Search results

1 – 10 of 32
Article
Publication date: 2 November 2022

Raouf Ahmad Rather, Shakir Hussain Parrey, Rafia Gulzar and Shakeel ul Rehman

Drawing upon protection motivation theory and service-dominant-logic, the authors develop a model, which examines the influence of perceived psychological risk and social media…

Abstract

Purpose

Drawing upon protection motivation theory and service-dominant-logic, the authors develop a model, which examines the influence of perceived psychological risk and social media involvement (SMI) on customer-brand-engagement (CBE), brand co-creation and behavioral intention during COVID-19 outbreak in the tourism context. The current research also explores the mediating effect of CBE, and moderating role of tourism-based threat/coping appraisal in the proposed associations.

Design/methodology/approach

To investigate such issues, the authors deploy a sample of 320 tourism consumers by adopting partial least squares-structural equation modeling or (PLS-SEM).

Findings

PLS-SEM findings revealed that SMI positively impacts tourism-CBE. Secondly, results revealed the customer brand engagement's significant-positive effect on brand co-creation and behavioral intent. Third, results showed the social media's and psychological risk's indirect impact on co-creation and behavioral intent, as mediated through customer brand engagement. Fourth, results exposed a significant/negative moderating effect of threat appraisal and significant/positive moderating role of coping appraisal in projected relationships.

Research limitations/implications

Given the study's focus on pandemic-based SMI, CBE and co-creation, the authors contribute to the existing tourism marketing literature, which also generates plentiful avenues for further research, as delineated.

Practical implications

This research facilitates tourism brand managers to better understand the drivers of CBE and paves the way for managers to develop CBE and threat/coping strategies during pandemic.

Originality/value

Despite the increasing understanding of social media, CBE and co-creation in tourism, limited remains identified regarding the association of these, and associated, factors during pandemic, as thereby explored in the current research.

Details

Journal of Hospitality and Tourism Insights, vol. 6 no. 5
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 2 August 2019

Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang and Hai-hua Hu

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

1449

Abstract

Purpose

The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions.

Design/methodology/approach

Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users.

Findings

Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances.

Research limitations/implications

Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated.

Originality/value

This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.

Article
Publication date: 18 February 2021

Hao Chen, Ofir Turel and Yufei Yuan

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can…

Abstract

Purpose

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.

Design/methodology/approach

By applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.

Findings

Results highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.

Originality/value

Results support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.

Details

Information Technology & People, vol. 35 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 24 October 2022

Yumei Luo and Jian Mou

This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of…

1316

Abstract

Purpose

This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of health-related ascribes on continuance intention to use mHealth apps and how these influences are contingent on gender in the mHealth app using context.

Design/methodology/approach

This study takes the protection motivation theory as a theoretical framework to examine the ordered relationship between threat and coping appraisals and their impacts on continuance intention to use mHealth apps. In addition, this study further extends the literature on gender differences into the mHealth app's context to investigate the moderating role of gender. The suggested hypotheses are confirmed by a structural equation modeling approach and multigroup investigation employing survey data of 345 users of Spring Rain Doctor in China, a typical mHealth app.

Findings

The findings suggest that the impact of perceived disease threat on user's continuance intention is mediated entirely by coping appraisals. Furthermore, the three coping appraisals' impacts are contingent upon gender. Specifically, response efficacy is more crucial for male users in forecasting continuance intention, whereas self-efficacy and response cost have a more salient influence on continuance intention for female users.

Originality/value

This study examines the ordered influences of threat and coping appraisal, moderated by gender, on continuance intention on use mHealth apps. These findings could contribute to relevant theoretical and practical implications.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 September 2019

Xing Zhang, Shan Liu, Li Wang, Yajun Zhang and Jiayin Wang

Mobile health service (MHS) can provide users with convenient health services and information to reduce their medical costs from aging or other health issues. Previous studies…

2083

Abstract

Purpose

Mobile health service (MHS) can provide users with convenient health services and information to reduce their medical costs from aging or other health issues. Previous studies confirm the underdevelopment of the Chinese MHS. The purpose of this paper is to analyze the factors that affect the intention to use MHS.

Design/methodology/approach

This paper develops a research model that integrates personal health differences with theory of planned behavior (TPB) and protection motivation theory (PMT). This model is empirically tested using data from 494 valid questionnaires. Structural equation modeling is used to test the hypotheses.

Findings

Perceived vulnerability to disease, perceived severity of disease, response efficacy and self-efficacy positively affect attitude, thereby exerting a positive influence on the behavioral intention to use MHS. Subjective norms also influence users’ behavioral intention. Personal health status and personal health value have quasi-moderating effects on the relationship between attitude and behavioral intention.

