Search results

1 – 10 of over 9000
Article
Publication date: 27 August 2019

Shengliang Zhang, Yuan Chen, Xiaodong Li and Guowei Dou

The purpose of this study is to use role expectation theory to identify potential determinants of user voting avoidance on mobile social media.

Abstract

Purpose

The purpose of this study is to use role expectation theory to identify potential determinants of user voting avoidance on mobile social media.

Design/methodology/approach

Data were collected through a survey of 602 WeChat users, and the proposed model was analysed using structural equation modelling.

Findings

Results indicate that user voting avoidance was positively influenced by unfair competition, perceived inauthenticity, perceived information insecurity, over-consumption of renqing (a unique Chinese human relation) and organisation placement in the context of mobile social media.

Originality/value

This study illustrates mobile user voting avoidance from the perspective of role expectation theory and clarifies the importance of avoidance in current voting research.

Details

Kybernetes, vol. 49 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 30 March 2023

Tao Zhou and Yingying Xie

Based on the C-A-C framework, this article examined users' information avoidance intention in social media platforms.

Abstract

Purpose

Based on the C-A-C framework, this article examined users' information avoidance intention in social media platforms.

Design/methodology/approach

The authors conducted data analysis using a mixed method of the SEM and fsQCA.

Findings

The results indicated that information overload, functional overload and social overload influence fatigue and dissatisfaction, both of which further determine users' information avoidance intention. The results of the fsQCA identified two paths that trigger users' information avoidance intention.

Originality/value

Extant studies have examined the information avoidance in the contexts of healthcare, academics and e-commerce, but have seldom explored the mechanism underlying users' information avoidance in social media. To fill this gap, this article will empirically investigate users' information avoidance in social media platforms based on the C-A-C framework.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 2 July 2020

Bao Dai, Ahsan Ali and Hongwei Wang

Grounded on the cognition–affect–conation (C–A–C) framework, this study aims to explore how perceived information overload affects the information avoidance intention of social…

4641

Abstract

Purpose

Grounded on the cognition–affect–conation (C–A–C) framework, this study aims to explore how perceived information overload affects the information avoidance intention of social media users through fatigue, frustration and dissatisfaction.

Design/methodology/approach/methodology/approach

A quantitative research design is adopted. The data collected from 254 respondents in China are analyzed via structural equation modeling (SEM).

Findings

Perceived information overload directly affects fatigue, frustration and dissatisfaction among social media users, thereby affecting their information avoidance intention. In addition, frustration significantly affects social media fatigue and dissatisfaction. Consequently, social media fatigue influences dissatisfaction among users.

Originality/value

The literature review indicates that social media overload and fatigue yield negative behavioral outcomes, including discontinuance. However, rather than completely abstaining or escaping, social media users adopt moderate strategies, including information avoidance, to cope with overload and fatigue owing to their high dependence on social media. Unfortunately, merely few studies are available on the information avoidance behavior of social media users. Focusing on this line of research, the current study develops a model to investigate the antecedents of information avoidance in social media.

Article
Publication date: 27 June 2020

Esther Dzidzah, Kwame Owusu Kwateng and Benjamin Kofi Asante

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in…

Abstract

Purpose

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in cybersecurity threat. Customers are progressively becoming conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour.

Design/methodology/approach

A synthesis of theories – Self-efficacy and technology threat avoidance theories – was used to examine the security behaviour of users of MFSs. Data was gathered from 530 students in Ghana using convenience sampling technique. Data analysis was carried out using descriptive statistics, inferential statistics and structural equation model.

Findings

Outcome of the investigation indicate that both mastery experience and verbal persuasion have substantial effect on the avoidance motivation of MFSs users. It was, however, found that emotional state and vicarious experience of users do not influence their avoidance motivation. Also, it was established that avoidance motivation is a positive prognosticator of avoidance behaviour.

Practical implications

Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the successes achieved.

Originality/value

Studies on user security behaviour are rare, especially in sub Saharan Africa, thus, this study will contribute to extant literature by adding a new dimension of user security behaviour.

Article
Publication date: 3 July 2020

Tai-Yee Wu, Xiaowen Xu and David Atkin

This study integrates the spiral of silence (SoS) theory and theory of planned behavior (TPB) by examining Facebook users' opinion expression avoidance, the reactions to…

Abstract

Purpose

This study integrates the spiral of silence (SoS) theory and theory of planned behavior (TPB) by examining Facebook users' opinion expression avoidance, the reactions to dissenting views without revealing one's true opinion, in the context of political discussions. The present integrative approach provides a more comprehensive framework that expands our understanding of online opinion expression and withdrawal.

