Search results

1 – 10 of 18
Article
Publication date: 18 February 2021

Hao Chen, Ofir Turel and Yufei Yuan

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can…

Abstract

Purpose

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.

Design/methodology/approach

By applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.

Findings

Results highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.

Originality/value

Results support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.

Details

Information Technology & People, vol. 35 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 30 December 2022

Hao Chen and Yufei Yuan

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…

Abstract

Purpose

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.

Design/methodology/approach

The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).

Findings

The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.

Originality/value

First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.

Article
Publication date: 18 April 2022

Qi Chen, Ofir Turel and Yufei Yuan

Controversial information systems (IS) represent a unique context in which certain members of a user's social circle may endorse the use of a system while others object to it. The…

Abstract

Purpose

Controversial information systems (IS) represent a unique context in which certain members of a user's social circle may endorse the use of a system while others object to it. The purpose of this paper is to explore the simultaneous and often conflicting roles of such positive and negative social influences through social learning and ambivalence theories in shaping user adoption intention of a representative case of controversial IS, namely online dating services (ODS).

Design/methodology/approach

The model was tested with two empirical studies using structural equation modeling techniques. The data of these studies were collected from 451 (Study 1) and 510 (Study 2) single individuals (i.e. not in a relationship).

Findings

(1) Positive social influence has a stronger impact on perceived benefits and adoption intention, while negative social influence exerts a greater impact on perceived risks; (2) positive and negative social influences affect adoption intention toward ODS differently, through benefit and risk assessments; and (3) ambivalence significantly negatively moderates the effects of social influences on adoption.

Originality/value

This study enriches and extends the IS use, ambivalence theory, prospect theory, and social learning theory research streams. Furthermore, this study suggests that it is necessary to focus on not only the oft-considered positive but also negative social influences in IS research.

Details

Information Technology & People, vol. 36 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 11 June 2018

Cindy Zhiling Tu, Yufei Yuan, Norm Archer and Catherine E. Connelly

Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to…

1820

Abstract

Purpose

Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management. Applying a critical success factor (CSF) analysis approach, this paper aims to propose a CSF model based on a strategic alignment approach and test a model of the main factors that contributes to the success of information security management.

Design/methodology/approach

A theoretical model was proposed and empirically tested with data collected from a survey of managers who were involved in decision-making regarding their companies’ information security (N = 219). The research model was validated using partial least squares structural equation modeling approach.

Findings

Overall, the model was successful in capturing the main antecedents of information security management performance. The results suggest that with business alignment, top management support and organizational awareness of security risks and controls, effective information security controls can be developed, resulting in successful information security management.

Originality/value

Findings from this study provide several important contributions to both theory and practice. The theoretical model identifies and verifies key factors that impact the success of information security management at the organizational level from a strategic management perspective. It provides practical guidelines for organizations to make more effective information security management.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 31 August 2020

Qi Chen, Yufei Yuan, Yuqiang Feng and Norm Archer

Online dating services have been growing rapidly in recent years. However, adopting these services may involve high risk and trust issues among potential users toward both online…

2139

Abstract

Purpose

Online dating services have been growing rapidly in recent years. However, adopting these services may involve high risk and trust issues among potential users toward both online dating services and the daters they introduce to users. The purpose of this paper is to investigate how perceived benefits vs risks, and trust vs distrust affect user adoption vs non-adoption intentions toward using this rather controversial information and communications technology in the context of online dating.

Design/methodology/approach

Structural equation modeling was used to evaluate the research model using data from a survey of 451 single individuals.

Findings

The results indicated that perceived benefits play more essential roles in adoption, while perceived risks affect non-adoption more. Individuals' trust in online dating service predicts a major portion of the variation in user benefit perceptions, while distrust in online dating service and in daters that users might select significantly influence perceived risks. Moreover, benefit and risk perceptions can mediate the impacts of trust and distrust on both adoption and non-adoption decisions.

Originality/value

This study extends theories of decision-making in the use of controversial information technologies such as in the case of online dating. It investigates the coexistence of various trust and distrust beliefs as well as benefit and risk perceptions, and their different impacts on adoption and non-adoption in online dating services.

Article
Publication date: 1 October 2002

Tim McLaren, Milena Head and Yufei Yuan

Collaboration is a recent trend in supply chain management (SCM) that focuses on joint planning, coordination, and process integration between suppliers, customers, and other…

8904

Abstract

Collaboration is a recent trend in supply chain management (SCM) that focuses on joint planning, coordination, and process integration between suppliers, customers, and other partners in a supply chain. Its competitive benefits include cost reductions and increased return on assets, and increased reliability and responsiveness to market needs. Recent advances in inter‐enterprise software and communication technologies, along with a growing use of strategic partnering and outsourcing relationships, has resulted in a confusing assortment of alternative information systems approaches for supporting collaborative SCM. This paper analyzes the alternatives and presents a framework for understanding the expected costs and benefits of each type of system. These costs include not only the total cost of ownership of the system, but also the partnership opportunity cost – the cost of being tied to a partner due to system inflexibility. The benefits of collaborative SCM include process, inventory, and product cost reductions as well as increased cycle times, service levels, and market intelligence.