Originality/value

This paper presents an early attempt to conceptualize and validate a research model of MHS acceptance by integrating TPB and PMT in a complementary manner. The integrated model provides a holistic view of people’s intention to use MHS by considering health threat beliefs, individual role (i.e. attitude and self-efficacy) and social influences (i.e. subjective norms). Furthermore, this research highlights the role of two individual health characteristics (i.e. personal health status and personal health value) in MHS adoption. These new findings are beneficial toward an in-depth understanding of technology adoption in the MHS context.

Details

Online Information Review, vol. 44 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 14 February 2022

Abdul Wahid Khan and Jatin Pandey

Cyberchondria refers to the repeated and excessive search for health-related information online, associated with increased health anxiety. This paper utilizes the protection…

Abstract

Purpose

Cyberchondria refers to the repeated and excessive search for health-related information online, associated with increased health anxiety. This paper utilizes the protection motivation theory to investigate the negative behavioral consequences of cyberchondria that pose health risks to users, such as trust in the physician, propensity to self-medicate, and therapy compliance.

Design/methodology/approach

The data for the study were collected from a sample of 317 participants in India using an online survey and form. The analysis was conducted using structural equation modeling.

Findings

Cyberchondria negatively affects the trust in physician and positively affects the propensity to self-medicate. Trust in physician negatively affects the propensity to self-medicate and positively affects therapy compliance. Furthermore, trust in physician partially mediates the relationship between cyberchondria and the propensity to self-medicate and completely mediates the relationship between cyberchondria and therapy compliance. Cyberchondria has no direct significant effect on therapy compliance.

Research limitations/implications

Researchers need to examine other behavioral or psychological factors affected by the reduced trust in physicians due to cyberchondria.

Practical implications

Physicians and health care providers should refocus on patients with cyberchondria and regain their trust through quality interactions and services. Policymakers may consider regulating online health information publication to set the standards of information quality and source. Websites and platforms publishing health information online should distinctly label verified information.

Originality/value

This study investigates the damaging effects of cyberchondria's behavioral consequences that pose health risks to users.

Details

Aslib Journal of Information Management, vol. 74 no. 5
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 4 April 2023

Yavuz Idug, Suman Niranjan, Ila Manuj, David Gligor and Jeffrey Ogden

The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy…

Abstract

Purpose

The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy, general deterrence theory and protection motivation theory this research investigates the behavioral factors impacting ride-hailing drivers' operational performance.

Design/methodology/approach

The authors empirically test the antecedents impacting a ride-hailing driver's operational performance using an online survey dataset comprising 513 ride-hailing drivers working for Uber and Lyft in the United States.

Findings

Ride-hailing drivers' intention to comply with the ride-hailing company guidelines results in better operational performance for the driver. Moreover, drivers believe that ride-hailing companies have effective penalties to deter drivers from violating company guidelines. However, drivers also believe that the chances of being caught while ignoring the company guidelines are low.

Practical implications

The results of this research support the decision-making processes of ride-hailing company managers and offer insights on how managers can enhance the operational performance of their drivers.

Originality/value

This study provides unique contributions to emerging research at the intersection of peer-to-peer asset sharing, behavioral studies and technology management. This research is one of the first to explore the role of behavioral factors such as coping mechanisms on the operational performance of sharing economy workers.

Details

International Journal of Operations & Production Management, vol. 43 no. 12
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 26 May 2022

Xiu Ming Loh, Voon Hsien Lee, Garry Wei-Han Tan, Keng-Boon Ooi and Samuel Fosso Wamba

The COVID-19 pandemic has brought about significant changes to the lives of many people. One of which is the accelerated digitalization in the commerce sector. Hence, this study…

Abstract

Purpose

The COVID-19 pandemic has brought about significant changes to the lives of many people. One of which is the accelerated digitalization in the commerce sector. Hence, this study looks to determine the antecedents that affect users' mobile shopping actual use during a pandemic.

Design/methodology/approach

The research model was founded on the integration of the Protection Motivation Theory and Transactional Theory of Stress. This is in addition to further extending the integrated research model with other constructs to develop a multi-dimensional framework that accounted for the health, personal, technological and social dimensions. The data was collected from users of mobile shopping through an online survey which was then analyzed via Partial Least Squares–Structural Equation Modeling.

Findings

This study provides empirical support to establish the major role of COVID-19 pandemic in affecting the actual usage of mobile shopping. Furthermore, the determinants of actual usage of mobile shopping were found to be multi-dimensional. In particular, the Importance-Performance Map Analysis revealed that emphasis should be place on perceived vulnerability.

Originality/value

As other studies focused on users' intentions, this study looked into the factors that influence the actual usage of mobile shopping. Furthermore, this study emphasizes on the contextualization of time and situation in addition to a multi-dimensional approach toward the subject matter. Overall, this study offers practical insights to stakeholders to better tailor their mobile shopping services in times of a pandemic and advances the literature on actual usage of mobile shopping.

Details

Industrial Management & Data Systems, vol. 122 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of 32