Search results

1 – 10 of over 5000
To view the access options for this content please click here
Article
Publication date: 15 January 2021

Xingyu Chen, Yitong Wang, Da Tao, Ling Jiang and Shaobo Li

Smartphone multitasking behavior has become prevalent in our daily lives, yet factors influencing smartphone multitasking behavior have not been fully investigated. This…

Abstract

Purpose

Smartphone multitasking behavior has become prevalent in our daily lives, yet factors influencing smartphone multitasking behavior have not been fully investigated. This study aimed to examine the roles of a set of demographic, personality and motivational factors on smartphone multitasking behavior, and how these factors were related to general and application-specific types of smartphone multitasking behavior.

Design/methodology/approach

A cross-sectional study was conducted in which 2,659 smartphone users were invited to complete an online survey on smartphone multitasking behavior. Hierarchical multiple regression analyses were used to examine the roles of demographic, personality and motivational factors on smartphone multitasking behavior.

Findings

The results showed that, in general, demographic factors, such as gender, age, occupation status, education and smartphone usage time significantly predicted smartphone multitasking behavior. People characterized by agreeableness, extraversion, neuroticism and openness to experience were more likely to multitask with smartphones. Information seeking, efficiency and habit motivations were identified as major motivational factors for smartphone multitasking behavior. The roles of demographic, personality and motivational factors differed much across varied types of application-specific smartphone multitasking behavior.

Originality/value

This study extends and advances the literature on media multitasking, smartphone multitasking in particular, by identifying a set of demographic, personality and motivational factors as antecedents of smartphone multitasking behavior. In addition, this study revealed the differentiated roles of the above-mentioned factors across varied types of smartphone application usages. The findings provide important implications for practitioners to tailor smartphone applications and services to different target smartphone users and use situations.

Details

Internet Research, vol. 31 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 6 November 2017

Xiao Juan Zhang, Zhenzhen Li and Hepu Deng

Understanding user behavior is increasingly critical for information security in the use of smartphones. There is, however, lack of empirical studies about the behavior of…

Downloads
1069

Abstract

Purpose

Understanding user behavior is increasingly critical for information security in the use of smartphones. There is, however, lack of empirical studies about the behavior of smartphone users for information security in China. The purpose of this paper is to present an empirical analysis of the behavior of smartphone users in China in relation to information security.

Design/methodology/approach

A review of the related literature is conducted, leading to the development of a questionnaire for investigating the behavior of smartphone users. An online survey of the smartphone users in China is conducted. The collected data are analyzed with the use of descriptive analysis and Pearson’s chi-square test to better understand the behavior of smartphone users on information security.

Findings

The paper shows that there are serious concerns about information security in the use of smartphones in China including the ignorance of security information in downloading and using applications, inadequate phone settings, inappropriate enabling of add-on utilities and lack of proper disaster recovery plans. The study also reveals that there is a significant difference between different groups of users on information security in smartphone use.

Research limitations/implications

This paper is based on a purposeful sample of smartphone users in China. It is exploratory in nature.

Practical implications

The paper can lead to a better understanding of the behavior of smartphone users and information security in China and provide relevant government departments and institutions with useful information for developing appropriate strategies and policies and designing specific training programs to improve information security in the smartphone use.

Originality/value

This paper is the first of this kind to collect quantitative data from users in China for better understanding the behavior of smartphone users on information security. It provides insight towards the adoption of various measures for information security from the perspective of smartphone users in China.

Details

The Electronic Library, vol. 35 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

To view the access options for this content please click here
Article
Publication date: 19 August 2021

Oussama BenRhouma, Ali AlZahrani, Ahmad AlKhodre, Abdallah Namoun and Wasim Ahmad Bhat

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand…

Abstract

Purpose

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android devices.

Design/methodology/approach

This study uses a black-box testing-principles based methodology to develop use-cases that simulate real-world case-scenarios of the activities performed by the users on the social media application. The authors executed these use-cases in a controlled experiment and examined the Android smartphone to recover the private-data pertaining to these use-cases.

