Search results

1 – 10 of over 34000
Article
Publication date: 11 January 2008

Yuan Chen and John M. Kamara

The purpose of this paper is to develop a model for the use of mobile computing in the management of on‐site construction information and communication.

4847

Abstract

Purpose

The purpose of this paper is to develop a model for the use of mobile computing in the management of on‐site construction information and communication.

Design/methodology/approach

The research strategy contains three steps: a pilot study for the first stage, a survey that investigated the information needs of particular users and the nature of on‐site information, and finally the development of a model and the validation and evaluation by operational scenarios.

Findings

The developed model explores how mobile computing can be used on construction sites to manage on‐site information. This model, firstly, identifies the key factors of mobile computer, wireless network, mobile application, construction personnel, construction information, and construction site; secondly it describes the relationships and interactions among these factors. Based on the model, the selection process for mobile computing strategy includes the clarification of information management process, the creations of overview for mobile computing solution, the identification of mobile computing strategy, and the selection of appropriate mobile computing technology.

Originality/value

The developed model explores the general concepts and the internal relationships at the two areas of mobile computing and construction site information management. The application of the model can help users to select mobile computing strategies for managing on‐site construction information based on the characteristics of their projects.

Details

Engineering, Construction and Architectural Management, vol. 15 no. 1
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 31 August 2012

Mehdi Nourbakhsh, Rosli Mohamad Zin, Javier Irizarry, Samaneh Zolfagharian and Masoud Gheisari

The purpose of this paper is to present the results of a study aimed at investigating the information requirements for broad use mobile applications for construction projects. It…

3459

Abstract

Purpose

The purpose of this paper is to present the results of a study aimed at investigating the information requirements for broad use mobile applications for construction projects. It also presents the results of usability testing of a mobile application prototype for improving information management in construction projects.

Design/methodology/approach

To achieve the research objectives, the information required to properly design the mobile application was collected by distributing an online questionnaire among construction professionals. Then a server‐based application prototype was developed based on enterprise content management concepts. The mobile application was tested in a laboratory by setting a group of construction management postgraduate students who had experience of working in the construction industry.

Findings

This study determines and ranks the critical on‐site information artifacts, considered highly important from the perspective of clients, consultants, and contractors. The study also illustrates the development of a mobile application prototype and results of a usability test. The test results demonstrate that the application is well designed, user friendly, and meets user requirements.

Practical implications

The results of this study are useful for developing a functional mobile application to manage on‐site information in construction projects.

Originality/value

The paper makes an original contribution by investigating information requirements of a mobile application for on‐site information management.

Details

Engineering, Construction and Architectural Management, vol. 19 no. 5
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 27 March 2020

Irfan Ali and Nosheen Fatima Warraich

The purpose of this study is to explore the relationship between mobile self-efficacy and personal information management (PIM) practices through mobile phones and smartphones…

1115

Abstract

Purpose

The purpose of this study is to explore the relationship between mobile self-efficacy and personal information management (PIM) practices through mobile phones and smartphones, and additionally, to explore the challenges of using a smart device for PIM.

Design/methodology/approach

This study followed Preferred Reporting Items for the Systematic Review and Meta-analysis (PRISMA) guidelines to achieve the objectives. A comprehensive search strategy, inclusion criteria and exclusion criteria were formulated in light of PRISMA guidelines. The data were collected from different scholarly repositories, databases and core journals of PIM. The studies were included after four steps, i.e. identification, screening, eligibility and inclusion of studies.

Findings

Findings revealed that there was a positive relationship between mobile self-efficacy and PIM via mobile phones. People used two techniques for finding and re-finding information via mobile phones/smartphones. These techniques include browsing and searching information. People send information, share with others and save in draft folders to emails in mobile phones/smartphones for keeping information for future use. They organize their personal information in folders and use different applications such as Evernote, Google Calendar, alarm and organizer. They uninstall and update mobile applications with new versions, clear phone call history and backup personal information to desktop devices and cloud services to maintain personal information. PIM via mobile phone/smartphone challenges were also identified. These challenges were classified as information related challenges, technical challenges, mobile phone adaptability challenges and miscellaneous challenges.

Originality/value

This study will help library professionals and decision makers to devise information literacy instruction programs according to the users' needs. The results of this study will also open new horizons for system designers to devise mobile-based PIM tools according to users' needs.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 15 November 2011

Rachael Lindsay, Thomas W. Jackson and Louise Cooke

In light of a growing trend towards mobile information management and a UK governmental drive for police forces to implement mobile technologies and realise significant benefits…

4067

Abstract

Purpose

In light of a growing trend towards mobile information management and a UK governmental drive for police forces to implement mobile technologies and realise significant benefits, it is important to examine the factors affecting officer acceptance. There appears to be little understanding of the key factors, yet this is critical to the success of the initiative. The purpose of this paper is to investigate the main factors that influence the usage of mobile technologies amongst police officers.

