Search results

1 – 10 of 821
Article
Publication date: 11 June 2018

Cindy Zhiling Tu, Yufei Yuan, Norm Archer and Catherine E. Connelly

Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to…

1815

Abstract

Purpose

Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management. Applying a critical success factor (CSF) analysis approach, this paper aims to propose a CSF model based on a strategic alignment approach and test a model of the main factors that contributes to the success of information security management.

Design/methodology/approach

A theoretical model was proposed and empirically tested with data collected from a survey of managers who were involved in decision-making regarding their companies’ information security (N = 219). The research model was validated using partial least squares structural equation modeling approach.

Findings

Overall, the model was successful in capturing the main antecedents of information security management performance. The results suggest that with business alignment, top management support and organizational awareness of security risks and controls, effective information security controls can be developed, resulting in successful information security management.

Originality/value

Findings from this study provide several important contributions to both theory and practice. The theoretical model identifies and verifies key factors that impact the success of information security management at the organizational level from a strategic management perspective. It provides practical guidelines for organizations to make more effective information security management.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 31 August 2020

Qi Chen, Yufei Yuan, Yuqiang Feng and Norm Archer

Online dating services have been growing rapidly in recent years. However, adopting these services may involve high risk and trust issues among potential users toward both online…

2128

Abstract

Purpose

Online dating services have been growing rapidly in recent years. However, adopting these services may involve high risk and trust issues among potential users toward both online dating services and the daters they introduce to users. The purpose of this paper is to investigate how perceived benefits vs risks, and trust vs distrust affect user adoption vs non-adoption intentions toward using this rather controversial information and communications technology in the context of online dating.

Design/methodology/approach

Structural equation modeling was used to evaluate the research model using data from a survey of 451 single individuals.

Findings

The results indicated that perceived benefits play more essential roles in adoption, while perceived risks affect non-adoption more. Individuals' trust in online dating service predicts a major portion of the variation in user benefit perceptions, while distrust in online dating service and in daters that users might select significantly influence perceived risks. Moreover, benefit and risk perceptions can mediate the impacts of trust and distrust on both adoption and non-adoption decisions.

Originality/value

This study extends theories of decision-making in the use of controversial information technologies such as in the case of online dating. It investigates the coexistence of various trust and distrust beliefs as well as benefit and risk perceptions, and their different impacts on adoption and non-adoption in online dating services.

Article
Publication date: 31 December 2018

Mahmud Akhter Shareef, Yogesh K. Dwivedi, Norm Archer and Mohammad Mahboob Rahman

Stakeholders affiliated with healthcare services should understand patient attitudes and criteria that are involved in selecting a personal physician. The purpose of this paper is…

Abstract

Purpose

Stakeholders affiliated with healthcare services should understand patient attitudes and criteria that are involved in selecting a personal physician. The purpose of this paper is to identify the factors that are significant to patients in selecting or deselecting physicians as providers of healthcare services.

Design/methodology/approach

The research structure was set to theorize the physician selection criteria (PSC) model into two phases. The first phase developed a conceptual model as revealed from healthcare consumer perceptions. The second phase was designed to test and validate the model through cause–effect statistical analysis underpinned by theoretical explanations through an empirical study.

Findings

Through an empirical study of benchmarking perceptions of people from 15 different countries, qualitative PSC were gathered and used to formulate an initial PSC model. Based on the proposed model, a validity test was conducted, and finally, the PSC model was developed, resulting in several interesting and self-explanatory outcomes.

Research limitations/implications

The model was tested in only one (relatively cosmopolitan) city. For proper generalization, it should be tested in countries with differing healthcare service systems.

Practical implications

The results of this study are interesting, important and have potential values to academics and medical professionals. The study provides strong evidence that a physician’s external approach to patients is the most significant issue for patients seeking medical services. This does not refer to basic medical services, but rather the treatment process, where the physician’s behavior and positive attitude has the strongest effect on the patient’s decision to choose one physician over others.

Originality/value

Final PSC model has identified some significant theoretical explanations for academics and professional justifications for practitioners.

Details

Benchmarking: An International Journal, vol. 26 no. 1
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 12 July 2018

Yanni Liu, Dongsheng Liu, Yufei Yuan and Norm Archer

The purpose of this paper is to investigate users’ continuous adoption behaviors on mobile game playing from the perspective of situational habit formation.

1422

Abstract

Purpose

The purpose of this paper is to investigate users’ continuous adoption behaviors on mobile game playing from the perspective of situational habit formation.

Design/methodology/approach

Based on the literature research, a continuous adoption model for situational mobile game is proposed. And the research model is assessed based on data gathered from a sample of 226 mobile game players by employing the structural equation model methodology.

Findings

The results show that situational cues represented by availability, perceived ease of use and diversion lead to repeated performance that can be represented by flow experience and satisfaction in the situational mobile game playing context. But only flow experience and diversion influence continuous usage directly. Additionally diversion, as a critical situational variable, not only indirectly affects continuous usage intention through flow experience, but also directly affects continuous usage intention for situational mobile game playing.

Originality/value

Mobile game adoption has been studied from different perspectives, but most research is based on the technology acceptance model. They could not explain the common fact that young people tend to be highly motivated by mobile games and can be regarded as pro-active mobile game players, but many people play mobile games only when they are bored and need a diversion. So this study attempts to illustrate the phenomena to fill the gaps.

