Search results

1 – 10 of 55
Article
Publication date: 20 June 2008

Robert J. Nathan, Paul H.P. Yeow and San Murugesan

This paper aims to report on a web usability study and to identify and prioritise key web interface usability factors (WIUFs) for web sites of 36 student‐related online services…

4191

Abstract

Purpose

This paper aims to report on a web usability study and to identify and prioritise key web interface usability factors (WIUFs) for web sites of 36 student‐related online services categorised into three groups: personal services, purchase services and study‐related web sites.

Design/methodology/approach

In this study, involving 400 student internet users (SIUs), 12,310 data points were collected and analysed using a multiple linear regression test. Seven WIUFs were tested: use of colour and font (UCF), use of graphics and multimedia (UGM), clarity of goals in web site (CGW), trustworthiness of web site (TOW), interactivity of web site (IOW), ease of web navigation (EWN), and download speed of web site (DSOW).

Findings

The study results reveal that every online service category has a different set of crucial WIUFs. SIUs' web usability preferences were compared with those of general internet users.

Research limitations/implications

The participants were all Malaysians; therefore, generalising the findings to all SIUs will require a confirmatory study with SIUs from other parts of the world.

Practical implications

Web developers can use the results to design usable web sites for specific online service categories.

Originality/value

The research offers a simpler alternative to measure web usability and to determine which WIUFs are crucial for a specific online service category with consideration of the users' role. This study overcomes some weaknesses of previous studies, i.e. small sample size, no consideration of product‐task relationship, no specific customer group and cumbersome procedures.

Details

Online Information Review, vol. 32 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 April 1993

MENGXIONG LIU

The use of bibliographic citation is a crucial aspect in the creation and dissemination of information. Numerous studies have been done ranging from simple citation counts to more…

Abstract

The use of bibliographic citation is a crucial aspect in the creation and dissemination of information. Numerous studies have been done ranging from simple citation counts to more complex bibliographic coupling studies, and from citation classifications to citation motivation studies. This review focusses on the citation studies that have explored the complexities and the underlying norms of the citation process. The major emphasis is placed upon the studies which have dealt with citation functions, citation quality, citation concepts and citation motivation. The international perspectives of citation practice are also discussed.

Details

Journal of Documentation, vol. 49 no. 4
Type: Research Article
ISSN: 0022-0418

Book part
Publication date: 28 July 2014

Theresa Bauer

Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance…

Abstract

Purpose

Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.

Methodology/approach

The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.

Findings

Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.

Research limitations/implications

The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.

Originality/value

Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.

Details

Communicating Corporate Social Responsibility: Perspectives and Practice
Type: Book
ISBN: 978-1-78350-796-2

Keywords

Article
Publication date: 23 August 2011

Nikleia Eteokleous

This study seeks to evaluate the application of a social‐virtual curriculum delivered through in‐classroom and web‐based activities, aiming to develop youth's social‐cultural…

1162

Abstract

Purpose

This study seeks to evaluate the application of a social‐virtual curriculum delivered through in‐classroom and web‐based activities, aiming to develop youth's social‐cultural skills, cultural competency and multicultural awareness. Specifically, the study evaluates the overall impact of the curriculum to the participating youth's Universality‐Diversity Orientation, diversity of contact, relativistic appreciation (RA) and comfort with differences. It examines the influence of gender, ethnicity and religion to the aforementioned variables. Finally, it aims to identify the role of the curriculum and the Web 2.0 in promoting multiculturalism and multicultural education and in changing youth's perceptions, and attitudes towards others.

Design/methodology/approach

A quantitative approach was applied, using the Miville‐Guzman Universality‐Diversity Scale that measures an individual's Universal‐Diverse Orientation. Descriptive (frequencies, percentages, means, standard deviations and Cronbach's alpha) and inferential (the independent t‐test, the paired‐sample t‐test and the one‐way analysis of variances) statistics were conducted. Questionnaires were given to 303 students. The pre‐measurement took place in April 2008 (70 per cent response rate) and the post‐measurement took place in June‐July 2009 (45 per cent response rate).

Findings

The study discusses the impact of the social‐virtual curriculum, the influence of gender, ethnicity and religion, the role of the social‐virtual curriculum and the Web 2.0 tools in promoting multiculturalism and multicultural education and in changing youth's beliefs, perceptions and attitudes towards others and the new learning, collaboration and communication culture established.

Originality/value

The study constitutes the foundation for further research to be conducted regarding the educational use of Web 2.0 tools, the in‐depth examination of the application of the educational networking within the school curriculum.