Design/methodology/approach

A qualitative, partially ethnographic design was followed to allow an in‐depth exploration of this issue. The study was based on a mixed‐methods longitudinal evaluation study of the implementation of mobile technologies within a UK police force over a nine‐month period. The technology acceptance model (TAM) and the subsequent TAM2 and TAM3, were then reengineered to provide a suitable theoretical model for a mobile policing context.

Findings

In total, four main categories of officer acceptance factors were identified: officer performance, security/reliability, management style and cognitive acceptance. Evidence from the study showed a key shortfall in all three versions of the TAM in that they focus on the user perspective and did not confirm the broader organisational factors within the implementation and social contexts of mobile policing.

Originality/value

Consequently, an adapted mobile‐TAM (m‐TAM) was produced that incorporated these factors into the existing TAM elements. The high‐level nature of the adapted model for mobile policing means it could be applied by other police forces and potentially other organisations, regardless of the type of mobile device implemented, to address the barriers to acceptance. The m‐TAM addresses the need for a more relevant and robust model to the mobile policing paradigm, which goes beyond the static technology environment in which the TAM2 and TAM3 were built.

Article
Publication date: 23 May 2023

Irfan Ali and Nosheen Fatima Warraich

Although, smartphones have facilitated users to keep their personal information, nonetheless, less has been investigated about factors affecting personal information management…

Abstract

Purpose

Although, smartphones have facilitated users to keep their personal information, nonetheless, less has been investigated about factors affecting personal information management (PIM) practices. Therefore, this study aims to investigate how personal innovativeness, perceived ease of use (PEOU) and mobile self-efficacy affect PIM (e.g. finding/re-finding, keeping, organizing and maintaining) practices.

Design/methodology/approach

Quantitative research design was used in this study. The authors collected data from 222 students of information management from public sector universities using a questionnaire. PLS modeling technique was used to analyze data.

Findings

The authors noted that personal innovativeness significantly impacts finding/refinding information, whereas it insignificantly affects keeping, organizing and maintaining information practices. In addition, smartphone PEOU significantly influences information finding and refinding, information keeping and organizing information, whereas insignificantly influences information maintaining. Moreover, mobile self-efficacy was noted to be significantly associated with finding and refinding information, information keeping, information organizing and information maintaining.

Originality/value

This research is an important contribution to the body of existing literature, as it proposed an integrated model based on constructs extracted from Technology Acceptance Model (TAM), Social Cognitive Theory, personal innovativeness and PIM. This study also has practical significance because the findings of this study would be helpful for smartphone application developers and LIS school directors to design programs for information literacy.

Article
Publication date: 6 February 2018

Yu-Yin Wang, Hsin-Hui Lin, Yi-Shun Wang, Ying-Wei Shih and Ssu-Ting Wang

Grounded on the value-based adoption model and innovation diffusion theory, this study examined consumer purchase decisions of mobile Global Positioning System (GPS) navigation…

2120

Abstract

Purpose

Grounded on the value-based adoption model and innovation diffusion theory, this study examined consumer purchase decisions of mobile Global Positioning System (GPS) navigation apps. In addition, this study also investigated the moderating role that perceived availability of free substitutes (PAFS) plays in the relationship between perceived value and purchase intention. The paper aims to discuss these issues.

Design/methodology/approach

Data collected from 219 mobile users were analyzed against the research model using the partial least squares approach.

Findings

The results showed that compatibility, relative advantage, perceived enjoyment, perceived cost (positively), and complexity (negatively) influenced these users’ value perceptions and purchase decisions. Furthermore, PAFS significantly weakened the positive relationship between perceived value and purchase intentions.

Practical implications

Based on these findings, the authors provide practical suggestions for mobile app developers to increase mobile app sales. This study also helps advance knowledge of mobile internet marketing.

Originality/value

This study is a pioneering effort in explaining consumer purchase intentions in the context of mobile GPS navigation app.

Article
Publication date: 4 October 2019

Kuo-Lun Hsiao, Kuan-Yu Lin, Yi-Ting Wang, Chun-Hsiung Lee and Zhe-Ming Zhang

In recent years, the ongoing development and rapid popularization of mobile devices, not only has brought new forms of lifestyle but also has boomed a wide array of service…

1946

Abstract

Purpose

In recent years, the ongoing development and rapid popularization of mobile devices, not only has brought new forms of lifestyle but also has boomed a wide array of service contents, allowing users to engage in entertainment, study and other daily activities, in addition to business transactions. To explore the factors that affect users' continued use of mobile app software, this paper aims to take into account the utilitarian value and privacy, as well as security factors and intends to propose an integrated research model based on the information systems success (ISS) model.

Design/methodology/approach

The data for this study were collected via an online survey questionnaire. A total of 190 valid responses were used to examine the hypotheses in the research model. The casual model was assessed using partial least squares techniques.

