Search results

1 – 10 of over 13000
To view the access options for this content please click here
Article
Publication date: 10 January 2019

JiHye Park, JaeHong Park and Ho-Jung Yoon

When purchasing digital content (DC), consumers are typically influenced by various information sources on the website. Prior research has mostly focused on the individual…

Abstract

Purpose

When purchasing digital content (DC), consumers are typically influenced by various information sources on the website. Prior research has mostly focused on the individual effect of the information sources on the DC choice. To fill the gap in the previous studies, this research includes three main effects: information cascades, recommendations and word of mouth. In particular, the purpose of this paper is to focus on the interaction effect of information cascades and recommendations on the number of software downloads.

Design/methodology/approach

The authors use the panel generalized least squares estimation to test the hypotheses by using a panel data set of 2,000 pieces of software at download.cnet.com over a month-long period. Product ranking and recommendation status are used as key independent variables to capture the effects of information cascades and recommendations, respectively.

Findings

One of this study’s findings is that information cascades positively interact with recommendations to influence the number of software downloads. The authors also show that the impact of information cascades on the number of software downloads is greater than one of the recommendations from a distributor does.

Originality/value

Information cascades and recommendations have been considered as the primary effects for online product choices. However, these two effects typically are not considered together in one research. As previous studies have mainly focused on each effect, respectively, the authors believe that this study may fill the gap by examining how these effects are interacted to one other to influence customers’ choices. The authors also show that the impact of information cascades on the number of software downloads is greater than one of the recommendations from a system does.

Details

Online Information Review, vol. 43 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 1987

Alison Jameson

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical…

Abstract

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical advances, applications and legal attitudes. There is also a review of current software for downloading. Recent developments mean a trend to higher internal memory and storage capacity, and greater transmission speeds. Packages now offer access to more than one host, give maximum assistance to the user without being menu‐driven and incorporate the latest developments in artificial intelligence. Disadvantages are in the length of time involved in the process and the fact that the legal issue of copyright has not yet been finalised. Database producers have turned to licensing under contract law, but there is still need to rely on user ethics, and the need for a standard permissions form is highlighted.

Details

Library Management, vol. 8 no. 1
Type: Research Article
ISSN: 0143-5124

Keywords

To view the access options for this content please click here
Article
Publication date: 25 May 2010

Peter Williams, David Nicholas and Ian Rowlands

The purpose of this paper is to summarise and evaluate the literature on digital consumer behaviour and attitudes towards digital piracy.

Downloads
5888

Abstract

Purpose

The purpose of this paper is to summarise and evaluate the literature on digital consumer behaviour and attitudes towards digital piracy.

Design/methodology/approach

The paper presents a review and synthesis of the academic literature on the subject, using the authors' unique “pro‐forma” approach to the evaluation of individual papers.

Findings

A major limitation in the studies reported became apparent. They are almost exclusively concerned with the behaviours and attitudes of young people. There is a dearth of studies looking at demographic differences, and also a lack of longitudinal work. Given these constraints, the literature strongly suggests that social and situational factors impact on the likelihood of illegally obtaining digital content more than ethical considerations. Anonymity is a strong indicator, “de‐individualising” people and releasing them from traditional societal constraints and making the digital world far different from the physical one. The literature is ambiguous on whether punishment acts as a deterrent.

Practical implications

The main point that comes out of these studies is that the digital world is not the same as the physical world. It is changing basic assumptions about the idea of ownership, sharing, and copying content. Laws prohibiting all unauthorised downloading potentially criminalise millions of people, so new and creative business models are needed to resolve the problem.

Originality/value

The authors believe this to be the first systematic review of current literature in this area since the issue became topical with the Pirate Bay trial and the Government's Digital Britain report.

Details

Aslib Proceedings, vol. 62 no. 3
Type: Research Article
ISSN: 0001-253X

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 1996

Howard Falk

Software is available for downloading from many Internet sources. This article lists and describes World Wide Web, FTP and Gopher sites where software is available, as…

Abstract

Software is available for downloading from many Internet sources. This article lists and describes World Wide Web, FTP and Gopher sites where software is available, as well as software newsgroups that Internet e‐mail users can join.

Details

The Electronic Library, vol. 14 no. 1
Type: Research Article
ISSN: 0264-0473

To view the access options for this content please click here
Article
Publication date: 1 February 1991

Stuart Spore

This article discusses downloading from OPACs in general and from the INNOPAC system in particular. It begins by setting out a brief philosophy of downloading, providing…

Abstract

This article discusses downloading from OPACs in general and from the INNOPAC system in particular. It begins by setting out a brief philosophy of downloading, providing an introduction to OPAC downloading. It then discusses the practice of OPAC downloading with particular emphasis on tools for capturing and “postprocessing” downloaded flies. Technical and institutional constraints on downloading are addressed and an innovative program for overcoming some of these constraints is described in detail. The article concludes by considering various proposals for improving INNOPAC downloading capabilities.

