Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 6 March 2019

Betsy Stringam and John Gerdes

The purpose of this paper is to investigate how well hotel website load time performance compared against customer expectation benchmarks. In a competitive market, service…

6171

Abstract

Purpose

The purpose of this paper is to investigate how well hotel website load time performance compared against customer expectation benchmarks. In a competitive market, service interactions are important. As customers move to mobile devices, the time to load a website is a critical part of the service delivery. Long load times can lead to poor service experiences, customer frustration and lost business. Hotel website load times on both mobile and desktop devices were examined and compared to service expectations.

Design/methodology/approach

The study used an online service to assess and compare website load performance using both desktop and mobile devices for 259 international hotel company and sub-brand websites.

Findings

The time to load hotel websites was significantly slower on mobile devices compared to desktops. Load times on both platforms exceeded 3 s, which is considered best practice. Long load times represent a service gap and can cause dissatisfaction resulting in a potential customer abandoning the website for a competitor’s site, thus affecting sales.

Research limitations/implications

While the population for the study was robust in size and contained most of the major hotel companies worldwide, it was not exhaustive. Data also represent a snapshot and will change over time. Load times vary based on test location, access device and network traffic. Additionally, web page load times and customer expectations will change as technology evolves.

Originality/value

Increased use of mobile devices for hotel reservations increases the importance of mobile service delivery. This is the first known study to measure hotel website load times for mobile devices, and to examine both mobile and desktop performance against best practice. The results of this study highlight a service gap, which can lead to loss of business. Given the consistency of the results, the authors suspect that this is an issue that has not been recognized within the industry. This study is valuable because it exposes an issue of website design not generally addressed in the hospitality industry, even though tools are available to monitor site performance.

Details

International Hospitality Review, vol. 33 no. 1
Type: Research Article
ISSN: 2516-8142

Keywords

Abstract

Details

Library Hi Tech News, vol. 30 no. 1
Type: Research Article
ISSN: 0741-9058

Open Access
Article
Publication date: 6 September 2018

Nguyen Dong Phong, Nguyen Huu Khoi and Angelina Nhat-Hanh Le

Mobile shopping is the current trend for firms to conduct business, having great advantages over electronic shopping as well as traditional shopping. The purpose of this paper is…

8448

Abstract

Purpose

Mobile shopping is the current trend for firms to conduct business, having great advantages over electronic shopping as well as traditional shopping. The purpose of this paper is to discuss not only the driving forces of mobile shopping behaviors from the theory of reasoned action (TRA) perspective, but also the additional promotion and barrier sides of the mobile business.

Design/methodology/approach

A structural equation modeling approach with latent constructs is applied on a self-administered survey data of 208 Vietnamese consumers to test the hypotheses.

Findings

The results of this study have proved the predictive power of TRA in exploring consumer behavior in the context of mobile shopping. Also, both promotion and barrier variables have significantly strong impacts on the intention to adopt mobile shopping.

Research limitations/implications

Future studies would benefit from investigating other variables (e.g. specific aspects of trust and risk) and using actual behavior (e.g. online purchases).

Practical implications

Business managers should pay attention to both promotion and barrier factors to understand how and why Vietnamese consumers adopt mobile shopping.

Originality/value

This pioneering study adapts the TRA model with extended promotion and barrier variables to explain mobile shopping in the context of Vietnam.

Details

Journal of Asian Business and Economic Studies, vol. 25 no. 2
Type: Research Article
ISSN: 2515-964X

Keywords

Open Access
Article
Publication date: 16 July 2021

Karen Renaud and Jacques Ophoff

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…

5838

Abstract

Purpose

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.

Design/methodology/approach

In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.

Findings

The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.

Research limitations/implications

While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.

Practical implications

The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.

Originality/value

This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Content available
Article
Publication date: 3 August 2012

Lois Trapasso

144

Abstract

Details

Library Hi Tech News, vol. 29 no. 6
Type: Research Article
ISSN: 0741-9058

Open Access
Article
Publication date: 22 July 2020

Nsikak P. Owoh and M. Mahinderjit Singh

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…

2076

Abstract

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.

Details

Applied Computing and Informatics, vol. 18 no. 1/2
Type: Research Article
ISSN: 2210-8327

Keywords

Open Access
Article
Publication date: 14 July 2021

Molly Cooper, Yair Levy, Ling Wang and Laurie Dringus

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

1533

Abstract

Purpose

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

Design/methodology/approach

This study has three phases. The first phase included 32 subject matter experts that provided feedback toward a phishing alert and warning system. The second phase included development and a pilot study to validate a phishing alert and warning system prototype. The third phase included delivery of the Phishing Alert and Warning System (PAWSTM mobile app) to 205 participants. This study designed, developed, as well as empirically tested the PAWSTM mobile app that alerted and warned participants to the signs of phishing in emails on mobile devices.

Findings

The results of this study indicated audio alerts and visual warnings potentially lower phishing susceptibility in emails. Audiovisual warnings appeared to assist study participants in noticing phishing emails more easily and in less time than without audiovisual warnings.

Practical implications

This study's implications to mitigation of phishing emails are key, as it appears that alerts and warnings added to email applications may play a significant role in the reduction of phishing susceptibility.

Originality/value

This study extends the existing information security body of knowledge on phishing prevention and awareness by using audiovisual alerts and warnings to email recipients tested in real-life applications.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Content available
Article
Publication date: 1 December 2001

Magnus Ahlberg

161

Abstract

Details

Facilities, vol. 19 no. 13/14
Type: Research Article
ISSN: 0263-2772

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6197

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access

Abstract

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 10 no. 2
Type: Research Article
ISSN: 2077-5504

1 – 10 of over 1000