Search results

1 – 10 of over 217000
Article
Publication date: 1 December 2003

Kwo‐Shing Hong, Yen‐Ping Chi, Louis R. Chao and Jih‐Hsing Tang

With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of…

18263

Abstract

With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of attention from both academia and practitioners. However, there is lacking a theoretical framework for information security management. This paper attempts to integrate security policy theory, risk management theory, control and auditing theory, management system theory and contingency theory in order to build a comprehensive theory of information security management (ISM). This paper suggests that an integrated system theory is useful for understanding information security management, explaining information security management strategies, and predicting management outcomes. This theory may lay a solid theoretical foundation for further empirical research and application.

Details

Information Management & Computer Security, vol. 11 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 14 December 2022

Jane Garner

This paper serves to test the validity of Chatman’s theory of “Life Lived in the Round” within a modern prison context. In particular, it examines Propositions Five and Six of her…

Abstract

Purpose

This paper serves to test the validity of Chatman’s theory of “Life Lived in the Round” within a modern prison context. In particular, it examines Propositions Five and Six of her theory.

Design/methodology/approach

Data regarding the information-seeking practices of Australian adult female and male prisoners from maximum-, medium- and minimum-security facilities was gathered through 106 surveys and 27 semi-structured interviews. Participants’ information-seeking from sources internal and external to the “small world” of the prison was described. The information behaviours of the participants were examined against Chatman’s theory of “Life in the Round” to determine its applicability in the prison context.

Findings

The data gathered does not support Chatman’s theory of “Life Lived in the Round”, despite that theory being developed in a prison context. Neither Proposition Five nor Proposition Six of Chatman’s theory can be supported when examined in the light of the current data.

Research limitations/implications

The inability of the data to support Chatman’s theory requires a reassessment of the applicability of the theory, at least to the prison context. As the theory was generated in part from a prison study, the foundational understandings of the theory could be questioned as a result of this current research.

Originality/value

Although Chatman’s theory has been examined against the information behaviours of other “Small World” communities, none of these studies have taken the theory back to the prison context from which the theory was developed. This study is also novel as its findings do not support Chatman’s theory, in contrast to other previously published examinations.

Details

Journal of Documentation, vol. 79 no. 4
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 October 1996

Guy Jumarie

Surveys some of the important contributions of information theory (IT) to the understanding of systems science and cybernetics. Presents a short background on the main definitions…

Abstract

Surveys some of the important contributions of information theory (IT) to the understanding of systems science and cybernetics. Presents a short background on the main definitions of IT, and examines in which way IT could be thought of as a unified approach to general systems. Analyses the topics: syntax and semantics in information, information and self‐organization, entropy of forms (entropy of non‐random functions), and information in dynamical systems. Enumerates some suggestions for further research and takes this opportunity to describe new points of view, mainly by using entropy of non‐random functions.

Details

Kybernetes, vol. 25 no. 7/8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 3 May 2019

Liangzhi Yu

Based on the assumption that information access disparity is a highly complex phenomenon demanding integrative explications that heed both structure and agency, the purpose of…

Abstract

Purpose

Based on the assumption that information access disparity is a highly complex phenomenon demanding integrative explications that heed both structure and agency, the purpose of this paper is to outline the theoretical background against which endeavours to develop such explanations can be planned.

Design/methodology/approach

The study is based on a close reading of: existing explanations of information access disparity; research of other library and information science (LIS) issues that have demonstrated conscious attempts to bridge structure and agency; and cross-disciplinary integrative theories that have served as foundations for LIS research. Explanatory power of the first and applicability of the latter two are critically assessed; lessons for future research are drawn.

Findings

The examination shows that efforts to develop integrative theories for information access disparity are emerging but remain indistinct; integrative frameworks for other LIS phenomena exist but are developed primarily by adopting concepts from cross-disciplinary theories and are, therefore, both enabled and constrained by them. It also shows that cross-disciplinary integrative theories contribute to LIS by exporting the general integrative theorising approach and a range of specific concepts but, owing to their limitations in dealing with information-specific issues, their adequacy for explaining information access disparity cannot be assumed.

Originality/value

The study demonstrates that a promising way forward for developing integrative theories of information access disparity is to follow the general integrative approach, but to ground related concepts and propositions in empirical data alone, i.e., to begin the journey of integrative theorising theory-free.

Details

Journal of Documentation, vol. 75 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Book part
Publication date: 10 December 2015

Chun Kit Lok

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior…

Abstract

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior of E-payment systems that employ smart card technology becomes a research area that is of particular value and interest to both IS researchers and professionals. However, research interest focuses mostly on why a smart card-based E-payment system results in a failure or how the system could have grown into a success. This signals the fact that researchers have not had much opportunity to critically review a smart card-based E-payment system that has gained wide support and overcome the hurdle of critical mass adoption. The Octopus in Hong Kong has provided a rare opportunity for investigating smart card-based E-payment system because of its unprecedented success. This research seeks to thoroughly analyze the Octopus from technology adoption behavior perspectives.

