Index
ISBN: 978-1-83909-813-0, eISBN: 978-1-83909-812-3
Publication date: 11 June 2021
This content is currently only available as a PDF
Citation
(2021), "Index", Lee, Z.W.Y., Chan, T.K.H. and Cheung, C.M.K. (Ed.) Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress, Emerald Publishing Limited, Leeds, pp. 243-246. https://doi.org/10.1108/978-1-83909-812-320211010
Publisher
:Emerald Publishing Limited
Copyright © 2021 Emerald Publishing Limited
INDEX
Absorption trait
, 113–114
Advanced analytics
, 29, 31
Advanced persistent threat
, 68
Agency of technology
, 8, 12–15
Agile development
, 9
Analytical methods
, 43
Analytics-based prediction
, 4–5
Anxiety
, 90–91
Artificial intelligence (AI)
, 2, 26, 69
Augmentation
, 148, 153–154, 167–168
Augmented reality (AR)
, 148
Automated storefronts
, 5
Automation
, 5
AutoML
, 4
Backfire
, 17
Behavioural techno-strain
, 206, 216
Big data
, 29, 43
Big Five Personality Trait Assessment
, 187–188
Black-box algorithms
, 17
Blockchain technologies
, 70
Business analytics capability
, 30
Business intelligence competency centre (BICC)
, 40, 42
Chatbots
, 5, 14
Clean desk policy
, 75
Coding
, 93–94
Cognitive absorption (CA)
, 112
Cognitive engagement
, 113–114
Compliance behaviour
, 71
Computer-mediated communication (CMC)
, 180
Concentration problems
, 216
Concept drift
, 15
Concept matrix
, 228–242
Confidentiality
, 65
Consumer value perceptions
, 155–156, 167
Continuous partial attention
, 89
Conversational agents
, 14
Counteraction strategies
, 75–77
Covariance shift
, 15
Curiosity
, 115
Cyberbullying
, 63, 209
Data (see also Big data)
analytics
, 33, 36
breach response policy
, 75
consumption
, 36, 44
curators
, 43
data-driven organisational ethos
, 36
imbalance
, 16
ingestion
, 36, 43
integrity
, 15
management
, 36
models
, 36, 43
platform
, 36
processes
, 36
requirement
, 36, 43
science labour
, 5
strategy
, 43
Data-driven decision-making
, 27, 29–32, 37, 44, 46
Decision support systems (DSSs)
, 4
Decision-makers
, 29
Deep learning
, 3–5, 17
Denial of service attacks
, 68
Design science research
, 32
Deteriorated performance
, 216
Digital marketing tools
, 149
Digital shopping approaches
, 157
Digital technologies
, 26
Digitisation
, 65–70
DIKIW pyramid
, 37, 42
Disclosure
, 209
Discontinuous usage intention
, 216
Dissatisfaction
, 213–214
Distraction
, 216–217
Diurnal cortisol production
, 215
E-commerce
, 62
Ease of use
, 153, 166
Educational gamified systems
, 62
Electronic leash and expectations of availability
, 89–90
Email
filtering
, 76
policy
, 75
Embedded case study
, 93
Employee ISP violations
, 71
Employees security-related behaviours
, 70
Exhaustion
, 214
Experiential marketing
, 149
External human threats
, 68
Extroversion
, 187–188
Face-to-face self-disclosure
, 187
False progress
, 18
Fatigue
, 91
Fear of Missing out (FoMo)
, 210
Feature overload
, 212
Feeling inefficient
, 91
Feeling of obligation
, 91–92
Firms
, 62, 75
Flow
state
, 113–114
theory
, 120
Focussed immersion
, 115
Fully autonomous systems
, 13–15
Gamified systems
, 62
Gartner information technology
, 29
Graphical processing units (GPUs)
, 3
Healthcare
, 62
Hedonic value perception
, 167–168
Hedonism
, 155
Heightened enjoyment
, 115
Human and machine knowledge collaboration
, 37
Human in loop’ ML systems
, 12
Human intervention
, 43
Human involvement
, 7
Human threats
, 68
Human-AI
collaborations
, 31
hybrid systems
, 12–13
Hybrid intelligence systems
, 12
Hyperpersonal communication model
, 176
Hypothalamic-pituitary-adrenal axis (HPA axis)
, 215
Impression management
, 211
Information and communication technologies (ICTs)
, 62, 86, 205
Information avoidance behaviour
, 217
Information fatigue syndrome (IFS)
, 91
Information loss
, 15–16
Information overload
, 210
Information processing capability
, 29
Information richness theory
, 176
Information security (InfoSec)
, 63
Information system (IS)
, 62, 178
Information technologies (IT)
, 62–65
Informativeness
, 153, 166
Informed decisions
, 30
InfoSec policies (ISPs)
, 70
violation
, 73
Insecurity
, 212–213
Insider threat programs
, 75
Insights-driven digital organisation (iDDO)
, 40
Integrative framework of CA for technology use
, 122–125
Integrity
, 65
Intelligent machines
, 26–27, 29
Intentional malicious insiders
, 69
Intentional non-malicious insiders
, 69
Interaction approach
, 88
Interaction overload
, 210
Interactivity
, 167–168
of AR
, 154
Internal human threats
, 68
Internet of Things (IoT)