Design/methodology/approach

A cross-sectional online survey was employed, which rendered 348 valid responses from US college students (61.5% female; average age 19.11) recruited from a northeastern university.

Findings

The results categorized two sets of opinion avoidance strategies from six Facebook features. The intention to adopt “proactive avoidance strategies” (filtering out unwanted information) is positively related to descriptive norms and perceived self-efficacy, but negatively related to fear of isolation and perceived control of the urge to debate. Regarding the intention to employ “reactive avoidance strategies” (less obtrusive articulations), fear of isolation and attitudes toward opinion expression avoidance are positive determinants, whereas perceived control of the urge to debate again exerts a negative influence.

Originality/value

This study examines the growing variety of features that users adopt to avoid expressing their true opinion in reacting to dissenting views, updating our understanding of opinion circumvention in social media environment. As one of the few theoretically driven empirical investigations of SoS theory and TPB, the findings not only elucidate the significance of perceived behavioral control as the common ground in association with user adoption intention but also identify distinct qualities of the two sets of strategies that affect the likelihood of adoption. That is, proactive avoidance is more susceptible to normative influences, while reactive avoidance reflects user attitude and belief. This theoretical integration also helps identify diverse levels of intentions to strategically avoid opinion expression influenced by fear of isolation.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 22 March 2022

Haiping Zhao, Shengli Deng, Yong Liu, Sudi Xia, Eric Tze Kuan Lim and Chee-Wee Tan

Drawing on the Health Belief Model (HBM), this study aims to investigate the roles of health beliefs (i.e. perceived susceptibility, perceived severity, perceived benefits…

Abstract

Purpose

Drawing on the Health Belief Model (HBM), this study aims to investigate the roles of health beliefs (i.e. perceived susceptibility, perceived severity, perceived benefits, perceived barriers, health self-efficacy and cues to action) in promoting college students’ smartphone avoidance intention.

Design/methodology/approach

Empirical data were collected through a cross-sectional survey questionnaire administered to 4,670 student smartphone users at a large university located in Central China. Further, a two-step Structural Equation Modeling was conducted using AMOS 22.0 software to test the hypothesized relationships in the research model.

Findings

Analytical results indicate that (1) perceived susceptibility, perceived severity, perceived benefits and health self-efficacy positively influence users’ smartphone avoidance intention; (2) perceived barriers negatively influence smartphone avoidance intention, while (3) cues to action reinforce the relationships between perceived susceptibility/perceived benefits and smartphone avoidance intention, but attenuate the relationships between perceived barriers/health self-efficacy and smartphone avoidance intention.

Research limitations/implications

This study demonstrates that HBM is invaluable in explaining and promoting users’ smartphone avoidance intention, thereby extending extant literature on both HBM and smartphone avoidance.

Originality/value

Research on smartphone avoidance is still in a nascent stage. This study contributes to the field by offering a fresh theoretical lens for pursuing this line of inquiry together with robust empirical evidence.

Details

Industrial Management & Data Systems, vol. 122 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 13 August 2014

Jeroen Meijerink, Joost ten Kattelaar and Michel Ehrenhard

The purpose of this study is to explore the use of shared services by end-users and why this may conflict with the use as intended by the shared service center (SSC) management.

Abstract

Purpose

The purpose of this study is to explore the use of shared services by end-users and why this may conflict with the use as intended by the shared service center (SSC) management.

Methodology/approach

By applying structuration theory, this empirical study draws on qualitative data obtained from semi-structured interviews with managers and end-users of an SSC. This SSC is part of a Dutch subsidiary of a multinational corporation that produces professional electronics for the defense and security market.

Findings

We find two main types of shared services usage by end-users which were not intended by the SSC management: avoidance and window-dressing. These forms of unintended usage were the result of contradictions in social structures related to the centralization and decentralization models as appropriated by end-users and management.

Implications

Our findings show that the benefits of shared services depends on how well contradictions in managers’ and end-users’ interpretive schemes, resources, and norms associated with centralization and decentralization models are resolved.

Originality/value

A popular argument in existing studies is that the benefit of shared services follows from the design of the SSC’s organizational structure. These studies overlook the fact that shared services are not always used as their designers intended and, therefore, that success depends on how the SSC’s organizational structure is appropriated by end-users. As such, the originality of this study is our focus on the way shared services are used by their end-users in order to explain why SSCs succeed or fail in reaping their promised benefits.

