Search results

1 – 10 of 48
Article
Publication date: 26 July 2023

Yupeng Mou and Xiangxue Meng

With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have…

Abstract

Purpose

With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have received more and more attention. However, most of the existing research focuses on investigating the application of theories to explain consumer behavior related to intention to use and adopt IVAs, while ignoring the impact of its privacy issues on consumer resistance. This article especially examines the negative impact of artificial intelligence-based IVAs’ privacy concerns on consumer resistance, and studies the mediating effect of perceived creepiness in the context of privacy cynicism and privacy paradox and the moderating effect of anthropomorphized roles of IVAs and perceived corporate social responsibility (CSR) of IVAs’ companies. The demographic variables are also included.

Design/methodology/approach

Based on the theory of human–computer interaction (HCI), this study addresses the consumer privacy concerns of IVAs, builds a model of the influence mechanism on consumer resistance, and then verifies the mediating effect of perceived creepiness and the moderating effect of anthropomorphized roles of IVAs and perceived CSR of IVAs companies. This research explores underlying mechanism with three experiments.

Findings

It turns out that consumers’ privacy concerns are related to their resistance to IVAs through perceived creepiness. The servant (vs. partner) anthropomorphized role of IVAs is likely to induce more privacy concerns and in turn higher resistance. At the same time, when the company’s CSR is perceived high, the impact of the concerns of IVAs’ privacy issues on consumer resistance will be weakened, and the intermediary mechanism of perceiving creepiness in HCI and anthropomorphism of new technology are further explained and verified. The differences between different age and gender are also revealed in the study.

Originality/value

The research conclusions have strategic reference significance for enterprises to build the design framework of IVAs and formulate the response strategy of IVAs’ privacy concerns. And it offers implications for researchers and closes the research gap of IVAs from the perspective of innovation resistance.

Article
Publication date: 5 March 2024

William Joseph Fassbender

This study builds on previous theoretical work that considered artificial intelligence (AI) and its potential for creating “teacher-centaurs” whose labor could be accelerated…

Abstract

Purpose

This study builds on previous theoretical work that considered artificial intelligence (AI) and its potential for creating “teacher-centaurs” whose labor could be accelerated through the use of generative AI (Fassbender, in review). The purpose of this paper is to use empirical methods to study centaur teachers and the division of labor (Durkheim, 1893/2013) that arise from outsourcing teaching tasks to AI.

Design/methodology/approach

Multiple case study (Stake, 2006) was used to collect data on two secondary English teachers who were early adopters of generative AI. Data included semi-structured interviews as well as ChatGPT chat logs, which helped in describing how teaching approaches evolved using AI technology.

Findings

Results showed that teachers used AI for planning, instruction and assessment. AI-augmented teaching practices allowed teachers to complete tasks with greater speed, which in turn increased stamina and short-term work–life balance. Given the novelty of AI, concerns about data privacy and academic integrity raised ethical questions.

Originality/value

ChatGPT’s rise to popularity in 2023 brought with it significant discussions about education, specifically how students would use AI primarily as a tool for plagiarism. This study takes a different focus, considering how early adoption of AI has begun changing teacher labor, offering implications for the future of the teaching profession.

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1056

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 25 May 2023

Suchismita Swain, Kamalakanta Muduli, Anil Kumar and Sunil Luthra

The goal of this research is to analyse the obstacles to the implementation of mobile health (mHealth) in India and to gain an understanding of the contextual inter-relationships…

Abstract

Purpose

The goal of this research is to analyse the obstacles to the implementation of mobile health (mHealth) in India and to gain an understanding of the contextual inter-relationships that exist amongst those obstacles.

Design/methodology/approach

Potential barriers and their interrelationships in their respective contexts have been uncovered. Using MICMAC analysis, the categorization of these barriers was done based on their degree of reliance and driving power (DP). Furthermore, an interpretive structural modeling (ISM) framework for the barriers to mHealth activities in India has been proposed.

