Search results

1 – 10 of 16
To view the access options for this content please click here
Article
Publication date: 18 February 2021

Hao Chen, Ofir Turel and Yufei Yuan

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in…

Abstract

Purpose

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.

Design/methodology/approach

By applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.

Findings

Results highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.

Originality/value

Results support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 31 August 2020

Qi Chen, Yufei Yuan, Yuqiang Feng and Norm Archer

Online dating services have been growing rapidly in recent years. However, adopting these services may involve high risk and trust issues among potential users toward both…

Abstract

Purpose

Online dating services have been growing rapidly in recent years. However, adopting these services may involve high risk and trust issues among potential users toward both online dating services and the daters they introduce to users. The purpose of this paper is to investigate how perceived benefits vs risks, and trust vs distrust affect user adoption vs non-adoption intentions toward using this rather controversial information and communications technology in the context of online dating.

Design/methodology/approach

Structural equation modeling was used to evaluate the research model using data from a survey of 451 single individuals.

Findings

The results indicated that perceived benefits play more essential roles in adoption, while perceived risks affect non-adoption more. Individuals' trust in online dating service predicts a major portion of the variation in user benefit perceptions, while distrust in online dating service and in daters that users might select significantly influence perceived risks. Moreover, benefit and risk perceptions can mediate the impacts of trust and distrust on both adoption and non-adoption decisions.

Originality/value

This study extends theories of decision-making in the use of controversial information technologies such as in the case of online dating. It investigates the coexistence of various trust and distrust beliefs as well as benefit and risk perceptions, and their different impacts on adoption and non-adoption in online dating services.

To view the access options for this content please click here
Article
Publication date: 11 June 2018

Cindy Zhiling Tu, Yufei Yuan, Norm Archer and Catherine E. Connelly

Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive…

Abstract

Purpose

Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management. Applying a critical success factor (CSF) analysis approach, this paper aims to propose a CSF model based on a strategic alignment approach and test a model of the main factors that contributes to the success of information security management.

Design/methodology/approach

A theoretical model was proposed and empirically tested with data collected from a survey of managers who were involved in decision-making regarding their companies’ information security (N = 219). The research model was validated using partial least squares structural equation modeling approach.

Findings

Overall, the model was successful in capturing the main antecedents of information security management performance. The results suggest that with business alignment, top management support and organizational awareness of security risks and controls, effective information security controls can be developed, resulting in successful information security management.

Originality/value

Findings from this study provide several important contributions to both theory and practice. The theoretical model identifies and verifies key factors that impact the success of information security management at the organizational level from a strategic management perspective. It provides practical guidelines for organizations to make more effective information security management.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 2002

Tim McLaren, Milena Head and Yufei Yuan

Collaboration is a recent trend in supply chain management (SCM) that focuses on joint planning, coordination, and process integration between suppliers, customers, and…

Abstract

Collaboration is a recent trend in supply chain management (SCM) that focuses on joint planning, coordination, and process integration between suppliers, customers, and other partners in a supply chain. Its competitive benefits include cost reductions and increased return on assets, and increased reliability and responsiveness to market needs. Recent advances in inter‐enterprise software and communication technologies, along with a growing use of strategic partnering and outsourcing relationships, has resulted in a confusing assortment of alternative information systems approaches for supporting collaborative SCM. This paper analyzes the alternatives and presents a framework for understanding the expected costs and benefits of each type of system. These costs include not only the total cost of ownership of the system, but also the partnership opportunity cost – the cost of being tied to a partner due to system inflexibility. The benefits of collaborative SCM include process, inventory, and product cost reductions as well as increased cycle times, service levels, and market intelligence.

Details

Internet Research, vol. 12 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 1 December 2000

Norm Archer and Yufei Yuan

E‐commerce technologies provide effective and efficient ways in which corporate buyers can gather information rapidly about available P/S (products and services), evaluate…

Abstract

E‐commerce technologies provide effective and efficient ways in which corporate buyers can gather information rapidly about available P/S (products and services), evaluate and negotiate with suppliers, implement order fulfillment over communications links, and access post‐sales services. From the supplier side, marketing, sales, and service information is also readily gathered from customers. Building and maintaining customer relationships is the key to success in e‐commerce and, unless service is maintained, customer loss may result, more than offsetting any cost efficiencies due to introducing e‐commerce technology. Since the core of e‐commerce is information and communications, support for managing customer relationships is available to those who know how to use it. Discusses how technology can be used to encourage and facilitate customer‐business relationships. Shows through a customer relationship life cycle model how the management of related procurement functions in customer companies can adjust to take advantage of these relationships.

Details

Internet Research, vol. 10 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 29 September 2020

Jiaqing Xu, Weiling Jiao, Hao Chen and Yufei Yuan

Free trial is an effective strategy to gaining users’ data so as to strengthen and optimize product design. The purpose of this paper is to understand the IT companies'…

Abstract

Purpose

Free trial is an effective strategy to gaining users’ data so as to strengthen and optimize product design. The purpose of this paper is to understand the IT companies' dynamic decision-making behavior in the free trial of IT products and services context based on a three-stage theoretical framework and users' decision-making behavior in the respective stage.

Design/methodology/approach

A three-stage methodology is proposed to clarify relevant decision problems and actions in each stage from IT companies' and users' perspectives, respectively. It then investigates relating variables on IT companies' decision-making based on extant research and users' decision-making.

