Search results

1 – 10 of 604
Article
Publication date: 30 March 2023

Zhiyun Zhang, Ziqiong Zhang and Zili Zhang

Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews…

Abstract

Purpose

Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews and focal reviews affect reviewers' preference for anonymity. The purpose of this paper is to investigate why reviewers seek anonymity in terms of prior anonymous reviews and focal reviews.

Design/methodology/approach

Based on restaurant reviews collected from meituan.com, one of the largest group-buying ecommerce platforms in China, this study employed logistic regression to examine how prior anonymous reviews and focal reviews are associated with reviewers' preference for anonymity.

Findings

Results show that the volume and sequence of prior anonymous review are positively associated with the likelihood of reviewers' preference for anonymity, whereas focal review valence is negatively correlated with this preference. Focal review length is positively correlated with reviewers' preference for anonymity but negatively moderates the roles of review valence and prior anonymous reviews on this preference.

Originality/value

This study expands the information disclosure literature by exploring determinants of user identity disclosure from a reviewer perspective. This research also offers a methodological contribution by employing a more accurate measure to calculate reviewers' preference for anonymity, enhancing the empirical results. Lastly, this work supplements the online review literature on how prior anonymous reviews and focal reviews are associated with reviewers' identity disclosure.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 1 March 2024

Sophie Wootton, Sophia Tkazky and Henriette Bergstrøm

The purpose of this study is to investigate how mock jurors’ experiences of deliberations are impacted by the defendant having a personality disorder.

Abstract

Purpose

The purpose of this study is to investigate how mock jurors’ experiences of deliberations are impacted by the defendant having a personality disorder.

Design/methodology/approach

This study used a qualitative approach to explore mock jurors’ experiences during the deliberations of a fictional defendant, Sarah Priest. Ten participants formed two mock juries, and each mock jury were given two case studies to deliberate. Case study one described Priest as having “Severe Personality Disorder, Borderline Pattern” whereas case study two described Priest as having “Complex Mental Health Problems”. There were no changes to the content of the case studies aside from the change in language used to describe the defendant.

Findings

An inductive thematic analysis identified two main themes relating to juror experience: “Interaction with Other Mock Jurors” and “Language as a Barrier to a Verdict”. Participants constructed that prosocial interactions with other mock jurors in the deliberations helped them make a verdict decision, but some of these interactions led to disagreements between participants due to a wide variation of opinion. Second, the different description of the defendant in each case study were constructed to have made the deliberations and decision-making difficult, but for different reasons. In case study one, a lack of knowledge surrounding BPD was the reason for this difficulty, and in case study two, participants thought that the applicability of diminished responsibility criteria were unclear, making it hard to reach a verdict.

Practical implications

The findings have key implications for the judicial system; common experiences can be identified and recorded to implement procedures to protect jurors from adverse experiences.

Originality/value

There is a lack of studies that have investigated juror experience in the UK, and the few studies available have used a quantitative methodology. The approach taken in the current study is, therefore, unique in a UK context. The findings have key implications for the judicial system; common experiences can be identified and recorded to implement procedures to protect jurors from adverse experiences.

Details

The Journal of Forensic Practice, vol. 26 no. 1
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

148

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 25 April 2024

Jayme Stewart, Jessie Swanek and Adelle Forth

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying…

Abstract

Purpose

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying that perpetrators target them repeatedly. Indeed, research reveals specific traits (e.g. submissiveness) and behaviors (e.g. gait) related to past victimization or vulnerability. The purpose of this study is to explore the link between personality traits, self-assessed vulnerability and nonverbal cues.

Design/methodology/approach

In all, 40 undergraduate Canadian women were videotaped while recording a dating profile. Self-report measures of assertiveness, personality traits and vulnerability ratings for future sexual or violent victimization were obtained following the video-recording. The videotape was coded for nonverbal behaviors that have been related to assertiveness or submissiveness.

