Search results

1 – 10 of 595
Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…

Abstract

Purpose

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.

Design/methodology/approach

A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.

Findings

The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.

Research limitations/implications

This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.

Practical implications

This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.

Social implications

The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.

Originality/value

This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 28 February 2024

Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu

Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…

Abstract

Purpose

Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.

Design/methodology/approach

The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.

Findings

DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.

Originality/value

This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 March 2024

Mohd Nazim Mat Nawi, Muhammad Ashraf Fauzi, Irene Wei Kiong Ting, Walton Wider and Gabari Barry Amaka

This study provide an in-depth review on the knowledge structure of green information technology (GIT) adoption and behavior. Environmental degradation has escalated even further…

Abstract

Purpose

This study provide an in-depth review on the knowledge structure of green information technology (GIT) adoption and behavior. Environmental degradation has escalated even further with information and digital technology development. Researchers have come up with a new concept of GIT to dampen the carbon emission due to the excessive use of IT in today’s everyday usage. A similar terminology, green information system (GIS), is a rather broad understanding of GIT, which relates to the environmental management system to improve operations in the organization and will be included in the scope of the study.

Design/methodology/approach

This study presents a science mapping analysis through a bibliometric review to explore emerging trends and predict future trends based on 293 publications in the Web of Science.

Findings

The bibliographic coupling analysis discovered five themes related to the theoretical foundation of GIT and the determinants of their adoption. The five themes are (1) theoretical foundation in GIT, (2) determinants of green IT and IS adoption, (3) fundamental of GIT and information science, (4) green technologies and green computing and (5) determinants of managers green IT adoption behavior. While co-word analysis presents the impact of GIT, driving performance and energy efficiency through the adoption of GIT producing four themes, (1) GIT acceptance through the theory of planned behavior, (2) impact of GIT’s: strategies for sustainable implementation, (3) driving sustainable performance through green innovation in information systems and technology and (4) energy efficiency and sustainability in green computing and cloud computing.

Research limitations/implications

The finding is relevant to managers, researchers and stakeholders bounded by environmental responsibilities to mitigate its impact on the socioeconomic and environment through GIT adoption.

Originality/value

The contribution of this study is presenting an in-depth analysis of the knowledge structure through bibliometric analysis by providing network visualization on one of the crucial pro-environmental behavior.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 March 2024

Muhammad Azmi Sait, Muhammad Anshari Ali, Mohammad Nabil Almunawar and Haji Masairol Haji Masri

This exploratory study aims to investigate and identify the factors influencing discontinuance intention among past users of local digital wallets in Brunei Darussalam.

Abstract

Purpose

This exploratory study aims to investigate and identify the factors influencing discontinuance intention among past users of local digital wallets in Brunei Darussalam.

Design/methodology/approach

This study uses a mixed-method approach that integrates quantitative and qualitative research method. An online survey is distributed via widely used social media platforms, using purposive sampling to target previous users of local digital wallets. Structured questionnaires capture demographic data, whereas open-ended inquiries delve into reasons for discontinuation. Descriptive analysis will extract the demographic profiles of the samples. Inductive thematic analysis, guided by Braun and Clarke's framework, will extract and analyze qualitative responses to unveil emergent themes. Data saturation, anticipated beyond 12 responses, will signify sample adequacy.

Findings

Demographic profiles based on gender, age and payment preferences of discontinuers supplement the justification for identified themes influencing digital wallet discontinuation in Brunei Darussalam. These themes include “Acceptability Challenge,” highlighting limited vendor acceptance; “Financial Management and Security Issues,” revealing concerns over impulsive buying behavior and security robustness; “Limited Benefits,” referring to short-term interest driven by promotional benefits; “Technological Inertia,” emphasizing reluctance to change from conventional payment methods and “Technical Challenges,” encompassing internet connectivity and operational functionality issues.

Research limitations/implications

This study acknowledges few limitations, including a limited number of respondents, comprising majorly of the younger age groups and females. Self-reported data usage introduces potential response bias, impacting result validity. The qualitative approach limits comprehensive understanding, suggesting validation through quantitative correlational studies. Additionally, the cross-sectional design restricts insight into the dynamic nature of digital wallet discontinuance in Brunei, suggesting the need for longitudinal studies.

Practical implications

The findings of this study offer valuable insights for digital wallet providers, policymakers and businesses operating within the realm of Brunei Darussalam. By tackling pertinent issues such as vendor acceptance, financial security and promotional incentives, stakeholders can effectively improve user experiences and mitigate intentions of discontinuing usage. Recommended strategies encompass the enlargement of vendor networks, the implementation of stringent security measures and the customization of promotional campaigns. Furthermore, comprehending demographic inclinations enables the tailoring of offerings, thereby fostering enduring adoption rates.

Social implications

This study’s findings hold social significance for financial inclusion, technological literacy and consumer empowerment in Brunei Darussalam. Overcoming barriers to digital wallet adoption, such as limited vendor acceptance, promotes financial inclusion in the long run. Improved understanding of digital wallets enhances technological literacy and empowers users to make informed decisions. By catering to diverse demographic needs, stakeholders can promote social equity and ensure widespread access to digital payment benefits, thus positively impacting Brunei Darussalam’s socioeconomic landscape.