Details

Library Hi Tech, vol. 9 no. 2
Type: Research Article
ISSN: 0737-8831

To view the access options for this content please click here
Article
Publication date: 2 March 2012

Stephen Bradley, Changsu Kim, Jongheon Kim and In Lee

The purpose of this conceptual paper is to provide a typology for classification of the digital goods business (DGB), analyzing its characteristics with selected cases, to…

Downloads
3105

Abstract

Purpose

The purpose of this conceptual paper is to provide a typology for classification of the digital goods business (DGB), analyzing its characteristics with selected cases, to suggest an evolution strategy appropriate for today's digital business economy, and to address the research implications.

Design/methodology/approach

Based on a focus group interview, the study identified and classified the DGB models into four types in terms of sales channels and service methods, and further proposed five evolution strategies for the DGM.

Findings

The paper proposes five evolution strategies for the DGB: from streaming direct to streaming intermediary; from download direct to download intermediary; from download intermediary to streaming intermediary; from download direct to streaming direct; and from download direct to streaming intermediary. These evaluation strategies will be suitably applicable to the type of digital goods for which a business strives.

Research limitations/implications

As the study is exploratory in nature, further research will be required to empirically confirm the findings of the underlying study regarding various DGBs, such as software, games, and movies. In addition, as the proposed typology reflects only the current state of the DGB industry, a further elaboration of the typology may also prove necessary in the future as technologies and the DGB industry evolve.

Originality/value

Providing a useful theoretical foundation for future DGB studies and valuable insight into practical applications in the ever‐growing DGB field, the paper delivers transitional strategic insights based on digital goods taxonomy. This strategic implication can be applicable to analyzing and explaining current DGB cases.

Details

Management Decision, vol. 50 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 2001

Laura Tull

Cloning software is now becoming quite popular in all types of libraries. Pricing is such that even smaller libraries can afford it. Cloning software basically takes an…

Downloads
676

Abstract

Cloning software is now becoming quite popular in all types of libraries. Pricing is such that even smaller libraries can afford it. Cloning software basically takes an image of an entire hard drive and stores it on some kind of medium such as zip disks, compact disks, or a server’s hard drive. It can be used to roll out a group of new computers or as a backup system. It can be especially helpful to libraries that have limited staffing resources to devote to troubleshooting computer software problems. If a software problem occurs on a computer, it can basically be restored in a matter of minutes to the state it was in at the time the image was created. It is well worth the cost when purchasing computers in bulk for a new building or replacing a group of old computers. It is wise to consider a couple of things before going into the cloning business. First, design the images carefully. Second, create a method to track the images after they have been created. This article describes how cloning software can benefit a library as well as designing and tracking the images for most efficient usage.

Details

Library Hi Tech, vol. 19 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Content available
Article
Publication date: 20 September 2021

Kavya Sharma, Xinhui Zhan, Fiona Fui-Hoon Nah, Keng Siau and Maggie X. Cheng

Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This…

Abstract

Purpose

Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses.

Design/methodology/approach

A 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming).

Findings

The findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link.

Originality/value

This research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2635-0270

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 1986

Not only do microcomputers enhance productivity and efficiency in the workplace by the implementation of many applications — wordprocessing, information management…

Abstract

Not only do microcomputers enhance productivity and efficiency in the workplace by the implementation of many applications — wordprocessing, information management, spreadsheet, calculations and financial models, graphics and so on, but they can now be used as a tool to tap the almost unlimited information available on the major online services. All that is needed are a few accessories to enable access to the hosts; thereafter, the user can adopt two routes: ‘downloading’ information on to a floppy or hard disk for personal manipulation of the data, or ‘uploading’ which enables quicker transfer of messages/requests/ orders, fast delivery of search results via electronic mail, data transfer to mainframe/minicomputer database or private file service which may offer fuller facilities such as major analytical processing.

Details

The Electronic Library, vol. 4 no. 1
Type: Research Article
ISSN: 0264-0473

To view the access options for this content please click here
Article
Publication date: 9 March 2010

Francis P. Donnelly

The purpose of this paper is to provide an overview of free and open source (FOSS) geographic information system (GIS) software within the broader contexts of the open…

Downloads
2489

Abstract

Purpose

The purpose of this paper is to provide an overview of free and open source (FOSS) geographic information system (GIS) software within the broader contexts of the open source software movement and developments in GIS, and pose the question of whether libraries and academic departments should consider adopting FOSS GIS.

Design/methodology/approach

The process of creating a basic thematic map was used to test six FOSS GIS software packages, as it is a multi‐step process and a good example of a common task GIS users would want to perform. The test demonstrates what the process of creating a thematic map using FOSS GIS involves and how it compares to proprietary software like ArcGIS.

Findings

Each of the individual FOSS GIS packages had their own particular strengths and weaknesses and some performed well for thematic mapping. The FOSS packages generally were weaker compared to ArcGIS in terms of support for various projection and coordinate systems, joining attribute data to GIS files, and automatic labeling, but their advantage is that they were free in terms of cost and licensing restrictions. When coupled with plug‐ins and helper applications the viability of the FOSS GIS packages increased.

Originality/value

There is little published research to date on the capabilities and applications of FOSS GIS despite the fact that it is a growing movement. This research provides a practical, application‐based overview and critique of FOSS GIS.

Details

Library Hi Tech, vol. 28 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of over 13000