Search results

1 – 10 of over 4000
Open Access
Article
Publication date: 8 August 2024

Mateo Hitl, Nikola Greb and Marina Bagić Babac

The purpose of this study is to investigate how expressing gratitude and forgiveness on social media platforms relates to the overall sentiment of users, aiming to understand the…

215

Abstract

Purpose

The purpose of this study is to investigate how expressing gratitude and forgiveness on social media platforms relates to the overall sentiment of users, aiming to understand the impact of these expressions on social media interactions and individual well-being.

Design/methodology/approach

The hypothesis posits that users who frequently express gratitude or forgiveness will exhibit more positive sentiment in all posts during the observed period, compared to those who express these emotions less often. To test the hypothesis, sentiment analysis and statistical inference will be used. Additionally, topic modelling algorithms will be used to identify and assess the correlation between expressing gratitude and forgiveness and various topics.

Findings

This research paper explores the relationship between expressing gratitude and forgiveness in X (formerly known as Twitter) posts and the overall sentiment of user posts. The findings suggest correlations between expressing these emotions and the overall tone of social media content. The findings of this study can inform future research on how expressing gratitude and forgiveness can affect online sentiment and communication.

Originality/value

The authors have demonstrated that social media users who frequently express gratitude or forgiveness over an extended period of time exhibit a more positive sentiment compared to those who express these emotions less. Additionally, the authors observed that BERTopic modelling analysis performs better than latent dirichlet allocation and Top2Vec modelling analyses when analysing short messages from social media. This research, through the application of innovative techniques and the confirmation of previous theoretical findings, paves the way for further studies in the fields of positive psychology and machine learning.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 22 May 2024

Jia Wang, Qianqian Cao and Xiaogang Zhu

This study aims to examine the effects of multidimensional factors of platform features, group effects and emotional attitudes on social media users’ privacy disclosure intention.

Abstract

Purpose

This study aims to examine the effects of multidimensional factors of platform features, group effects and emotional attitudes on social media users’ privacy disclosure intention.

Design/methodology/approach

This study collected the data from 426 respondents through an online questionnaire survey and conducted two approaches of structural equation modeling (SEM) and fuzzy-set qualitative comparative analysis (fsQCA) for theoretical hypothesis testing and configuration analysis of the data.

Findings

The results show that social media platform features (rewards of information disclosure, personalized service quality and data transparency), group effects (group similarity, group information interaction and network externality), individual emotional attitudes (trust and privacy concern) and control variable (gender) have a significant impact on privacy disclosure intention, as well as trust and privacy concern play mediating roles. Additionally, the fsQCA method reveals five causal configurations that explain high privacy disclosure intentions. Furthermore, the study reveals that male users pay more attention to platform features, while female users are more inclined to group effects.

Originality/value

This study attempts to construct a comprehensive model to examine the factors that affect users' intention to disclose their privacy on social media platforms. Drawing on the cognition-affect-conation model and multidimensional development theory, the model integrates multidimensional factors of platform features, group effects, trust and privacy concern to complement existing theoretical frameworks and privacy disclosure literature. By understanding the complex dynamics behind privacy disclosure, this study helps platform providers and policymakers develop effective strategies to ensure the vitality and momentum of the social media ecosystem.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 11 September 2024

Maria Cristina Longo and Masanori Yasumoto

This research explores how firms manage the complex technologies standardization in action groups. It considers the strategic issues that technology producers face when involving…

Abstract

Purpose

This research explores how firms manage the complex technologies standardization in action groups. It considers the strategic issues that technology producers face when involving lead users in architecture design. Drawing on the multi-mode standardization literature, this study addresses two dilemmas regarding value creation and appropriation by technology producers within coalitions. The first dilemma is how to create value by developing solutions in compliance with industry standards. The second one is how to appropriate value while ensuring the technology sharing with action groups. The answers to these two dilemmas contribute to filling the research gap on value creation and appropriation in multi-mode standardization.

