Akmal Mirsadikov, Ali Vedadi and Kent Marett
With the widespread use of online communications, users are extremely vulnerable to a myriad of deception attempts. This study aims to extend the literature on deception in…
Abstract
Purpose
With the widespread use of online communications, users are extremely vulnerable to a myriad of deception attempts. This study aims to extend the literature on deception in computer-mediated communication by investigating whether the manner in which popularity information (PI) is presented and media richness affects users’ judgments.
Design/methodology/approach
This study developed a randomized, within and 2 × 3 between-subject experimental design. This study analyzed the main effects of PI and media richness on the imitation magnitude of veracity judges and the effect of the interaction between PI and media richness on the imitation magnitude of veracity judges.
Findings
The manner in which PI is presented to people affects their tendency to imitate others. Media richness also has a main effect; text-only messages resulted in greater imitation magnitude than those viewed in full audiovisual format. The findings showed an interaction effect between PI and media richness.
Originality/value
The findings of this study contribute to the information systems literature by introducing the notion of herd behavior to judgments of truthfulness and deception. Also, the medium over which PI was presented significantly impacted the magnitude of imitation tendency: PI delivered through text-only medium led to a greater extent of imitation than when delivered in full audiovisual format. This suggests that media richness alters the degree of imitating others’ decisions such that the leaner the medium, the greater the expected extent of imitation.
Details
Keywords
Ali Vedadi, Nita Brooks and Tim Greer
Many organizations struggle to utilize security-as-a-service (SecaaS) advantages effectively, thus challenging the assumption that adopting the SecaaS model will necessarily lead…
Abstract
Purpose
Many organizations struggle to utilize security-as-a-service (SecaaS) advantages effectively, thus challenging the assumption that adopting the SecaaS model will necessarily lead to post-adoption satisfaction. This research paper draws on the organizational mindfulness theory and investigates the factors that lead to satisfaction with SecaaS.
Design/methodology/approach
The key informant-based survey approach was employed to collect data from 215 organizations that were using the SecaaS model. PLS was used for data analysis.
Findings
Organizations with greater extents of internal security resources report higher satisfaction levels with SecaaS, thanks to the mediating effect of organizational mindfulness, and that organizations with extensive and mature security auditing were especially well-positioned to experience satisfaction with SecaaS.
Originality/value
This research provides new theoretical insights into the conditions under which organizations' post-adoption satisfaction with the SecaaS model is shaped by investigating the role of internal security resources and organizational mindfulness.
Details
Keywords
Lisana Lisana and Yonathan Dri Handarkho
This study aims to investigate the influence of environmental factors on individual personality traits associated with mobile paymens (MP) adoption using the technological…
Abstract
Purpose
This study aims to investigate the influence of environmental factors on individual personality traits associated with mobile paymens (MP) adoption using the technological personal environment (TPE) theory as a framework for the proposed theoretical model.
Design/methodology/approach
A total of 736 feedback from respondents was used to validate the proposed model using structural equation modeling. The model comprises Trust and Self-efficacy to explain MP adoption from a personal trait perspective. Meanwhile, environmental aspects are represented by social influence, vendor regulations and network externalities.
Findings
The result indicates that self-efficacy has the most significant direct effect on user intention to use MP, followed in decreasing order of significance by social influence, trust, vendor regulations and network externalities. Furthermore, social influence is the most contributing aspect from the environmental area that influences user intention directly and indirectly through trust and self-efficacy as mediators. Meanwhile, the moderating effect analysis also found that gender moderates the effect of user self-efficacy on MP adoption.
Originality/value
This study fills the gap by comparing trust and self-efficacy and exploring how those factors are developed and affected by the environmental aspect of MP usage. It was discovered that self-efficacy was the most influential construct influencing the adoption of MP. Social influence was identified as the primary environmental factor that directly impacts user intention regarding MP usage. Furthermore, gender was shown as a moderator, as males place a higher value on self-efficacy as a factor affecting their intention to embrace MP in comparison to females.
