Table of contents
Digital access through smartphones and well-being of BoP women: insights from a field study in India
Rishikesan Parthiban, Saravana Jaikumar, Jayanta Basak, Somprakash BandyopadhyayThe authors study the effect of access to smartphones on the socio-economic well-being in the case of rural base of the pyramid (BoP) women. While smartphone access may have its…
Investigating predictors of online vigilance among university students
Daniel B. Le Roux, Douglas A. ParryOnline vigilance is a novel construct which describes individual differences in users' cognitive orientation to online connectedness, their attention to and integration of…
Understanding determinants of social networking service fatigue: an interpretive structural modeling approach
Lin Xiao, Ting Pan, Jian Mou, Lihua HuangThe purpose of this paper is to build a comprehensive structural model to demonstrate the interrelationships of factors influencing social networking service (SNS) fatigue and to…
Exhaustion and dependency: a habituation–sensitization perspective on the duality of habit in social media use
Amr Soror, Zachary R. Steelman, Ofir TurelThe current work builds on the dual process theory of habituation and sensitization to empirically investigate theory-based mechanisms through which social media use habit…
Anxiety buffers and the threat of extreme automation: a terror management theory perspective
Frank Goethals, Jennifer L. ZiegelmayerThe advent of extreme automation from new technologies such as artificial intelligence portends a massive increase in unemployment. The psychological impact of this threat on the…
Technostress and its influence on employee information security policy compliance
Forough Nasirpouri Shadbad, David BirosThis study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to…
Tablets for problem-solving through a flow theory: the impact of navigation and visual appearance on perceived performance and efficiency
Dezhi Wu, Jingjun (David) Xu, Sue AbdinnourThe paper aims to investigate how a tablet's design features, namely, its navigation design and visual appearance, influence users' enjoyment, concentration and control, when…
The role of intrinsic and extrinsic motivations in sharing economy post-adoption
Tiago Oliveira, Iolanda Barbeitos, Antonela CaladoThe purpose of this paper is to examine use and sharing economy (SE) continuance intention, and the mediation effects of use between individuals' motivations and SE continuance…
The impact of information technology culture and personal innovativeness in information technology on digital entrepreneurship success
Mumin Abubakre, Yiwei Zhou, Zhongyun ZhouVery little or no study has explored the predictors of behaviour and traits that determine digital entrepreneurship (DE) success. In response, the purpose of this paper is to…
Dynamics of convergence behaviour in social media crisis communication – a complexity perspective
Milad Mirbabaie, Stefan Stieglitz, Felix BrünkerThe purpose of this study is to investigate communication on Twitter during two unpredicted crises (the Manchester bombings and the Munich shooting) and one natural disaster…
Trust and elderly users' continuance intention regarding mobile health services: the contingent role of health and technology anxieties
Fanbo Meng, Xitong Guo, Zeyu Peng, Qiang Ye, Kee-Hung LaiMobile health (mHealth) services are considered an important means of relieving the problems of the aging population. The efficiency of mHealth services can be enhanced by…
Gamified money: exploring the effectiveness of gamification in mobile payment adoption among the silver generation in China
Donna Wong, Hongfei Liu, Yue Meng-Lewis, Yan Sun, Yun ZhangThis study investigates the use of gamification in promoting the silver generation's adoption of mobile payment technology through the gamified cultural practice of gifting red…
Avoidance behaviour towards using pirated software: testing a seven-component model on SME employees
Muhammad Sabbir Rahman, Md Afnan Hossain, Fadi Abdel Muniem Abdel Fattah, Abdel Mubdiu Ibne MokterThis research aims to develop and test a conceptual model for shaping small and medium enterprise (SME) employees' avoidance behaviour towards using pirated software. The model…
Social media use by first-generation college students and two forms of social capital: a revealed causal mapping approach
Xuefei (Nancy) Deng, Yesenia Fernández, Meng ZhaoThe purpose of this study is to examine social media use and its impacts on first generation students by answering the two questions: how do FGS use social media on college…
Enhancing supply chain sensing capability through social media: an environmental scanning perspective
Jiahe Song, Kang-Bok Lee, Zhongyun Zhou, Lin Jia, Casey Cegielski, Soo Il ShinThe purpose of this study is to investigate the relationship between social media and sensing capability for supply chain management (SCM) from an environmental scanning…
WeChat relationships maintenance behavior and social entrepreneurial intention under conditions of dual narcissism: the mediating role of social capital
Wenqing Wu, Yuzheng Su, Chia-Huei Wu, Sang-Bing Tsai, Yu-Hsi YuanAs social networking sites (SNSs) gain popularity, they are being widely used by entrepreneurs to obtain social capital to carry out business ventures. However not all SNS usage…
Team social media usage and intra-team competition and cooperation: a social information processing perspective
Shuqin Zhang, Qian Huang, Hefu Liu, Youying WangThis study aims to explore how team task-related social media usage (TSMU) and social-related social media usage (SSMU) affect employees' perceptions of intra-team cooperation and…
Understanding employees' information security identities: an interpretive narrative approach
Jeffrey D. Wall, Prashant PalviaThe authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors…
ISSN:
0959-3845e-ISSN:
1758-5813ISSN-L:
0959-3845Renamed from:
Office Technology and PeopleOnline date, start – end:
1992Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Prof Edgar Whitley
- Prof Kevin Crowston
- Prof Yulin Fang
- Prof Jyoti Choudrie