Design/methodology/approach

The research focuses on technology producers participating in action groups where lead users play a crucial role. We conducted a qualitative analysis based on the standardization experience of a Japanese company specializing in smart robotics. Data are collected through semi-structured interviews with key actors. Action groups are defined operationally as a set of stakeholders including competitors of the technology producers, component suppliers, end users, services providers, research centers and academia. The case study is suitable for highlighting specific aspects of the standardization process during its manifestation. It reveals how firms create and appropriate value, providing details about its standardization strategy.

Findings

Our findings show that smart robotics standardization is drivn by collaborative models, where the two dilemmas of value creation and appropriation are evident. Firstly, the case revealed that standardization is lead users oriented. Secondly, lead users’ involvement is crucial to customize technologies. Thirdly, the firm’s position is to share a part of the value with the members. The IPR policy is a matter of interest within action groups, since the collaboration is based on open innovation models to share patents and licenses related knowledge.

Research limitations/implications

This research has some limitations attributable to the limited generalizability of the results due to the qualitative analysis. In addition, this study considers the perspective of technology producers, but should also take into account the perspective of both collective actions itself and the lead users. Findings have some implications in the strategy negotiation. Participating in action groups is not enough to ensure a competitive advantage. Involving lead users is of strategic importance to acquire a competitive advantage. Lead users contribute to the producers’ technology design, helping firms to differentiate solutions from the industry standard and create value from customized technologies.

Practical implications

This study helps practitioners understand the competitive side of collective actions, clarifying the value capture and appropriability in standardization. The research provides insights to policymakers and standard development organizations committees when they are called to harmonize standards considering the fallouts on the sector’s competitiveness. Findings suggest appropriate property rights policies to manage the issues related to the value appropriability and technology sharing, recognizing action groups members for their contribution in value creation.

Originality/value

This study shows how firms deal within action groups with the two dilemmas of variety versus technology conformity and property rights versus technology sharing. It fills the research gap in collective actions, emphasizing the perspective of the individual firm in the group rather than the coalition strategy itself. This topic highlights the crucial role of lead users within action groups in managing the two dilemmas, offering a new perspective for understanding critical issues of multi-mode standardization. Reflecting on mechanisms and tools to manage the two dilemmas allows firms to protect their competitive advantage in coalitions.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 October 2023

Anna Sigridur Islind, Johan Lundin, Katerina Cerna, Tomas Lindroth, Linda Åkeflo and Gunnar Steineck

Designing digital artifacts is not a linear, straightforward process. This is particularly true when applying a user-centered design approach, or co-design, with users who are…

Abstract

Purpose

Designing digital artifacts is not a linear, straightforward process. This is particularly true when applying a user-centered design approach, or co-design, with users who are unable to participate in the design process. Although the reduced participation of a particular user group may harm the end result, the literature on solving this issue is sparse. In this article, proxy design is outlined as a method for involving a user group as proxy users to speak on behalf of a group that is difficult to reach. The article investigates the following research question: How can roleplaying be embedded in co-design to engage users as proxies on behalf of those who are unable to represent themselves?

Design/methodology/approach

The article presents a design ethnography spanning three years at a cancer rehabilitation clinic, where digital artifacts were designed to be used collaboratively by nurses and patients. The empirical data were analyzed using content analysis and consisted of 20 observation days at the clinic, six proxy design workshops, 21 telephone consultations between patients and nurses, and log data from the digital artifact.

Findings

The article shows that simulated consultations, with nurses roleplaying as proxies for patients ignited and initiated the design process and enabled an efficient in-depth understanding of patients. Moreover, the article reveals how proxy design as a method further expanded the design. The study findings illustrate: (1) proxy design as a method for initiating design, (2) proxy design as an embedded element in co-design and (3) six design guidelines that should be considered when engaging in proxy design.

Originality/value

The main contribution is the conceptualization of proxy design as a method that can ignite and initiate the co-design process when important users are unreachable, vulnerable or unable to represent themselves in the co-design process. More specifically, based on the empirical findings from a design ethnography that involved nurses as proxy users speaking on behalf of patients, the article shows that roleplaying in proxy design is a fitting way of initiating the design process, outlining proxy design as an embedded element of co-design.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 May 2024

Xiang Gong, Zhenxin Xiao, Xiaoxiao Liu and Matthew K.O. Lee

Active participation is critical to the survival and development of the multiplayer online battle arena (MOBA) game community. However, this issue has not received much attention…

116

Abstract

Purpose

Active participation is critical to the survival and development of the multiplayer online battle arena (MOBA) game community. However, this issue has not received much attention in the information systems literature. To address this issue, we develop a tripartite model that accounts for the roles of behavioral dedication, constraint, obligation mechanisms on active participation in the MOBA community.

