Search results

41 – 50 of over 23000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Book part
Publication date: 17 February 2015

Noelle Chesley and Britta E. Johnson

To assess: (1) the prevalence of specific work practices that incorporate use of information and communication technology (ICT), (2) whether these practices are connected to…

Abstract

Purpose

To assess: (1) the prevalence of specific work practices that incorporate use of information and communication technology (ICT), (2) whether these practices are connected to employee distress or productivity via work extension or social network processes; (3) the implications of ICT-based work practices for the work/family interface.

Design/methodology/approach

We draw on the 2008 Pew Networked Workers data collected from a nationally representative sample of workers and use logistic regression methods to investigate links among use of specific ICT-based practices and increases in distress or productivity.

Findings

(1) Use of e-mail, instant messaging, texts, and social networking sites at work varies by demographic, organization, and job characteristics, and (2) ICT-based work extension, social network expansion, and connectivity to work colleagues are linked to increases in distress and productivity. Connecting with family or friends while at work can reduce the likelihood that an employee reports an increase in work stress.

Research limitations/implications

Limitations include a cross-sectional design, age of the data, missing data, and measurement issues. Even with these limitations, there are few investigations drawing from national samples of employees that can assess work-related ICT use with this level of depth.

Originality/value

Findings point to technological innovation as an important factor influencing work extension and social network processes and connect this to changes in employee distress and productivity. The focus on productivity is especially important given the emphasis that previous research has placed on linking ICT use and employee distress.

Details

Work and Family in the New Economy
Type: Book
ISBN: 978-1-78441-630-0

Keywords

Access Restricted. View access options
Article
Publication date: 8 November 2011

Mariam Al‐Hamar, Ray Dawson and Jassim Al‐Hamar

This paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phishing…

4370

Abstract

Purpose

This paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phishing in one of the fastest growing economies in the world, the State of Qatar.

Design/methodology/approach

A survey comprising a questionnaire and interviews was used to investigate the awareness of phishing among Qatari citizens, their susceptibility to phishing and their views on the best method of defence against this attack, and this was compared to other developed nations, the UK in particular.

Findings

The paper concludes that phishing is becoming common and very successful because of people's susceptibility to such attack, largely due to insufficient awareness of the threat. Comparing Qatar with the UK, there were significant differences between responses in each country in most questionnaire variables, especially those identifying the vulnerability to phishing which was found to be very high in Qatar.

Research limitations/implications

The paper shows that there is a particular need for education on phishing in this fast developing country.

Practical implications

There is a growing threat in the use of phishing by hackers and some businesses to obtain information on individual users on the internet through e‐mail or the web. In some cases this has led to identity thefts and related illogical operations online both within and across countries. This paper has compared level of awareness of phishing in two countries and has the potential to shed light on attitudes and present status of e‐mail phishing with a view to developing ways of dealing with it and improving cyber security and international operations.

Originality/value

The paper adopts an innovative approach to study e‐mail phishing and compares results from two diverse countries. New ideas are advanced from the findings which are useful for understanding some operations in cyber space.

Details

Campus-Wide Information Systems, vol. 28 no. 5
Type: Research Article
ISSN: 1065-0741

Keywords

Access Restricted. View access options
Article
Publication date: 31 May 2013

Hsin Hsin Chang, Hamid Rizal and Hanudin Amin

The aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By…

10262

Abstract

Purpose

The aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By examining different types of email (i.e. permission‐based email and spamming), the present study empirically tested the theoretical linkage between email advertising values, perceived instrusiveness, and the attitudinal‐behavioural dispositions towards email advertising.

Design/methodology/approach

A survey was conducted using 221 respondents from Taiwan. Two scenarios were designed for the present study. The questionnaires were equally divided into two sets, with the first half containing a scenario depicting permission‐based email, and the other half containing a scenario describing a spamming email. Each respondent only received one set of the survey.

Findings

Results from a survey of 221 Internet users in Taiwan indicate that values and attitudes toward, and the perceived intrusiveness of, email advertising significantly affect consumers’ behavioral dispositions toward email advertising. The results suggest that permission‐based email is more effective as compared to spam email advertising. For solicited email, consumers perceived less intrusiveness if the email advertisement offered them financial incentives.

Research limitations/implications

The authors acknowledge four limitations in this study. These limitations however provide further direction for future studies in the discipline. The discussion of these limitations is provided.

Practical implications

Importantly, this study yields significant theoretical and managerial implications. Concerned with the context of email advertising, the authors’ work provides theoretical support for both constructs of advertising values and perceived intrusiveness as important. Concerned with the advertisers, this study renders important implications for better planning of marketing mix strategy using email.

