Search results
1 – 10 of over 31000Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
Mélissa Fortin, Erica Pimentel and Emilio Boulianne
This study explores how introducing a permissioned blockchain in a supply chain context impacts accountability relationships and the process of rendering an account. The authors…
Abstract
Purpose
This study explores how introducing a permissioned blockchain in a supply chain context impacts accountability relationships and the process of rendering an account. The authors explore how implementing a digital transformation impacts the governance of network transactions.
Design/methodology/approach
The authors mobilize 28 interviews and documentary analysis. The authors focus on early blockchain adopters to get an insight into how implementing a permissioned blockchain can transform information sharing, coordination and collaboration between business partners, now converted into network participants.
Findings
The authors suggest that implementing a permissioned blockchain impacts accountability across three levers, namely through the ledger, through the code and through the people, where these levers are interconnected. Blockchains are often valued for their ability to enable transparency through the visibility of transactions, but the authors argue that this is an incomplete view. Rather, transparency alone does not help to satisfy a duty of accountability, as it can result in selective disclosure or obfuscation.
Originality/value
The authors extend the conceptualizations of accountability in the blockchain literature by focusing on how accountability relationships are enacted, and accounts are rendered in a permissioned blockchain context. Additionally, the authors complement existing work on accountability and governance by suggesting an integrated model across three dimensions: ledger, code and people.
Details
Keywords
This paper aims to investigate the motivating and dissuading factors, which develop consumers’ attitude towards permission based marketing.
Abstract
Purpose
This paper aims to investigate the motivating and dissuading factors, which develop consumers’ attitude towards permission based marketing.
Design/methodology/approach
A conceptual model is proposed and validated by following the various studies on mobile and email marketing. A survey of 325 respondents was conducted in the Mumbai city, out of which 271 survey questionnaires were deemed fit for analysis, representing 83.38 per cent response rate. The researcher has used structural equation modelling to test the causal relationships among the constructs.
Findings
The results of the study indicate that increase in personal relevant messages, perceived monetary incentives and perceived entertainment increases consumers’ attitude towards permission based marketing, whereas increase in perceived registration effort decreases consumers’ attitude towards permission based marketing. Furthermore, contrary to the existing literature, perceived consumer empowerment, perceived intrusiveness and perceived privacy issues have no significant relationship with the attitude towards permission marketing. The findings are based on a particular region in India, so it may be different from previous studies.
Research limitations/implications
The study uses a self-reported measure to collect the data through email, and a printed copy of the questionnaire was circulated. Also, the method of sample selection was not random. These two aspects could limit the generalizability of the results.
Practical implications
The research can assist the companies going for promotions through mobile and internet. It provides important findings, which can help them to formulate better promotional strategies.
Originality/value
Fewer research studies have been done to examine the motivating and dissuading factors developing consumers’ attitude towards permission based marketing, therefore, the present research is conducted. After intensely reviewing the available literature, the factors were carefully chosen.
Details
Keywords
Fatim Bamba and Stuart J. Barnes
This study aims to examine the phenomenon of consumers' willingness to give permission to receive short message service (SMS) advertisements. The purpose of this research is…
Abstract
Purpose
This study aims to examine the phenomenon of consumers' willingness to give permission to receive short message service (SMS) advertisements. The purpose of this research is threefold: to better understand the phenomenon of consumers' willingness to give permission to receive text message (SMS) advertisements, to provide empirical data that supports our understanding, and to develop and test a basic model of consumers' willingness to give permission to receive SMS advertisements.
Design/methodology/approach
The study utilised a multi‐method research approach with both qualitative and quantitative data – via focus group and scenario‐based survey.
Findings
The results show that even if the relevance of the advertisement is high it does not on its own make consumers give permission; it needs to be combined with the control over opt‐in conditions to assure consumers and gain permission. Regarding brand familiarity, this appears to have little impact on consumers' willingness to give permission to receive SMS advertisements. The opt‐in conditions valued the most are: the possibility to withdraw at any time, personal data disclosure only with consent, and mobile phone operators as a primary advertising filter.
Originality/value
The principal contribution of the paper is in furthering our understanding of the concept of permission as related to the emerging topic of SMS advertising. The paper provides evidence and data triangulation in an area that so far has had little empirical investigation.
