Search results

1 – 10 of over 3000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 17 November 2021

Lori Baker-Eveleth, Robert Stone and Daniel Eveleth

This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the…

1693

Abstract

Purpose

This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the number of users and functionality; it is important to understand social media user privacy-protection behaviors and the users’ psychological underpinnings driving those behaviors. Among these, perceptions are the users’ evaluation of their privacy concerns and data sharing benefits inherent in social media use which influence the users’ behaviors to protect their privacy.

Design/methodology/approach

To research these issues, a theoretical model and hypotheses were developed, based on self-efficacy theory. The theoretical model was empirically tested using 193 questionnaire responses collected from students enrolled in business courses at a medium-sized university in the western USA. All the respondents reported that they routinely use social media. The empirical analysis was performed using structural equations modeling in PC SAS version 9.4, procedure Calis.

Findings

The estimation of the paths in the structural model indicates that privacy concerns positively influence social media users’ protection behaviors while the perceived benefits of data sharing negatively influence protection behaviors. Privacy experience positively influences privacy concerns. Alternatively, social media use positively influences social media self-efficacy and perceived usefulness, which, in turn, have meaningful influences on data sharing benefits.

Originality/value

Previous findings about the effect of self-efficacy on protection behaviors has been inconclusive. This study adds some clarity. Specifically, the findings suggest that the effect depends upon the foci of self-efficacy. While higher self-efficacy with respect to using privacy-related features of a specific technology tends to lead to greater privacy concerns, higher self-efficacy with respect to the more general technology (e.g. social media, computer) seems to affect protection behaviors through perceived benefits. Further, the results of this study offer conclusions about the roles that privacy experiences, social media use and perceived social media benefits play in affecting protection behaviors.

Access Restricted. View access options
Book part
Publication date: 5 February 2019

Harvey A. Farberman

Gregory P. Stone (1921–1981) made original contributions to the fields of urban sociology, social psychology, sociology of sport, and sociological theory. His work gave rise to a…

Abstract

Gregory P. Stone (1921–1981) made original contributions to the fields of urban sociology, social psychology, sociology of sport, and sociological theory. His work gave rise to a set of empirically grounded concepts including nonranked status aggregates, personalization, universes of appearance, and personal and collective identity. These concepts developed over time, were based on quantitative research, and provide continuity to Stone’s work. This essay will elaborate on these concepts in order to consolidate and interpret Stone’s contribution to sociology.

Access Restricted. View access options
Article
Publication date: 1 March 1996

Robert J. Stone

Looks at changes in the human‐computer interface, particularly in the field of using computers for applications which require an accurate registration from an input device in “six…

232

Abstract

Looks at changes in the human‐computer interface, particularly in the field of using computers for applications which require an accurate registration from an input device in “six degrees of freedom”, including robotics, CAD, anthropometric/biomechanic analysis, military, digital antique cataloguing and archaeological site surveys.

Details

Sensor Review, vol. 16 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Access Restricted. View access options
Article
Publication date: 1 August 1995

Robert J. Stone

Virtual reality (VR) has recently become established as a suite oftechnologies capable of serving many companies′ future needs in designpractice, training and organizational…

2656

Abstract

Virtual reality (VR) has recently become established as a suite of technologies capable of serving many companies′ future needs in design practice, training and organizational communication. Two years after the launch of a major British collaborative project involving 17 blue‐chip companies, VR is set to become adopted by many as their “information technology of choice” for the next century – some even aiming to establish in‐house facilities before the end of 1996. Proposes that, properly implemented, VR is capable of giving personnel at all company levels, who have a wide variety of educational backgrounds or skills, intuitive access to complex, computer‐mediated processes. Discusses some of the practical solutions to a commercially‐driven selection of demonstrator projects, while attempting to dispel some of the myths associated with VR, such as the necessity to don head‐mounted displays and instrumented gloves.

Details

World Class Design to Manufacture, vol. 2 no. 4
Type: Research Article
ISSN: 1352-3074

Keywords

Access Restricted. View access options
Article
Publication date: 8 July 2014

Alan Richardson, Kathryn A. Coventry, Alan M. Forster and Chris Jamison

Deterioration in natural stone is associated with many decay mechanisms and often the inherent composition of the materials themselves. Sandstone varies considerably but they all…

379

Abstract

Purpose

Deterioration in natural stone is associated with many decay mechanisms and often the inherent composition of the materials themselves. Sandstone varies considerably but they all require a cementing matrix to bind amongst others, the silica (SiO2) particles together (Reading, 1989). In calcareous sandstones and limestones this binding matrix is principally calcium carbonate based (Muir, 2006; Reading, 1989; McMillan et al., 1999) in the form of calcite (CaCO3). Friable sandstone substrates and stones suffering from “surface dissolution” or disaggregation (Muir, 2006; Smith et al., 1992) have been traditionally consolidated utilising a host of chemical compounds that had, in many cases negative effects on their long-term performance (Muir, 2006). A principle issue amongst many was moisture entrapment and irreversibility of the consolidants adopted. The paper aims to discuss these issues.