Originality/value

This study provides new theoretical insights into factors influencing consumers’ acceptance of email advertising by incorporating perceived intrusiveness as a mediator in the relationship between advertising values and attitudinal‐behavioral dispositions. By empirically comparing the different types of email advertisements of permission‐based email and spamming, the present study also offers better understanding and extending of the current literature on email advertising research.

Access Restricted. View access options
Article
Publication date: 10 April 2009

Martin Lohmann and Dirk J. Schmücker

Online data collection is gaining momentum throughout the market research business. At the same time internet users and their online information and booking behaviour are becoming…

2213

Abstract

Purpose

Online data collection is gaining momentum throughout the market research business. At the same time internet users and their online information and booking behaviour are becoming more and more important for the travel and tourism industry. This paper aims to investigate this issue.

Design/methodology/approach

The paper researches internet users' travel and information/booking behaviour through online surveys. However, this approach is prone to critical methodological limitations. One of the main issues in this respect is the question of proper definition of the universe and sampling procedures. The paper shows today's chances and limitations of sampling using list‐based e‐mail invitations and online access panels.

Findings

Results indicate that sampling method and length of field time have a substantial influence on response rates. It can further be shown that results from online travel research differ from results obtained in face‐to‐face interviews even when focussing on the same target group.

Research implications

As long as online research differs from research on internet users to such an extent, online surveys seem to be rather a good complement than a substitution for more traditional research methods.

Originality/value

The paper shows the limitations and chances of online travel research based on the unique comparison of data from a face‐to‐face and online access panel surveys.

Details

Tourism Review, vol. 64 no. 1
Type: Research Article
ISSN: 1660-5373

Keywords

Access Restricted. View access options
Article
Publication date: 1 September 2015

Amanda L. Whitmire, Michael Boock and Shan C. Sutton

The purpose of this paper is to demonstrate how knowledge of local research data management (RDM) practices critically informs the progressive development of research data…

2666

Abstract

Purpose

The purpose of this paper is to demonstrate how knowledge of local research data management (RDM) practices critically informs the progressive development of research data services (RDS) after basic services have already been established.

Design/methodology/approach

An online survey was distributed via e-mail to all university faculty in the fall of 2013, and was left open for just over one month. The authors sent two reminder e-mails before closing the survey. Survey data were downloaded from Qualtrics survey software and analyzed in R.

Findings

In this paper, the authors reviewed a subset of survey findings that included data types, volume, and storage locations, RDM roles and responsibilities, and metadata practices. The authors found that Oregon State University (OSU) researchers are generating a wide variety of data types, and that practices vary between colleges. The authors discovered that faculty are not utilizing campus-wide storage infrastructure, and are maintaining their own storage servers in surprising numbers. Faculty-level research assistants perform the majority of data-related tasks at OSU, with the exception of data sharing, which is primarily handled by the professorial ranks. The authors found that many faculty on campus are creating metadata, but that there is a need to provide support in how to discover and create standardized metadata.

Originality/value

This paper presents a novel example of how to efficiently move from establishing basic RDM services to providing more focussed services that meet specific local needs. It provides an approach for others to follow when tackling the difficult question of, “What next?” with regard to providing academic RDS.

Details

Program: electronic library and information systems, vol. 49 no. 4
Type: Research Article
ISSN: 0033-0337

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 1996

Graham P. Cornish

The term “library management” covers many different aspects of the way that a library is operated and conjures up different concepts in the minds of different people, depending on…

420

Abstract

The term “library management” covers many different aspects of the way that a library is operated and conjures up different concepts in the minds of different people, depending on their own interests, agendas and requirements. Research into the subject is even more difficult to define because the application of research in one field can be vital to the development of another. Some researchers would not consider their research central to library matters at all, whereas the practising librarian might well see it as casting new light on a difficult area of understanding or development.

Details

Library Management, vol. 17 no. 6
Type: Research Article
ISSN: 0143-5124

Access Restricted. View access options
Article
Publication date: 22 March 2013

Chun‐Yu Chen, Yen‐Chun Jim Wu and Wen‐Hsiung Wu

The purpose of this paper is to investigate the co‐production of knowledge and dialogic relationships via the collaboration between business practitioners and academic researchers.

3415

Abstract

Purpose

The purpose of this paper is to investigate the co‐production of knowledge and dialogic relationships via the collaboration between business practitioners and academic researchers.

Design/methodology/approach

The motivations, expectations, communication processes, and final performance of those engaged in collaborative management research are explored by applying a two‐pronged methodology with a content analysis and an e‐mail survey. The authors conducted a content analysis on 136 articles identified out of a total of 2,029 articles from six leading journals during 2006‐2011 which fulfilled the criteria of being coauthored by both professors and practitioners. An e‐mail survey of six open questions was given to pre‐screened authors in the first stage to investigate the in‐depth dialogue processes and stories of these collaborations.

