Search results
1 – 10 of 32Raouf Ahmad Rather, Shakir Hussain Parrey, Rafia Gulzar and Shakeel ul Rehman
Drawing upon protection motivation theory and service-dominant-logic, the authors develop a model, which examines the influence of perceived psychological risk and social media…
Abstract
Purpose
Drawing upon protection motivation theory and service-dominant-logic, the authors develop a model, which examines the influence of perceived psychological risk and social media involvement (SMI) on customer-brand-engagement (CBE), brand co-creation and behavioral intention during COVID-19 outbreak in the tourism context. The current research also explores the mediating effect of CBE, and moderating role of tourism-based threat/coping appraisal in the proposed associations.
Design/methodology/approach
To investigate such issues, the authors deploy a sample of 320 tourism consumers by adopting partial least squares-structural equation modeling or (PLS-SEM).
Findings
PLS-SEM findings revealed that SMI positively impacts tourism-CBE. Secondly, results revealed the customer brand engagement's significant-positive effect on brand co-creation and behavioral intent. Third, results showed the social media's and psychological risk's indirect impact on co-creation and behavioral intent, as mediated through customer brand engagement. Fourth, results exposed a significant/negative moderating effect of threat appraisal and significant/positive moderating role of coping appraisal in projected relationships.
Research limitations/implications
Given the study's focus on pandemic-based SMI, CBE and co-creation, the authors contribute to the existing tourism marketing literature, which also generates plentiful avenues for further research, as delineated.
Practical implications
This research facilitates tourism brand managers to better understand the drivers of CBE and paves the way for managers to develop CBE and threat/coping strategies during pandemic.
Originality/value
Despite the increasing understanding of social media, CBE and co-creation in tourism, limited remains identified regarding the association of these, and associated, factors during pandemic, as thereby explored in the current research.
Details
Keywords
Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu
The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.
Abstract
Purpose
The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.
Design/methodology/approach
Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.
Findings
Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.
Research limitations/implications
Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.
Originality/value
This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.
Details
Keywords
Hao Chen, Ofir Turel and Yufei Yuan
Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can…
Abstract
Purpose
Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.
Design/methodology/approach
By applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.
Findings
Results highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.
Originality/value
Results support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.
Details
Keywords
This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of…
Abstract
Purpose
This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of health-related ascribes on continuance intention to use mHealth apps and how these influences are contingent on gender in the mHealth app using context.
Design/methodology/approach
This study takes the protection motivation theory as a theoretical framework to examine the ordered relationship between threat and coping appraisals and their impacts on continuance intention to use mHealth apps. In addition, this study further extends the literature on gender differences into the mHealth app's context to investigate the moderating role of gender. The suggested hypotheses are confirmed by a structural equation modeling approach and multigroup investigation employing survey data of 345 users of Spring Rain Doctor in China, a typical mHealth app.
Findings
The findings suggest that the impact of perceived disease threat on user's continuance intention is mediated entirely by coping appraisals. Furthermore, the three coping appraisals' impacts are contingent upon gender. Specifically, response efficacy is more crucial for male users in forecasting continuance intention, whereas self-efficacy and response cost have a more salient influence on continuance intention for female users.
Originality/value
This study examines the ordered influences of threat and coping appraisal, moderated by gender, on continuance intention on use mHealth apps. These findings could contribute to relevant theoretical and practical implications.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Xing Zhang, Shan Liu, Li Wang, Yajun Zhang and Jiayin Wang
Mobile health service (MHS) can provide users with convenient health services and information to reduce their medical costs from aging or other health issues. Previous studies…
Abstract
Purpose
Mobile health service (MHS) can provide users with convenient health services and information to reduce their medical costs from aging or other health issues. Previous studies confirm the underdevelopment of the Chinese MHS. The purpose of this paper is to analyze the factors that affect the intention to use MHS.
Design/methodology/approach
This paper develops a research model that integrates personal health differences with theory of planned behavior (TPB) and protection motivation theory (PMT). This model is empirically tested using data from 494 valid questionnaires. Structural equation modeling is used to test the hypotheses.
Findings
Perceived vulnerability to disease, perceived severity of disease, response efficacy and self-efficacy positively affect attitude, thereby exerting a positive influence on the behavioral intention to use MHS. Subjective norms also influence users’ behavioral intention. Personal health status and personal health value have quasi-moderating effects on the relationship between attitude and behavioral intention.
Originality/value
This paper presents an early attempt to conceptualize and validate a research model of MHS acceptance by integrating TPB and PMT in a complementary manner. The integrated model provides a holistic view of people’s intention to use MHS by considering health threat beliefs, individual role (i.e. attitude and self-efficacy) and social influences (i.e. subjective norms). Furthermore, this research highlights the role of two individual health characteristics (i.e. personal health status and personal health value) in MHS adoption. These new findings are beneficial toward an in-depth understanding of technology adoption in the MHS context.