Cultural impacts on adoption behavior are one of the key areas that this research posits to investigate. Since the present research is conducted in Hong Kong where a majority of population is Chinese ethnicity and yet is westernized in a number of aspects, assuming that users in Hong Kong are characterized by eastern or western culture is less useful. Explicit cultural characteristics at individual level are tapped into here instead of applying generalization of cultural beliefs to users to more accurately reflect cultural bias. In this vein, the technology acceptance model (TAM) is adapted, extended, and tested for its applicability cross-culturally in Hong Kong on the Octopus. Four cultural dimensions developed by Hofstede are included in this study, namely uncertainty avoidance, masculinity, individualism, and Confucian Dynamism (long-term orientation), to explore their influence on usage behavior through the mediation of perceived usefulness.

TAM is also integrated with the innovation diffusion theory (IDT) to borrow two constructs in relation to innovative characteristics, namely relative advantage and compatibility, in order to enhance the explanatory power of the proposed research model. Besides, the normative accountability of the research model is strengthened by embracing two social influences, namely subjective norm and image. As the last antecedent to perceived usefulness, prior experience serves to bring in the time variation factor to allow level of prior experience to exert both direct and moderating effects on perceived usefulness.

The resulting research model is analyzed by partial least squares (PLS)-based Structural Equation Modeling (SEM) approach. The research findings reveal that all cultural dimensions demonstrate direct effect on perceived usefulness though the influence of uncertainty avoidance is found marginally significant. Other constructs on innovative characteristics and social influences are validated to be significant as hypothesized. Prior experience does indeed significantly moderate the two influences that perceived usefulness receives from relative advantage and compatibility, respectively. The research model has demonstrated convincing explanatory power and so may be employed for further studies in other contexts. In particular, cultural effects play a key role in contributing to the uniqueness of the model, enabling it to be an effective tool to help critically understand increasingly internationalized IS system development and implementation efforts. This research also suggests several practical implications in view of the findings that could better inform managerial decisions for designing, implementing, or promoting smart card-based E-payment system.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Book part
Publication date: 28 September 2015

Md Shah Azam

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and…

Abstract

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and non-economic activities. Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs. Past studies have shown that the contribution of ICT to the performance of SMEs is not clear and certain. Thus, it is crucial to determine the effectiveness of ICT in generating firm performance since this has implications for SMEs’ expenditure on the technology. This research examines the diffusion of ICT among SMEs with respect to the typical stages from innovation adoption to post-adoption, by analysing the actual usage of ICT and value creation. The mediating effects of integration and utilisation on SME performance are also studied. Grounded in the innovation diffusion literature, institutional theory and resource-based theory, this study has developed a comprehensive integrated research model focused on the research objectives. Following a positivist research paradigm, this study employs a mixed-method research approach. A preliminary conceptual framework is developed through an extensive literature review and is refined by results from an in-depth field study. During the field study, a total of 11 SME owners or decision-makers were interviewed. The recorded interviews were transcribed and analysed using NVivo 10 to refine the model to develop the research hypotheses. The final research model is composed of 30 first-order and five higher-order constructs which involve both reflective and formative measures. Partial least squares-based structural equation modelling (PLS-SEM) is employed to test the theoretical model with a cross-sectional data set of 282 SMEs in Bangladesh. Survey data were collected using a structured questionnaire issued to SMEs selected by applying a stratified random sampling technique. The structural equation modelling utilises a two-step procedure of data analysis. Prior to estimating the structural model, the measurement model is examined for construct validity of the study variables (i.e. convergent and discriminant validity).

The estimates show cognitive evaluation as an important antecedent for expectation which is shaped primarily by the entrepreneurs’ beliefs (perception) and also influenced by the owners’ innovativeness and culture. Culture further influences expectation. The study finds that facilitating condition, environmental pressure and country readiness are important antecedents of expectation and ICT use. The results also reveal that integration and the degree of ICT utilisation significantly affect SMEs’ performance. Surprisingly, the findings do not reveal any significant impact of ICT usage on performance which apparently suggests the possibility of the ICT productivity paradox. However, the analysis finally proves the non-existence of the paradox by demonstrating the mediating role of ICT integration and degree of utilisation explain the influence of information technology (IT) usage on firm performance which is consistent with the resource-based theory. The results suggest that the use of ICT can enhance SMEs’ performance if the technology is integrated and properly utilised. SME owners or managers, interested stakeholders and policy makers may follow the study’s outcomes and focus on ICT integration and degree of utilisation with a view to attaining superior organisational performance.