Details

Shared Services as a New Organizational Form
Type: Book
ISBN: 978-1-78350-536-4

Keywords

Article
Publication date: 3 September 2021

Mark I. Hwang and Susan Helser

Computer games that teach cybersecurity concepts have been developed to help both individuals and organizations shore up their defence against cybercrimes. Evidence of the…

Abstract

Purpose

Computer games that teach cybersecurity concepts have been developed to help both individuals and organizations shore up their defence against cybercrimes. Evidence of the effectiveness of these games has been rather weak, however. This paper aims to guide the design and testing of more effective cybersecurity educational games by developing a theoretical framework.

Design/methodology/approach

A review of the literature is conducted to explore the dependent variable of this research stream, learning outcomes and its relationship with four independent variables, game characteristics, game context, learning theory and user characteristics.

Findings

The dependent variable can be measured by five learning outcomes: information, content, strategic knowledge, eagerness to learn/time spent and behavioral change. Game characteristics refer to features that contribute to a game’s usefulness, interactivity, playfulness or attractiveness. Game context pertains to factors that determine how a game is used, including the target audience, the skill involved and the story. Learning theory explains how learning takes place and can be classified as behaviorism, cognitivism, humanism, social learning or constructivism. User characteristics including gender, age, computer experience, knowledge and perception, are attributes that can impact users’ susceptibility to cybercrimes and hence learning outcomes.

Originality/value

The framework facilitates taking stock of past research and guiding future research. The use of the framework is illustrated in a critique of two research streams. Multiple research directions are discussed for continued research into the design and testing of next-generation cybersecurity computer games.

Article
Publication date: 18 April 2022

Donghee Shin, Saifeddin Al-Imamy and Yujong Hwang

How does algorithmic information processing affect the thoughts and behavior of artificial intelligence (AI) users? In this study, the authors address this question by focusing on…

Abstract

Purpose

How does algorithmic information processing affect the thoughts and behavior of artificial intelligence (AI) users? In this study, the authors address this question by focusing on algorithm-based chatbots and examine the influence of culture on algorithms as a form of digital intermediation.

Design/methodology/approach

The authors conducted a study comparing the United States (US) and Japan to examine how users in the two countries perceive the features of chatbot services and how the perceived features affect user trust and emotion.

Findings

Clear differences emerged after comparing algorithmic information processes involved in using and interacting with chatbots. Major attitudes toward chatbots are similar between the two cultures, although the weights placed on qualities differ. Japanese users put more weight on the functional qualities of chatbots, and US users place greater emphasis on non-functional qualities of algorithms in chatbots. US users appear more likely to anthropomorphize and accept explanations of algorithmic features than Japanese users.

Research limitations/implications

Different patterns of chatbot news adoption reveal that the acceptance of chatbots involves a cultural dimension as the algorithms reflect the values and interests of their constituencies. How users perceive chatbots and how they consume and interact with the chatbots depends on the cultural context in which the experience is situated.

Originality/value

A comparative juxtaposition of cultural-algorithmic interactions offers a useful way to examine how cultural values influence user behaviors and identify factors that influence attitude and user acceptance. Results imply that chatbots can be a cultural artifact, and chatbot journalism (CJ) can be a socially contextualized practice that is driven by the user's input and behavior, which are reflections of cultural values and practices.

Details

Cross Cultural & Strategic Management, vol. 29 no. 3
Type: Research Article
ISSN: 2059-5794

Keywords

Article
Publication date: 13 September 2023

Shimin Yin, Bin Li and Qi Zhou

Skippable video advertising offers users the option to skip directly to their desired video content after viewing a limited amount of advertising and is becoming a format…

Abstract

Purpose

Skippable video advertising offers users the option to skip directly to their desired video content after viewing a limited amount of advertising and is becoming a format increasingly preferred by advertisers. This study constructed a mediator model based on advertising attitude to examine the influence of users' perceived control and perceived intrusiveness on brand attitude and advertising avoidance intention in skippable video ads.

Design/methodology/approach

The study considered the structural equation model using a self-reporting measure method. The research model was tested using a sample of 302 respondents.

Findings

The results showed that perceived control positively affected ad and brand attitude and negatively affected advertising avoidance intention. Perceived intrusiveness negatively affected attitudes toward the advertising and the brand but positively affected advertising avoidance intention. Ad attitude and brand attitude had no significant influence on advertising avoidance intention. The results also confirmed that ad attitude mediates the path from perceived control and intrusiveness to brand attitude.

Originality/value

This study further enriches the theoretical development of skippable video ads and expands the perspective and scope of interactive advertising research.

Details

Marketing Intelligence & Planning, vol. 41 no. 8
Type: Research Article
ISSN: 0263-4503

Keywords

1 – 10 of over 9000