Search results
1 – 10 of 664With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have…
Abstract
Purpose
With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have received more and more attention. However, most of the existing research focuses on investigating the application of theories to explain consumer behavior related to intention to use and adopt IVAs, while ignoring the impact of its privacy issues on consumer resistance. This article especially examines the negative impact of artificial intelligence-based IVAs’ privacy concerns on consumer resistance, and studies the mediating effect of perceived creepiness in the context of privacy cynicism and privacy paradox and the moderating effect of anthropomorphized roles of IVAs and perceived corporate social responsibility (CSR) of IVAs’ companies. The demographic variables are also included.
Design/methodology/approach
Based on the theory of human–computer interaction (HCI), this study addresses the consumer privacy concerns of IVAs, builds a model of the influence mechanism on consumer resistance, and then verifies the mediating effect of perceived creepiness and the moderating effect of anthropomorphized roles of IVAs and perceived CSR of IVAs companies. This research explores underlying mechanism with three experiments.
Findings
It turns out that consumers’ privacy concerns are related to their resistance to IVAs through perceived creepiness. The servant (vs. partner) anthropomorphized role of IVAs is likely to induce more privacy concerns and in turn higher resistance. At the same time, when the company’s CSR is perceived high, the impact of the concerns of IVAs’ privacy issues on consumer resistance will be weakened, and the intermediary mechanism of perceiving creepiness in HCI and anthropomorphism of new technology are further explained and verified. The differences between different age and gender are also revealed in the study.
Originality/value
The research conclusions have strategic reference significance for enterprises to build the design framework of IVAs and formulate the response strategy of IVAs’ privacy concerns. And it offers implications for researchers and closes the research gap of IVAs from the perspective of innovation resistance.
Details
Keywords
Efrosini Siougle, Sophia Dimelis and Nikolaos Malevris
This study explores the link between ISO 9001 certification, personal data protection and firm performance using financial balance sheet and survey data. The security aspect of…
Abstract
Purpose
This study explores the link between ISO 9001 certification, personal data protection and firm performance using financial balance sheet and survey data. The security aspect of data protection is analyzed based on the major requirements of the General Data Protection Regulation and mapped to the relevant controls of the ISO/IEC 27001/27002 standards.
Design/methodology/approach
The research analysis is based on 96 ISO 9001–certified and non-certified publicly traded manufacturing and service firms that responded to a structured questionnaire. The authors develop and empirically test their theoretical model using the structural equation modeling technique and follow a difference-in-differences econometric modeling approach to estimate financial performance differences between certified and non-certified firms accounting for the level of data protection.
Findings
The estimates indicate three core dimensions in the areas of “policies, procedures and responsibilities,” “access control management” and “risk-reduction techniques” as desirable components in establishing the concept of data security. The estimates also suggest that the data protection level has significantly impacted the performance of certified firms relative to the non-certified. Controlling for the effect of industry-level factors reveals a positive relationship between data security and high-technological intensity.
Practical implications
The results imply that improving the level of compliance to data protection enhances the link between certification and firm performance.
Originality/value
This study fills a gap in the literature by empirically testing the influence of data protection on the relationship between quality certification and firm performance.
Details
Keywords
Abdul Moid, M. Masoom Raza, Mohammad Javed and Keshwar Jahan
Records are current documents containing crucial personal, legal, financial and medical information, while archives house non-current documents with the same details. This study…
Abstract
Purpose
Records are current documents containing crucial personal, legal, financial and medical information, while archives house non-current documents with the same details. This study specifically aims to measure existing research in records and archives management with various scientific indicators.
Design/methodology/approach
Data extraction was conducted using the Web of Science, resulting in a data set of 2003 records for further analysis. Biblioshiny and VOSviewer have been used for mapping and visualization of the extracted data.
Findings
Managing and organizing this essential information is equally vital to maintaining records and archives. The findings encompass various aspects such as publications and citations, influential authors, source impact factors, relevant articles, affiliations, co-authorship trends across the top 10 countries and regions, references, publication year spectroscopy, keyword co-occurrence and historiography. The study concludes that medical records management prominently dominates the selected research area.