Details

Information Technology & People, vol. 31 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 December 2000

Norm Archer and Yufei Yuan

E‐commerce technologies provide effective and efficient ways in which corporate buyers can gather information rapidly about available P/S (products and services), evaluate and…

9417

Abstract

E‐commerce technologies provide effective and efficient ways in which corporate buyers can gather information rapidly about available P/S (products and services), evaluate and negotiate with suppliers, implement order fulfillment over communications links, and access post‐sales services. From the supplier side, marketing, sales, and service information is also readily gathered from customers. Building and maintaining customer relationships is the key to success in e‐commerce and, unless service is maintained, customer loss may result, more than offsetting any cost efficiencies due to introducing e‐commerce technology. Since the core of e‐commerce is information and communications, support for managing customer relationships is available to those who know how to use it. Discusses how technology can be used to encourage and facilitate customer‐business relationships. Shows through a customer relationship life cycle model how the management of related procurement functions in customer companies can adjust to take advantage of these relationships.

Details

Internet Research, vol. 10 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 December 2000

Fang Wang, Milena Head and Norm Archer

Electronic commerce has existed in the business‐to‐business marketplace since the 1970s, in forms such as electronic data interchange (EDI) and electronic funds transfer (EFT)…

5060

Abstract

Electronic commerce has existed in the business‐to‐business marketplace since the 1970s, in forms such as electronic data interchange (EDI) and electronic funds transfer (EFT). With the emergence of the Internet, and the World Wide Web in particular, electronic commerce entered a new era which opened the door for an electronic business‐to‐consumer marketplace. Although the retail side of electronic commerce is still in its infancy, the Web medium offers great potential for building the customer‐base, promoting sales, and improving after‐sales service. Examines the concept of relationship marketing, which has caused a paradigm shift in business‐to‐business marketing during recent years. Extends the concepts of network marketing to the Web retail marketplace, and develops a market process model for Web retailing that outlines the stages of the relationship building process.

Details

Internet Research, vol. 10 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 December 2000

Susan Sproule and Norm Archer

Software agents are computer programs that run in the background and perform tasks autonomously as delegated by the user. Although there has been much research on this topic…

4037

Abstract

Software agents are computer programs that run in the background and perform tasks autonomously as delegated by the user. Although there has been much research on this topic recently, usable software agents are at an early stage of development, and are only now starting to appear in real applications. Typical of these early stages, there has been a technology focus, rather than a product focus, in much of the development work to date. A fruitful application area for software agents is in the area of e‐commerce, where potential buyers can easily be overwhelmed by the flood of information that is available, thus potentially making less than optimal purchasing decisions. This paper blends models from marketing and learnings from the field of decision support systems to build a framework for the design of software agents to support in e‐commerce buying applications.

Details

Internet Research, vol. 10 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 26 July 2019

Chloé Adler and Carole Lalonde

The purpose of this paper is to synthesize a body of research addressing changes in academic identity brought on by neo-liberal university management while proposing a new…

Abstract

Purpose

The purpose of this paper is to synthesize a body of research addressing changes in academic identity brought on by neo-liberal university management while proposing a new interpretation based on the institutional work theory and a relational approach to agency.

Design/methodology/approach

The authors analyzed 19 qualitative empirical studies regarding the impact of new public management policies on academic identity within universities from different countries to support a qualitative meta-synthesis.

Findings

The meta-synthesis established a classification of work identity and self-identity that reflects variable but globally difficult experiences with the universities’ neo-liberal management. The results also indicate that, paradoxically, academics contribute to the perpetuation of managerialism through protection strategies and institutional maintenance work while acknowledging their painful effects on their identity. Despite the control and monitoring measures put in place by university administrations, academics have assumed a pragmatic approach to identity by using the prevailing spaces of autonomy and engaging in constant self-questioning. Those involved could make better use of these free spaces by adopting projective agency, that is by expanding the areas of support, collaboration and creativity that, by their own admission, make up the academic profession.

Originality/value

This meta-synthesis sheds light on the limits of current academic identity research while advancing studies conducted on institutional work, primarily by highlighting the type of agency used by actors during institutional change; at a practical level, this research promotes discussion on the manner in which academics could use their agency and reflexive skills by pushing their institutional work surrounding identity recreation further.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 15 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Content available
Article
Publication date: 2 October 2007

Norm Archer

320

Abstract

Details

Journal of Enterprise Information Management, vol. 20 no. 5
Type: Research Article
ISSN: 1741-0398

Article
Publication date: 1 January 2012

Norm Archer

The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.

5276

Abstract

Purpose

The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.

Design/methodology/approach

Using survey data, this paper models the relationship between past experience of consumers and their levels of concern, and derives the principal components that make up consumer behaviours.

Findings

The components are physical prevention measures, account monitoring, agency monitoring, password security, and risky behaviour avoidance. These components were found to be almost orthogonal, implying that consumers tend to “buy into” a particular component of behaviour. The proposed model of consumer behaviour, while statistically significant, did not have high predictive value.

Research limitations/implications

The survey data used were collected without reference to the model used in this paper, which limits the efficacy of the model.

Practical implications

Consumers use all the behaviours in one component without regard to other components. This can leave “holes” in consumer defence against identity theft and fraud. Consumer education on identity theft and fraud needs to stress that consumers need to employ all behaviours that can minimise risk and loss.

Originality/value

This paper puts forward an initial model of consumer behaviours as it relates to identity theft and fraud. The derivation of the orthogonal components of behaviour is a new and important finding.

Details

Journal of Financial Crime, vol. 19 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 821