Search results
1 – 10 of 595Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık
The purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Abstract
Purpose
The purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Design/methodology/approach
This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.
Findings
The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.
Research limitations/implications
This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.
Originality/value
This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.
Details
Keywords
Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung
The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…
Abstract
Purpose
The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.
Design/methodology/approach
A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.
Findings
The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.
Research limitations/implications
This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.
Practical implications
This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.
Social implications
The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.
Originality/value
This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.
Details
Keywords
Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…
Abstract
Purpose
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.
Design/methodology/approach
The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.
Findings
DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.
Originality/value
This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122
Details
Keywords
Tim Wright, Zainab Ruhwanya and Jacques Ophoff
The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…
Abstract
Purpose
The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.
Design/methodology/approach
A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.
Findings
The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.
Practical implications
The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).
Originality/value
This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.
Details
Keywords
Mohd Nazim Mat Nawi, Muhammad Ashraf Fauzi, Irene Wei Kiong Ting, Walton Wider and Gabari Barry Amaka
This study provide an in-depth review on the knowledge structure of green information technology (GIT) adoption and behavior. Environmental degradation has escalated even further…
Abstract
Purpose
This study provide an in-depth review on the knowledge structure of green information technology (GIT) adoption and behavior. Environmental degradation has escalated even further with information and digital technology development. Researchers have come up with a new concept of GIT to dampen the carbon emission due to the excessive use of IT in today’s everyday usage. A similar terminology, green information system (GIS), is a rather broad understanding of GIT, which relates to the environmental management system to improve operations in the organization and will be included in the scope of the study.
Design/methodology/approach
This study presents a science mapping analysis through a bibliometric review to explore emerging trends and predict future trends based on 293 publications in the Web of Science.
Findings
The bibliographic coupling analysis discovered five themes related to the theoretical foundation of GIT and the determinants of their adoption. The five themes are (1) theoretical foundation in GIT, (2) determinants of green IT and IS adoption, (3) fundamental of GIT and information science, (4) green technologies and green computing and (5) determinants of managers green IT adoption behavior. While co-word analysis presents the impact of GIT, driving performance and energy efficiency through the adoption of GIT producing four themes, (1) GIT acceptance through the theory of planned behavior, (2) impact of GIT’s: strategies for sustainable implementation, (3) driving sustainable performance through green innovation in information systems and technology and (4) energy efficiency and sustainability in green computing and cloud computing.
Research limitations/implications
The finding is relevant to managers, researchers and stakeholders bounded by environmental responsibilities to mitigate its impact on the socioeconomic and environment through GIT adoption.
Originality/value
The contribution of this study is presenting an in-depth analysis of the knowledge structure through bibliometric analysis by providing network visualization on one of the crucial pro-environmental behavior.
Details
Keywords
Muhammad Azmi Sait, Muhammad Anshari Ali, Mohammad Nabil Almunawar and Haji Masairol Haji Masri
This exploratory study aims to investigate and identify the factors influencing discontinuance intention among past users of local digital wallets in Brunei Darussalam.
Abstract
Purpose
This exploratory study aims to investigate and identify the factors influencing discontinuance intention among past users of local digital wallets in Brunei Darussalam.
Design/methodology/approach
This study uses a mixed-method approach that integrates quantitative and qualitative research method. An online survey is distributed via widely used social media platforms, using purposive sampling to target previous users of local digital wallets. Structured questionnaires capture demographic data, whereas open-ended inquiries delve into reasons for discontinuation. Descriptive analysis will extract the demographic profiles of the samples. Inductive thematic analysis, guided by Braun and Clarke's framework, will extract and analyze qualitative responses to unveil emergent themes. Data saturation, anticipated beyond 12 responses, will signify sample adequacy.
Findings
Demographic profiles based on gender, age and payment preferences of discontinuers supplement the justification for identified themes influencing digital wallet discontinuation in Brunei Darussalam. These themes include “Acceptability Challenge,” highlighting limited vendor acceptance; “Financial Management and Security Issues,” revealing concerns over impulsive buying behavior and security robustness; “Limited Benefits,” referring to short-term interest driven by promotional benefits; “Technological Inertia,” emphasizing reluctance to change from conventional payment methods and “Technical Challenges,” encompassing internet connectivity and operational functionality issues.
Research limitations/implications
This study acknowledges few limitations, including a limited number of respondents, comprising majorly of the younger age groups and females. Self-reported data usage introduces potential response bias, impacting result validity. The qualitative approach limits comprehensive understanding, suggesting validation through quantitative correlational studies. Additionally, the cross-sectional design restricts insight into the dynamic nature of digital wallet discontinuance in Brunei, suggesting the need for longitudinal studies.
Practical implications
The findings of this study offer valuable insights for digital wallet providers, policymakers and businesses operating within the realm of Brunei Darussalam. By tackling pertinent issues such as vendor acceptance, financial security and promotional incentives, stakeholders can effectively improve user experiences and mitigate intentions of discontinuing usage. Recommended strategies encompass the enlargement of vendor networks, the implementation of stringent security measures and the customization of promotional campaigns. Furthermore, comprehending demographic inclinations enables the tailoring of offerings, thereby fostering enduring adoption rates.