Findings

The study explores a total of 15 factors that reduce the efficiency of mHealth adoption in India. The findings of the Matrix Cross-Reference Multiplication Applied to a Classification (MICMAC) investigation show that the economic situation of the government, concerns regarding the safety of intellectual technologies and privacy issues are the primary obstacles because of the significant driving power they have in mHealth applications.

Practical implications

Promoters of mHealth practices may be able to make better plans if they understand the social barriers and how they affect each other; this leads to easier adoption of these practices. The findings of this study might be helpful for governments of developing nations to produce standards relating to the deployment of mHealth; this will increase the efficiency with which it is adopted.

Originality/value

At this time, there is no comprehensive analysis of the factors that influence the adoption of mobile health care with social cognitive theory in developing nations like India. In addition, there is a lack of research in investigating how each of these elements affects the success of mHealth activities and how the others interact with them. Because developed nations learnt the value of mHealth practices during the recent pandemic, this study, by investigating the obstacles to the adoption of mHealth and their inter-relationships, makes an important addition to both theory and practice.

Details

International Journal of Industrial Engineering and Operations Management, vol. 6 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 2 December 2022

Makungu Meriot Chavalala, Surajit Bag, Jan Harm Christiaan Pretorius and Muhammad Sabbir Rahman

The cold supply chain industry is still emerging and digital transformation is in the nascent stage in this industry. This paper argues that there are various barriers to…

Abstract

Purpose

The cold supply chain industry is still emerging and digital transformation is in the nascent stage in this industry. This paper argues that there are various barriers to implementing blockchain technology in the cold supply chain and aims to develop and validate a model for overcoming key barriers to implementing blockchain technology in the cold supply chain.

Design/methodology/approach

The adoption of blockchain technology was proposed through interpretive structural modeling (ISM) and further it is validated using structural equation modeling (SEM).

Findings

In this study, ten key barriers to implementing blockchain technology in the cold supply chain were identified, modelled and analysed. Poor leadership style of top management was found to be the most important barriers to implementing blockchain technology in the cold supply chain. The results of SEM indicate that all the paths are supported. The findings showcase the barriers responsible for the lack of blockchain technology infrastructure that ultimately impacts the cold supply chains.

Practical implications

This study highlights the fact that the fate of blockchain technology infrastructure development depends on the leadership style of top management. Demonstrating good leadership style by top management can help overcome the barriers. A good leader pulls the entire team instead of pushing the team. A good leader can guide the entire team to improve IT governance, financial investment, digital footprint, digital readiness, skills and collaboration with service providers to implement blockchain technology. Not only that, a good leader provides mental strength to the team and helps overcome the fear of implementing blockchain in the cold supply chain. A good leader demonstrates good administrative skills and focus on security and privacy policies.

Originality/value

This is a novel contribution towards analysing the key barriers to implementing blockchain technology in the South African cold supply chain using the integrated ISM–MICMAC and SEM approach.

Details

Journal of Enterprise Information Management, vol. 37 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 12 October 2023

Shahriar Akter, Mujahid Mohiuddin Babu, Tasnim M. Taufique Hossain, Bidit Lal Dey, Hongfei Liu and Pallavi Singh

The main purpose of this study is to fill the research gap on how B2B global service firms integrate dynamic capabilities within their omnichannel management to influence positive…

Abstract

Purpose

The main purpose of this study is to fill the research gap on how B2B global service firms integrate dynamic capabilities within their omnichannel management to influence positive word of mouth (WOM), customer engagement (CE) and customer equity.

Design/methodology/approach

Drawing on the dynamic capability and WOM theories, a model has been developed that defines the subjects of the empirical test. The paper reports on data collected from 312 service-oriented global firms in Australia, through a cross-sectional survey. Data were analyzed using structural equation modeling.

Findings

The findings suggest that content management (i.e. information consistency, source trustworthiness and endorsement) and concerns management (i.e. privacy, security and recovery) capabilities are the two significant antecedents of positive WOM within a B2B omnichannel setting in international marketing. The findings also confirm the key mediating role of CE between positive WOM and customer equity.

Originality/value

The findings extend dynamic capability theory in the context of international marketing by linking WOM, CE and customer equity. The findings add further theoretical rigor by establishing the nomological chain between positive WOM and customer equity, in which CE plays a key mediating role.