Design/methodology/approach

The research model is empirically validated by online survey data among 971 users of a popular MOBA community.

Findings

The results show that perceived enjoyment, perceived escapism, and affective commitment are key behavioral dedication factors, which further promote active participation in the MOBA community. In addition, past investment, self-efficacy for change, and calculative commitment are important behavioral constraint factors, which ultimately influence active participation in the MOBA community. Finally, subjective norm, group norm, social identity, and normative commitment are influential behavioral obligation factors, which in turn facilitate active participation in the MOBA community.

Originality/value

This study contributes to the theoretical understanding of active participation in the MOBA community and offers practical guidance for promoting active participation in the community.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 8 May 2023

Liya Wang, Rong Cong, Shuxiang Wang, Sitan Li and Ya Wang

The research aims to explore the influence mechanism of peer feedback and users' knowledge contribution behavior. This study draws on the social identity theory and considers…

Abstract

Purpose

The research aims to explore the influence mechanism of peer feedback and users' knowledge contribution behavior. This study draws on the social identity theory and considers social identity as a mediating factor into the research framework.

Design/methodology/approach

This paper collected users' activity data of 142,191 ideas submitted by 76,647 users from the MIUI community between October 2010 and May 2018 via Python software, and data were processed using Stata 16.0.

Findings

The results indicate that knowledge feedback and social feedback positively influence users' knowledge contribution (quantity and quality), respectively. User's cognitive identity positively mediates the relationship between peer feedback and knowledge contribution behavior, affective identity positively mediates the relationship between peer feedback and knowledge contribution behavior, while evaluative identity positively mediates the relationship between peer feedback and knowledge contribution quality, but there is no mediating effect between peer feedback and knowledge contribution quantity.

Originality/value

This study advances knowledge management by highlighting peer feedback on online innovation communities. By demonstrating the significant mediating effect of social identity, this study empirically clarifies the relationships of peer feedback (knowledge feedback and social feedback) to specific dimensions of knowledge contribution, thereby providing managerial guidance to the online innovation community on incentivizing and managing user interaction to foster the innovation development of firms.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 February 2024

Yumeng Feng, Weisong Mu, Yue Li, Tianqi Liu and Jianying Feng

For a better understanding of the preferences and differences of young consumers in emerging wine markets, this study aims to propose a clustering method to segment the super-new…

Abstract

Purpose

For a better understanding of the preferences and differences of young consumers in emerging wine markets, this study aims to propose a clustering method to segment the super-new generation wine consumers based on their sensitivity to wine brand, origin and price and then conduct user profiles for segmented consumer groups from the perspectives of demographic attributes, eating habits and wine sensory attribute preferences.

Design/methodology/approach

We first proposed a consumer clustering perspective based on their sensitivity to wine brand, origin and price and then conducted an adaptive density peak and label propagation layer-by-layer (ADPLP) clustering algorithm to segment consumers, which improved the issues of wrong centers' selection and inaccurate classification of remaining sample points for traditional DPC (DPeak clustering algorithm). Then, we built a consumer profile system from the perspectives of demographic attributes, eating habits and wine sensory attribute preferences for segmented consumer groups.

Findings

In this study, 10 typical public datasets and 6 basic test algorithms are used to evaluate the proposed method, and the results showed that the ADPLP algorithm was optimal or suboptimal on 10 datasets with accuracy above 0.78. The average improvement in accuracy over the base DPC algorithm is 0.184. As an outcome of the wine consumer profiles, sensitive consumers prefer wines with medium prices of 100–400 CNY and more personalized brands and origins, while casual consumers are fond of popular brands, popular origins and low prices within 50 CNY. The wine sensory attributes preferred by super-new generation consumers are red, semi-dry, semi-sweet, still, fresh tasting, fruity, floral and low acid.