, 4–5, 17, 69
Interpretivism
, 93
Interrelationships
, 124
Interruptions
, 89
Invasion
, 213
Knowledge work
, 26–29
social context
, 28
Knowledge workers
, 28
Logic
, 36
Logical reasoning
, 43
Machine learning (ML)
, 3–4, 17, 26
Malicious attackers
, 70
Malware
, 68
Maturity frameworks
, 37
Maturity scale
, 43–44
Model poisoning attacks
, 16
Multiple cloud code resources
, 70
Multitasking
, 76
Natural language processing (NLP)
, 3–5
Negative spillover
, 17–18
Obligation
, 91–92, 95
Online disinhibition
, 180, 184–187
Online learning and education
, 62
Online social comparison
, 210–211
Organisational ability
, 37
Organisational transformation framework for data-driven decision-making (OTxDD)
, 25, 27, 32, 37–47
Parental monitoring
, 211
Password attacks
, 68
Perceptions of information privacy violations
, 62–63
Person-artefact-task model (PAT model)
, 122–124
Person-environment fit theory
, 63
Person-technology theory
, 64
Personal device policy
, 75
Personalisation
, 7
Personality trait-extroversion
, 187–188
Phishing attacks
, 68
Physiological techno-strains
, 206, 215–217
Policy violation
, 69
Privacy
concerns
, 213
risk
, 179
Programmer bias
, 16
Project managers
, 9
Psychological stress
, 180, 187
Psychological techno-strain
, 206, 213–215
Psychophysiological effects
, 215–216
Purchase intention
, 155, 167
Ransomware attacks
, 69
Regret
, 214–215
Reinforcement learning
, 4–5
Reliable data
, 5
Reliance on cloud
, 17
Remote access policy
, 75
Response approach
, 88
Robotics
, 4–5, 17
Role ambiguity
, 89
Self-disclosure
, 176–177
Sensemaking approach
, 43
Sensor failures
, 17
Signal innovation
, 8
Sleep problems
, 217
Social anxiety
, 179–180, 184
Social context cues hypothesis
, 176
Social identity model of deindividuation (SIDE model)
, 176
Social influence
, 218
Social media
, 62, 204
Social networking
, 176
Social networking sites (SNSs)
, 62–63, 176, 204
Social overload
, 211–212
Social presence theory
, 176
Standardisation
, 6
Stimuli approach
, 88
Stimulus-organism-response model (SOR model)
, 154–155
Strain
, 90
Strategy
, 37
Stress
, 63–65
Stressors
, 64
Strong AI
, 10–11
Structural model testing
, 165
Supervised learning
, 5
Switching exhaustion
, 215
System developers
, 9–10
Systematic literature review (SLR)
, 32–33
Task assemblage
, 31
Task augmentation
, 31
Task orientation
, 8–11
Task substitution
, 31
Technical SNS-stressors
, 212–213
Techno-complexity
, 64, 73, 76, 90
Techno-insecurity
, 64, 74, 90
Techno-invasion
, 64, 74, 90
Techno-overload
, 64, 74, 76, 90
Techno-uncertainty
, 64, 73–74, 76, 90
Techno-unreliability
, 64, 74, 76
Technoaddiction
, 91
Technological threats
, 68
Technology acceptance model (TAM)
, 111
Technostrains
, 88, 90–91, 205
Technostress
, 63, 87, 205–206
Technostressor
, 88, 205
Telecommunication organisation
, 40
Telepresence
, 148, 153, 157–158, 166–168
Tellegen Absorption Scale
, 113
Temporal dissociation
, 114
Top management and users
, 9
Training data
, 15
Trait of absorption
, 113–114
Transactional approach
, 88
Transactional model of SNS-use stress
, 208
Turing test
, 10
Uncertainty
, 213
Unintentional non-malicious insiders
, 69
Unsupervised learning
, 5
Upper respiratory infection (URI)
, 216
User-generated content
, 204
Utilitarian value perception
, 155–156, 166
Utilitarianism
, 155
Validity
, 15
Video games
, 62
Virtual platforms
, 62
Virtual reality (VR)
, 151 (see also Augmented reality (AR))
Vulnerabilities
, 3, 15–16, 18, 70, 76
Weak AI
, 9–11
Well-being
, 183, 187
Work-home
balance
, 101–102
conflict
, 89
Workaholism
, 91
Workplace
, 63
- Prelims
- Chapter 1: AI and Its Implications for Organisations
- Chapter 2: Collaboration of Human and Machine for Knowledge Work: An Organisational Transformation Framework for Data-driven Decision-making
- Chapter 3: Does Technostress Trigger Insider Threat? A Conceptual Model and Mitigation Solutions
- Chapter 4: Sociological Mechanisms Behind ICT-Related Technostress in the Workplace
- Chapter 5: An Integrative Framework of Cognitive Absorption for Technology Use
- Chapter 6: Augmented Reality in Experiential Marketing: The Effects on Consumer Utilitarian and Hedonic Perceptions and Behavioural Responses
- Chapter 7: Does Self-Disclosure on Social Networking Sites Enhance Well-Being? The Role of Social Anxiety, Online Disinhibition, and Psychological Stress
- Chapter 8: Social Media Stress: A Literature Review and Future Research Directions
- Index