Findings

The results revealed that collaboration topics of interest focused mostly on organizational behavior, business policy, and strategy, and that theoretical inquiry and case study were the most used research methods. According to the 68 valid returned e‐mail surveys, the providing of consulting services by professors in firms plays a critical role in facilitating knowledge co‐creation between practice and knowing. The findings also highlight key factors of sustainable co‐production relationships.

Originality/value

This study provides an empirical, valuable step towards an investigation into the co‐creation dialogue experiences of practitioners and academics in three dimensions: purpose, procedure, and promise.

Details

Management Decision, vol. 51 no. 3
Type: Research Article
ISSN: 0025-1747

Keywords

Access Restricted. View access options
Article
Publication date: 1 September 1999

Nelda Spinks, Barron Wells and Melanie Meche

Making writers of e‐mail messages aware of appropriate “netiquette” will enhance today’s instant communication process. Researchers determined what the literature recommends as…

2579

Abstract

Making writers of e‐mail messages aware of appropriate “netiquette” will enhance today’s instant communication process. Researchers determined what the literature recommends as being appropriate “netiquette”, surveyed a university business faculty to determine their knowledge of appropriate “netiquette”, and compared the faculty members’ knowledge with guidelines from the literature.

Details

Corporate Communications: An International Journal, vol. 4 no. 3
Type: Research Article
ISSN: 1356-3289

Keywords

Access Restricted. View access options
Book part
Publication date: 10 December 2015

Chun Kit Lok

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior…

Abstract

Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior of E-payment systems that employ smart card technology becomes a research area that is of particular value and interest to both IS researchers and professionals. However, research interest focuses mostly on why a smart card-based E-payment system results in a failure or how the system could have grown into a success. This signals the fact that researchers have not had much opportunity to critically review a smart card-based E-payment system that has gained wide support and overcome the hurdle of critical mass adoption. The Octopus in Hong Kong has provided a rare opportunity for investigating smart card-based E-payment system because of its unprecedented success. This research seeks to thoroughly analyze the Octopus from technology adoption behavior perspectives.

Cultural impacts on adoption behavior are one of the key areas that this research posits to investigate. Since the present research is conducted in Hong Kong where a majority of population is Chinese ethnicity and yet is westernized in a number of aspects, assuming that users in Hong Kong are characterized by eastern or western culture is less useful. Explicit cultural characteristics at individual level are tapped into here instead of applying generalization of cultural beliefs to users to more accurately reflect cultural bias. In this vein, the technology acceptance model (TAM) is adapted, extended, and tested for its applicability cross-culturally in Hong Kong on the Octopus. Four cultural dimensions developed by Hofstede are included in this study, namely uncertainty avoidance, masculinity, individualism, and Confucian Dynamism (long-term orientation), to explore their influence on usage behavior through the mediation of perceived usefulness.

TAM is also integrated with the innovation diffusion theory (IDT) to borrow two constructs in relation to innovative characteristics, namely relative advantage and compatibility, in order to enhance the explanatory power of the proposed research model. Besides, the normative accountability of the research model is strengthened by embracing two social influences, namely subjective norm and image. As the last antecedent to perceived usefulness, prior experience serves to bring in the time variation factor to allow level of prior experience to exert both direct and moderating effects on perceived usefulness.

The resulting research model is analyzed by partial least squares (PLS)-based Structural Equation Modeling (SEM) approach. The research findings reveal that all cultural dimensions demonstrate direct effect on perceived usefulness though the influence of uncertainty avoidance is found marginally significant. Other constructs on innovative characteristics and social influences are validated to be significant as hypothesized. Prior experience does indeed significantly moderate the two influences that perceived usefulness receives from relative advantage and compatibility, respectively. The research model has demonstrated convincing explanatory power and so may be employed for further studies in other contexts. In particular, cultural effects play a key role in contributing to the uniqueness of the model, enabling it to be an effective tool to help critically understand increasingly internationalized IS system development and implementation efforts. This research also suggests several practical implications in view of the findings that could better inform managerial decisions for designing, implementing, or promoting smart card-based E-payment system.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Access Restricted. View access options
Article
Publication date: 1 August 2003

Peter Tingling, Michael Parent and Michael Wade

The ubiquity of the Internet and e‐mail has resulted in a burgeoning interest in their potential for academic research. This paper summarizes the existing practices of Internet…

2112

Abstract

The ubiquity of the Internet and e‐mail has resulted in a burgeoning interest in their potential for academic research. This paper summarizes the existing practices of Internet research and suggests extensions to them based on the design and administration of a large‐scale, national Web survey. These extensions include consideration of new capabilities such as adaptive questions and higher levels of flexibility and control. Lessons learned include the use of a modular design, management of Web traffic, and the higher level of communication with respondents.

Details

Internet Research, vol. 13 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

41 – 50 of over 23000
Per page
102050