for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Emerald   (Total: 356 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 356 Journals sorted alphabetically
A Life in the Day     Hybrid Journal   (Followers: 12)
Academia Revista Latinoamericana de Administración     Open Access   (Followers: 2, SJR: 0.178, CiteScore: 1)
Accounting Auditing & Accountability J.     Hybrid Journal   (Followers: 32, SJR: 1.71, CiteScore: 3)
Accounting Research J.     Hybrid Journal   (Followers: 25, SJR: 0.144, CiteScore: 0)
Accounting, Auditing and Accountability J.     Hybrid Journal   (Followers: 25, SJR: 2.187, CiteScore: 4)
Advances in Accounting Education     Hybrid Journal   (Followers: 17, SJR: 0.279, CiteScore: 0)
Advances in Appreciative Inquiry     Hybrid Journal   (Followers: 1, SJR: 0.451, CiteScore: 1)
Advances in Autism     Hybrid Journal   (Followers: 33, SJR: 0.222, CiteScore: 1)
Advances in Dual Diagnosis     Hybrid Journal   (Followers: 46, SJR: 0.21, CiteScore: 1)
Advances in Gender Research     Full-text available via subscription   (Followers: 5, SJR: 0.16, CiteScore: 0)
Advances in Intl. Marketing     Full-text available via subscription   (Followers: 6)
Advances in Mental Health and Intellectual Disabilities     Hybrid Journal   (Followers: 83, SJR: 0.296, CiteScore: 0)
Advances in Mental Health and Learning Disabilities     Hybrid Journal   (Followers: 30)
African J. of Economic and Management Studies     Hybrid Journal   (Followers: 10, SJR: 0.216, CiteScore: 1)
Agricultural Finance Review     Hybrid Journal   (SJR: 0.406, CiteScore: 1)
Aircraft Engineering and Aerospace Technology     Hybrid Journal   (Followers: 217, SJR: 0.354, CiteScore: 1)
American J. of Business     Hybrid Journal   (Followers: 20)
Annals in Social Responsibility     Full-text available via subscription  
Anti-Corrosion Methods and Materials     Hybrid Journal   (Followers: 11, SJR: 0.235, CiteScore: 1)
Arts and the Market     Hybrid Journal   (Followers: 9)
Asia Pacific J. of Innovation and Entrepreneurship     Open Access   (Followers: 1)
Asia Pacific J. of Marketing and Logistics     Hybrid Journal   (Followers: 8, SJR: 0.425, CiteScore: 1)
Asia-Pacific J. of Business Administration     Hybrid Journal   (Followers: 6, SJR: 0.234, CiteScore: 1)
Asian Association of Open Universities J.     Open Access   (Followers: 1)
Asian Education and Development Studies     Hybrid Journal   (Followers: 6, SJR: 0.233, CiteScore: 1)
Asian J. on Quality     Hybrid Journal   (Followers: 3)
Asian Review of Accounting     Hybrid Journal   (Followers: 2, SJR: 0.222, CiteScore: 1)
Aslib J. of Information Management     Hybrid Journal   (Followers: 31, SJR: 0.725, CiteScore: 2)
Aslib Proceedings     Hybrid Journal   (Followers: 310)
Assembly Automation     Hybrid Journal   (Followers: 2, SJR: 0.603, CiteScore: 2)
Baltic J. of Management     Hybrid Journal   (Followers: 3, SJR: 0.309, CiteScore: 1)
Benchmarking : An Intl. J.     Hybrid Journal   (Followers: 10, SJR: 0.559, CiteScore: 2)
British Food J.     Hybrid Journal   (Followers: 17, SJR: 0.5, CiteScore: 2)
Built Environment Project and Asset Management     Hybrid Journal   (Followers: 15, SJR: 0.46, CiteScore: 1)
Business Process Re-engineering & Management J.     Hybrid Journal   (Followers: 8)
Business Strategy Series     Hybrid Journal   (Followers: 6)
Career Development Intl.     Hybrid Journal   (Followers: 17, SJR: 0.527, CiteScore: 2)
China Agricultural Economic Review     Hybrid Journal   (Followers: 2, SJR: 0.31, CiteScore: 1)
China Finance Review Intl.     Hybrid Journal   (Followers: 6, SJR: 0.245, CiteScore: 0)
Chinese Management Studies     Hybrid Journal   (Followers: 4, SJR: 0.278, CiteScore: 1)
Circuit World     Hybrid Journal   (Followers: 16, SJR: 0.246, CiteScore: 1)
Collection and Curation     Hybrid Journal   (Followers: 11, SJR: 0.296, CiteScore: 1)
COMPEL: The Intl. J. for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3, SJR: 0.22, CiteScore: 1)
