Search results
1 – 10 of over 3000Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…
Abstract
Purpose
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.
Design/methodology/approach
An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.
Findings
The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.
Originality/value
This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.
Details
Keywords
Yingying Yu, Wencheng Su, Zhangping Lu, Guifeng Liu and Wenjing Ni
Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity…
Abstract
Purpose
Spatial olfactory design in the library appears to be a practical approach to enhance the coordination between architectural spaces and user behaviors, shape immersive activity experiences and shape immersive activity experiences. Therefore, this study aims to explore the association between the olfactory elements of library space and users’ olfactory perception, providing a foundation for the practical design of olfactory space in libraries.
Design/methodology/approach
Using the olfactory perception semantic differential experiment method, this study collected feedback on the emotional experience of olfactory stimuli from 56 participants in an academic library. From the perspective of environmental psychology, the dimensions of pleasure, control and arousal of users’ olfactory perception in the academic library environment were semantically and emotionally described. In addition, the impact of fatigue state on users’ olfactory perception was analyzed through statistical methods to explore the impact path of individual physical differences on olfactory perception.
Findings
It was found that users’ olfactory perception in the academic library environment is likely semantically described from the dimensions of pleasure, arousal and control. These dimensions mutually influence users’ satisfaction with olfactory elements. Moreover, there is a close correlation between pleasure and satisfaction. In addition, fatigue states may impact users’ olfactory perception. Furthermore, users in a high-fatigue state may be more sensitive to the arousal of olfactory perception.
Originality/value
This article is an empirical exploration of users’ perception of the environmental odors in libraries. The experimental results of this paper may have practical implications for the construction of olfactory space in academic libraries.
Details
Keywords
Xiaojun Wu, Zhongyun Zhou and Shouming Chen
Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…
Abstract
Purpose
Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.
Design/methodology/approach
The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.
Findings
Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.
Originality/value
This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.
Details
Keywords
Ben Krishna, Satish Krishnan and M.P. Sebastian
The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…
Abstract
Purpose
The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.
Design/methodology/approach
A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.
Findings
The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.
Research limitations/implications
The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.
Originality/value
The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.
Details
Keywords
Despite the increasing interest in the metaverse—immersive three-dimensional virtual worlds wherein personalized avatars interact with one another—little is known about how users…
Abstract
Purpose
Despite the increasing interest in the metaverse—immersive three-dimensional virtual worlds wherein personalized avatars interact with one another—little is known about how users cognitively appraise and emotionally experience it. To fill this gap, the present study explores the emotional, behavioral and social consequences of users' cognitive appraisals, while focusing on social virtual reality (VR) as a representative entry point to the metaverse.
Design/methodology/approach
Drawing on cognitive appraisal theory against the backdrop of a framework for classifying emotions, this study develops and tests a theoretical model to account for users' continuance intention and its consequences in the social VR context based on two-wave panel survey data collected from 216 users of social VR platforms, including AltspaceVR, VRChat, Bigscreen and Rec Room.
Findings
The results of the first survey showed that perceived opportunity was more strongly influenced by technological opportunity than social opportunity, whereas perceived threat was more strongly affected by social threat than technological threat. Integrating the data collected from the first survey with those of the second survey, we also found that users' continuance intention positively influenced both their behavioral engagement and social self-efficacy.
Originality/value
By adopting a longitudinal approach, this study provides insights that may be valuable to researchers and practitioners who seek to use social VR for business purposes. This study also contributes to the metaverse literature by conceptualizing and operationalizing the opportunity and threat factors of social VR and identifying salient emotions that users experience in this context. Finally, this study has practical implications for addressing the social and technological features that may cause adverse user experiences in social VR.
Details
Keywords
Garima Sahu, Gurinder Singh, Gurmeet Singh and Loveleen Gaur
With over-the-top (OTT) streaming services rapidly transforming the media industry and saturating the market, the authors' study seeks to enrich the goal-directed behaviour model…
Abstract
Purpose
With over-the-top (OTT) streaming services rapidly transforming the media industry and saturating the market, the authors' study seeks to enrich the goal-directed behaviour model by exploring how perceived risks and descriptive norms influence OTT consumption.
Design/methodology/approach
Survey data from OTT subscribers were collected online to assess their risk behaviours. The 353 responses obtained were analysed with SmartPLS, validating the structural equation modelling (SEM) through structural and measurement model verification.
Findings
The authors' findings illustrate that descriptive norm, perceived behavioural control, as well as positive and negative anticipated emotion (NEM) and attitude, contribute positively to the desire to engage with OTT streaming services. Interestingly, the authors' study contradicts common assumptions, revealing that subjective norms do not significantly impact the propensity to utilise OTT services. This counterintuitive finding necessitates a reconsideration of prevalent theories and contributes to a nuanced understanding of OTT adoption determinants.
