Search results
1 – 6 of 6Saleem Alhabash, Mengtian Jiang, Brandon Brooks, Nora J. Rifon, Robert LaRose and Shelia R. Cotten
The study examines how two types of trust – institutional and system trust – predict online banking intentions (OBI) as a function of generational cohort membership.
Abstract
Purpose
The study examines how two types of trust – institutional and system trust – predict online banking intentions (OBI) as a function of generational cohort membership.
Methodology/approach
The study uses a cross-sectional survey of 559 U.S. Amazon Mechanical Turk (MTurk) members using quota sampling from three generational groups: SGI (born before 1946), older boomer (born 1946–1954), and millennial (born 1977–1992).
Findings
Results showed generational cohort differences in system and institutional trust as well as OBI. Serial mediation model results showed the model where institutional trust precedes system trust best explains the relationship between generational cohort membership and OBI.
Research limitations
While diverse, the sample comprised of MTurk workers and relied on self-report measures of behavioral intentions, thus limiting the generalizability of our findings.
Implications
This study introduces two levels of e-trust into the technology acceptance literature and provides a guideline for financial institutions and system designers to understand the role of trust in driving online service adoption and use for different generations.
Originality/value
This study explores generational differences in technology use with special focus on older adults, which is yet to be fully explored in the literature. This study differentiates between two levels of e-trust and explores the order in which both trust types mediate the relationship between generational cohort membership and OBI.
Details
Keywords
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…
Abstract
Purpose
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.
Design/methodology/approach
A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.
Research limitations/implications
This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.
Originality/value
The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.
Details
Keywords
Shivinder Nijjer and Sahil Raj
The high rate of internet penetration has led to the proliferation of social media (SM) use, even at the workplace, including academia. This research attempts to develop a…
Abstract
Purpose
The high rate of internet penetration has led to the proliferation of social media (SM) use, even at the workplace, including academia. This research attempts to develop a topology and thereby determine the dominant use motive for faculty’s use of SM.
Design/methodology/approach
In this two-part study, a two-stage research design has been adopted for topology development based on the application of Uses and Gratifications Theory. In the second part, the Technology Acceptance Model is applied to discern the dominant motive for SM use in academia.
Findings
The work is able to develop a seven-item topology, conforming to the basic three use motives, namely, hedonic, utilitarian and social. The work shows faculty attach more value to the instrumental utility of SM, while the hedonic function is also significant.
Practical implications
Discerning dominant motive implies that SM use at the workplace should not be banned, rather effective regulated use will instil the faculty to enhance work outcomes. The conceptualisation of topology for SM use in academia at the workplace can aid in designing an effective organisation policy, and design of an internal SM platform.
Originality/value
The study is unique towards topology development for academic faculty and has many important implications for management and academia, especially towards policy design for SM use at the workplace.
Details