Social implications
This study’s findings hold social significance for financial inclusion, technological literacy and consumer empowerment in Brunei Darussalam. Overcoming barriers to digital wallet adoption, such as limited vendor acceptance, promotes financial inclusion in the long run. Improved understanding of digital wallets enhances technological literacy and empowers users to make informed decisions. By catering to diverse demographic needs, stakeholders can promote social equity and ensure widespread access to digital payment benefits, thus positively impacting Brunei Darussalam’s socioeconomic landscape.
Originality/value
This study contributes to the existing knowledge gap on digital wallet discontinuance in Brunei Darussalam. By uncovering key themes and factors influencing past users’ decisions, it advances understanding in the context of postadoption dynamics. The study provides valuable insights for local and global fintech adoption strategies.
Details
Keywords
Mohd Hafiz Hanafiah, Muhammad Aliff Asyraff, Mohd Noor Ismawi Ismail and Juke Sjukriana
The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the…
Abstract
Purpose
The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the inter-relationship between Gen Z tourist’s perception of M-payment benefits, adoption behaviour, usage risk and future usage intention.
Design/methodology/approach
The sample comprised Malaysian Gen Z individuals (n = 326) who had experience using M-payment methods while travelling outbound. Given the complex nature of the model and the goal to predict and explain relationships within Gen Z's M-payment usage, partial-least square-structural equation modelling was used to assess the study framework and test the proposed relationships.
Findings
This study reveals significant influences on Gen Z tourists' behavioural intentions towards M-payment usage. Perceived benefits, performance expectancy, social influence and perceived trust positively impact behavioural intentions, while effort expectancy exhibits no significant effect. Furthermore, perceived trust is strongly influenced by perceived security, which also positively influences behavioural intentions. A mediated relationship is evident as trust mediating the effect of perceived security on behavioural intentions.
Research limitations/implications
This study’s findings contribute to understanding the intricate relationships influencing Gen Z's M-payment behaviour and underscore trust's pivotal role in mediating the security–behavioural intention relationship.
Originality/value
This study is among the first to consider Mental Accounting Theory and the Unified Theory of Acceptance and Use of Technology as crucial underpinning theories in comprehending the intricate relationships that influence Gen Z travellers' perceptions and behaviours concerning M-payment systems.
Details
Keywords
Himanshu Joshi and Deepak Chawla
The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in…
Abstract
Purpose
The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in mobile wallets enhances user trust (TR), attitude (ATT) and intention (INT). Using a multiple and serial mediation model, both TR and ATT were found to mediate the relationship between PS and BI.
Design/methodology/approach
Drawing on the stimulus-organism-response (S-O-R) theory, the proposed conceptual model comprises PS, TR, ATT and BI. An online survey was conducted with a cross-sectional sample of 744 mobile wallet users in India. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the hypothesized relationships and test the mediation effects.
Findings
Results show that the stimulus, PS, has a positive and significant influence on TR and ATT, which eventually has a positive influence on BI. The research model explains 64.4 percent of the variance in BI. Further, both TR and ATT independently and parallelly mediate the relationship PS and BI. Lastly, gender is found to moderate the relationship between TR and BI and ATT and BI.
Practical implications
The research showed the importance of PS, TR and ATT towards mobile wallet adoption INTs. Further, the findings support the idea that developing TR and ATT is essential for shaping INTs. This suggests that mobile wallet service providers should invest in methods that not just enhance user TR but also reinforce a positive ATT towards the platform. To demonstrate TR, mobile wallet providers must ensure the confidentiality and privacy of user data, keep customer interests in mind and fulfill commitments. Lastly, for strengthening customer TR, excellent customer support is extremely important.
Originality/value
While prior researchers have majorly used technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT) models to explain adoption INTs, this study examines the relationship between PS, TR, ATT and BI through the lens of the SOR framework.
Details
Keywords
Sherly de Yong, Murni Rachmawati and Ima Defiana
This paper aims to identify aspects of how work-life interaction has changed in the post-pandemic situations and propose strategies of the security concept for living-working…
Abstract
Purpose
This paper aims to identify aspects of how work-life interaction has changed in the post-pandemic situations and propose strategies of the security concept for living-working patterns in the post-pandemic interior as future disease prevention.
Design/methodology/approach
We conducted a systematic literature search and review to select previous research systematically and relate concepts by coding the data and synthesising the data critically. The systematic literature search and review considered 90 papers (35 were studied).
Findings
The findings identify three strategies: hybrid activity patterns, new layout for hybrid and changing behaviour and culture. Each strategy demonstrates the connection between the hybrid living-working interior spaces in the post-pandemic period and security-pandemic variables. The results on security design factors focused on interior control, detection and deterrence; connection to nature creates a safer environment to prevent further variables; and hybrid activity requires more elements to govern users' behaviour and culture.
Research limitations/implications
Limitations of this study are as follows: excluded papers that are not written in English/Bahasa or do not have gold/green open access; some aspects were not discussed (such as social distancing); the articles included in this review are up to April 2023 (and there is the possibility of recent papers). Future studies can be developed to update building certification for post-pandemic interiors or research with psychological, social equity or family vitality issues.
Originality/value
The study offers strategies and the holistic relationship between the post-pandemic concept and security-pandemic design variables within the built environment, especially in the users' culture and behaviour context.
Details