Search results

1 – 10 of 13
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 27 July 2023

Shu Schiller, Fiona Fui-Hoon Nah, Andy Luse and Keng Siau

The gender composition of teams remains an important yet complex element in unlocking the success of collaboration and performance in the metaverse. In this study, the authors…

674

Abstract

Purpose

The gender composition of teams remains an important yet complex element in unlocking the success of collaboration and performance in the metaverse. In this study, the authors examined the collaborations of same- and mixed-gender dyads to investigate how gender composition influences perceptions of the dyadic collaboration process and outcomes at both the individual and team levels in the metaverse.

Design/methodology/approach

Drawing on expectation states theory and social role theory, the authors hypothesized differences between dyads of different gender compositions. A blocked design was utilized where 432 subjects were randomly assigned to teams of different gender compositions: 101 male dyads, 59 female dyads and 56 mixed-gender dyads. Survey responses were collected after the experiment.

Findings

Multilevel multigroup analyses reveal that at the team level, male dyads took on the we-impress manifestation to increase satisfaction with the team solution. In contrast, female and mixed-gender dyads adopted the we-work-hard-on-task philosophy to increase satisfaction with the team solution. At the individual level, impression management is the key factor associated with trust in same-gender dyads but not in mixed-gender dyads.

Originality/value

As one of the pioneering works on gender effects in the metaverse, our findings shed light on two fronts in virtual dyadic collaborations. First, the authors offer a theoretically grounded and gendered perspective by investigating male, female and mixed-gender dyads in the metaverse. Second, the study advances team-based theory and deepens the understanding of gender effects at both the individual and team levels (multilevel) in a virtual collaboration environment.

Available. Open Access. Open Access
Article
Publication date: 20 September 2021

Kavya Sharma, Xinhui Zhan, Fiona Fui-Hoon Nah, Keng Siau and Maggie X. Cheng

Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research…

5230

Abstract

Purpose

Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses.

Design/methodology/approach

A 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming).

Findings

The findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link.

Originality/value

This research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Available. Open Access. Open Access
Article
Publication date: 5 December 2016

Soon-Goo Hong, Keng Siau and Jong-Weon Kim

This paper aims to assess how enterprise resource planning (ERP) performance of Korean small and medium enterprises in manufacturing differs according to different levels of…

6291

Abstract

Purpose

This paper aims to assess how enterprise resource planning (ERP) performance of Korean small and medium enterprises in manufacturing differs according to different levels of business process reengineering (BPR), information strategic planning (ISP) and ERP customization.

Design/methodology/approach

A questionnaire survey was carried out in this research. Responses from 96 small and medium manufacturing companies that have adopted ERP systems were analyzed.

Findings

The results of this study suggest that ISP and BPR implementation are positively correlated to ERP performance.

Originality/value

While consulting and customization costs have positive impacts on ERP performance, the level of customization does not influence performance. As one of the pioneering studies that investigate the impact of BPR, ISP and ERP customization on small and medium manufacturing companies, this research contributes to both theory and practice.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 10 no. 1
Type: Research Article
ISSN: 2071-1395

Keywords

Access Restricted. View access options
Article
Publication date: 1 May 2005

Keng Siau and Yuan Long

The growing interest in e‐government raises the question of stages in e‐government development. A few stage models for e‐government have been proposed. Without a common…

6812

Abstract

Purpose

The growing interest in e‐government raises the question of stages in e‐government development. A few stage models for e‐government have been proposed. Without a common e‐government stage model, different research in e‐government may be based on different stage models. This presents a difficulty in comparing and understanding different research results. In this research, we synthesize the existing e‐government stage models so that there is a common frame of reference for researchers and practitioners in the area.

Design/methodology/approach

This research utilizes a qualitative meta‐synthesis methodology to synthesize different e‐government stage models. The meta‐synthesis follows the steps used in meta‐ethnography.

Findings

Five different e‐government stage models were used in this research. We translated the stages within different models into one another and developed a new e‐government stage model. The new e‐government stage model has the following five stages: web presence, interaction, transaction, transformation, and e‐democracy.

Research limitations/implications

The paper contributes to e‐government theory development. The new five‐stage model provides a synthesized conceptual framework for researchers to evaluate and understand e‐government development.

Practical implications

The synthesized e‐government stage model presents a road map for practitioners to follow in their e‐government projects.

Originality/value

The research uses an innovative and new research methodology to synthesize the existing research. It is one of the first research in the information systems area to make use of meta‐synthesis approach to consolidate the existing qualitative research. This paper is also one of the one papers to systematically come up with an e‐government stage model.

Details

Industrial Management & Data Systems, vol. 105 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 2001

Sang Jun Lee and Keng Siau

Terabytes of data are generated everyday in many organizations. To extract hidden predictive information from large volumes of data, data mining (DM) techniques are needed…

15399

Abstract

Terabytes of data are generated everyday in many organizations. To extract hidden predictive information from large volumes of data, data mining (DM) techniques are needed. Organizations are starting to realize the importance of data mining in their strategic planning and successful application of DM techniques can be an enormous payoff for the organizations. This paper discusses the requirements and challenges of DM, and describes major DM techniques such as statistics, artificial intelligence, decision tree approach, genetic algorithm, and visualization.

