Search results
1 – 10 of 55Robert J. Nathan, Paul H.P. Yeow and San Murugesan
This paper aims to report on a web usability study and to identify and prioritise key web interface usability factors (WIUFs) for web sites of 36 student‐related online services…
Abstract
Purpose
This paper aims to report on a web usability study and to identify and prioritise key web interface usability factors (WIUFs) for web sites of 36 student‐related online services categorised into three groups: personal services, purchase services and study‐related web sites.
Design/methodology/approach
In this study, involving 400 student internet users (SIUs), 12,310 data points were collected and analysed using a multiple linear regression test. Seven WIUFs were tested: use of colour and font (UCF), use of graphics and multimedia (UGM), clarity of goals in web site (CGW), trustworthiness of web site (TOW), interactivity of web site (IOW), ease of web navigation (EWN), and download speed of web site (DSOW).
Findings
The study results reveal that every online service category has a different set of crucial WIUFs. SIUs' web usability preferences were compared with those of general internet users.
Research limitations/implications
The participants were all Malaysians; therefore, generalising the findings to all SIUs will require a confirmatory study with SIUs from other parts of the world.
Practical implications
Web developers can use the results to design usable web sites for specific online service categories.
Originality/value
The research offers a simpler alternative to measure web usability and to determine which WIUFs are crucial for a specific online service category with consideration of the users' role. This study overcomes some weaknesses of previous studies, i.e. small sample size, no consideration of product‐task relationship, no specific customer group and cumbersome procedures.
Details
Keywords
The use of bibliographic citation is a crucial aspect in the creation and dissemination of information. Numerous studies have been done ranging from simple citation counts to more…
Abstract
The use of bibliographic citation is a crucial aspect in the creation and dissemination of information. Numerous studies have been done ranging from simple citation counts to more complex bibliographic coupling studies, and from citation classifications to citation motivation studies. This review focusses on the citation studies that have explored the complexities and the underlying norms of the citation process. The major emphasis is placed upon the studies which have dealt with citation functions, citation quality, citation concepts and citation motivation. The international perspectives of citation practice are also discussed.
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance…
Abstract
Purpose
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.
Methodology/approach
The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.
Findings
Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.
Research limitations/implications
The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.
Originality/value
Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.
Details
Keywords
This study seeks to evaluate the application of a social‐virtual curriculum delivered through in‐classroom and web‐based activities, aiming to develop youth's social‐cultural…
Abstract
Purpose
This study seeks to evaluate the application of a social‐virtual curriculum delivered through in‐classroom and web‐based activities, aiming to develop youth's social‐cultural skills, cultural competency and multicultural awareness. Specifically, the study evaluates the overall impact of the curriculum to the participating youth's Universality‐Diversity Orientation, diversity of contact, relativistic appreciation (RA) and comfort with differences. It examines the influence of gender, ethnicity and religion to the aforementioned variables. Finally, it aims to identify the role of the curriculum and the Web 2.0 in promoting multiculturalism and multicultural education and in changing youth's perceptions, and attitudes towards others.
Design/methodology/approach
A quantitative approach was applied, using the Miville‐Guzman Universality‐Diversity Scale that measures an individual's Universal‐Diverse Orientation. Descriptive (frequencies, percentages, means, standard deviations and Cronbach's alpha) and inferential (the independent t‐test, the paired‐sample t‐test and the one‐way analysis of variances) statistics were conducted. Questionnaires were given to 303 students. The pre‐measurement took place in April 2008 (70 per cent response rate) and the post‐measurement took place in June‐July 2009 (45 per cent response rate).
Findings
The study discusses the impact of the social‐virtual curriculum, the influence of gender, ethnicity and religion, the role of the social‐virtual curriculum and the Web 2.0 tools in promoting multiculturalism and multicultural education and in changing youth's beliefs, perceptions and attitudes towards others and the new learning, collaboration and communication culture established.
Originality/value
The study constitutes the foundation for further research to be conducted regarding the educational use of Web 2.0 tools, the in‐depth examination of the application of the educational networking within the school curriculum.
Details
Keywords
Abstract
Purpose
As an enabler of environmental sustainability, Green information technology (IT) has become an emerging topic of interest in both academic and business communities. Despite its importance, confusions exist in the content and scope of Green IT practice. The purpose of this paper is to provide an overview of the current state of Green IT practice.