Findings

The results suggest that the social media data recovered from Android devices can reveal a complete timeline of activities performed by the user, identify all the videos watched, uploaded, shared and deleted by the user, disclose the username and user-id of the user, unveil the email addresses used by the user to download the application and share the videos with other users and expose the social network of the user on the platform. Forensic investigators may find this data helpful in investigating crimes such as cyber bullying, racism, blasphemy, vehicle thefts, road accidents and so on. However, this data-breach in Android devices is a threat to user's privacy, identity and profiling in second-hand market.

Practical implications

Perceived notion of data sanitisation as a result of application removal and factory-reset can have serious implications. Though being helpful to forensic investigators, it leaves the user vulnerable to privacy breach, identity theft, profiling and social network revealing in second-hand market. At the same time, users' sensitivity towards data-breach might compel users to refrain from selling their Android devices in second-hand market and hamper device recycling.

Originality/value

This study attempts to bridge the literature gap in social media data-breach in second-hand Android devices by experimentally determining the extent of the breach. The findings of this study can help digital forensic investigators in solving crimes such as vehicle theft, road accidents, cybercrimes and so on. It can assist smartphone users to decide whether to sell their smartphones in a second-hand market, and at the same time encourage developers and researchers to design methods of social media data sanitisation.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 11 January 2016

Tim Vorley and Nick Williams

The purpose of this paper is to examine the effectiveness of smartphone apps in fostering effectual thinking. The paper considers both the effectual development of…

Abstract

Purpose

The purpose of this paper is to examine the effectiveness of smartphone apps in fostering effectual thinking. The paper considers both the effectual development of entrepreneurial ideas and the associated change in entrepreneurial confidence and perceived entrepreneurial skills of students at a UK Higher Education Institution.

Design/methodology/approach

The research was conducted with 60 first year undergraduate management students who had not previously undertaken enterprise education. Students were divided into three groups: the first was given a process-based briefing on developing entrepreneurial ideas; the second the process-based briefing and an additional method-based briefing on developing entrepreneurial ideas; while the third the same process-based briefing and use of the smartphone application as a method-based learning tool.

Findings

The results show the value of method-based teaching and the potential value of smartphone based learning tool to support independent method-based learning. Compared to the process-based approach, the method-based approach is shown to have an increased effect on the development of entrepreneurial ideas, as well as increasing entrepreneurial confidence and entrepreneurial skill of the participants.

Practical implications

Implications for the future development of enterprise and entrepreneurial education are presented, referring to factors which enable entrepreneurial ideas to be developed and how pedagogical approaches shape this.

Originality/value

The study adds to the emergent literature on enterprise education by evidencing the need to develop new approaches and identify in what ways these may be informed by a more effectual approach.

Details

Education + Training, vol. 58 no. 1
Type: Research Article
ISSN: 0040-0912

Keywords

To view the access options for this content please click here
Article
Publication date: 16 October 2018

Guan Yuan, Zhaohui Wang, Fanrong Meng, Qiuyan Yan and Shixiong Xia

Currently, ubiquitous smartphones embedded with various sensors provide a convenient way to collect raw sequence data. These data bridges the gap between human activity…

Abstract

Purpose

Currently, ubiquitous smartphones embedded with various sensors provide a convenient way to collect raw sequence data. These data bridges the gap between human activity and multiple sensors. Human activity recognition has been widely used in quite a lot of aspects in our daily life, such as medical security, personal safety, living assistance and so on.

Design/methodology/approach

To provide an overview, the authors survey and summarize some important technologies and involved key issues of human activity recognition, including activity categorization, feature engineering as well as typical algorithms presented in recent years. In this paper, the authors first introduce the character of embedded sensors and dsiscuss their features, as well as survey some data labeling strategies to get ground truth label. Then, following the process of human activity recognition, the authors discuss the methods and techniques of raw data preprocessing and feature extraction, and summarize some popular algorithms used in model training and activity recognizing. Third, they introduce some interesting application scenarios of human activity recognition and provide some available data sets as ground truth data to validate proposed algorithms.