Details

International Marketing Review, vol. 41 no. 1
Type: Research Article
ISSN: 0265-1335

Keywords

Article
Publication date: 12 July 2023

Sarthak Dhingra, Rakesh Raut, Angappa Gunasekaran, B. Koteswara Rao Naik and Venkateshwarlu Masuna

This paper aims to discover and analyze the challenges hampering blockchain technology’s (BT’s) implementation in the Indian health-care sector. A total of 18 challenges have been…

Abstract

Purpose

This paper aims to discover and analyze the challenges hampering blockchain technology’s (BT’s) implementation in the Indian health-care sector. A total of 18 challenges have been prioritized and modeled based on an extensive literature search and professional views.

Design/methodology/approach

An integrated multi-criteria decision-making approach has been used in two phases. Best worst method (BWM) is used in the first phase to prioritize the challenges with sensitivity analysis to validate the findings and eliminate a few challenges. In the second phase, interpretive structural modeling is applied to the remaining 15 challenges to obtain relative relationships among them with cross-impact matrix multiplication applied to classification analysis for their categorization.

Findings

The study’s results reveal that limited knowledge and expertise, cost and risk involved, technical issues, lack of clear regulations, resistance to change and lack of top management support are the top-ranked or high-intensity challenges according to the BWM. Interpretive structural modelling findings suggest that the lack of government initiatives has been driving other challenges with the highest driving power.

Research limitations/implications

This work has been conducted in the Indian context, so careful generalization of the results is needed.

Practical implications

This work will give health-care stakeholders a better perspective regarding blockchain’s adoption. It will help health-care stakeholders, service providers, researchers and policymakers get a glimpse of the strategies for eradicating mentioned challenges. The analysis will help reduce the challenges’ impact on blockchain’s adoption in the Indian health-care sector.

Originality/value

The adoption of BT is a novel concept, especially in developing countries such as India. This is one of the few works addressing the challenges to BT adoption in the Indian health-care sector.

Details

Journal of Modelling in Management, vol. 19 no. 2
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 28 February 2023

Zhisheng Chen

This study aims to explore the application scenarios of metaverse offices in organizations, including immersive work experiences, weak social networks and virtual meetings. Based…

Abstract

Purpose

This study aims to explore the application scenarios of metaverse offices in organizations, including immersive work experiences, weak social networks and virtual meetings. Based on the exploration of this application scenario, this study discusses four levels of organizational change that will be brought about by the future metaverse office, such as the inter-enterprise ecological collaboration model, distributed autonomous organization, flexible leadership and individual belongingness. The metaverse office has some special advantages over traditional office models, but the metaverse office still raises some issues, such as privacy, security, addiction, equity and usability. These issues brake the widespread adoption of metaverse technologies. The study recommends that researchers take these issues into account in future metaverse research and development.

Design/methodology/approach

This study surveys the relevant literature by means of a literature review in order to analyze how metaverse technology can be applied to teleworking. Two databases including Web of Science (https://www.webofscience.com/) and Google Scholar (http://scholar.google.com) were selected for this study. Keywords such as “teleworking and metaverse” were used, and 18 publications were found to be relevant to the study. After excluding duplicates, less relevant and older literature, only 14 articles could be used as references for this study. Based on the exploration of this application scenario, this study discusses four levels of organizational change and issues that will be brought about by the metaverse office of the future.

Findings

It presents the application scenarios of the metaverse office in organizations, including immersive work experience, weak social networking and virtual meetings.

Social implications

The pandemic triggers a desire for contactless working. The three main applications of the metaverse office also have a practical value which has been proven in some high-tech companies. It is foreseeable that an efficient, electronic and personalized office model will be enthusiastically adopted by society. Metaverse office will gradually step into people's view in the future.

Originality/value

The concept of the metaverse office has rarely been touched upon by theoretical research, although the technology is gradually becoming known. Even its application to teleworking has only recently been reached by some organizations.

Details

Kybernetes, vol. 53 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Access

Year

Last 3 months (48)

Content type

Article (48)
1 – 10 of 48