Search results
1 – 10 of over 1000Betsy Stringam and John Gerdes
The purpose of this paper is to investigate how well hotel website load time performance compared against customer expectation benchmarks. In a competitive market, service…
Abstract
Purpose
The purpose of this paper is to investigate how well hotel website load time performance compared against customer expectation benchmarks. In a competitive market, service interactions are important. As customers move to mobile devices, the time to load a website is a critical part of the service delivery. Long load times can lead to poor service experiences, customer frustration and lost business. Hotel website load times on both mobile and desktop devices were examined and compared to service expectations.
Design/methodology/approach
The study used an online service to assess and compare website load performance using both desktop and mobile devices for 259 international hotel company and sub-brand websites.
Findings
The time to load hotel websites was significantly slower on mobile devices compared to desktops. Load times on both platforms exceeded 3 s, which is considered best practice. Long load times represent a service gap and can cause dissatisfaction resulting in a potential customer abandoning the website for a competitor’s site, thus affecting sales.
Research limitations/implications
While the population for the study was robust in size and contained most of the major hotel companies worldwide, it was not exhaustive. Data also represent a snapshot and will change over time. Load times vary based on test location, access device and network traffic. Additionally, web page load times and customer expectations will change as technology evolves.
Originality/value
Increased use of mobile devices for hotel reservations increases the importance of mobile service delivery. This is the first known study to measure hotel website load times for mobile devices, and to examine both mobile and desktop performance against best practice. The results of this study highlight a service gap, which can lead to loss of business. Given the consistency of the results, the authors suspect that this is an issue that has not been recognized within the industry. This study is valuable because it exposes an issue of website design not generally addressed in the hospitality industry, even though tools are available to monitor site performance.
Details
Keywords
Nguyen Dong Phong, Nguyen Huu Khoi and Angelina Nhat-Hanh Le
Mobile shopping is the current trend for firms to conduct business, having great advantages over electronic shopping as well as traditional shopping. The purpose of this paper is…
Abstract
Purpose
Mobile shopping is the current trend for firms to conduct business, having great advantages over electronic shopping as well as traditional shopping. The purpose of this paper is to discuss not only the driving forces of mobile shopping behaviors from the theory of reasoned action (TRA) perspective, but also the additional promotion and barrier sides of the mobile business.
Design/methodology/approach
A structural equation modeling approach with latent constructs is applied on a self-administered survey data of 208 Vietnamese consumers to test the hypotheses.
Findings
The results of this study have proved the predictive power of TRA in exploring consumer behavior in the context of mobile shopping. Also, both promotion and barrier variables have significantly strong impacts on the intention to adopt mobile shopping.
Research limitations/implications
Future studies would benefit from investigating other variables (e.g. specific aspects of trust and risk) and using actual behavior (e.g. online purchases).
Practical implications
Business managers should pay attention to both promotion and barrier factors to understand how and why Vietnamese consumers adopt mobile shopping.
Originality/value
This pioneering study adapts the TRA model with extended promotion and barrier variables to explain mobile shopping in the context of Vietnam.
Details
Keywords
Karen Renaud and Jacques Ophoff
There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…
Abstract
Purpose
There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.
Design/methodology/approach
In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.
Findings
The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.
Research limitations/implications
While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.
Practical implications
The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.
Originality/value
This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.
Details
Keywords
Nsikak P. Owoh and M. Mahinderjit Singh
The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…
Abstract
The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.
Details
Keywords
Molly Cooper, Yair Levy, Ling Wang and Laurie Dringus
This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.
Abstract
Purpose
This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.
Design/methodology/approach
This study has three phases. The first phase included 32 subject matter experts that provided feedback toward a phishing alert and warning system. The second phase included development and a pilot study to validate a phishing alert and warning system prototype. The third phase included delivery of the Phishing Alert and Warning System (PAWSTM mobile app) to 205 participants. This study designed, developed, as well as empirically tested the PAWSTM mobile app that alerted and warned participants to the signs of phishing in emails on mobile devices.
Findings
The results of this study indicated audio alerts and visual warnings potentially lower phishing susceptibility in emails. Audiovisual warnings appeared to assist study participants in noticing phishing emails more easily and in less time than without audiovisual warnings.
Practical implications
This study's implications to mitigation of phishing emails are key, as it appears that alerts and warnings added to email applications may play a significant role in the reduction of phishing susceptibility.
Originality/value
This study extends the existing information security body of knowledge on phishing prevention and awareness by using audiovisual alerts and warnings to email recipients tested in real-life applications.
Details
Keywords
Abstract
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords