Search results

1 – 10 of over 3000
Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 December 2023

Ben Krishna, Satish Krishnan and M.P. Sebastian

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…

Abstract

Purpose

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.

Design/methodology/approach

A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.

Findings

The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.

Research limitations/implications

The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.

Originality/value

The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 23 May 2023

Ayoung Suh

Despite the increasing interest in the metaverse—immersive three-dimensional virtual worlds wherein personalized avatars interact with one another—little is known about how users…

847

Abstract

Purpose

Despite the increasing interest in the metaverse—immersive three-dimensional virtual worlds wherein personalized avatars interact with one another—little is known about how users cognitively appraise and emotionally experience it. To fill this gap, the present study explores the emotional, behavioral and social consequences of users' cognitive appraisals, while focusing on social virtual reality (VR) as a representative entry point to the metaverse.

Design/methodology/approach

Drawing on cognitive appraisal theory against the backdrop of a framework for classifying emotions, this study develops and tests a theoretical model to account for users' continuance intention and its consequences in the social VR context based on two-wave panel survey data collected from 216 users of social VR platforms, including AltspaceVR, VRChat, Bigscreen and Rec Room.

Findings

The results of the first survey showed that perceived opportunity was more strongly influenced by technological opportunity than social opportunity, whereas perceived threat was more strongly affected by social threat than technological threat. Integrating the data collected from the first survey with those of the second survey, we also found that users' continuance intention positively influenced both their behavioral engagement and social self-efficacy.

Originality/value

By adopting a longitudinal approach, this study provides insights that may be valuable to researchers and practitioners who seek to use social VR for business purposes. This study also contributes to the metaverse literature by conceptualizing and operationalizing the opportunity and threat factors of social VR and identifying salient emotions that users experience in this context. Finally, this study has practical implications for addressing the social and technological features that may cause adverse user experiences in social VR.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 8 December 2022

Khurram Shahzad and Shakeel Ahmad Khan

This study aims to investigate the current practices being implemented against the dissemination of fake online news, identify the relationship of new media literacy (NML) with…

Abstract

Purpose

This study aims to investigate the current practices being implemented against the dissemination of fake online news, identify the relationship of new media literacy (NML) with fake news epidemic control and find out the challenges in identifying valid sources of information.

Design/methodology/approach

To accomplish constructed objectives of this study, a systematic literature review (SLR) was conducted. The authors carried out the “Preferred Reporting Items for the Systematic Review and Meta-analysis” guidelines as a research methodology. The data were retrieved from ten world’s leading digital databases and online tools. A total of 25 key studies published in impact factor (IF) journals were included for systematic review vis-à-vis standard approaches.

Findings

This study revealed trending practices to control fake news consisted of critical information literacy, civic education, new thinking patterns, fact-checkers, automatic fake news detection tools, employment of ethical norms and deep learning via neural networks. Results of the synthesized studies revealed that media literacy, web literacy, digital literation, social media literacy skills and NML assisted acted as frontline soldiers in combating the fake news war. The findings of this research also exhibited different challenges to control fake news perils.

Research limitations/implications

This study provides pertinent theoretical contributions in the body of existing knowledge through the addition of valuable literature by conducting in-depth systematic review of 25 IF articles on a need-based topic.

Practical implications

This scholarly contribution is fruitful and practically productive for the policymakers belonging to different spectrums to effectively control web-based fake news epidemic.

Social implications

This intellectual piece is a benchmark to address fake news calamities to save the social system and to educate citizens from harms of false online stories on social networking websites.

Originality/value

This study vivifies new vistas via a reinvigorated outlook to address fake news perils embedded in dynamic, rigorous and heuristic strategies for redefining a predetermined set of social values.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 23 January 2024

Garima Sahu, Gurinder Singh, Gurmeet Singh and Loveleen Gaur

With over-the-top (OTT) streaming services rapidly transforming the media industry and saturating the market, the authors' study seeks to enrich the goal-directed behaviour model…

Abstract

Purpose

With over-the-top (OTT) streaming services rapidly transforming the media industry and saturating the market, the authors' study seeks to enrich the goal-directed behaviour model by exploring how perceived risks and descriptive norms influence OTT consumption.

Design/methodology/approach

Survey data from OTT subscribers were collected online to assess their risk behaviours. The 353 responses obtained were analysed with SmartPLS, validating the structural equation modelling (SEM) through structural and measurement model verification.