Findings

The authors summarize their viewpoints on human activity recognition, discuss the main challenges and point out some potential research directions.

Originality/value

It is hoped that this work will serve as the steppingstone for those interested in advancing human activity recognition.

Details

Sensor Review, vol. 39 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

To view the access options for this content please click here
Article
Publication date: 3 October 2016

Donghee Shin, Myunggoon Choi, Jang Hyun Kim and Jae-gil Lee

The purpose of this paper is to examine the effects of interaction techniques (e.g. swiping and tapping) and the range of thumb movement on interactivity, engagement…

Downloads
1324

Abstract

Purpose

The purpose of this paper is to examine the effects of interaction techniques (e.g. swiping and tapping) and the range of thumb movement on interactivity, engagement, attitude, and behavioral intention in single-handed interaction with smartphones.

Design/methodology/approach

A 2×2 between-participant experiment (technological features: swiping and tapping×range of thumb movement: wide and narrow) was conducted to study the effects of interaction techniques and thumb movement ranges.

Findings

The results showed that the range of thumb movement had significant effects on perceived interactivity, engagement, attitude, and behavioral intention, whereas no effects were observed for interaction techniques. A narrow range of thumb movement had more influence on the interactivity outcomes in comparison to a wide range of thumb movement.

Practical implications

While the subject of actual and perceived interactivity has been discussed, the issue has not been applied to smartphone. Based on the research results, the mobile industry may come up with a design strategy that balances feature- and perception-based interactivity.

Originality/value

This study adopted the perspective of the hybrid definition of interactivity, which includes both actual and perceived interactivity. Interactivity effect outcomes mediated by perceived interactivity.

Details

Internet Research, vol. 26 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Content available
Article
Publication date: 4 February 2019

Jelena Dorcic, Jelena Komsic and Suzana Markovic

The popularity of mobile technologies and applications is constantly growing and undoubtedly changing consumers’ and providers’ behavior. The purpose of this study is to…

Downloads
7287

Abstract

Purpose

The popularity of mobile technologies and applications is constantly growing and undoubtedly changing consumers’ and providers’ behavior. The purpose of this study is to provide a comprehensive systematic literature review of academic research related to mobile technologies and applications in smart tourism published between 2012 and June 2017.

Design/methodology/approach

Published peer-reviewed articles were gathered from the three largest and most popular online databases and search engines – EBSCO host, Science Direct and Google Scholar and ENTER conference proceedings. Based on a keyword-driven search and content analysis, 126 articles were determined to be relevant to this study.

Findings

Selected publications were analyzed in accordance with the proposed research questions and thematically classified into three main categories: consumer perspective, technological perspective and provider perspective. The findings contribute to a better overall understanding of recent research into mobile technologies and applications in smart tourism by presenting the main results, methods, trends and other insights of relevant publications.

Research limitations/implications

Although the researchers used two databases, one search engine and ENTER conference proceedings to collect articles, there is the possibility that some studies connected to the topic were not included. The study did not include books, other conference proceedings, literature reviews, theses, business reports and other possibly relevant publications.

Originality/value

This study provides a systematic review of the most recent published academic research (2012-June 2017; also including “Online First” articles) on mobile technologies and applications in smart tourism. The results of this study provide an agenda for future research in tourism and hospitality industry by identifying major trends and developments in smart tourism.

Details

Tourism Review, vol. 74 no. 1
Type: Research Article
ISSN: 1660-5373

Keywords

To view the access options for this content please click here
Article
Publication date: 9 March 2015

Eun-A Park and Sangwon Lee

In a converged and smart media environment, it no longer makes sense to talk only of a digital divide based on access to a platform – instead, a new “smartphone divide” is…

Downloads
2749

Abstract

Purpose

In a converged and smart media environment, it no longer makes sense to talk only of a digital divide based on access to a platform – instead, a new “smartphone divide” is created based on a user’s ability to access and use an array of different services. Although there is an extensive literature on the digital divide in broadband access and use, zero research efforts have addressed the digital divide in mobile phone usage. Therefore, this research study aims to fill the gap in the literature by looking into new dimensions of the smartphone divide.

