Search results

1 – 10 of 15
Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 September 2021

Hamid Reza Nikkhah and Rajiv Sabherwal

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC…

Abstract

Purpose

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.

Design/methodology/approach

This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).

Findings

This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.

Originality/value

With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 30 October 2023

Ali Balapour, Rajiv Sabherwal and Varun Grover

Mobile apps usually have a short lifespan, and this prevents the majority from surviving long enough to generate revenue for their developers. To address this issue, this study…

Abstract

Purpose

Mobile apps usually have a short lifespan, and this prevents the majority from surviving long enough to generate revenue for their developers. To address this issue, this study aims to recognize the role of engagement and immersion and develops a cognitive-affective theoretical framework to associate these factors with the lifespan of an app. Moreover, the authors focus on gaming apps because of their dominance on mobile platforms, and because a few of them become lucrative while the majority perish within a few weeks.

Design/methodology/approach

This study uses a longitudinal survey-based approach to collect data on one of the popular gaming apps (Pokémon Go), which received international attention. The design focuses on identifying factors that extend the lifespan of the app and affects users’ decision to continue or stop using the app over time. The authors use the survival analysis and structural equation modeling to analyze the theoretical framework.

Findings

The authors find the centrality of the users’ experience of immersion to extend the mobile app lifespan. Engagement influences immersion and immersion predicts users’ decision to continue or stop using the app. Users’ experience of immersion increases the probability of the apps’ survival by 12%.

Originality/value

To the best of the authors’ knowledge, this is the only study that proposes a theoretical framework, meticulously investigates the factors that can lead to survival of a mobile app and uses longitudinal data for the empirical analysis.

Details

Journal of Systems and Information Technology, vol. 25 no. 4
Type: Research Article
ISSN: 1328-7265

Keywords

Abstract

Details

Review of Marketing Research
Type: Book
ISBN: 978-0-7656-1305-9

Article
Publication date: 1 May 1986

Margaret A. Stroup

How familiar is the lament, “It wasn't our plans that went wrong, it was our underlying assumptions.” Each year, planners carefully integrate products, cost of goods sold…

Abstract

How familiar is the lament, “It wasn't our plans that went wrong, it was our underlying assumptions.” Each year, planners carefully integrate products, cost of goods sold, marketplace tactics, and earnings results into superbly constructed plans. Then the realization dawns that the whole structure was built on a base of false assumptions — or that major factors were completely missed. And suddenly the plans are worth less than the paper they're written on.

Details

Planning Review, vol. 14 no. 5
Type: Research Article
ISSN: 0094-064X

Article
Publication date: 3 February 2021

Jamil Anwar, S.A.F. Hasnu, Irfan Butt and Nisar Ahmed

The purpose of this paper is to find out the most influential journals, articles, authors and the subject areas where Miles and Snow typology is used. The study identifies the…

1963

Abstract

Purpose

The purpose of this paper is to find out the most influential journals, articles, authors and the subject areas where Miles and Snow typology is used. The study identifies the opportunities for future research as well.

Design/methodology/approach

Review is based on 196 journal articles selected through a systematic and rigorous search process from the four databases: ProQuest, Business Source Complete, Willy and Science Direct. Total Citation, threshold citations, fractional citation and citation per year techniques are used for analyses.

Findings

Strategic Management Journal (SMJ), Academy of Management Journal (AMJ) and Journal of Marketing (JOM) are the most influential Journals. The most influential and prolific articles on the subject are from Hambrick (1983), Conant et al. (1990), Doty et al. (1993), Sabherwal et al. (2001), Desarbo et al. (2005) and Fiss (2011). Management, strategic management and marketing are the most studied subject areas.

Originality/value

Although there have been many reviews of the literature on this typology, the systematic review on Miles and Snow typology to find out the most influential journals, authors, articles and subject area has not been done before.

Details

Journal of Organizational Change Management, vol. 34 no. 2
Type: Research Article
ISSN: 0953-4814

Keywords

Open Access
Article
Publication date: 12 July 2023

Nicola Cobelli and Emanuele Blasioli

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management…

1105

Abstract

Purpose

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management. Furthermore, this study aims to provide an overview of the existing resources in healthcare management and education and other developing interdisciplinary fields.

Design/methodology/approach

This work uses bibliometric analysis to conduct a comprehensive review to map the use of the unified theory of acceptance and use of technology (UTAUT) and the unified theory of acceptance and use of technology 2 (UTAUT2) research models in healthcare academic studies. Bibliometric studies are considered an important tool to evaluate research studies and to gain a comprehensive view of the state of the art.

Findings

Although UTAUT dates to 2003, our bibliometric analysis reveals that only since 2016 has the model, together with UTAUT2 (2012), had relevant application in the literature. Nonetheless, studies have shown that UTAUT and UTAUT2 are particularly suitable for understanding the reasons that underlie the adoption and non-adoption choices of eHealth services. Further, this study highlights the lack of a multidisciplinary approach in the implementation of eHealth services. Equally significant is the fact that many studies have focused on the acceptance and the adoption of eHealth services by end users, whereas very few have focused on the level of acceptance of healthcare professionals.