Details

Multicultural Education & Technology Journal, vol. 5 no. 3
Type: Research Article
ISSN: 1750-497X

Keywords

Article
Publication date: 8 May 2017

Qi Deng, Shaobo Ji and Yun Wang

As an enabler of environmental sustainability, Green information technology (IT) has become an emerging topic of interest in both academic and business communities. Despite its…

1115

Abstract

Purpose

As an enabler of environmental sustainability, Green information technology (IT) has become an emerging topic of interest in both academic and business communities. Despite its importance, confusions exist in the content and scope of Green IT practice. The purpose of this paper is to provide an overview of the current state of Green IT practice.

Design/methodology/approach

First 14 widely accepted Green IT practice topics were identified from prior research and a taxonomy was developed to categorize them. Using the content analysis method, these topics were examined in the sustainability reports of 30 IT companies in 2014 Fortune 500. A quantity–quality portfolio framework was developed and applied to measure and assess the Green IT practices of the selected samples.

Findings

Currently, the Green IT practice is still in its infancy. Both research and practice attention are now focusing on IT’s direct impacts and enabling impacts, while overlooking the systemic impacts, on natural environment. The possible reasons for the current state and the recommendations for future research and practice are provided.

Originality/value

Theoretically, this paper identified 14 widely accepted Green IT practice topics and developed a taxonomy for categorizing them. The taxonomy and topics provide a theoretical basis for future examination on Green IT practice-related issues. Practically, the findings of this paper provide guidelines for Green IT practice and directions for both Green IT developers and adopters in their decision-making.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 January 1981

BLAISE CRONIN

Metaphorically speaking, citations are frozen footprints in the landscape of scholarly achievement; footprints which bear witness to the passage of ideas. From footprints it is…

Abstract

Metaphorically speaking, citations are frozen footprints in the landscape of scholarly achievement; footprints which bear witness to the passage of ideas. From footprints it is possible to deduce direction; from the configuration and depth of the imprint it should be possible to construct a picture of those who have passed by, whilst the distribution and variety furnish clues as to whether the advance was orderly and purposive. So it is with citations in respect of the growth of human knowledge; they give substantive expression to the process of innovation, and, if properly marshalled, can provide the researcher with a forensic tool of seductive power and versatility.

Details

Journal of Documentation, vol. 37 no. 1
Type: Research Article
ISSN: 0022-0418

Article
Publication date: 5 June 2018

Praveen Choudhary, Monika Mital, Ashis Kumar Pani, Armando Papa and Francesca Vicentini

The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational…

Abstract

Purpose

The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational ambidexterity when using enterprise mobile systems (EMS). This study investigates the mediation role of business process customizability in the relationship between habitual use of EMS by individuals and organizational ambidexterity.

Design/methodology/approach

Over 150 possible respondent mobile phone users across 40 organizations in metropolitan National Capital Region (NCR) of Delhi with approximately were given the questionnaire. The data of a total of 121 NCR valid respondents aged between 22 and 49, after scrutinizing all collected questionnaires and removing those that had too many missing values or had the same answer to all questions, were used for analysis. The respondents were sampled from a research panel directory of a set of firms of the research firm hired for this survey.

Findings

The study finds complete mediation between the habitual use of EMS and organizational ambidexterity. Importantly, the empirical findings provide the research community with a deeper understanding of how EMS usage impacts organizational ambidexterity and individual’s UX locus of control.

Originality/value

It draws some newer areas of research with respect to interactions between enterprise mobile systems, business process customization due to enterprise mobile systems and organizational ambidexterity, which were hitherto unexplored.

Details

Business Process Management Journal, vol. 24 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1697

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 1 June 2005

Heng‐Li Yang and Jih‐Hsin Tang

To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of…

2144

Abstract

Purpose

To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of elicited requirements in web‐based information systems (WIS).

Design/methodology/approach

A lab experiment was designed and conducted to investigate the relationship between college students' elicited requirements for two WIS cases and their social networks.

Findings

The individual centrality in “information” networks has a significant positive relationship with the numbers of elicited “information” requirements and total requirements; however, the individual centrality in other social networks has no significant relationship with the number of the elicited requirements.

Research limitations/implications

The requirements collected from “key users” may account for most requirements, which is similar to the results predicted by Pareto's rule.

Practical implications

The origin of a WIS depends on a few influential users. These key users possess more power than others, and they define not only the “requirements” of the site but also its content or knowledge. The WIS designers may take advantage of this fact.

Originality/value

This paper fills the information requirement elicitation gap, while transferring the conventional IS development experiences to WIS.

Details

Industrial Management & Data Systems, vol. 105 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Abstract

Details

Evaluating Scholarship and Research Impact
Type: Book
ISBN: 978-1-78756-390-2

1 – 10 of 55