Competitiveness Review : An Intl. Business J. incorporating J. of Global Competitiveness     Hybrid Journal   (Followers: 5, SJR: 0.274, CiteScore: 1)
Construction Innovation: Information, Process, Management     Hybrid Journal   (Followers: 14, SJR: 0.731, CiteScore: 2)
Corporate Communications An Intl. J.     Hybrid Journal   (Followers: 8, SJR: 0.453, CiteScore: 1)
Corporate Governance Intl. J. of Business in Society     Hybrid Journal   (Followers: 6, SJR: 0.336, CiteScore: 1)
Critical Perspectives on Intl. Business     Hybrid Journal   (SJR: 0.378, CiteScore: 1)
Cross Cultural & Strategic Management     Hybrid Journal   (Followers: 9, SJR: 0.504, CiteScore: 2)
Data Technologies and Applications     Hybrid Journal   (Followers: 327, SJR: 0.355, CiteScore: 1)
Development and Learning in Organizations     Hybrid Journal   (Followers: 8, SJR: 0.138, CiteScore: 0)
Digital Library Perspectives     Hybrid Journal   (Followers: 32, SJR: 0.341, CiteScore: 1)
Direct Marketing An Intl. J.     Hybrid Journal   (Followers: 6)
Disaster Prevention and Management     Hybrid Journal   (Followers: 21, SJR: 0.47, CiteScore: 1)
Drugs and Alcohol Today     Hybrid Journal   (Followers: 147, SJR: 0.245, CiteScore: 1)
Education + Training     Hybrid Journal   (Followers: 24)
Education, Business and Society : Contemporary Middle Eastern Issues     Hybrid Journal   (Followers: 1, SJR: 1.707, CiteScore: 3)
Emerald Emerging Markets Case Studies     Hybrid Journal   (Followers: 1)
Employee Relations     Hybrid Journal   (Followers: 8, SJR: 0.551, CiteScore: 2)
Engineering Computations     Hybrid Journal   (Followers: 3, SJR: 0.444, CiteScore: 1)
Engineering, Construction and Architectural Management     Hybrid Journal   (Followers: 9, SJR: 0.653, CiteScore: 2)
English Teaching: Practice & Critique     Hybrid Journal   (SJR: 0.417, CiteScore: 1)
Equal Opportunities Intl.     Hybrid Journal   (Followers: 3)
Equality, Diversity and Inclusion : An Intl. J.     Hybrid Journal   (Followers: 17, SJR: 0.5, CiteScore: 1)
EuroMed J. of Business     Hybrid Journal   (Followers: 1, SJR: 0.26, CiteScore: 1)
European Business Review     Hybrid Journal   (Followers: 10, SJR: 0.585, CiteScore: 3)
European J. of Innovation Management     Hybrid Journal   (Followers: 25, SJR: 0.454, CiteScore: 2)
European J. of Management and Business Economics     Open Access   (Followers: 2, SJR: 0.239, CiteScore: 1)
European J. of Marketing     Hybrid Journal   (Followers: 21, SJR: 0.971, CiteScore: 2)
European J. of Training and Development     Hybrid Journal   (Followers: 13, SJR: 0.477, CiteScore: 1)
Evidence-based HRM     Hybrid Journal   (Followers: 5, SJR: 0.537, CiteScore: 1)
Facilities     Hybrid Journal   (Followers: 3, SJR: 0.503, CiteScore: 2)
Foresight     Hybrid Journal   (Followers: 8, SJR: 0.34, CiteScore: 1)
Gender in Management : An Intl. J.     Hybrid Journal   (Followers: 20, SJR: 0.412, CiteScore: 1)
Global Knowledge, Memory and Communication     Hybrid Journal   (Followers: 990, SJR: 0.261, CiteScore: 1)
Grey Systems : Theory and Application     Hybrid Journal   (Followers: 1)
Health Education     Hybrid Journal   (Followers: 2, SJR: 0.421, CiteScore: 1)
Higher Education Evaluation and Development     Open Access  
Higher Education, Skills and Work-based Learning     Hybrid Journal   (Followers: 47, SJR: 0.426, CiteScore: 1)
History of Education Review     Hybrid Journal   (Followers: 12, SJR: 0.26, CiteScore: 0)
Housing, Care and Support     Hybrid Journal   (Followers: 8, SJR: 0.171, CiteScore: 0)
Human Resource Management Intl. Digest     Hybrid Journal   (Followers: 21, SJR: 0.129, CiteScore: 0)
IMP J.     Hybrid Journal  
Indian Growth and Development Review     Hybrid Journal   (SJR: 0.174, CiteScore: 0)
Industrial and Commercial Training     Hybrid Journal   (Followers: 5, SJR: 0.301, CiteScore: 1)
Industrial Lubrication and Tribology     Hybrid Journal   (Followers: 7, SJR: 0.334, CiteScore: 1)
Industrial Management & Data Systems     Hybrid Journal   (Followers: 7, SJR: 0.904, CiteScore: 3)
Industrial Robot An Intl. J.     Hybrid Journal   (Followers: 2, SJR: 0.318, CiteScore: 1)