Findings

In this study, the authors argue that the IT companies have to make the offering, implementation and retention decision in different stage during the whole free trial process. Each decision is determined by several variables from their own and users, namely the offering decision is determined by product characteristics, network effects, product life cycle and WOM (word of mouth); the implementation decision is determined by the quality of products and services, trial type, incentive measures on user's usage and communication strategy; and the retention decision is determined by the product and price strategy.

Practical implications

The results are practical and can be used by IT companies as a decision basis or reference to make reliable decisions so that IT companies can take target measures to ensure the effectiveness of their free trial strategy so as to meet their users' needs based on products designed by data driven. Thus, the ultimate goal of supply chain management is achieved.

Originality/value

In this study, the decision-making process in the free trial of IT products and services context is investigated as a whole for the first time. From the IT companies' perspective, the process includes offering, implementation and retention decision stages, which are continuous and inseparable. The variables that determine IT companies' decision-making are identified based on users' decision and action. Hence, it represents a brand-new whole process perception to clearly understand the dynamic of the IT companies' decision-making. Considering users' decision and action, the final decisions of the IT companies will be more practical in respect of motivating, retaining and upgrading users.

Details

Journal of Enterprise Information Management, vol. 34 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article
Publication date: 12 July 2018

Yanni Liu, Dongsheng Liu, Yufei Yuan and Norm Archer

The purpose of this paper is to investigate users’ continuous adoption behaviors on mobile game playing from the perspective of situational habit formation.

Abstract

Purpose

The purpose of this paper is to investigate users’ continuous adoption behaviors on mobile game playing from the perspective of situational habit formation.

Design/methodology/approach

Based on the literature research, a continuous adoption model for situational mobile game is proposed. And the research model is assessed based on data gathered from a sample of 226 mobile game players by employing the structural equation model methodology.

Findings

The results show that situational cues represented by availability, perceived ease of use and diversion lead to repeated performance that can be represented by flow experience and satisfaction in the situational mobile game playing context. But only flow experience and diversion influence continuous usage directly. Additionally diversion, as a critical situational variable, not only indirectly affects continuous usage intention through flow experience, but also directly affects continuous usage intention for situational mobile game playing.

Originality/value

Mobile game adoption has been studied from different perspectives, but most research is based on the technology acceptance model. They could not explain the common fact that young people tend to be highly motivated by mobile games and can be regarded as pro-active mobile game players, but many people play mobile games only when they are bored and need a diversion. So this study attempts to illustrate the phenomena to fill the gaps.

Details

Information Technology & People, vol. 31 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 5 June 2017

Samira Farivar, Ofir Turel and Yufei Yuan

Social commerce websites have emerged as new platforms which integrate social media features with traditional commerce aspects to enhance users’ purchasing experience. The…

Abstract

Purpose

Social commerce websites have emerged as new platforms which integrate social media features with traditional commerce aspects to enhance users’ purchasing experience. The purpose of this paper is to examine the role of social factors such as trust toward site members in determining users’ trust and risk evaluations, and the role of social commerce use habit in attenuating users’ rational risk and trust considerations for developing purchase intentions.

Design/methodology/approach

Relying on the risk deterrence perspective and rational decision-making models involving trust and habit, this study proposes a set of hypotheses which are tested through analyzing survey data using structural equation modeling techniques.

Findings

Results show that commerce risk deters purchasing intentions; trust toward the social commerce website increases users’ purchasing intentions; and trust toward the site members indirectly increases purchasing intentions. Moreover, trust toward site members reduces perceived commerce risk. Findings also show that habit modulates trust and risk effects on use decisions in this context; habit moderates (weakens) the relationships between commerce risk and purchase intentions and between trust toward the social commerce site and purchase intentions.

Originality/value

This study extends theories on decision making in social settings such as in the case of social commerce. It does so by accounting for unique modulating effects of habit in social settings in which social aspects such as trust in other members and risk are unique and important.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 2 September 2013

Greg J. Sears, Haiyan Zhang, Willi H. Wiesner, Rick D. Hackett and Yufei Yuan

Based on theories of media richness and procedural justice, the authors aim to examine the influence of videoconferencing (VC) technology on applicant reactions and…

Abstract

Purpose

Based on theories of media richness and procedural justice, the authors aim to examine the influence of videoconferencing (VC) technology on applicant reactions and interviewer judgments in the employment interview, the most commonly used employee selection device.

Design/methodology/approach

MBA students participated in simulated VC and face-to-face (FTF) interviews. Applicant perceptions of procedural justice and interviewer characteristics were collected. Interviewers provided ratings of affect toward the applicant, perceived applicant competence, overall interview performance, as well as an overall hiring recommendation.

Findings

Applicants perceived VC interviews as offering less of a chance to perform and as yielding less selection information. They also viewed VC interviews as less job-related than FTF interviews and had significantly less favorable evaluations of their interviewer (on personableness, trustworthiness, competence, and physical appearance) in VC interviews. Finally, applicants in VC interviews received lower ratings of affect (likeability) and lower interview scores, and were less likely to be recommended for the position.

Research limitations/implications

The authors' findings suggest that VC technology can adversely affect both applicant reactions and interviewer judgments. They propose several precautionary steps to help minimize the risks associated with conducting VC interviews.

Originality/value

The authors extend prior research concerning the use of VC interviews by directly assessing applicant perceptions of both procedural justice and of interviewer characteristics associated with the probability that job offers will be accepted. They also add to the literature in showing that VC interviews tend to result in less favorable evaluations of applicants than FTF interviews.

Content available
Article
Publication date: 1 December 2000

David G. Schwartz

Abstract

Details

Internet Research, vol. 10 no. 5
Type: Research Article
ISSN: 1066-2243

1 – 10 of 16