Practical implications

Young Chinese consumers are the main driver of wine consumption in the future. This paper provides a tool for decision-makers and marketers to identify the preferences of young consumers quickly which is meaningful and helpful for wine marketing.

Originality/value

In this study, the ADPLP algorithm was introduced for the first time. Subsequently, the user profile label system was constructed for segmented consumers to highlight their characteristics and demand partiality from three aspects: demographic characteristics, consumers' eating habits and consumers' preferences for wine attributes. Moreover, the ADPLP algorithm can be considered for user profiles on other alcoholic products.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 11 September 2024

Rajab Ghandour

The aim of the research is to evaluate different modality for product reviews presentation and its impact on users’ performance, purchase intention and enjoyment.

Abstract

Purpose

The aim of the research is to evaluate different modality for product reviews presentation and its impact on users’ performance, purchase intention and enjoyment.

Design/methodology/approach

The study utilized an experimental approach with 48 opportunistic participants in three groups (16 users per group). Participants were randomly assigned to experimental conditions to ensure unbiased treatment. Data were collected through controlled interventions or manipulations, with pre-defined measures to assess specific outcomes. Statistical techniques such as ANOVA were employed to analyse the data, allowing for comparisons between experimental variables.

Findings

The findings revealed that integrating facial expression avatars and emojis into an e-commerce platform effectively communicates product reviews and ratings. Moreover, the use of animation significantly enhanced user enjoyment. This suggests that visual representations not only convey information effectively but also contribute to a more engaging and enjoyable user experience.

Research limitations/implications

While this experiment offers valuable insights into the impact of different e-commerce presentation layouts on user behaviour, further research could delve deeper into specific aspects such as the influence of individual user characteristics and the long-term effects of layout preferences.

Originality/value

This study contributes original insights by demonstrating the efficacy of facial expressive avatars and emojis in conveying product reviews and ratings within e-commerce platforms. Moreover, it adds value by highlighting the positive impact of animation on user enjoyment. By combining these elements, the research offers a novel approach to enhancing user engagement and understanding of customer feedback in online shopping environments. The findings provide valuable guidance for e-commerce platforms seeking innovative ways to communicate product information effectively and enhance the overall user experience, ultimately benefiting both businesses and consumers.

Details

Journal of Trade Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2815-5793

Keywords

Article
Publication date: 5 December 2023

Agnieszka Maria Koziel and Chien-wen Shen

This research aims to comprehend the factors that impact the emerging inclination of consumers toward mobile finance technology (fintech) services over banking institutions. The…

Abstract

Purpose

This research aims to comprehend the factors that impact the emerging inclination of consumers toward mobile finance technology (fintech) services over banking institutions. The study focuses on users' demographics and psychographics to delineate their unique segments and profiles.

Design/methodology/approach

The study proposes a segmentation and profiling framework that includes variance analysis, two-step cluster analysis and pairwise statistical tests. This framework is applied to a dataset of customers using a range of mobile fintech services, specifically robo-investment, peer-to-peer (P2P) payments, robo-advisory and digital savings. The analysis creates distinct customer profile clusters, which are later validated using pairwise statistical tests based on segmentation output.

Findings

Empirical results reveal that P2P payment service users exhibit a higher frequency of usage, proficiency and intention to continue using the service compared to users of robo-investment or digital savings platforms. In contrast, individuals utilizing robo-advisory services are identified to have a significantly greater familiarity and intention to sustain engagement with the service compared to digital savings users.

Practical implications

The findings provide financial institutions, especially traditional banks with actionable insights into their customer base. This information enables them to identify specific customer needs and preferences, thereby allowing them to tailor products and services accordingly. Ultimately, this understanding may strategically position traditional banks to maintain competitiveness amidst the increasing prominence of fintech enterprises.

Originality/value

This research provides an in-depth examination of customer segments and profiles within the mobile fintech services sphere, thus giving a nuanced understanding of customer behavior and preferences and generating practical recommendations for banks and other financial institutions. This study thereby sets the stage for further research and paves the way for developing personalized products and services in the evolving fintech landscape.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 4000