Search results

1 – 4 of 4
Per page
102050
Citations:
Loading...
Available. Open Access. Open Access
Article
Publication date: 7 November 2016

Ali Tarhini, Mazen El-Masri, Maged Ali and Alan Serrano

A number of studies have shown that internet banking (IB) implementation is not only determined by banks or government support, but also by perceptions and experience of IB users…

26217

Abstract

Purpose

A number of studies have shown that internet banking (IB) implementation is not only determined by banks or government support, but also by perceptions and experience of IB users. IB studies have showed encouraging results from academics in developed countries. Yet little is known about the user adoption of IB in Lebanon. The purpose of this paper is to investigate the factors that may hinder or facilitate the acceptance and usage of IB in Lebanon.

Design/methodology/approach

A conceptual framework was developed through extending the unified theory of acceptance and use of technology (UTAUT) by incorporating two additional factors namely; perceived credibility (PC) and task-technology fit (TTF). A quantitative approach based on cross-sectional survey was used to collect data from 408 IB consumers. Data were analysed using structural equation modelling based on AMOS 20.0.

Findings

The results of the structural path revealed that performance expectancy (PE), social influence, PC and TTF to be significant predictors in influencing customers’ behavioural intention (BI) to use IB and explained 61 per cent of its variance, with PE was found the strongest antecedent of BI. Contrary to the UTAUT, the effect of effort expectancy on BI was insignificant. In addition, both BI and facilitating conditions were found to affect the actual usage behaviour and explained 64 per cent of its variance

Practical implications

This study would be helpful for bank managers and policy makers to explain the currently relatively low penetration rate of IB in formulating strategies to encourage the adoption and acceptance of IB by Lebanese customers, where IB is still considered an innovation.

Originality/value

This study is the first research that extend the UTAUT by incorporating two additional factors namely; PC and TTF to study the IB in the Lebanese context. This study contributes to the research on computer technology usage by looking at IB adoption and incorporation into the lives of customers via the BI to use and actual usage of IB in Lebanon.

Access Restricted. View access options
Article
Publication date: 19 November 2020

Karma Sherif, Omolola Jewesimi and Mazen El-Masri

Advances in electronic performance monitoring (EPM) have raised employees’ concerns regarding the invasion of privacy and erosion of trust. On the other hand, EPM promises to…

1180

Abstract

Purpose

Advances in electronic performance monitoring (EPM) have raised employees’ concerns regarding the invasion of privacy and erosion of trust. On the other hand, EPM promises to improve performance and processes. This paper aims to focus on how the alignment of EPM design and organizational culture through effective organizational mechanisms can address privacy concerns, and, hence, positively affect employees’ perception toward technology.

Design/methodology/approach

Based on a theoretical lens extending two conceptual frameworks, a qualitative approach was used to analyze interview data collected from a comparative case study of two organizations in the USA and Qatar within the oil and gas sector. These two contexts were selected to emphasize the cross-cultural and organizational differences in employees’ acceptance of EPM.

Findings

The study revealed that national and corporate cultures affected employees’ perception and acceptance of monitoring in both countries. Because of diversity, though EPM was better accepted in Qatar, as they are an easy way to enforce standardization and to push employees to adapt to a dominating corporate culture. Conversely, in the USA where culture is more innovation-oriented, organizational mechanisms shifted the perceptions of EPM to being mean to obtain feedback rather than to impose standards.

Research limitations/implications

This qualitative study is based on a descriptive comparative case study of two organizations with two cultural contexts. The limited sample size and cross-sectional nature of data may need to be extended to a larger cultural scope that is observed over a longer period to safely generalize the findings.

Practical implications

Decision-makers in multinational corporations with different cultural backgrounds may benefit of this study’s outcomes, as it emphasizes the importance of the fit between EPM designs and the cultural settings. Furthermore, organizations aiming to conduct analytics on EPM data have to justify and prove its benefits to employees to facilitate acceptance.

Social implications

The study shows that employees in Qatar have a different cultural frame of reference in their perception of fairness and ethics than their counterparts in the USA because of changes in the meaning of social relations, personal goals and behavioral norms.

Originality/value

The originality of this study lays in its empirical validation of a composite framework examining both national and corporate cultures on employees’ reactions to EPM systems. It also proves the critical importance of organizational mechanisms to align the EPM design with the organization cultural settings.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Access Restricted. View access options
Article
Publication date: 2 August 2021

Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…

918

Abstract

Purpose

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.

Design/methodology/approach

An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.

Findings

The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.

Research limitations/implications

Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.

Practical implications

Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.

Originality/value

This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Access Restricted. View access options
Article
Publication date: 9 April 2018

Karim Al-Yafi, Mazen El-Masri and Ray Tsai

Social network sites (SNSs) have been common applications attracting a large number of users in Qatar. Current literature remains inconclusive about the relationship between SNS…

2769

Abstract

Purpose

Social network sites (SNSs) have been common applications attracting a large number of users in Qatar. Current literature remains inconclusive about the relationship between SNS usage and users’ academic performance. While one stream confirms that SNS usage may lead to addiction and seriously affect individuals’ academic performance, other studies refer to SNS as learning enablers. The purpose of this paper is twofold: first, it investigates the SNS usage profiles among the young generation in the Gulf Cooperation Council (GCC) represented by Qatar; second, it examines the relationship between the identified SNS usage profiles and their respective users’ academic performance.

Design/methodology/approach

The study follows a quantitative survey-based method that was adapted from Chen’s internet Addiction Scale to fit the context of social networks. Data were collected from students of two universities in Qatar, one private and another public. Respondents’ grade point average was also collected and compared across the different usage profiles to understand how SNS usage behavior affects academic performance.

Findings

Results reveal that there is no linear relationship between SNS usage and academic performance. Therefore, this study further investigates SNS usage profiles and identifies three groups: passive (low usage), engaged (normal usage) and addicted (high usage). It was found that engaged users demonstrate significantly higher academic performance than their passive and addicted peers. Moreover, there is no significant difference in the academic performance between passive and addicted users.

Research limitations/implications

This study is cross-sectional and based on self-reported data collected from university students in Qatar. Further research venues could employ a more general sample covering a longer period, differentiating between messaging tools (e.g. WhatsApp) and other pure SNS (e.g. Twitter), and to cover other aspects than just academic performance.

Originality/value

This study complements research efforts on the influence of technology on individuals and on the society in the GCC area. It concludes that engaged SNS users achieve better academic performance than the addicted or passive users. Contradicting the strong linear relationship between SNS and performance, as claimed by previous studies, is the main originality of this paper.

Details

Journal of Enterprise Information Management, vol. 31 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 4 of 4
Per page
102050