Originality/value
The study reflects the advancements in management systems and continues to emerge as research on the management of records and archives has gained significance.
Details
Keywords
M. Omar Parvez, Kayode Kolawole Eluwole and Taiwo Temitope Lasisi
This study aims to investigate tourists’ intentions to use hotel service robots with a focus on safety and hygiene. It examines the impact of perceived safety, health awareness…
Abstract
Purpose
This study aims to investigate tourists’ intentions to use hotel service robots with a focus on safety and hygiene. It examines the impact of perceived safety, health awareness and service assurance on consumer engagement and robot usage.
Design/methodology/approach
Survey data from 275 participants with experience in robotic service were analyzed using structural equation modeling (SEM). The study used purposive sampling and collected data via the Prolific platform, using SEM and SmartPLS Ver. 3.0 for analysis.
Findings
Results indicate customers prioritize safety and hygiene, valuing effective service responses and cleanliness. Perceived robotic safety and service assurance positively influence personal engagement, with a preference for service robots among female guests.
Research limitations/implications
While emphasizing the importance of safety and service assurance in hotel robotics, the study acknowledges limitations in personalization and conclusive use of service robots.
Originality/value
This research contributes to understanding the role of perceived safety in service robot usage, highlighting the significance of user trust and comfort in human–robot interactions. It also explores the novel connection between service assurance and service robots, offering insights into robotic performance reliability in user-centric contexts.
Details
Keywords
Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…
Abstract
Purpose
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.
Design/methodology/approach
The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.
Findings
The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).
Originality/value
This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.
Details
Keywords
Niki Chatzipanagiotou, Anita Mirijamdotter and Christina Mörtberg
This paper aims to focus on academic library managers’ learning practices in the context of cooperative work supported by computational artefacts. Academic library managers’…
Abstract
Purpose
This paper aims to focus on academic library managers’ learning practices in the context of cooperative work supported by computational artefacts. Academic library managers’ everyday work is mainly cooperative. Their cooperation is supported predominantly by computational artefacts. Learning how to use the computational artefacts efficiently and effectively involves understanding the changes in everyday work that affect managers and, therefore, it requires deep understanding of their cooperative work practices.
Design/methodology/approach
Focused ethnography was conducted through participant observations, interviews and document analysis. Ten managers from a university library in Sweden participated in the research. A thematic method was used to analyse the empirical material. Computer supported cooperative work (CSCW) and work-integrated learning was used as the conceptual lens.
Findings
Five learning practices were identified: collaboration, communication, coordination, decision-making processes and computational artefacts’ use. The findings show that learning is embedded in managers’ cooperative work practices, which do not necessarily include sufficient training time. Furthermore, learning was intertwined with cooperating and was situational. Managers learned by reflecting together on their own experiences and through joint cooperation and information sharing while using the computational artefacts.
Originality/value
The main contribution lies in providing insights into how academic library managers learn and cooperate in their everyday work, emphasizing the role of computational artefacts, the importance of the work context and the collective nature of learning. It also highlights the need for continual workplace learning in contemporary knowledge work environments. Thus, the research generates contributions to the informatics field by extending the understanding of managers’ work-integrated learning in their everyday cooperative work practices supported by computational artefacts’ use. It also contributes to the intersection of CSCW and work-integrated learning.
Details
Keywords
Lisana Lisana and Yonathan Dri Handarkho
This study aims to investigate the influence of environmental factors on individual personality traits associated with mobile paymens (MP) adoption using the technological…
Abstract
Purpose
This study aims to investigate the influence of environmental factors on individual personality traits associated with mobile paymens (MP) adoption using the technological personal environment (TPE) theory as a framework for the proposed theoretical model.
Design/methodology/approach
A total of 736 feedback from respondents was used to validate the proposed model using structural equation modeling. The model comprises Trust and Self-efficacy to explain MP adoption from a personal trait perspective. Meanwhile, environmental aspects are represented by social influence, vendor regulations and network externalities.
Findings
The result indicates that self-efficacy has the most significant direct effect on user intention to use MP, followed in decreasing order of significance by social influence, trust, vendor regulations and network externalities. Furthermore, social influence is the most contributing aspect from the environmental area that influences user intention directly and indirectly through trust and self-efficacy as mediators. Meanwhile, the moderating effect analysis also found that gender moderates the effect of user self-efficacy on MP adoption.