Details
Keywords
Abdul Wahid Khan and Jatin Pandey
Cyberchondria refers to the repeated and excessive search for health-related information online, associated with increased health anxiety. This paper utilizes the protection…
Abstract
Purpose
Cyberchondria refers to the repeated and excessive search for health-related information online, associated with increased health anxiety. This paper utilizes the protection motivation theory to investigate the negative behavioral consequences of cyberchondria that pose health risks to users, such as trust in the physician, propensity to self-medicate, and therapy compliance.
Design/methodology/approach
The data for the study were collected from a sample of 317 participants in India using an online survey and form. The analysis was conducted using structural equation modeling.
Findings
Cyberchondria negatively affects the trust in physician and positively affects the propensity to self-medicate. Trust in physician negatively affects the propensity to self-medicate and positively affects therapy compliance. Furthermore, trust in physician partially mediates the relationship between cyberchondria and the propensity to self-medicate and completely mediates the relationship between cyberchondria and therapy compliance. Cyberchondria has no direct significant effect on therapy compliance.
Research limitations/implications
Researchers need to examine other behavioral or psychological factors affected by the reduced trust in physicians due to cyberchondria.
Practical implications
Physicians and health care providers should refocus on patients with cyberchondria and regain their trust through quality interactions and services. Policymakers may consider regulating online health information publication to set the standards of information quality and source. Websites and platforms publishing health information online should distinctly label verified information.
Originality/value
This study investigates the damaging effects of cyberchondria's behavioral consequences that pose health risks to users.
Details
Keywords
Yavuz Idug, Suman Niranjan, Ila Manuj, David Gligor and Jeffrey Ogden
The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy…
Abstract
Purpose
The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy, general deterrence theory and protection motivation theory this research investigates the behavioral factors impacting ride-hailing drivers' operational performance.
Design/methodology/approach
The authors empirically test the antecedents impacting a ride-hailing driver's operational performance using an online survey dataset comprising 513 ride-hailing drivers working for Uber and Lyft in the United States.
Findings
Ride-hailing drivers' intention to comply with the ride-hailing company guidelines results in better operational performance for the driver. Moreover, drivers believe that ride-hailing companies have effective penalties to deter drivers from violating company guidelines. However, drivers also believe that the chances of being caught while ignoring the company guidelines are low.
Practical implications
The results of this research support the decision-making processes of ride-hailing company managers and offer insights on how managers can enhance the operational performance of their drivers.
Originality/value
This study provides unique contributions to emerging research at the intersection of peer-to-peer asset sharing, behavioral studies and technology management. This research is one of the first to explore the role of behavioral factors such as coping mechanisms on the operational performance of sharing economy workers.
Details
Keywords
Xiu Ming Loh, Voon Hsien Lee, Garry Wei-Han Tan, Keng-Boon Ooi and Samuel Fosso Wamba
The COVID-19 pandemic has brought about significant changes to the lives of many people. One of which is the accelerated digitalization in the commerce sector. Hence, this study…
Abstract
Purpose
The COVID-19 pandemic has brought about significant changes to the lives of many people. One of which is the accelerated digitalization in the commerce sector. Hence, this study looks to determine the antecedents that affect users' mobile shopping actual use during a pandemic.
Design/methodology/approach
The research model was founded on the integration of the Protection Motivation Theory and Transactional Theory of Stress. This is in addition to further extending the integrated research model with other constructs to develop a multi-dimensional framework that accounted for the health, personal, technological and social dimensions. The data was collected from users of mobile shopping through an online survey which was then analyzed via Partial Least Squares–Structural Equation Modeling.
Findings
This study provides empirical support to establish the major role of COVID-19 pandemic in affecting the actual usage of mobile shopping. Furthermore, the determinants of actual usage of mobile shopping were found to be multi-dimensional. In particular, the Importance-Performance Map Analysis revealed that emphasis should be place on perceived vulnerability.
Originality/value
As other studies focused on users' intentions, this study looked into the factors that influence the actual usage of mobile shopping. Furthermore, this study emphasizes on the contextualization of time and situation in addition to a multi-dimensional approach toward the subject matter. Overall, this study offers practical insights to stakeholders to better tailor their mobile shopping services in times of a pandemic and advances the literature on actual usage of mobile shopping.
Details
Keywords
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…
Abstract
Purpose
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.
Design/methodology/approach
An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.
Findings
The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.
Originality/value
This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
Details