Design/methodology/approach

Data were collected from a college student sample through an online survey and some hypotheses were framed and tested for intergroup (smartphone users vs non-users) and intragroup (active smartphone users vs inactive users) differences based on access, experience and persistence of usage.

Findings

Findings are: first, smartphone users were more active online as expected. Although no significant difference was detected in the amount of time spent on social networking sites (SNSs) between smartphone users and non-users, smartphone users had more friends online and more “online-only” friends than non-users. Second, smartphone users seem to participate more actively in social and political issues than non-users do. Third, active users were adopting digital technologies faster than less active users, and active users were inclined to spend longer time on SNSs than less active users. Also, active users used more free and paid applications on their smartphones compared to less active users.

Originality/value

This research study aims to fill the gap in the literature by looking into new dimensions of the smartphone divide and exploring the differential usage of smartphone users in terms of usage level, awareness and usability levels, usage scope and consequential uses controlling for demographics and socioeconomic status. The ensuing pilot study validates some of speculations suggested in the previous literature.

Details

info, vol. 17 no. 2
Type: Research Article
ISSN: 1463-6697

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 2015

Robin Mueller, Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg and Edgar Weippl

This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis…

Downloads
1704

Abstract

Purpose

This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis on several new applications. Mobile messaging and VoIP applications for smartphones have seen a massive surge in popularity, which has also sparked the interest in research related to their security and privacy protection, leading to in-depth analyses of specific applications or vulnerabilities.

Design/methodology/approach

The evaluation methods mostly focus on known vulnerabilities in connection with authentication and validation mechanisms but also describe some newly identified attack vectors.

Findings

The results show a positive trend for new applications, which are mostly being developed with security and privacy features, whereas some of the older applications have shown little progress or have even introduced new vulnerabilities. In addition, this paper shows privacy implications of smartphone messaging that are not even solved by today’s most sophisticated “secure” smartphone messaging applications, as well as discusses methods for protecting user privacy during the creation of the user network.

Research limitations/implications

Currently, there is no perfect solution available; thus, further research on this topic needs to be conducted.

Originality/value

In addition to conducting a security evaluation of existing applications together with newly designed messengers that were designed with a security background in mind, several methods for protecting user privacy were discussed. Furthermore, some new attack vectors were discussed.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 15 March 2013

Jun Mo Kwon, Jung‐in (Stephanie) Bae and Shane C. Blum

The purpose of this study is to examine customer intentions to download mobile applications in the hospitality industry. Even though major hospitality companies offer the…

Downloads
7534

Abstract

Purpose

The purpose of this study is to examine customer intentions to download mobile applications in the hospitality industry. Even though major hospitality companies offer the mobile applications, many customers have not utilized them. The results showed what encouraged customers to download mobile applications in the hospitality industry.

Design/methodology/approach

The Technology Acceptance Model was applied for this research to explain customer intentions. College students were the target population of this study because they understand and adopt the technology well. Therefore, mobile applications will become a popular way to purchase goods and services when university students will have purchasing power.

Findings

Even though major hospitality companies offer mobile applications, more than a half of respondents responded that they had not used mobile applications from the hospitality firms. The results showed that promotion information was not an only reason to download mobile applications; however, the results also showed that consumers who enjoy using smartphones and who are confident in themselves are more likely to download the mobile applications.

Research limitations/implications

The data were collected in a university; therefore, generalizability is one of the limitations of this research. Multiple regressions only verify the relationship between dependant and independent variables. University students may not have a chance to plan their trips so they may not need the mobile applications.

Originality/value

This study employed the TAM to examine the reasons why customers download mobile applications offered by companies in the hospitality industry. Literature discussing mobile applications in the hospitality industry is very scarce. This research will assist managements in utilizing their mobile applications.

Details

Journal of Hospitality and Tourism Technology, vol. 4 no. 1
Type: Research Article
ISSN: 1757-9880

Keywords

1 – 10 of over 5000