Originality/value

This study contributes to the existing knowledge gap on digital wallet discontinuance in Brunei Darussalam. By uncovering key themes and factors influencing past users’ decisions, it advances understanding in the context of postadoption dynamics. The study provides valuable insights for local and global fintech adoption strategies.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 21 February 2024

Mohd Hafiz Hanafiah, Muhammad Aliff Asyraff, Mohd Noor Ismawi Ismail and Juke Sjukriana

The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the…

Abstract

Purpose

The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the inter-relationship between Gen Z tourist’s perception of M-payment benefits, adoption behaviour, usage risk and future usage intention.

Design/methodology/approach

The sample comprised Malaysian Gen Z individuals (n = 326) who had experience using M-payment methods while travelling outbound. Given the complex nature of the model and the goal to predict and explain relationships within Gen Z's M-payment usage, partial-least square-structural equation modelling was used to assess the study framework and test the proposed relationships.

Findings

This study reveals significant influences on Gen Z tourists' behavioural intentions towards M-payment usage. Perceived benefits, performance expectancy, social influence and perceived trust positively impact behavioural intentions, while effort expectancy exhibits no significant effect. Furthermore, perceived trust is strongly influenced by perceived security, which also positively influences behavioural intentions. A mediated relationship is evident as trust mediating the effect of perceived security on behavioural intentions.

Research limitations/implications

This study’s findings contribute to understanding the intricate relationships influencing Gen Z's M-payment behaviour and underscore trust's pivotal role in mediating the security–behavioural intention relationship.

Originality/value

This study is among the first to consider Mental Accounting Theory and the Unified Theory of Acceptance and Use of Technology as crucial underpinning theories in comprehending the intricate relationships that influence Gen Z travellers' perceptions and behaviours concerning M-payment systems.

Details

Young Consumers, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 26 February 2024

Himanshu Joshi and Deepak Chawla

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in…

Abstract

Purpose

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in mobile wallets enhances user trust (TR), attitude (ATT) and intention (INT). Using a multiple and serial mediation model, both TR and ATT were found to mediate the relationship between PS and BI.

Design/methodology/approach

Drawing on the stimulus-organism-response (S-O-R) theory, the proposed conceptual model comprises PS, TR, ATT and BI. An online survey was conducted with a cross-sectional sample of 744 mobile wallet users in India. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the hypothesized relationships and test the mediation effects.

Findings

Results show that the stimulus, PS, has a positive and significant influence on TR and ATT, which eventually has a positive influence on BI. The research model explains 64.4 percent of the variance in BI. Further, both TR and ATT independently and parallelly mediate the relationship PS and BI. Lastly, gender is found to moderate the relationship between TR and BI and ATT and BI.

Practical implications

The research showed the importance of PS, TR and ATT towards mobile wallet adoption INTs. Further, the findings support the idea that developing TR and ATT is essential for shaping INTs. This suggests that mobile wallet service providers should invest in methods that not just enhance user TR but also reinforce a positive ATT towards the platform. To demonstrate TR, mobile wallet providers must ensure the confidentiality and privacy of user data, keep customer interests in mind and fulfill commitments. Lastly, for strengthening customer TR, excellent customer support is extremely important.

Originality/value

While prior researchers have majorly used technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT) models to explain adoption INTs, this study examines the relationship between PS, TR, ATT and BI through the lens of the SOR framework.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 23 February 2024

Sherly de Yong, Murni Rachmawati and Ima Defiana

This paper aims to identify aspects of how work-life interaction has changed in the post-pandemic situations and propose strategies of the security concept for living-working…

Abstract

Purpose

This paper aims to identify aspects of how work-life interaction has changed in the post-pandemic situations and propose strategies of the security concept for living-working patterns in the post-pandemic interior as future disease prevention.

Design/methodology/approach

We conducted a systematic literature search and review to select previous research systematically and relate concepts by coding the data and synthesising the data critically. The systematic literature search and review considered 90 papers (35 were studied).

Findings

The findings identify three strategies: hybrid activity patterns, new layout for hybrid and changing behaviour and culture. Each strategy demonstrates the connection between the hybrid living-working interior spaces in the post-pandemic period and security-pandemic variables. The results on security design factors focused on interior control, detection and deterrence; connection to nature creates a safer environment to prevent further variables; and hybrid activity requires more elements to govern users' behaviour and culture.

Research limitations/implications

Limitations of this study are as follows: excluded papers that are not written in English/Bahasa or do not have gold/green open access; some aspects were not discussed (such as social distancing); the articles included in this review are up to April 2023 (and there is the possibility of recent papers). Future studies can be developed to update building certification for post-pandemic interiors or research with psychological, social equity or family vitality issues.

Originality/value

The study offers strategies and the holistic relationship between the post-pandemic concept and security-pandemic design variables within the built environment, especially in the users' culture and behaviour context.

Details

International Journal of Workplace Health Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8351

Keywords

Access

Year

Last 3 months (595)

Content type

Earlycite article (595)
1 – 10 of 595