Details

Internet Research, vol. 12 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 December 2000

Norm Archer and Yufei Yuan

E‐commerce technologies provide effective and efficient ways in which corporate buyers can gather information rapidly about available P/S (products and services), evaluate and…

9418

Abstract

E‐commerce technologies provide effective and efficient ways in which corporate buyers can gather information rapidly about available P/S (products and services), evaluate and negotiate with suppliers, implement order fulfillment over communications links, and access post‐sales services. From the supplier side, marketing, sales, and service information is also readily gathered from customers. Building and maintaining customer relationships is the key to success in e‐commerce and, unless service is maintained, customer loss may result, more than offsetting any cost efficiencies due to introducing e‐commerce technology. Since the core of e‐commerce is information and communications, support for managing customer relationships is available to those who know how to use it. Discusses how technology can be used to encourage and facilitate customer‐business relationships. Shows through a customer relationship life cycle model how the management of related procurement functions in customer companies can adjust to take advantage of these relationships.

Details

Internet Research, vol. 10 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 12 July 2018

Yanni Liu, Dongsheng Liu, Yufei Yuan and Norm Archer

The purpose of this paper is to investigate users’ continuous adoption behaviors on mobile game playing from the perspective of situational habit formation.

1428

Abstract

Purpose

The purpose of this paper is to investigate users’ continuous adoption behaviors on mobile game playing from the perspective of situational habit formation.

Design/methodology/approach

Based on the literature research, a continuous adoption model for situational mobile game is proposed. And the research model is assessed based on data gathered from a sample of 226 mobile game players by employing the structural equation model methodology.

Findings

The results show that situational cues represented by availability, perceived ease of use and diversion lead to repeated performance that can be represented by flow experience and satisfaction in the situational mobile game playing context. But only flow experience and diversion influence continuous usage directly. Additionally diversion, as a critical situational variable, not only indirectly affects continuous usage intention through flow experience, but also directly affects continuous usage intention for situational mobile game playing.

Originality/value

Mobile game adoption has been studied from different perspectives, but most research is based on the technology acceptance model. They could not explain the common fact that young people tend to be highly motivated by mobile games and can be regarded as pro-active mobile game players, but many people play mobile games only when they are bored and need a diversion. So this study attempts to illustrate the phenomena to fill the gaps.

Details

Information Technology & People, vol. 31 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 September 2020

Jiaqing Xu, Weiling Jiao, Hao Chen and Yufei Yuan

Free trial is an effective strategy to gaining users’ data so as to strengthen and optimize product design. The purpose of this paper is to understand the IT companies' dynamic…

Abstract

Purpose

Free trial is an effective strategy to gaining users’ data so as to strengthen and optimize product design. The purpose of this paper is to understand the IT companies' dynamic decision-making behavior in the free trial of IT products and services context based on a three-stage theoretical framework and users' decision-making behavior in the respective stage.

Design/methodology/approach

A three-stage methodology is proposed to clarify relevant decision problems and actions in each stage from IT companies' and users' perspectives, respectively. It then investigates relating variables on IT companies' decision-making based on extant research and users' decision-making.

Findings

In this study, the authors argue that the IT companies have to make the offering, implementation and retention decision in different stage during the whole free trial process. Each decision is determined by several variables from their own and users, namely the offering decision is determined by product characteristics, network effects, product life cycle and WOM (word of mouth); the implementation decision is determined by the quality of products and services, trial type, incentive measures on user's usage and communication strategy; and the retention decision is determined by the product and price strategy.

Practical implications

The results are practical and can be used by IT companies as a decision basis or reference to make reliable decisions so that IT companies can take target measures to ensure the effectiveness of their free trial strategy so as to meet their users' needs based on products designed by data driven. Thus, the ultimate goal of supply chain management is achieved.

Originality/value

In this study, the decision-making process in the free trial of IT products and services context is investigated as a whole for the first time. From the IT companies' perspective, the process includes offering, implementation and retention decision stages, which are continuous and inseparable. The variables that determine IT companies' decision-making are identified based on users' decision and action. Hence, it represents a brand-new whole process perception to clearly understand the dynamic of the IT companies' decision-making. Considering users' decision and action, the final decisions of the IT companies will be more practical in respect of motivating, retaining and upgrading users.

Details

Journal of Enterprise Information Management, vol. 34 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 5 June 2017

Samira Farivar, Ofir Turel and Yufei Yuan

Social commerce websites have emerged as new platforms which integrate social media features with traditional commerce aspects to enhance users’ purchasing experience. The purpose…

2666

Abstract

Purpose

Social commerce websites have emerged as new platforms which integrate social media features with traditional commerce aspects to enhance users’ purchasing experience. The purpose of this paper is to examine the role of social factors such as trust toward site members in determining users’ trust and risk evaluations, and the role of social commerce use habit in attenuating users’ rational risk and trust considerations for developing purchase intentions.

Design/methodology/approach

Relying on the risk deterrence perspective and rational decision-making models involving trust and habit, this study proposes a set of hypotheses which are tested through analyzing survey data using structural equation modeling techniques.

Findings

Results show that commerce risk deters purchasing intentions; trust toward the social commerce website increases users’ purchasing intentions; and trust toward the site members indirectly increases purchasing intentions. Moreover, trust toward site members reduces perceived commerce risk. Findings also show that habit modulates trust and risk effects on use decisions in this context; habit moderates (weakens) the relationships between commerce risk and purchase intentions and between trust toward the social commerce site and purchase intentions.

Originality/value

This study extends theories on decision making in social settings such as in the case of social commerce. It does so by accounting for unique modulating effects of habit in social settings in which social aspects such as trust in other members and risk are unique and important.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 18