Search results

1 – 2 of 2
Per page
102050
Citations:
Loading...
Available. Open Access. Open Access
Article
Publication date: 24 September 2021

Sandra Adabere, Kwame Owusu Kwateng, Esther Dzidzah and Francis Tetteh Kamewor

The introduction of information technology (IT) in port operations has been a tremendous contributor to transformation in world trade. This study was carried out to examine the…

8039

Abstract

Purpose

The introduction of information technology (IT) in port operations has been a tremendous contributor to transformation in world trade. This study was carried out to examine the influence of IT on the efficiency of seaport operations.

Design/methodology/approach

The study is quantitative in nature, and it relied on a closed-ended self-administered questionnaire to collect primary data. Structural equation modeling (SEM) was used to test the theoretical model and hypothesis.

Findings

The results indicate that IT has a positive direct effect on port operational efficiency (OE) and an indirect effect on port OE through organizational culture (OC). The mediating role of OC is statistically insignificant.

Originality/value

This is among the first few attempts in Sub-Saharan Africa (SSA) that provides researchers with a contemporary view of IT and seaport operations.

Details

Marine Economics and Management, vol. 4 no. 2
Type: Research Article
ISSN: 2516-158X

Keywords

Access Restricted. View access options
Article
Publication date: 27 June 2020

Esther Dzidzah, Kwame Owusu Kwateng and Benjamin Kofi Asante

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in…

843

Abstract

Purpose

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in cybersecurity threat. Customers are progressively becoming conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour.

Design/methodology/approach

A synthesis of theories – Self-efficacy and technology threat avoidance theories – was used to examine the security behaviour of users of MFSs. Data was gathered from 530 students in Ghana using convenience sampling technique. Data analysis was carried out using descriptive statistics, inferential statistics and structural equation model.

Findings

Outcome of the investigation indicate that both mastery experience and verbal persuasion have substantial effect on the avoidance motivation of MFSs users. It was, however, found that emotional state and vicarious experience of users do not influence their avoidance motivation. Also, it was established that avoidance motivation is a positive prognosticator of avoidance behaviour.

Practical implications

Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the successes achieved.

Originality/value

Studies on user security behaviour are rare, especially in sub Saharan Africa, thus, this study will contribute to extant literature by adding a new dimension of user security behaviour.

1 – 2 of 2
Per page
102050