This study urges concerned business enterprises and government to look at the environmental and cultural factors with a view to achieving ICT usage success in terms of enhanced firm performance. In particular, improving organisational practices and procedures by eliminating the traditional power distance inside organisations and implementing necessary rules and regulations are important actions for managing environmental and cultural uncertainties. The application of a Bengali user interface may help to ensure the productivity of ICT use by SMEs in Bangladesh. Establishing a favourable national technology infrastructure and legal environment may contribute positively to improving the overall situation. This study also suggests some changes and modifications in the country’s existing policies and strategies. The government and policy makers should undertake mass promotional programs to disseminate information about the various uses of computers and their contribution in developing better organisational performance. Organising specialised training programs for SME capacity building may succeed in attaining the motivation for SMEs to use ICT. Ensuring easy access to the technology by providing loans, grants and subsidies is important. Various stakeholders, partners and related organisations should come forward to support government policies and priorities in order to ensure the productive use of ICT among SMEs which finally will help to foster Bangladesh’s economic development.

Details

E-Services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-325-9

Keywords

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Article
Publication date: 16 August 2022

Xiaoyi Sylvia Gao, Imran S. Currim and Sanjeev Dewan

This paper aims to demonstrate how consumer clickstream data from a leading hotel search engine can be used to validate two hidden information processing stages – first eliminate…

Abstract

Purpose

This paper aims to demonstrate how consumer clickstream data from a leading hotel search engine can be used to validate two hidden information processing stages – first eliminate alternatives, then choose – proposed by the revered information processing theory of consumer choice.

Design/methodology/approach

This study models the two hidden information processing stages as hidden states in a hidden Markov model, estimated on consumer search behavior, product attributes and diversity of alternatives in the consideration set.

Findings

First, the stage of information processing can be statistically characterized in terms of consumer search covariates, including trip characteristics, use of search tools and the diversity of the consideration set, operationalized in terms of: number of brands, dispersion of price and dispersion of quality. Second, users are more sensitive to price and quality in the first rather than the second stage, which is closer to purchase.

Research limitations/implications

The results suggest practical implications for how search engine managers can target consumers with appropriate marketing-mix actions, based on which information processing stage consumers might be in.

Originality/value

Most previous studies on validating the information processing theory of consumer choice have used laboratory experiments, subjects and information display boards comprising hypothetical product alternatives and attributes. Only a few studies use observational data. In contrast, this study uniquely uses point-of-purchase clickstream data on actual visitors at a leading hotel search engine and tests the theory based on real products, attributes and diversity of the consideration set.

Details

European Journal of Marketing, vol. 56 no. 8
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 1 December 1998

Birger Hjørland

This paper analyses the theoretical and the epistemological assumptions of information science (IS). Different views of knowledge underlie all major issues in IS. Epistemological…

3313

Abstract

This paper analyses the theoretical and the epistemological assumptions of information science (IS). Different views of knowledge underlie all major issues in IS. Epistemological theories have a fundamental impact on theories about users, their cognition and information seeking behaviour, on subject analysis, and on classification. They have also fundamental impact on information retrieval, on the understanding of “information”, on the view of documents and their role in communication, on information selection, on theories about the functions of information systems and on the role of information professionals. IS must be based on epistemological knowledge, which avoids blind alleys and is not outdated. The paper shows limitations in the dominant approaches to IS and proposes alternative viewpoints.

Details

Journal of Documentation, vol. 54 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 18 May 2021

Fang Wang, Jing Yang and Yejun Wu

This paper aims to reveal the global non-synchronism that exists in the theoretical research of information science (IS) by analyzing and comparing the distribution of theory use…

Abstract

Purpose

This paper aims to reveal the global non-synchronism that exists in the theoretical research of information science (IS) by analyzing and comparing the distribution of theory use, creation and borrowing in four representative journals from the USA, the UK and China.

Design/methodology/approach

Quantitative content analysis is adopted as the research method. First, an analytical framework for non-synchronism in theoretical research of IS is constructed. Second, theories mentioned in the full texts of the research papers of four journals are extracted according to a theory dictionary made before. Third, the non-synchronism in the theoretical research of IS is analyzed.

Findings

Non-synchronism exists in many aspects of the theoretical research of IS between journals, subject areas and countries/regions. The theoretical underdevelopment still exists in some subject areas of IS. IS presents obvious interdisciplinary characteristics. The theoretical distance from IS to social sciences is shorter than that to natural sciences.

Research limitations/implications

This study investigates the theoretical research of IS from the perspective of non-synchronism theory, reveals the theoretical distance from IS to other sciences, deepens the communication between different subject and regional sub-communities of IS and provides new evidences for the necessity of developing domestic theories and theorists of IS.

Originality/value

This study introduces the theory of non-synchronism to IS research for the first time, investigates the new advances in theoretical research of IS and provides new quantitative evidences for the understanding of the interdisciplinary characteristics of IS and the necessity of better communication between sub-communities of IS.

Details

Journal of Documentation, vol. 77 no. 6
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 10 of over 217000