Search results
1 – 10 of over 5000The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems…
Abstract
Purpose
The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems contexts may be inappropriate for use within an IoT context. The purpose of this paper is to offer empirically generated understandings of trust within potential IoT applications.
Design/methodology/approach
In an attempt to capture and communicate the complex and all-pervading but frequently inconspicuous nature of ubiquitous technologies within potential IoT techno-systems, propositions developed are investigated using a novel mixed methods research design combining a videographic projective technique with a quantitative survey, sampling 1,200 respondents.
Findings
Research findings suggest the dimensionality of trust may vary according to the IoT techno-service context being assessed.
Originality/value
The contribution of this paper is twofold. First, and from a theoretical perspective, it offers a conceptual foundation for trust dimensions within potential IoT applications based upon empirical evaluation. Second, and from a pragmatic perspective, the paper offers insights into how findings may guide practitioners in developing appropriate trust management systems dependent upon the characteristics of particular techno-service contexts.
Details
Keywords
Tina Bedenik, Claudine Kearney and Éidín Ní Shé
In this viewpoint article, the authors recognize the increased focus in health systems on co-design for innovation and change. This article explores the role of leaders and…
Abstract
Purpose
In this viewpoint article, the authors recognize the increased focus in health systems on co-design for innovation and change. This article explores the role of leaders and mangers in developing and enhancing a culture of trust in their organizations to enable co-design, with the potential to drive innovation and change in healthcare.
Design/methodology/approach
Using social science analyses, the authors argue that current co-design literature has limited focus on interactions between senior leaders and managers, and healthcare staff and service users in supporting co-designed innovation and change. The authors draw on social and health science studies of trust to highlight how the value-based co-design process needs to be supported and enhanced. We outline what co-design innovation and change involve in a health system, conceptualize trust and reflect on its importance within the health system, and finally note the role of senior leaders and managers in supporting trust and responsiveness for co-designed innovation and change.
Findings
Healthcare needs leaders and managers to embrace co-design that drives innovation now and in the future through people – leading to better healthcare for society at large. As authors we argue that it is now the time to shift our focus on the role of senior managers and leaders to embed co-design into health and social care structures, through creating and nurturing a culture of trust.
Originality/value
Building public trust in the health system and interpersonal trust within the health system is an ongoing process that relies upon personal behavior of managers and senior leaders, organizational practices within the system, as well as political processes that underpin these practices. By implementing managerial, leadership and individual practices on all levels, senior managers and leaders provide a mechanism to increase both trust and responsiveness for co-design that supports innovation and change in the health system.
Details
Keywords
Heitor Hoffman Nakashima, Daielly Mantovani and Celso Machado Junior
This paper aims to investigate whether professional data analysts’ trust of black-box systems is increased by explainability artifacts.
Abstract
Purpose
This paper aims to investigate whether professional data analysts’ trust of black-box systems is increased by explainability artifacts.
Design/methodology/approach
The study was developed in two phases. First a black-box prediction model was estimated using artificial neural networks, and local explainability artifacts were estimated using local interpretable model-agnostic explanations (LIME) algorithms. In the second phase, the model and explainability outcomes were presented to a sample of data analysts from the financial market and their trust of the models was measured. Finally, interviews were conducted in order to understand their perceptions regarding black-box models.
Findings
The data suggest that users’ trust of black-box systems is high and explainability artifacts do not influence this behavior. The interviews reveal that the nature and complexity of the problem a black-box model addresses influences the users’ perceptions, trust being reduced in situations that represent a threat (e.g. autonomous cars). Concerns about the models’ ethics were also mentioned by the interviewees.
Research limitations/implications
The study considered a small sample of professional analysts from the financial market, which traditionally employs data analysis techniques for credit and risk analysis. Research with personnel in other sectors might reveal different perceptions.
Originality/value
Other studies regarding trust in black-box models and explainability artifacts have focused on ordinary users, with little or no knowledge of data analysis. The present research focuses on expert users, which provides a different perspective and shows that, for them, trust is related to the quality of data and the nature of the problem being solved, as well as the practical consequences. Explanation of the algorithm mechanics itself is not significantly relevant.
Details
Keywords
Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…
Abstract
Purpose
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.
Design/methodology/approach
The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.
Findings
The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).
Research limitations/implications
This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.
Practical implications
The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.
Originality/value
The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.
Details
Keywords
Jorge Tiago Martins and Miguel Baptista Nunes
This paper aims to examine how academics enact trust in e-learning through an inductive identification of perceived risks and enablers involved in e-learning adoption, in the…
Abstract
Purpose
This paper aims to examine how academics enact trust in e-learning through an inductive identification of perceived risks and enablers involved in e-learning adoption, in the context of higher education institutions (HEIs).
Design/methodology/approach
Grounded Theory was the methodology used to systematically analyse data collected in semi-structured interviews with 62 academics. Data analysis followed the constant comparative method and its three-staged coding approach: open, axial and selective coding.
Findings
The resulting trajectory of trust factors is presented in a Grounded Theory narrative where individual change and integration through shared collective understanding and institutionalisation are discussed as stages leading to the overcoming of e-learning adoption barriers.
Originality/value
The paper proposes that the interplay between institutionalism and individualism has implications in the success or failure of strategies for the adoption of e-learning in HEIs, as perceived by academics. In practical terms, this points to the need for close attention to contextually sensitive trust-building mechanisms that promote the balance between academics’ commitments, values and sense of self-worth and centrally planned policy, rules, resources and exhortations that enable action.