Originality/value

To the best of the authors’ knowledge, this is the first study to conduct a bibliometric analysis of technology acceptance and adoption by using advanced tools that were conceived specifically for this purpose. In addition, the examination was not limited to a certain era and aimed to give a worldwide overview of eHealth service acceptance and adoption.

Details

The TQM Journal, vol. 35 no. 9
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 8 November 2022

Ernesto Tavoletti and Vas Taras

This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).

Abstract

Purpose

This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).

Design/methodology/approach

Using a systematic literature review approach, it identifies all articles in the Web of Science from 1999 to 2021 that include the term GVTs (in the title, the abstract or keywords) and finds 175 articles. The VOSviewer software was applied to analyze the bibliometric data.

Findings

The analysis revealed three dialogizing research clusters in the GVTs literature: a pioneering management information systems and organizational cluster, a general management cluster and a growing international management and behavioural studies cluster. Furthermore, it highlights the most cited articles, authors, journals and nations, and the network of strong and weak links regarding co-authorships and co-citations. Additionally, this study shows a change in research patterns regarding topics, journals and disciplinary approaches from 1999 to 2021. Finally, the analysis illustrates the position and centrality in the network of the most relevant actors.

Practical implications

The findings can guide management practitioners, educators and researchers to the most meaningful clusters of publications on GVTs, and help navigate and make sense of the vast body of the available literature. The importance of GVTs has been growing in the past two decades, and Covid-19 has accelerated the trend.

Originality/value

This study provides an updated and comprehensive systematic literature review on GVTs. To the best of the authors’ knowledge, it is also the first systematic literature review and bibliometry on GVTs. It concludes by suggesting future research paths.

Details

Management Research Review, vol. 46 no. 8
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 14 March 2022

Shaobo Wei, Jinmei Yin and Wei Chen

Drawing on the dynamic capabilities theory, this paper proposes that supply chain (SC) strategies (i.e. the lean SC and agile SC strategies) will mediate the relationship between…

1037

Abstract

Purpose

Drawing on the dynamic capabilities theory, this paper proposes that supply chain (SC) strategies (i.e. the lean SC and agile SC strategies) will mediate the relationship between big data analytics (BDA) and SC performance. Furthermore, from the perspective of strategic alignment, this study hypothesizes that the effect of the SC strategy on SC performance is differently moderated by the information system (IS) strategy (i.e. the IS innovator and IS conservative strategies).

Design/methodology/approach

This study used 159 match-paired questionnaires collected from Chinese firms to empirically test the hypotheses.

Findings

Results show the positive direct and indirect impact of BDA on SC performance. Specifically, the lean and agile SC strategies mediate the relationship between BDA and SC performance. Furthermore, the results indicate that the IS innovator and IS conservative strategies differentially moderate the effect of the lean and agile SC strategies on SC performance. Specifically, the IS innovator strategy positively moderates the effect of the agile SC strategy on SC performance. By contrast, the IS conservative strategy positively moderates the effect of the lean SC strategy on SC performance but negatively moderates the effect of the agile SC strategy on SC performance.

Originality/value

This study provides a comprehensive understanding of how SC and IS strategies can help firms leverage BDA to improve SC performance.

Details

The International Journal of Logistics Management, vol. 33 no. 2
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 6 July 2015

Lew Sook-Ling, Maizatul Akmar Ismail and Yuen Yee-Yen

The purpose of this paper is to propose an inclusive research model to overcome the single perspective issues of the previous research which were looking at either on knowledge…

2346

Abstract

Purpose

The purpose of this paper is to propose an inclusive research model to overcome the single perspective issues of the previous research which were looking at either on knowledge management (KM) activity, information technology (IT) applications or information infrastructure capability (IIC) independently.

Design/methodology/approach

This paper reviewed and categorised five knowledge management (KM) frameworks: first, KM foundation studies; second, resource-based view studies; third, IIC studies; fourth, competitive advantage (CA) studies; fifth, organisational information processing theory studies to propose research model. Case studies based on face-to-face interviews were conducted to empirically analyse the proposed research model.

Findings

An inclusive research model was suggested to redress the key limitation of past studies in this research field.

Research limitations/implications

Since Asian countries are at present heading for the creation of a knowledge economy, the present study is important to assist government and researchers to develop the most suitable information infrastructure for effective KM in the organisation. The research model proposed by the present study can also become a key reference to the governments and researchers in other developing countries towards the creation of knowledge economy.

Practical implications

The model proposed by the present study will help organisations to examine the performance of their current information infrastructure towards developing new business processes, techniques and decisions for effective KM in the organisations.

Originality/value

The present study is one of the pioneer studies that integrating important IICs such as the integrating capability, data management capability, security capability, utility capability and collaborating capability in the research framework to assist knowledge-based companies to enhance current KM practices and attain long-term CA.

Details

International Journal of Operations & Production Management, vol. 35 no. 7
Type: Research Article
ISSN: 0144-3577

Keywords

1 – 10 of 15