Findings

Self-perceived sexual vulnerability correlated with reduced assertiveness and dominance and increased emotionality (e.g. fear and anxiety). Additionally, nonverbal behaviors differed based on personality traits: self-touch was linked to lower assertiveness, dominance and extraversion and higher submissiveness, emotionality and warm-agreeableness.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind to consider the relationships between personality, self-perceived vulnerability and nonverbal behaviors among college-aged women. Potential implications, including enhancing autonomy and self-efficacy, are discussed.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 6 December 2023

Mengxi Zhou, Selena Steinberg, Christina Stiso, Joshua A. Danish and Kalani Craig

This study aims to explore how network visualization provides opportunities for learners to explore data literacy concepts using locally and personally relevant data.

Abstract

Purpose

This study aims to explore how network visualization provides opportunities for learners to explore data literacy concepts using locally and personally relevant data.

Design/methodology/approach

The researchers designed six locally relevant network visualization activities to support students’ data reasoning practices toward understanding aggregate patterns in data. Cultural historical activity theory (Engeström, 1999) guides the analysis to identify how network visualization activities mediate students’ emerging understanding of aggregate data sets.

Findings

Pre/posttest findings indicate that this implementation positively impacted students’ understanding of network visualization concepts, as they were able to identify and interpret key relationships from novel networks. Interaction analysis (Jordan and Henderson, 1995) of video data revealed nuances of how activities mediated students’ improved ability to interpret network data. Some challenges noted in other studies, such as students’ tendency to focus on familiar concepts, are also noted as teachers supported conversations to help students move beyond them.

Originality/value

To the best of the authors’ knowledge, this is the first study the authors are aware of that supported elementary students in exploring data literacy through network visualization. The authors discuss how network visualizations and locally/personally meaningful data provide opportunities for learning data literacy concepts across the curriculum.

Details

Information and Learning Sciences, vol. 125 no. 3/4
Type: Research Article
ISSN: 2398-5348

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Open Access
Article
Publication date: 19 April 2024

Rimple Manchanda

The objective of this study is to explore the level of understanding and actions taken by the people of Gurugram (erstwhile Gurgaon) to mitigate the impact of climate change…

Abstract

Purpose

The objective of this study is to explore the level of understanding and actions taken by the people of Gurugram (erstwhile Gurgaon) to mitigate the impact of climate change, given its critical importance as a global issue.

Design/methodology/approach

Using a qualitative approach, primary data were collected through in-depth interviews by means of semi-structured interview methods.

Findings

The findings indicate that while people are aware of climate change, the information is deficient for them to translate their knowledge into effective action. Some of the major challenges identified are lack of appropriate understanding, resources, education, motivation and government initiatives, as well as the old habits, peer influence, feeling of incapability and limited media exposure. To bridge the intention-action gap, it is recommended that people should be empowered to act desirably. There is a change need for awareness and education on ways to mitigate the effects of climate change. The study has implications for researchers, environmentalists, policymakers, non-government organizations and local residents of Gurugram.

Originality/value

This study provides unique insights into the understanding of climate change by the general public and challenges faced in taking pro-environment actions. It emphasizes the urgent need to create awareness and educate individuals about ways to mitigate the impact of climate change.

Details

Journal of Asian Business and Economic Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2515-964X

Keywords

Article
Publication date: 9 February 2024

Neelesh Kumar Mishra, Poorva Pande Sharma and Shyam Kumar Chaudhary

This paper aims to uncover the key enablers of an agile supply chain in the manufacturing sector amidst disruptions such as pandemics, trade wars and cross-border challenges. The…

Abstract

Purpose

This paper aims to uncover the key enablers of an agile supply chain in the manufacturing sector amidst disruptions such as pandemics, trade wars and cross-border challenges. The study aims to assess the applicability of existing literature to manufacturing and identify additional industry-specific enablers contributing to the field of supply chain management.

