Search results

1 – 6 of 6
Book part
Publication date: 12 December 2015

Saleem Alhabash, Mengtian Jiang, Brandon Brooks, Nora J. Rifon, Robert LaRose and Shelia R. Cotten

The study examines how two types of trust – institutional and system trust – predict online banking intentions (OBI) as a function of generational cohort membership.

Abstract

Purpose

The study examines how two types of trust – institutional and system trust – predict online banking intentions (OBI) as a function of generational cohort membership.

Methodology/approach

The study uses a cross-sectional survey of 559 U.S. Amazon Mechanical Turk (MTurk) members using quota sampling from three generational groups: SGI (born before 1946), older boomer (born 1946–1954), and millennial (born 1977–1992).

Findings

Results showed generational cohort differences in system and institutional trust as well as OBI. Serial mediation model results showed the model where institutional trust precedes system trust best explains the relationship between generational cohort membership and OBI.

Research limitations

While diverse, the sample comprised of MTurk workers and relied on self-report measures of behavioral intentions, thus limiting the generalizability of our findings.

Implications

This study introduces two levels of e-trust into the technology acceptance literature and provides a guideline for financial institutions and system designers to understand the role of trust in driving online service adoption and use for different generations.

Originality/value

This study explores generational differences in technology use with special focus on older adults, which is yet to be fully explored in the literature. This study differentiates between two levels of e-trust and explores the order in which both trust types mediate the relationship between generational cohort membership and OBI.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78560-381-5

Keywords

Abstract

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78560-381-5

Content available
Book part
Publication date: 12 December 2015

Abstract

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78560-381-5

Book part
Publication date: 12 December 2015

Abstract

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78560-381-5

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 29 January 2020

Shivinder Nijjer and Sahil Raj

The high rate of internet penetration has led to the proliferation of social media (SM) use, even at the workplace, including academia. This research attempts to develop a…

Abstract

Purpose

The high rate of internet penetration has led to the proliferation of social media (SM) use, even at the workplace, including academia. This research attempts to develop a topology and thereby determine the dominant use motive for faculty’s use of SM.

Design/methodology/approach

In this two-part study, a two-stage research design has been adopted for topology development based on the application of Uses and Gratifications Theory. In the second part, the Technology Acceptance Model is applied to discern the dominant motive for SM use in academia.

Findings

The work is able to develop a seven-item topology, conforming to the basic three use motives, namely, hedonic, utilitarian and social. The work shows faculty attach more value to the instrumental utility of SM, while the hedonic function is also significant.

Practical implications

Discerning dominant motive implies that SM use at the workplace should not be banned, rather effective regulated use will instil the faculty to enhance work outcomes. The conceptualisation of topology for SM use in academia at the workplace can aid in designing an effective organisation policy, and design of an internal SM platform.

Originality/value

The study is unique towards topology development for academic faculty and has many important implications for management and academia, especially towards policy design for SM use at the workplace.

Details

Journal of Information, Communication and Ethics in Society, vol. 18 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

1 – 6 of 6