Originality/value
This study fills the gap by comparing trust and self-efficacy and exploring how those factors are developed and affected by the environmental aspect of MP usage. It was discovered that self-efficacy was the most influential construct influencing the adoption of MP. Social influence was identified as the primary environmental factor that directly impacts user intention regarding MP usage. Furthermore, gender was shown as a moderator, as males place a higher value on self-efficacy as a factor affecting their intention to embrace MP in comparison to females.
Details
Keywords
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…
Abstract
Purpose
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.
Design/methodology/approach
Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.
Findings
Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.
Originality/value
This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.
Details
Keywords
Hamed Ahmadinia, Jannica Heinström, Kristina Eriksson-Backa and Shahrokh Nikou
This research paper aims to delve into the perceptions of health susceptibility among Iranian, Afghan and Tajik individuals hailing from asylum-seeking or refused asylum-seeking…
Abstract
Purpose
This research paper aims to delve into the perceptions of health susceptibility among Iranian, Afghan and Tajik individuals hailing from asylum-seeking or refused asylum-seeking backgrounds currently residing in Finland, Norway and Sweden.
Design/methodology/approach
Semi-structured interviews were conducted between May and October 2022 involving a sample size of 27 participants. An adapted framework based on the health belief model along with previous studies served as a guide for formulating interview questions.
Findings
Notably influenced by cultural background, religious beliefs, psychological states and past traumatic experiences during migration journeys – before arrival in these countries till settling down – subjects’ perception of health concerns emerged significantly shaped. Additionally impacting perspectives were social standing, occupational status, personal/family medical history, lifestyle choices and dietary preferences nurtured over time, leading to varying degrees of influence upon individuals’ interpretation about their own wellness or illness.
Practical implications
Insights garnered throughout the authors’ analysis hold paramount significance when it comes to developing targeted strategies catering culturally sensitive health-care provisions, alongside framing policies better aligned with primary care services tailored explicitly around singular demands posed by these specific communities dwelling within respective territories.
Originality/value
This investigation represents one among few pioneering initiatives assessing perceptions regarding both physical and mental well-being within minority groups under examination across Nordic nations, unveiling complexities arising through intersecting factors like individual attributes mingling intricately with socio-cultural environments, thereby forming unique viewpoints towards health-care belief systems prevalent among such population segments.
Details
Keywords
Eiman Almheiri, Mostafa Al-Emran, Mohammed A. Al-Sharafi and Ibrahim Arpaci
The proliferation of smartwatches in the digital age has radically transformed health and fitness management, offering users a multitude of functionalities that extend beyond mere…
Abstract
Purpose
The proliferation of smartwatches in the digital age has radically transformed health and fitness management, offering users a multitude of functionalities that extend beyond mere physical activity tracking. While these modern wearables have empowered users with real-time data and personalized health insights, their environmental implications remain relatively unexplored despite a growing emphasis on sustainability. To bridge this gap, this study extends the UTAUT2 model with smartwatch features (mobility and availability) and perceived security to understand the drivers of smartwatch usage and its consequent impact on environmental sustainability.
Design/methodology/approach
The proposed theoretical model is evaluated based on data collected from 303 smartwatch users using a hybrid structural equation modeling–artificial neural network (SEM-ANN) approach.
Findings
The PLS-SEM results supported smartwatch features’ effect on performance and effort expectancy. The results also supported the role of performance expectancy, social influence, price value, habit and perceived security in smartwatch usage. The use of smartwatches was found to influence environmental sustainability significantly. However, the results did not support the association between effort expectancy, facilitating conditions and hedonic motivation with smartwatch use. The ANN results further complement these outcomes by showing that habit with a normalized importance of 100% is the most significant factor influencing smartwatch use.
Originality/value
Theoretically, this research broadens the UTAUT2 by introducing smartwatch features as external variables and environmental sustainability as a new outcome of technology use. On a practical level, the study offers insights for various stakeholders interested in smartwatch use and their environmental implications.
Details