Design/methodology/approach

The research methodology is comprehensively described, detailing the utilization of extent literature and semistructured interviews with mid- and top-level executives in a supply chain. The authors ensure the robustness of the data collection process and results interpretation.

Findings

The study identifies six essential dimensions of an agile supply chain: information availability, design robustness, external resource planning, quickness and speed, public policy influencing skills and cash flow management. The study provides valuable insights for industry professionals to develop agile supply chains capable of responding to disruptions in a rapidly changing world.

Research limitations/implications

This study is limited by its focus on the manufacturing sector, and future research may explore the applicability of these findings to other industries. By focusing on these essential dimensions identified in the study, managers can develop strategies to improve the agility and responsiveness of their supply chains. In addition, further research may investigate how these enablers may vary in different regions or contexts.

Practical implications

The COVID-19 pandemic has forced executives to reconsider their sourcing strategies and reduce dependence on suppliers from specific geographies. To ensure business continuity, companies should assess the risk associated with their suppliers and develop a business continuity plan that includes multisourcing their strategic materials. Digital transformation will revolutionize the supply chain industry, allowing for end-to-end visibility, real time insights and seamless integration of business and processes. Companies should also focus on creating a collaborative workforce ecosystem that prioritizes worker health and well-being. Maintaining trust with stakeholders is crucial, and firms must revisit their relationship management strategies. Finally, to maintain business leadership and competitiveness during volatile periods, the product portfolio needs to be diversified and marketing and sales teams must work in tandem with product teams to position new products accordingly.

Social implications

This work contributes substantially to the literature on supply chain agility (SCA) by adding several new factors. The findings result in a more efficient and cost-effective supply chain during a stable situation and high service levels in a volatile situation. A less complex methodology for understanding SCA provides factors with a more straightforward method for identifying well-springs of related drivers. First, the study contributes to reestablish the factors such as quickness, responsiveness, competency, flexibility, proactiveness, collaboration and partnership, customer focus, velocity and speed, visibility, robustness, cost-effectiveness, alertness accessibility to information and decisiveness as applicable factors for SCA. Second, the study suggests a few more factors, such as liquidity management, Vendors’ economic assessment and economic diversity, that are the study’s unique contributions in extending the enablers of SCA. Finally, public policy influencing skills, local administration connects and maintaining capable vendors are the areas that were never considered essential for SCA. These factors have emerged as a vital operational factor during the lockdown, and academicians may consider these factors in the future to assess their applicability.

Originality/value

This study provides new insights for decision-makers looking to enhance the resilience and agility of their supply chains. The identification of unique enablers specific to the manufacturing industry contributes to the existing body of literature on agile supply chains in the face of disruptions.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Open Access
Article
Publication date: 12 July 2022

Isabel Stella Schellnack-Kelly

Social media sites contribute significantly to nature conservation in, that they enlighten and educate those members of the public who would ordinarily not be in a position, or…

Abstract

Purpose

Social media sites contribute significantly to nature conservation in, that they enlighten and educate those members of the public who would ordinarily not be in a position, or would not be fortunate enough to visit the park and experience the various aspects first-hand. The purpose of this paper is to showcase social media pages related to a national game reserve in South Africa. This game reserve is the largest in the country and has a wide variety of conserved fauna and flora.

Design/methodology/approach

The theoretical framework used is the SCOPE framework that streamlines strategy development, content choice, refinement of online engagement, choice of social media platform and evaluations of social media campaigns.

Findings

The findings relate to the content found on these social media pages, as well as how members of the public interact with each other and officials from the game reserve in sharing experiences related to this wilderness area.

Research limitations/implications

The research is related to the Kruger National Park in South Africa and is limited to three social media sites.

Originality/value

Through its social media presence, this South African game reserve is able to share experiences from what is effectively a living museum, as well as from its library and archives, with members of the public and allowing individual members to share their encounters with wildlife and their historical memories of this wilderness area.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 604