Findings

The results indicated that the three quality factors (information quality, system quality and service quality) in the ISS model significantly affected satisfaction and utilitarian value. Private and security have significant negative association with utilitarian value. The results also showed that private and security did not significantly affect satisfaction. The findings also provide some directions for further research.

Practical implications

The results show that user's continued use of mobile app software depends upon the perceived utilitarian value and satisfaction. The quality characteristics are the three critical factors that would affect the perceived utilitarian value and satisfaction. Compared to information quality and service quality, system quality has a higher degree of positive impact, which indicates that users are more concerned about the immediate download ability and ease-of-use provided by the system. Furthermore, the research also finds that privacy and security concerns have a negative influence on the utilitarian value, showing that in the context of task-oriented IS, the perceived risk of privacy and security during the process of using mobile app software services, will negatively affect users’ perception of utilitarian value. The insights provided by this study can help mobile app developers optimize design and marketing strategies.

Originality/value

This study provides a better understanding of how the factors in the theories influence the continuance usage intention of life style mobile applications.

Details

The Electronic Library, vol. 37 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 13 November 2007

Ragnar Schierholz, Lutz M. Kolbe and Walter Brenner

The bursting of the e‐bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. Business managers request detailed and…

6338

Abstract

Purpose

The bursting of the e‐bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. Business managers request detailed and thorough analyses prior to engaging in mobile initiatives. The paper aims to present a method, with which mobile business can be introduced to the customer relationship management (CRM) field.

Design/methodology/approach

The paper follows the design science paradigm as outlined by March and Smith, and Hevner et al.

Findings

The findings provide a framework for the definition of a mobile CRM strategy derived from the corporate strategy, suggest a method for the identification and exploitation of the mobilization potential in CRM processes in line with the strategy, and provide guidance for the design of mobile information systems to support these processes.

Research limitations/implications

The proposed method extends the body of available methods with a method for the introduction of mobile ISs into marketing, sales and service organizations. As design research, it does not strive for statistical generalization. The level of detail given in the elements of the method is to be increased in further research.

Practical implications

The method helps to reduce risk and uncertainty of mobile CRM initiatives, since it provides a structured and consistent procedure for the definition of goals, the identification of potentials for the fulfillment of these goals as well as recommendations for the systematic exploitation of these potentials.

Originality/value

With the application of this structured method, an organization should be able to avoid the pitfalls of technology‐driven information technology initiatives which various companies have experienced, particularly with mobile technologies.

Details

Business Process Management Journal, vol. 13 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 10 July 2017

Hao Chen and Wenli Li

Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and…

1810

Abstract

Purpose

Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software.

Design/methodology/approach

A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model.

Findings

Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool.

Practical implications

This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior.

Originality/value

This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 25 April 2023

Benjamin Jowett, David John Edwards and Mohamad Kassem

This study aims to develop a taxonomy of requirements for mobile BIM technologies (MBT), clarify the relating terms and concepts, and identify the interactions between MBT…

Abstract

Purpose

This study aims to develop a taxonomy of requirements for mobile BIM technologies (MBT), clarify the relating terms and concepts, and identify the interactions between MBT features and the construction management functions on sites.

Design/methodology/approach

A positivist approach with elements of interpretivism is adopted to allow to capture what is perceived as “reality” in relation to individuals’ interpretation and experience in the use and implementation of MBT. This is achieved by using a mixed qualitative-quantitative approach that can capture the various understandings of MBT. The research methods included a longitudinal case study over 12 months, two project workshops, expert interviews and an industry survey that together helped to investigate MBT at project, enterprise and industry levels.

Findings

The MBT requirements taxonomy included requirements relating to both project and organisation. Project requirements addressed MBT functionalities for sites and information management, while organisation requirements focused on the integration of MBT solutions with the enterprise from information technology, legal and security perspectives. A detailed matrix showing the interactions between five key MBT features and seven construction management functions was also developed.

Research limitations/implications

The two constructs developed by this study can help researchers to structure their investigation of key uses of MBT applications and their benefits. It can be used by researchers aiming to investigate integrated approaches to the digitalisation of construction sites, such as those enabled by Digital Twins. The interaction matrix can aid researchers in evaluating the intersections between the MBT functionalities and the site construction management functions (e.g. theoretical analysis of interactions from Lean Construction, benefit evaluation perspective). More broadly, the two constructs can support research and practice investigating the development of data-driven approaches on construction sites.

Practical implications

The developed MBT taxonomy can guide construction organisations in selecting suitable MBT for Field BIM for their projects. It can also act as a baseline against which varying MBT solutions can be compared.

Originality/value

Constructs such as taxonomies for MBTs; an understanding of MBT capabilities and use within the industry; and a lack of delineation between related terms, such as Mobile BIM, Field BIM, Site BIM, Cloud BIM and Mobile Apps, were lacking in the literature. This study contributed to addressing this gap.

Details

Construction Innovation , vol. 24 no. 1
Type: Research Article
ISSN: 1471-4175

Keywords

1 – 10 of over 34000