Research limitations/implications
The data gathering for this study were conducted from the perspective of a single nation. Therefore, caution must be exercised when generalising this study's results.
Practical implications
The practical ramifications of this research are vast, providing OTT service providers and marketers with actionable insights to maximise user engagement and navigate perceived risks related to OTT service adoption and consumption.
Originality/value
This study's exploration of perceived risks and descriptive norms enhances the goal-directed behaviour model's breadth, facilitating a holistic comprehension of the constructs shaping OTT consumption behaviours. It would be the first attempt to combine perceptual, affective and behavioural factors and perceived risks to understand the user's predisposition to engage in OTT streaming services.
Details
Keywords
Vibhav Singh, Niraj Kumar Vishvakarma and Vinod Kumar
E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind…
Abstract
Purpose
E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind dark patterns usage in e-commerce companies.
Design/methodology/approach
Dark pattern enablers were identified from existing literature and validated by industry experts. Total interpretive structural modeling (TISM) was used to model the enablers. In addition, “matriced impacts croisés multiplication appliquée á un classement” (MICMAC) analysis categorized and ranked the enablers into four groups.
Findings
Partial human command over cognitive biases, fighting market competition and partial human command over emotional triggers were ranked as the most influential enablers of dark patterns in e-commerce companies. At the same time, meeting long-term economic goals was identified as the most challenging enabler of dark patterns, which has the lowest dependency and impact over the other enablers.
Research limitations/implications
TISM results are reliant on the opinion of industry experts. Therefore, alternative statistical approaches could be used for validation.
Practical implications
The insights of this study could be used by business managers to eliminate dark patterns from their platforms and meet the motivations of the enablers of dark patterns with alternate strategies. Furthermore, this research would aid legal agencies and online communities in developing methods to combat dark patterns.
Originality/value
Although a few studies have developed taxonomies and classified dark patterns, to the best of the authors’ knowledge, no study has identified the enablers behind the use of dark patterns by e-commerce organizations. The study further models the enablers and explains the mutual relationships.
Details
Keywords
Sigi Goode and Amir Riaz
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…
Abstract
Purpose
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.
Design/methodology/approach
This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.
Findings
Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.
Originality/value
To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal
The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to…
Abstract
Purpose
The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to reveal the challenges to adopt BT in the university libraries.
Design/methodology/approach
A systematic literature review was applied to address the objectives of the study. Around 25 studies published in peer-reviewed journals were selected to conduct the study.
Findings
The findings of the study revealed that blockchain technology (BT) has positive effects on the university librarians as it assists them in digital resources management, provision of integrated library services, effective records management and continued professional development. The study also displayed that BT has a positive impact on the university libraries through effective information management, user privacy, collaboration, technological innovation and access control. Results also revealed that technical issues, financial constraints, security problems, skill issues and sociocultural issues created challenges to adopt BT in the university libraries.
Originality/value
The study has offered theoretical implications for future investigators through the provision of innovative literature on the prospectus and challenges associated with blockchain in the context of librarianship. The study has also provided practical implications for management bodies by offering recommendations for the successful adoption of blockchain in the university libraries. Additionally, a framework has been developed to adopt BT successfully in the university libraries for the delivery of smart library services to library patrons.
Details
Keywords
Liya Wang, Rong Cong, Shuxiang Wang, Sitan Li and Ya Wang
The research aims to explore the influence mechanism of peer feedback and users' knowledge contribution behavior. This study draws on the social identity theory and considers…
Abstract
Purpose
The research aims to explore the influence mechanism of peer feedback and users' knowledge contribution behavior. This study draws on the social identity theory and considers social identity as a mediating factor into the research framework.
Design/methodology/approach
This paper collected users' activity data of 142,191 ideas submitted by 76,647 users from the MIUI community between October 2010 and May 2018 via Python software, and data were processed using Stata 16.0.
Findings
The results indicate that knowledge feedback and social feedback positively influence users' knowledge contribution (quantity and quality), respectively. User's cognitive identity positively mediates the relationship between peer feedback and knowledge contribution behavior, affective identity positively mediates the relationship between peer feedback and knowledge contribution behavior, while evaluative identity positively mediates the relationship between peer feedback and knowledge contribution quality, but there is no mediating effect between peer feedback and knowledge contribution quantity.
Originality/value
This study advances knowledge management by highlighting peer feedback on online innovation communities. By demonstrating the significant mediating effect of social identity, this study empirically clarifies the relationships of peer feedback (knowledge feedback and social feedback) to specific dimensions of knowledge contribution, thereby providing managerial guidance to the online innovation community on incentivizing and managing user interaction to foster the innovation development of firms.
Details