Details

Industrial Management & Data Systems, vol. 101 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Available. Open Access. Open Access
Article
Publication date: 29 September 2021

Gurvirender Tejay and Gary Klein

749

Abstract

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Available. Content available

Abstract

Details

Internet Research, vol. 34 no. 1
Type: Research Article
ISSN: 1066-2243

Access Restricted. View access options
Book part
Publication date: 10 November 2023

David Wai Lun Ng and Lillian Koh Noi Keng

The internationalisation of industries has spilled over to academia, whereby institutions of higher learning (IHL) increasingly compete in the graduate quality and applied…

Abstract

The internationalisation of industries has spilled over to academia, whereby institutions of higher learning (IHL) increasingly compete in the graduate quality and applied graduate knowledge capabilities that they can offer. With increasing global competition for students, combined with the evolving need for lifelong learning in dynamic industries impacted by digital knowledge management, there is an opportunity for IHLs to be able to evolve to ensure their business models enable services and service delivery to cater to and help shape industry demands. This chapter will look at micro-credentialing (MC) and how the provision of MCs has changed along with the evolving IHL education environment. The demands of students, employers and ecosystem considerations will be addressed through a review of the current landscape, pathways to MC and how MC may be operationalised. The Bersteinian approach to pedagogic classification, which identifies the framework of knowledge as being communicable via three axes of singularism, regionalism and a wider generalist approach is referenced as a framework. The resultant recommendations that draw upon these foundations will conclude the chapter.

Details

Introducing Multidisciplinary Micro-credentialing: Rethinking Learning and Development for Higher Education and Industry
Type: Book
ISBN: 978-1-80382-460-4

Keywords

Access Restricted. View access options
Article
Publication date: 5 August 2014

Choy-Har Wong, Garry Wei-Han Tan, Siew-Phaik Loke and Keng-Boon Ooi

While mobile TV (m-TV) is beneficial and is currently an emerging area within mobile commerce, the adoption rate is at the infancy stage. The purpose of this paper is therefore to…

2542

Abstract

Purpose

While mobile TV (m-TV) is beneficial and is currently an emerging area within mobile commerce, the adoption rate is at the infancy stage. The purpose of this paper is therefore to adapt the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to explore on the factors in predicting users’ behavioral intention (BI) of m-TV.

Design/methodology/approach

Partial least square structural equation modeling approach was employed using 193 respondents to test the findings.

Findings

The findings revealed that effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM) and habit (HT) have significant effects on BI. In addition, gender was found to have moderating effect between FC and BI.

Practical implications

Findings from this study provide valuable insights and contribute to the marketing strategy for mobile marketers, wireless communications vendors and application developers in the m-TV industry.

Originality/value

Since the emergence of m-TV is regarded as a new concept, what factors that may motivate users to watch TV using m-devices remains unexplored and therefore is currently a neglected research area. This paper provides clues and valuable insights for mobile marketers, wireless communications vendors and application developers in the m-TV industry.

Details

Industrial Management & Data Systems, vol. 114 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 28 May 2020

Jaejoo Lim, Jim R. Wollscheid and Ramakrishna Ayyagari

Consumers often encounter issues of perceived ambiguity and performance risk when attempting to evaluate experience goods being offered online. Sellers try to alleviate this…

373

Abstract

Purpose

Consumers often encounter issues of perceived ambiguity and performance risk when attempting to evaluate experience goods being offered online. Sellers try to alleviate this knowledge gap often seen in a medium of low naturalness by engaging in effective compensatory adaptation. This research theoretically looks into three primary aspects of compensatory adaption and their potential in securing communication of high-quality information between the online seller and consumer.

Design/methodology/approach

Utilizing survey data and structural equation modeling, this study tests the effectiveness of different aspects of compensatory adaption to alleviate the knowledge gap in a medium of low naturalness.

Findings

Drawing on media naturalness theory and the tripartite model of attitude, this paper identifies three theoretical components that significantly affect the effectiveness of compensatory adaption. They are information retrieval capability from the cognitive/logical aspect, information richness from the affective/audiovisual aspect and interactivity from the behavioral aspect. The effectiveness of compensatory adaptation proves to have a positive impact on perceived information quality.

Originality/value

To the best of our knowledge, this is the first paper in the information systems literature to examine the compensatory adaptation tools for effective transfer of information. This study contributes to the academics by providing three handles to improve effectiveness of compensatory adaptation toward information quality. We focus on three compensatory adaptation tools in cognitive/logical, affective/audiovisual and behavioral aspects, and this compensation perspective leads to three practical factors that affect effective transfer of information between online sellers and consumers. The result of this study complements the nomological network of the enablers and impediments of e-commerce.

Details

American Journal of Business, vol. 35 no. 2
Type: Research Article
ISSN: 1935-519X

Keywords

1 – 10 of 13
Per page
102050