Ali Tarhini, Mazen El-Masri, Maged Ali and Alan Serrano
A number of studies have shown that internet banking (IB) implementation is not only determined by banks or government support, but also by perceptions and experience of IB users…
Abstract
Purpose
A number of studies have shown that internet banking (IB) implementation is not only determined by banks or government support, but also by perceptions and experience of IB users. IB studies have showed encouraging results from academics in developed countries. Yet little is known about the user adoption of IB in Lebanon. The purpose of this paper is to investigate the factors that may hinder or facilitate the acceptance and usage of IB in Lebanon.
Design/methodology/approach
A conceptual framework was developed through extending the unified theory of acceptance and use of technology (UTAUT) by incorporating two additional factors namely; perceived credibility (PC) and task-technology fit (TTF). A quantitative approach based on cross-sectional survey was used to collect data from 408 IB consumers. Data were analysed using structural equation modelling based on AMOS 20.0.
Findings
The results of the structural path revealed that performance expectancy (PE), social influence, PC and TTF to be significant predictors in influencing customers’ behavioural intention (BI) to use IB and explained 61 per cent of its variance, with PE was found the strongest antecedent of BI. Contrary to the UTAUT, the effect of effort expectancy on BI was insignificant. In addition, both BI and facilitating conditions were found to affect the actual usage behaviour and explained 64 per cent of its variance
Practical implications
This study would be helpful for bank managers and policy makers to explain the currently relatively low penetration rate of IB in formulating strategies to encourage the adoption and acceptance of IB by Lebanese customers, where IB is still considered an innovation.
Originality/value
This study is the first research that extend the UTAUT by incorporating two additional factors namely; PC and TTF to study the IB in the Lebanese context. This study contributes to the research on computer technology usage by looking at IB adoption and incorporation into the lives of customers via the BI to use and actual usage of IB in Lebanon.
Details
Keywords
Karma Sherif, Omolola Jewesimi and Mazen El-Masri
Advances in electronic performance monitoring (EPM) have raised employees’ concerns regarding the invasion of privacy and erosion of trust. On the other hand, EPM promises to…
Abstract
Purpose
Advances in electronic performance monitoring (EPM) have raised employees’ concerns regarding the invasion of privacy and erosion of trust. On the other hand, EPM promises to improve performance and processes. This paper aims to focus on how the alignment of EPM design and organizational culture through effective organizational mechanisms can address privacy concerns, and, hence, positively affect employees’ perception toward technology.
Design/methodology/approach
Based on a theoretical lens extending two conceptual frameworks, a qualitative approach was used to analyze interview data collected from a comparative case study of two organizations in the USA and Qatar within the oil and gas sector. These two contexts were selected to emphasize the cross-cultural and organizational differences in employees’ acceptance of EPM.
Findings
The study revealed that national and corporate cultures affected employees’ perception and acceptance of monitoring in both countries. Because of diversity, though EPM was better accepted in Qatar, as they are an easy way to enforce standardization and to push employees to adapt to a dominating corporate culture. Conversely, in the USA where culture is more innovation-oriented, organizational mechanisms shifted the perceptions of EPM to being mean to obtain feedback rather than to impose standards.
Research limitations/implications
This qualitative study is based on a descriptive comparative case study of two organizations with two cultural contexts. The limited sample size and cross-sectional nature of data may need to be extended to a larger cultural scope that is observed over a longer period to safely generalize the findings.
Practical implications
Decision-makers in multinational corporations with different cultural backgrounds may benefit of this study’s outcomes, as it emphasizes the importance of the fit between EPM designs and the cultural settings. Furthermore, organizations aiming to conduct analytics on EPM data have to justify and prove its benefits to employees to facilitate acceptance.
Social implications
The study shows that employees in Qatar have a different cultural frame of reference in their perception of fairness and ethics than their counterparts in the USA because of changes in the meaning of social relations, personal goals and behavioral norms.
Originality/value
The originality of this study lays in its empirical validation of a composite framework examining both national and corporate cultures on employees’ reactions to EPM systems. It also proves the critical importance of organizational mechanisms to align the EPM design with the organization cultural settings.
Details
Keywords
Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain
Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…
Abstract
Purpose
Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.
Design/methodology/approach
An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.
Findings
The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.
Research limitations/implications
Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.
Practical implications
Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.
Originality/value
This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.
Details
Keywords
Karim Al-Yafi, Mazen El-Masri and Ray Tsai
Social network sites (SNSs) have been common applications attracting a large number of users in Qatar. Current literature remains inconclusive about the relationship between SNS…
Abstract
Purpose
Social network sites (SNSs) have been common applications attracting a large number of users in Qatar. Current literature remains inconclusive about the relationship between SNS usage and users’ academic performance. While one stream confirms that SNS usage may lead to addiction and seriously affect individuals’ academic performance, other studies refer to SNS as learning enablers. The purpose of this paper is twofold: first, it investigates the SNS usage profiles among the young generation in the Gulf Cooperation Council (GCC) represented by Qatar; second, it examines the relationship between the identified SNS usage profiles and their respective users’ academic performance.
Design/methodology/approach
The study follows a quantitative survey-based method that was adapted from Chen’s internet Addiction Scale to fit the context of social networks. Data were collected from students of two universities in Qatar, one private and another public. Respondents’ grade point average was also collected and compared across the different usage profiles to understand how SNS usage behavior affects academic performance.
Findings
Results reveal that there is no linear relationship between SNS usage and academic performance. Therefore, this study further investigates SNS usage profiles and identifies three groups: passive (low usage), engaged (normal usage) and addicted (high usage). It was found that engaged users demonstrate significantly higher academic performance than their passive and addicted peers. Moreover, there is no significant difference in the academic performance between passive and addicted users.
Research limitations/implications
This study is cross-sectional and based on self-reported data collected from university students in Qatar. Further research venues could employ a more general sample covering a longer period, differentiating between messaging tools (e.g. WhatsApp) and other pure SNS (e.g. Twitter), and to cover other aspects than just academic performance.
Originality/value
This study complements research efforts on the influence of technology on individuals and on the society in the GCC area. It concludes that engaged SNS users achieve better academic performance than the addicted or passive users. Contradicting the strong linear relationship between SNS and performance, as claimed by previous studies, is the main originality of this paper.