Details
Keywords
Steven Cranfield, Jane Hendy, Barnaby Reeves, Andrew Hutchings, Simon Collin and Naomi Fulop
The purpose of this paper is to better understand how and why adoption and implementation of healthcare IT innovations occur. The authors examine two IT applications, computerised…
Abstract
Purpose
The purpose of this paper is to better understand how and why adoption and implementation of healthcare IT innovations occur. The authors examine two IT applications, computerised physician order entry (CPOE) and picture archiving and communication systems (PACS) at the meso and micro levels, within the context of the National Programme for IT in the English National Health Service (NHS).
Design/methodology/approach
To analyse these multi-level dynamics, the authors blend Rogers’ diffusion of innovations theory (DoIT) with Webster’s sociological critique of technological innovation in medicine and healthcare systems to illuminate a wider range of interacting factors. Qualitative data collected between 2004 and 2006 uses semi-structured, in-depth interviews with 72 stakeholders across four English NHS hospital trusts.
Findings
Overall, PACS was more successfully implemented (fully or partially in three out of four trusts) than CPOE (implemented in one trust only). Factors such as perceived benefit to users and attributes of the application – in particular speed, ease of use, reliability and flexibility and levels of readiness – were highly relevant but their influence was modulated through interaction with complex structural and relational issues.
Practical implications
Results reveal that combining contextual system level theories with DoIT increases understanding of real-life processes underpinning implementation of IT innovations within healthcare. They also highlight important drivers affecting success of implementation, including socio-political factors, the social body of practice and degree of “co-construction” between designers and end-users.
Originality/value
The originality of the study partly rests on its methodological innovativeness and its value on critical insights afforded into understanding complex IT implementation programmes.
Details
Keywords
Etikah Karyani, Ira Geraldina, Marissa Grace Haque and Ahmad Zahir
Halal certification is an acknowledgment of the halalness of a product or service issued by a halal regulator based on Islamic law. This study aims to investigate the intentions…
Abstract
Purpose
Halal certification is an acknowledgment of the halalness of a product or service issued by a halal regulator based on Islamic law. This study aims to investigate the intentions of consumers and regulators toward blockchain-based halal certification. Blockchain is useful for storing and verifying halal certificates, thereby increasing trust in products or services because the public cannot change or access data once it is stored.
Design/methodology/approach
This study uses a triangulation approach by distributing online questionnaires to consumers as a research instrument of a quantitative approach processed with smart partial least squares. Meanwhile, the qualitative approach is carried out through observation, in-depth interviews with the Ministry of Religion’s Halal Product Assurance Organizing Agency (BPJPH) and Halal Examination Agency (LPH), and forum group discussions (FGDs) with several related parties.
Findings
The observation results show that most consumers expect the government to provide an easy-to-use application to check halal food products and restaurants. Consumers’ intention to use this technology is influenced directly by attitudes and indirectly by their beliefs. Furthermore, the results of interviews and FGDs reported that LPH was not ready to apply blockchain technology, while BPJPH strongly supported adopting blockchain technology in the certification process.
Practical implications
This finding recommends that the Indonesian government apply blockchain technology to gain transparency and accountability regarding the halal product process.
Originality/value
This study fills the research gap by observing three perspectives from different stakeholders and using a triangulation approach to analyze the need for adoption of blockchain-based halal certification of halal food products.
Details
Keywords
Ville Jylhä, Noora Hirvonen and Jutta Haider
This study addresses how algorithmic recommendations and their affordances shape everyday information practices among young people.
Abstract
Purpose
This study addresses how algorithmic recommendations and their affordances shape everyday information practices among young people.
Design/methodology/approach
Thematic interviews were conducted with 20 Finnish young people aged 15–16 years. The material was analysed using qualitative content analysis, with a focus on everyday information practices involving online platforms.
Findings
The key finding of the study is that the current affordances of algorithmic recommendations enable users to engage in more passive practices instead of active search and evaluation practices. Two major themes emerged from the analysis: enabling not searching, inviting high trust, which highlights the how the affordances of algorithmic recommendations enable the delegation of search to a recommender system and, at the same time, invite trust in the system, and constraining finding, discouraging diversity, which focuses on the constraining degree of affordances and breakdowns associated with algorithmic recommendations.
Originality/value
This study contributes new knowledge regarding the ways in which algorithmic recommendations shape the information practices in young people's everyday lives specifically addressing the constraining nature of affordances.
Details
Keywords
Based on the theoretical predictions of media equation theory and the computers-are-social-actors (CASA) perspective, this study aims to examine the effects of performance error…
Abstract
Purpose
Based on the theoretical predictions of media equation theory and the computers-are-social-actors (CASA) perspective, this study aims to examine the effects of performance error type (i.e. logical, semantic or syntactic), task type and personality presentation (i.e. dominant/submissive and/or friendly/unfriendly) on users’ level of trust in their personal digital assistant (PDA), Siri.
Design/methodology/approach
An experimental study of human–PDA interactions was performed with two types of tasks (social vs functional) randomly assigned to participants (N = 163). While interacting with Siri in 15 task inquiries, the participants recorded Siri’s answers for each inquiry and self-rated their trust in the PDA. The answers were coded and rated by the researchers for personality presentation and error type.
Findings
Logical errors were the most detrimental to user trust. Users’ trust of Siri was significantly higher after functional tasks compared to social tasks when the effects of general usage (e.g. proficiency, length and frequency of usage) were controlled for. The perception of a friendly personality from Siri had an opposite effect on social and functional tasks in the perceived reliability dimension of trust and increased intensity of the presented personality reduced perceived reliability in functional tasks.
Originality/value
The research findings contradict predictions from media equation theory and the CASA perspective while contributing to a theoretical refinement of machine errors and their impact on user trust.
Details