and asked to complete an interview. The data were analyzed using inductive theme clustering for this study.

Findings

The analysis identified three themes: perception about applying IoT technology to the library, problems and improvements in using IoT. Participants were generally optimistic about the potential benefits of IoT for improving library operations and providing personalized services. However, they also expressed concerns about privacy and security, errors and extra efforts for information literacy training. They suggested improvements such as incorporating facial recognition technology, advanced RFID technology and collections identification technology to enhance user experience.

Originality/value

Most studies examined users' views rather than librarians' on IoT applications, which few studies cover, especially in East Asia.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 16 April 2024

Lee Yen Chaw, Chun Meng Tang and Muhammad Ali

As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to…

Abstract

Purpose

As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to stay competitive. This study aims to investigate the relationship between users’ needs, users’ attitude towards mobile payment apps and users’ continuance intention to use mobile payment apps.

Design/methodology/approach

Following an exploratory sequential mixed methods research design, this study first conducted three focus groups in the qualitative phase to investigate issues or concerns faced by current users of mobile payment apps. The study then conducted an online questionnaire survey in the quantitative phase to collect responses from users of mobile payment apps. Partial least squares structural equation modelling was used to analyse 110 valid responses.

Findings

Findings show that usefulness (modelled as a second-order reflective construct consisting of three first-order reflective constructs, i.e. ease of use, acceptability and responsiveness), traceability and security had a statistically significant relationship with attitude towards mobile payment apps (which in turn had a statistically significant relationship with continuance intention to use mobile payment apps). It was also found that attitude towards mobile payment mediated the relationships between usefulness, traceability and security; and continuance intention to use mobile payment apps.

Practical implications

The findings of this study can help mobile payment app service providers and developers design apps that offer the functions and features that their users need.

Originality/value

Although some recent studies have investigated the adoption of mobile payments in the Malaysian context, few of these studies examined current users’ continuance intention to use mobile payment apps.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Open Access
Article
Publication date: 30 January 2024

Saleem ur Rahman, Bang Nguyen-Viet, Yen Thi Hoang Nguyen and Sohail Kamran

M-wallets have emerged as one of the most important financial innovations of the 21st century, enabling users to carry digital cash by securely storing payment methods on their…

2041

Abstract

Purpose

M-wallets have emerged as one of the most important financial innovations of the 21st century, enabling users to carry digital cash by securely storing payment methods on their mobile devices. However, the continued use of m-wallets varies among people for several reasons. This study used the technology continuation theory (TCT), gamification and trust factors to examine the variables affecting consumers' intentions to continue using mobile wallets.

Design/methodology/approach

The SmartPLS partial least squares software was used to analyze data from 431 m-wallet users in Vietnam using the structural equation modeling technique.

Findings

The data revealed that the research model can predict users' intentions to continue using mobile wallets. TCT constructs demonstrated strong exploratory power in explaining consumer satisfaction and attitudes towards m-wallets. Furthermore, the study confirmed the direct effect of the perceived effectiveness of gamification on perceived ease of use and attitude, as well as its indirect effect on consumers' continued use intentions of mobile wallets via attitude. In addition, the trust negatively influenced consumers' intentions to continue using m-wallets.

Practical implications

The findings of this study can help researchers, practitioners and policymakers improve m-wallet design, development and adoption, as well as advance financial technology and define the future of digital payments in terms of consumer attraction, engagement and financial inclusion.

Originality/value

Based on TCT theory, this study enriches m-wallet research by examining two important factors, gamification and trust, and thus provides insights into how to improve consumers’ intentions to continue using m-wallets in developing countries. This study offers timely insights into theory and practice regarding these factors. It therefore paves the way for researchers and practitioners to learn how easy, enjoyable and secure the end-user experience should be to keep users engaged with m-wallets.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 26 February 2024

Himanshu Joshi and Deepak Chawla

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in…

Abstract

Purpose

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in mobile wallets enhances user trust (TR), attitude (ATT) and intention (INT). Using a multiple and serial mediation model, both TR and ATT were found to mediate the relationship between PS and BI.

Design/methodology/approach

Drawing on the stimulus-organism-response (S-O-R) theory, the proposed conceptual model comprises PS, TR, ATT and BI. An online survey was conducted with a cross-sectional sample of 744 mobile wallet users in India. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the hypothesized relationships and test the mediation effects.

Findings

Results show that the stimulus, PS, has a positive and significant influence on TR and ATT, which eventually has a positive influence on BI. The research model explains 64.4 percent of the variance in BI. Further, both TR and ATT independently and parallelly mediate the relationship PS and BI. Lastly, gender is found to moderate the relationship between TR and BI and ATT and BI.

Practical implications

The research showed the importance of PS, TR and ATT towards mobile wallet adoption INTs. Further, the findings support the idea that developing TR and ATT is essential for shaping INTs. This suggests that mobile wallet service providers should invest in methods that not just enhance user TR but also reinforce a positive ATT towards the platform. To demonstrate TR, mobile wallet providers must ensure the confidentiality and privacy of user data, keep customer interests in mind and fulfill commitments. Lastly, for strengthening customer TR, excellent customer support is extremely important.

Originality/value

While prior researchers have majorly used technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT) models to explain adoption INTs, this study examines the relationship between PS, TR, ATT and BI through the lens of the SOR framework.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Access

Year

Last 6 months (369)

Content type

Earlycite article (369)
1 – 10 of 369