Findings

The authors' findings illustrate that descriptive norm, perceived behavioural control, as well as positive and negative anticipated emotion (NEM) and attitude, contribute positively to the desire to engage with OTT streaming services. Interestingly, the authors' study contradicts common assumptions, revealing that subjective norms do not significantly impact the propensity to utilise OTT services. This counterintuitive finding necessitates a reconsideration of prevalent theories and contributes to a nuanced understanding of OTT adoption determinants.

Research limitations/implications

The data gathering for this study were conducted from the perspective of a single nation. Therefore, caution must be exercised when generalising this study's results.

Practical implications

The practical ramifications of this research are vast, providing OTT service providers and marketers with actionable insights to maximise user engagement and navigate perceived risks related to OTT service adoption and consumption.

Originality/value

This study's exploration of perceived risks and descriptive norms enhances the goal-directed behaviour model's breadth, facilitating a holistic comprehension of the constructs shaping OTT consumption behaviours. It would be the first attempt to combine perceptual, affective and behavioural factors and perceived risks to understand the user's predisposition to engage in OTT streaming services.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 February 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to…

Abstract

Purpose

The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to reveal the challenges to adopt BT in the university libraries.

Design/methodology/approach

A systematic literature review was applied to address the objectives of the study. Around 25 studies published in peer-reviewed journals were selected to conduct the study.

Findings

The findings of the study revealed that blockchain technology (BT) has positive effects on the university librarians as it assists them in digital resources management, provision of integrated library services, effective records management and continued professional development. The study also displayed that BT has a positive impact on the university libraries through effective information management, user privacy, collaboration, technological innovation and access control. Results also revealed that technical issues, financial constraints, security problems, skill issues and sociocultural issues created challenges to adopt BT in the university libraries.

Originality/value

The study has offered theoretical implications for future investigators through the provision of innovative literature on the prospectus and challenges associated with blockchain in the context of librarianship. The study has also provided practical implications for management bodies by offering recommendations for the successful adoption of blockchain in the university libraries. Additionally, a framework has been developed to adopt BT successfully in the university libraries for the delivery of smart library services to library patrons.

Article
Publication date: 8 May 2023

Liya Wang, Rong Cong, Shuxiang Wang, Sitan Li and Ya Wang

The research aims to explore the influence mechanism of peer feedback and users' knowledge contribution behavior. This study draws on the social identity theory and considers…

Abstract

Purpose

The research aims to explore the influence mechanism of peer feedback and users' knowledge contribution behavior. This study draws on the social identity theory and considers social identity as a mediating factor into the research framework.

Design/methodology/approach

This paper collected users' activity data of 142,191 ideas submitted by 76,647 users from the MIUI community between October 2010 and May 2018 via Python software, and data were processed using Stata 16.0.

Findings

The results indicate that knowledge feedback and social feedback positively influence users' knowledge contribution (quantity and quality), respectively. User's cognitive identity positively mediates the relationship between peer feedback and knowledge contribution behavior, affective identity positively mediates the relationship between peer feedback and knowledge contribution behavior, while evaluative identity positively mediates the relationship between peer feedback and knowledge contribution quality, but there is no mediating effect between peer feedback and knowledge contribution quantity.

Originality/value

This study advances knowledge management by highlighting peer feedback on online innovation communities. By demonstrating the significant mediating effect of social identity, this study empirically clarifies the relationships of peer feedback (knowledge feedback and social feedback) to specific dimensions of knowledge contribution, thereby providing managerial guidance to the online innovation community on incentivizing and managing user interaction to foster the innovation development of firms.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 12 April 2023

Dan Li, Hualong Yang and Zhibin Hu

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have…

Abstract

Purpose

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have investigated the positive effect of gamification competition on users, little research has considered gamification's ineffectiveness and negative effects. In particular, how gamification competition affects users' technological exhaustion remains unclear.

Design/methodology/approach

According to flow theory and related research on gamification, this study discusses the nonlinear relationship between gamification competition and users' technological exhaustion. Furthermore, the authors analyze the moderating effect of user type (socializers and achievers) and users' health condition on this nonlinear relationship. Based on flow theory, the authors propose a series of research hypotheses. To test all research hypotheses, the authors collected information from 407 users via a questionnaire as the data for this study.

Findings

The empirical results found a U-shaped relationship between gamification competition and technological exhaustion. Technological exhaustion gradually decreases as competition increases until reaching the lowest point; after that, technological exhaustion gradually increases as competition increases. Further, being a socializer and health condition play a moderating role in the U-shaped relationship between competition and technological exhaustion.

Originality/value

This study's findings not only enrich the related research in flow theory and gamification, but also contribute to the effective design of gamification in health management platforms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 3000