Details
Keywords
Hao Chen, Mengya Liu and Tu Lyu
This study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and…
Abstract
Purpose
This study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and information security policy (ISP) compliance intention and the effects of psychological capital (PsyCap) on relieving SRS and promoting compliance.
Design/methodology/approach
The authors tested a series of hypotheses by applying partial least squares–based structural equation modeling to survey data from 488 employees in Chinese enterprises.
Findings
The results suggest that the relationship between SRS and ISP compliance intention is fully mediated by information security fatigue. Employees’ SRS promotes their information security fatigue, which reduces their intention to follow ISPs. In addition, employees with high PsyCap may experience low levels of SRS and information security fatigue, which promotes their willingness to comply with ISPs.
Originality/value
This study extends knowledge by introducing information security fatigue and PsyCap to the field of information security management, and it calls attention to the effects on information security behaviors of employee emotions and positive psychological resources in an organization. The authors reveal the emotion-based mediating effect of information security fatigue and the positive influence of PsyCap in information security management.
Details
Keywords
Lisana and Yonathan Dri Handarkho
This research aims to investigate the significant influence of social factors based on the social impact theory against service quality factors based on uncertainty avoidance…
Abstract
Purpose
This research aims to investigate the significant influence of social factors based on the social impact theory against service quality factors based on uncertainty avoidance dimension in determining user perception of trust toward mobile payment (MP) usage.
Design/methodology/approach
The theoretical model used was analyzed by adopting the structural equation modeling technique. Questionnaires were delivered to Indonesian customers as the target respondents using Google Forms, and finally, 659 valid responses were received.
Findings
Based on the direct effect analysis, service quality had more influence on the user trust perception than the social aspect. More specifically, Perceived Security was the most influential in increasing the level of user trust followed by Perceived Usefulness and Network Externalities.
Originality/value
This research presents a comprehensive investigation that applied a different perspective of the way social and service quality aspects develop user trust toward MP usage.
Details
Keywords
Maurício Bergmann, Antonio Carlos Gastaud Maçada, Fernando de Oliveira Santini and Tareq Rasul
Although many studies have sought to address the topic of continuance intention among Fintech customers, the reported findings are fragmented. Therefore, the present study…
Abstract
Purpose
Although many studies have sought to address the topic of continuance intention among Fintech customers, the reported findings are fragmented. Therefore, the present study proposes a research model that integrates the main constructs involved in Fintech continuance intention.
Design/methodology/approach
The current study uses a meta-analytic-based correlation analysis of effect sizes, meta-regression analysis and meta-analytic structural equation modeling, with 247 effect sizes in 69 studies involving 26,140 respondents.
Findings
The results reveal continuance intention is driven by satisfaction and trust, with ease of use and usefulness being antecedents of satisfaction and trust. The authors also found evidence to show satisfaction partially mediates the relationship between ease of use and continuance intention and that trust fully mediates the relationship between ease of use and continuance intention and partially mediates the relationship between usefulness and continuance intention. In addition, the authors found that in Western countries, with higher Human Development Index levels and greater of use of electronic payment, satisfaction has more impact on continuance intention.
Practical implications
From a theoretical standpoint, this meta-analytic study has implications for the literature on Fintech by offering an empirical generalization on the strength of the antecedents of Fintech continuance intentions and by testing possible moderators in a wide range of countries and studies. In other words, this study’s goal is to broaden the scope of the research. Regarding managerial implications, it is important to listen to user opinions regarding the positive and negative points of their experience with these technologies and take them into consideration when planning improvements. Additionally, the analysis shows the importance of using data from user interaction with technology, obtained, for example, through big data analytics, whereby companies can see how users behave, how much time they spend accessing certain functions and which technological features they use most, and thus seek to improve whatever is needed.
Originality/value
This meta-analytic study advances the understanding of Fintech continuance intentions. Using the proposed approach, it is possible to generate accurate estimates of the effect size of each analyzed antecedent as the meta-analytic method jointly evaluates the results produced by a wide variety of studies performed in different contexts, allowing more accurate conclusions to be drawn.