Design/methodology/approach

This paper investigates the effect of microbial induced calcite precipitation (MICP) as a natural treatment for the conservation of historic natural stone substrates. Sporosarcina pasteurii has been proven as a bacterium that can perform MICP effectively in extreme conditions making it the preferred bacterium for the MICP process within this study. Surface treatment experiments were analysed by measuring the mass increase and surface changes using scanning electron microscopy (SEM).

Findings

The surface treatments showed a noticeable mass increase and observable deposition when viewed using a SEM microscope. Bio cementation of loose sand particles was observed and the degree of cementation was determined using a Moh's hardness test.

Research limitations/implications

Recommendations for further work to improve this study are: use an increased Sporosarcina pasteurii cell optical density which would provide a greater calcite output. Carry out a paired comparison initial surface absorption test (BS 1881: Part 208, 1996 or ASTM C 1585-04, 2004). To be carried out on untreated control and MICP samples which would determine the pore blocking effect and surface repair capability of the treated samples.

Practical implications

A method for obtaining optimal results in terms of surface treatment would involve reducing the time between mixing and application, this would require having the two reaction constituents mixed only seconds before use. Using a late mix spray application system has the potential to allow the two mixtures to combine in the spray nozzle whilst exiting the apparatus.

Originality/value

This paper investigates a safe, natural process for stone repair.

Details

Structural Survey, vol. 32 no. 3
Type: Research Article
ISSN: 0263-080X

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1993

Robert N. Stone and Kjell Grønhaug

Examines the construct of perceived risk, as used in consumer andmarketing research. In the light of the shortcomings of past research,develops and tests three hypotheses…

20302

Abstract

Examines the construct of perceived risk, as used in consumer and marketing research. In the light of the shortcomings of past research, develops and tests three hypotheses. Findings show that the risk dimensions proposed in the literature (i.e. financial, psychological, social, performance, physical and time‐related risk) capture a very high fraction of perceived overall risk, and that a parsimonious structure of the risk concept exists as the other risk dimensions are mediated through individual psychological risk. Implications are highlighted.

Details

European Journal of Marketing, vol. 27 no. 3
Type: Research Article
ISSN: 0309-0566

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1993

Robert W. Stone and David J. Good

Examines the relationships between the frequency of expert systemuse and the system′s hardware, access location, and features. Alsoexamines the relationship between the expert…

192

Abstract

Examines the relationships between the frequency of expert system use and the system′s hardware, access location, and features. Also examines the relationship between the expert system′s hardware and access location. The study is empirical, using a survey of marketing executives who work within marketing organizations employing expert systems. The findings include that the hardware type appears to influence the frequency of expert systems use. Daily use is dominated by mainframe computers, while weekly and monthly use is dominated by the microcomputers. Further, the frequency of expert system use increases with access availability and decreases as the expert system becomes less available. The dominant feature of these expert systems is the ability to perform what‐if‐analysis. When access location and hardware type are examined, the dominant hardware is the microcomputer. Further, particular hardware types tend to dominate specific access locations.

Details

Industrial Management & Data Systems, vol. 93 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 January 1983

Robert D. Stone

The purpose of this paper is to analyze the June 25 decision of the United States Supreme Court in the Island Trees school library case (Board of Education, Island Trees Union

51

Abstract

The purpose of this paper is to analyze the June 25 decision of the United States Supreme Court in the Island Trees school library case (Board of Education, Island Trees Union Free School District No. 26, et al. v. Pico, et al., _U.S._, 50 Law Week 4831 [1982]).

Details

Collection Building, vol. 5 no. 1
Type: Research Article
ISSN: 0160-4953

Access Restricted. View access options
Article
Publication date: 1 February 2000

David J. Good and Robert W. Stone

Although chiefly anecdotal, reports that performance is enhanced through technology has encouraged many marketers to adopt computer systems. To examine this issue, 183 industrial…

2985

Abstract

Although chiefly anecdotal, reports that performance is enhanced through technology has encouraged many marketers to adopt computer systems. To examine this issue, 183 industrial marketing executives familiar with computers were surveyed. The results suggest that, properly managed, computer usage enriches individual marketer productivity and, in turn, organizational performance. Because managers can direct this productivity through organizational activities and investments, these findings suggest a number of key implications for marketers and researchers interested in utilizing and/or expanding applications of computer technology.

Details

Journal of Business & Industrial Marketing, vol. 15 no. 1
Type: Research Article
ISSN: 0885-8624

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 1985

JAN KENNEDY and ROBERT W. STONE

There are currently two identical bills pending in Congress (House Resolution 4730 and Senate Bill 2148) which this research will examine. Title I of these bills would establish a…

39

Abstract

There are currently two identical bills pending in Congress (House Resolution 4730 and Senate Bill 2148) which this research will examine. Title I of these bills would establish a reforestation and conservation program entitled the Conservation Reserve Program. The Secretary of Agriculture would be able to designate land regularly used in the production of certain crops as eligible for program participation. If a landowner of farmer places the‐designated land in the program it must be planted in a “shelter belt,” which is an area of vegetative cover. Shelter belts can be divided for simplicity into two types, grassland and tree.

Details

Studies in Economics and Finance, vol. 9 no. 2
Type: Research Article
ISSN: 1086-7376

1 – 10 of over 3000
Per page
102050