Details
Keywords
Goran Sladić, Branko Milosavljević, Dušan Surla and Zora Konjović
The goal of this paper is to propose a data access control framework that is used for editing MARC‐based bibliographic databases. In cases where the bibliographic record editing…
Abstract
Purpose
The goal of this paper is to propose a data access control framework that is used for editing MARC‐based bibliographic databases. In cases where the bibliographic record editing activities carried out in libraries are complex and involve many people with different skills and expertise, a way of managing the workflow and data quality is needed. Enforcing access control can contribute to these goals.
Design/methodology/approach
The proposed solution for data access control enforcement is based on the well‐studied standard role‐based access control (RBAC) model. The bibliographic data, for the purpose of this system, is represented using the XML language. The software architecture of the access control system is modelled using the Unified Modelling Language (UML).
Findings
The access control framework presented in this paper represents a successful application of concepts of role‐based access control to bibliographic databases. The use of XML language for bibliographic data representation provides the means to integrate this solution into many different library information systems, facilitates data exchange and simplifies the software implementation because of the abundance of available XML tools. The solution presented is not dependent on any particular XML schema for bibliographic records and may be used in different library environments. Its flexibility stems from the fact that access control rules can be defined at different levels of granularity and for different XML schemas.
Research limitations/implications
This access control framework is designed to handle XML documents. Library systems that utilise bibliographic databases in other formats not easily convertible to XML would hardly integrate the framework into their environment.
Practical implications
The use of an access control enforcement framework in a bibliographic database can significantly improve the quality of data in organisations where record editing is performed by a large number of people with different skills. The examples of access control enforcement presented in this paper are extracted from the actual workflow for editing bibliographic records in the Belgrade City Library, the largest public city library in Serbia. The software implementation of the proposed framework and its integration in the BISIS library information system prove the practical usability of the framework. BISIS is currently deployed in over 40 university, public, and specialized libraries in Serbia.
Originality/value
A proposal for enforcing access control in bibliographic databases is given, and a software implementation and its integration in a library information system are presented. The proposed framework can be used in library information systems that use MARC‐based cataloguing.
Details
Keywords
Chanaka Jayawardhena, Andreas Kuckertz, Heikki Karjaluoto and Teemu Kautonen
This paper's aim is to develop a conceptual model to examine the influence of four antecedent factors (personal trust, institutional trust, perceived control and experience) on…
Abstract
Purpose
This paper's aim is to develop a conceptual model to examine the influence of four antecedent factors (personal trust, institutional trust, perceived control and experience) on consumers' willingness to participate in permission‐based mobile marketing. The model is to be tested empirically across three European countries and gender.
Design/methodology/approach
Data are collected from surveys of consumers in Finland, Germany and the UK. The partial least squares (PLS) approach is utilised to test the model fit.
Findings
The main factor affecting the consumers' decision to participate in mobile marketing is institutional trust, which is a significant factor in all three countries and across gender. The influence of other antecedent factors are less pronounced. On the whole, it is found that the more experienced consumers become with mobile marketing, the less influence perceived control will have on permission. There are notable variations across gender, with perceived control being an important determinant of permission for men, while it is not so for women.
Research implications/limitations
The results indicate the relative importance of four antecedents in the likelihood of consumers giving their permission to companies to send mobile marketing messages.
Practical implications
As institutional trust is the most important determinant of permission based mobile marketing, mobile marketers should focus on building a strong and positive media presence and image, and thereby influence consumers' likelihood of giving permission to mobile‐based marketing.
Originality/value
This is the first international empirical investigation of the different antecedents of permission‐based mobile marketing.
Details
Keywords
Mark A. Harris and Amita G. Chin
This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by…
Abstract
Purpose
This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by Google.
Design/methodology/approach
Risky app permissions and in-app purchases (IAP) from Google’s top developers and traditional developers were investigated in several Google Play top app categories, including Editor’s Choice apps. Analysis was performed between categories and developer types.
Findings
Overall, Google’s top developers’ apps request more risky permissions and IAP than do traditional developers. Other results indicate that free apps are more dangerous than paid apps and star ratings do not signify safe apps.
Research limitations/implications
Because of a limited number of Google’s top developers and Editor’s Choice apps, conclusions are drawn from a small sample of apps and not the entire market.
Practical implications
Google’s top developers’ apps are suited well for increasing revenue for Google and developers at the consumer’s expense. Consumers should be wary of top developer trust badges.
Social implications
As the lure for “top free” and “top developer” software is strong among consumers, this research contributes to societal welfare in that it makes consumers aware that Google top developer app trust badges and free apps are more dangerous than traditional developer and paid apps, as they request risky permissions at a much higher frequency. Therefore, consumers should be very careful when downloading apps that are advertised as “top free” or “top developer”.