Design/methodology/approach
First 14 widely accepted Green IT practice topics were identified from prior research and a taxonomy was developed to categorize them. Using the content analysis method, these topics were examined in the sustainability reports of 30 IT companies in 2014 Fortune 500. A quantity–quality portfolio framework was developed and applied to measure and assess the Green IT practices of the selected samples.
Findings
Currently, the Green IT practice is still in its infancy. Both research and practice attention are now focusing on IT’s direct impacts and enabling impacts, while overlooking the systemic impacts, on natural environment. The possible reasons for the current state and the recommendations for future research and practice are provided.
Originality/value
Theoretically, this paper identified 14 widely accepted Green IT practice topics and developed a taxonomy for categorizing them. The taxonomy and topics provide a theoretical basis for future examination on Green IT practice-related issues. Practically, the findings of this paper provide guidelines for Green IT practice and directions for both Green IT developers and adopters in their decision-making.
Details
Keywords
Metaphorically speaking, citations are frozen footprints in the landscape of scholarly achievement; footprints which bear witness to the passage of ideas. From footprints it is…
Abstract
Metaphorically speaking, citations are frozen footprints in the landscape of scholarly achievement; footprints which bear witness to the passage of ideas. From footprints it is possible to deduce direction; from the configuration and depth of the imprint it should be possible to construct a picture of those who have passed by, whilst the distribution and variety furnish clues as to whether the advance was orderly and purposive. So it is with citations in respect of the growth of human knowledge; they give substantive expression to the process of innovation, and, if properly marshalled, can provide the researcher with a forensic tool of seductive power and versatility.
Praveen Choudhary, Monika Mital, Ashis Kumar Pani, Armando Papa and Francesca Vicentini
The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational…
Abstract
Purpose
The purpose of this paper is to examine how organizational workers improve their perceived mobile user experience (UX) locus of control affected through organizational ambidexterity when using enterprise mobile systems (EMS). This study investigates the mediation role of business process customizability in the relationship between habitual use of EMS by individuals and organizational ambidexterity.
Design/methodology/approach
Over 150 possible respondent mobile phone users across 40 organizations in metropolitan National Capital Region (NCR) of Delhi with approximately were given the questionnaire. The data of a total of 121 NCR valid respondents aged between 22 and 49, after scrutinizing all collected questionnaires and removing those that had too many missing values or had the same answer to all questions, were used for analysis. The respondents were sampled from a research panel directory of a set of firms of the research firm hired for this survey.
Findings
The study finds complete mediation between the habitual use of EMS and organizational ambidexterity. Importantly, the empirical findings provide the research community with a deeper understanding of how EMS usage impacts organizational ambidexterity and individual’s UX locus of control.
Originality/value
It draws some newer areas of research with respect to interactions between enterprise mobile systems, business process customization due to enterprise mobile systems and organizational ambidexterity, which were hitherto unexplored.
Details
Keywords
Godwin Thomas and Mary-Jane Sule
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…
Abstract
Purpose
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.
Design/methodology/approach
Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.
Findings
Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.
Originality/value
This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.
Details
Keywords
Heng‐Li Yang and Jih‐Hsin Tang
To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of…
Abstract
Purpose
To investigate the relationship between key users (defined as their influence) in “information”, “purchase”, “communication” or “entertainment” networks, and the number of elicited requirements in web‐based information systems (WIS).
Design/methodology/approach
A lab experiment was designed and conducted to investigate the relationship between college students' elicited requirements for two WIS cases and their social networks.
Findings
The individual centrality in “information” networks has a significant positive relationship with the numbers of elicited “information” requirements and total requirements; however, the individual centrality in other social networks has no significant relationship with the number of the elicited requirements.
Research limitations/implications
The requirements collected from “key users” may account for most requirements, which is similar to the results predicted by Pareto's rule.
Practical implications
The origin of a WIS depends on a few influential users. These key users possess more power than others, and they define not only the “requirements” of the site but also its content or knowledge. The WIS designers may take advantage of this fact.
Originality/value
This paper fills the information requirement elicitation gap, while transferring the conventional IS development experiences to WIS.
Details