Originality/value
Google’s top developers’ apps and Editors’ Choice apps have not been investigated from the perspective of permissions and IAP before.
Details
Keywords
Phumisak Smutkupt, Donyaprueth Krairit and Do Ba Khang
The purpose of this paper is to investigate the impact of SMS (Short Message Service) advertising on consumer perceptions of Au Bon Pain's brand equity in Thailand.
Abstract
Purpose
The purpose of this paper is to investigate the impact of SMS (Short Message Service) advertising on consumer perceptions of Au Bon Pain's brand equity in Thailand.
Design/methodology/approach
The experimental study was based on a 4×2 between‐subjects design, with four levels of message types (personalization, interactivity, general, and no message control) and two levels of permission (with and without permission). Structural equation modeling was utilized to test the hypotheses.
Findings
SMS marketing is found to have a significant positive impact on brand awareness and perceived quality. Personalized, interactive, and general messages are effective for building brand awareness, and general and personalized messages positively influence perceived quality. With the right choice of message, explicit permission enhances the effects of SMS marketing on brand association.
Research limitations/implications
The experiment was conducted over a period of one month, with three SMS ads sent to each subject. Future research could extend the trial period and increase the number and variation of ads to confirm validity of the results.
Practical implications
As text message ads have a strong impact on brand awareness, marketers should focus on using text messages as reminders or updates rather than for complete marketing campaigns. They should also focus on offering permission‐based customers personalized information.
Originality/value
This is among the first mobile marketing experiments in a real‐life setting. Real text‐based promotions from an existing brand (Au Bon Pain) were tested on consumers. This approach creates a natural ad‐processing situation for participants, thus increasing the internal validity of the experiment.
Details
Keywords
Hsin Hsin Chang, Hamid Rizal and Hanudin Amin
The aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By…
Abstract
Purpose
The aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By examining different types of email (i.e. permission‐based email and spamming), the present study empirically tested the theoretical linkage between email advertising values, perceived instrusiveness, and the attitudinal‐behavioural dispositions towards email advertising.
Design/methodology/approach
A survey was conducted using 221 respondents from Taiwan. Two scenarios were designed for the present study. The questionnaires were equally divided into two sets, with the first half containing a scenario depicting permission‐based email, and the other half containing a scenario describing a spamming email. Each respondent only received one set of the survey.
Findings
Results from a survey of 221 Internet users in Taiwan indicate that values and attitudes toward, and the perceived intrusiveness of, email advertising significantly affect consumers’ behavioral dispositions toward email advertising. The results suggest that permission‐based email is more effective as compared to spam email advertising. For solicited email, consumers perceived less intrusiveness if the email advertisement offered them financial incentives.
Research limitations/implications
The authors acknowledge four limitations in this study. These limitations however provide further direction for future studies in the discipline. The discussion of these limitations is provided.
Practical implications
Importantly, this study yields significant theoretical and managerial implications. Concerned with the context of email advertising, the authors’ work provides theoretical support for both constructs of advertising values and perceived intrusiveness as important. Concerned with the advertisers, this study renders important implications for better planning of marketing mix strategy using email.
Originality/value
This study provides new theoretical insights into factors influencing consumers’ acceptance of email advertising by incorporating perceived intrusiveness as a mediator in the relationship between advertising values and attitudinal‐behavioral dispositions. By empirically comparing the different types of email advertisements of permission‐based email and spamming, the present study also offers better understanding and extending of the current literature on email advertising research.
Details
Keywords
Mohamed E. Ibrahim and Ahmed Al Amiri
This paper examined engineers’ satisfaction with services of a building permission unit at a local municipality using a focus group, a questionnaire and follow‐up interviews…
Abstract
This paper examined engineers’ satisfaction with services of a building permission unit at a local municipality using a focus group, a questionnaire and follow‐up interviews. Obtained satisfaction indexes are reported. Differences in satisfaction levels were tested using parametric t‐tests and Kruskal‐Wallis non‐parametric tests according to engineer’s specialization, size of office and number of building projects submitted to the building permission unit. The results indicate no significant statistical differences in satisfaction levels based on specialization (civil engineers versus architectural engineers), size of the consulting office, or the number of projects submitted. However, satisfaction indexes were not high. They were about 60 per cent.
Details