Info     Hybrid Journal   (Followers: 1)
Information and Computer Security     Hybrid Journal   (Followers: 22, SJR: 0.307, CiteScore: 1)
Information Technology & People     Hybrid Journal   (Followers: 45, SJR: 0.671, CiteScore: 2)
Innovation & Management Review     Open Access  
Interactive Technology and Smart Education     Hybrid Journal   (Followers: 12, SJR: 0.191, CiteScore: 1)
Interlending & Document Supply     Hybrid Journal   (Followers: 61)
Internet Research     Hybrid Journal   (Followers: 37, SJR: 1.645, CiteScore: 5)
Intl. J. for Lesson and Learning Studies     Hybrid Journal   (Followers: 4, SJR: 0.324, CiteScore: 1)
Intl. J. for Researcher Development     Hybrid Journal   (Followers: 10)
Intl. J. of Accounting and Information Management     Hybrid Journal   (Followers: 9, SJR: 0.275, CiteScore: 1)
Intl. J. of Bank Marketing     Hybrid Journal   (Followers: 9, SJR: 0.654, CiteScore: 3)
Intl. J. of Climate Change Strategies and Management     Hybrid Journal   (Followers: 17, SJR: 0.353, CiteScore: 1)
Intl. J. of Clothing Science and Technology     Hybrid Journal   (Followers: 8, SJR: 0.318, CiteScore: 1)
Intl. J. of Commerce and Management     Hybrid Journal   (Followers: 1)
Intl. J. of Conflict Management     Hybrid Journal   (Followers: 15, SJR: 0.362, CiteScore: 1)
Intl. J. of Contemporary Hospitality Management     Hybrid Journal   (Followers: 14, SJR: 1.452, CiteScore: 4)
Intl. J. of Culture Tourism and Hospitality Research     Hybrid Journal   (Followers: 20, SJR: 0.339, CiteScore: 1)
Intl. J. of Development Issues     Hybrid Journal   (Followers: 9, SJR: 0.139, CiteScore: 0)
Intl. J. of Disaster Resilience in the Built Environment     Hybrid Journal   (Followers: 6, SJR: 0.387, CiteScore: 1)
Intl. J. of Educational Management     Hybrid Journal   (Followers: 6, SJR: 0.559, CiteScore: 1)
Intl. J. of Emergency Services     Hybrid Journal   (Followers: 8, SJR: 0.201, CiteScore: 1)
Intl. J. of Emerging Markets     Hybrid Journal   (Followers: 4, SJR: 0.474, CiteScore: 2)
Intl. J. of Energy Sector Management     Hybrid Journal   (Followers: 2, SJR: 0.349, CiteScore: 1)
Intl. J. of Entrepreneurial Behaviour & Research     Hybrid Journal   (Followers: 5, SJR: 0.629, CiteScore: 2)
Intl. J. of Ethics and Systems     Hybrid Journal   (Followers: 3, SJR: 0.333, CiteScore: 1)
Intl. J. of Event and Festival Management     Hybrid Journal   (Followers: 7, SJR: 0.388, CiteScore: 1)
Intl. J. of Gender and Entrepreneurship     Hybrid Journal   (Followers: 7, SJR: 0.445, CiteScore: 1)
Intl. J. of Health Care Quality Assurance     Hybrid Journal   (Followers: 12, SJR: 0.358, CiteScore: 1)
Intl. J. of Health Governance     Hybrid Journal   (Followers: 26, SJR: 0.247, CiteScore: 1)
Intl. J. of Housing Markets and Analysis     Hybrid Journal   (Followers: 9, SJR: 0.211, CiteScore: 1)
Intl. J. of Human Rights in Healthcare     Hybrid Journal   (Followers: 6, SJR: 0.205, CiteScore: 0)
Intl. J. of Information and Learning Technology     Hybrid Journal   (Followers: 8, SJR: 0.226, CiteScore: 1)
Intl. J. of Innovation Science     Hybrid Journal   (Followers: 12, SJR: 0.197, CiteScore: 1)
Intl. J. of Intelligent Computing and Cybernetics     Hybrid Journal   (Followers: 3, SJR: 0.214, CiteScore: 1)
Intl. J. of Intelligent Unmanned Systems     Hybrid Journal   (Followers: 4)
Intl. J. of Islamic and Middle Eastern Finance and Management     Hybrid Journal   (Followers: 9, SJR: 0.375, CiteScore: 1)
Intl. J. of Law and Management     Hybrid Journal   (Followers: 2, SJR: 0.217, CiteScore: 1)
Intl. J. of Leadership in Public Services     Hybrid Journal   (Followers: 27)
Intl. J. of Lean Six Sigma     Hybrid Journal   (Followers: 8, SJR: 0.802, CiteScore: 3)
Intl. J. of Logistics Management     Hybrid Journal   (Followers: 10, SJR: 0.71, CiteScore: 2)
Intl. J. of Managerial Finance     Hybrid Journal   (Followers: 5, SJR: 0.203, CiteScore: 1)
Intl. J. of Managing Projects in Business     Hybrid Journal   (Followers: 3, SJR: 0.36, CiteScore: 2)
Intl. J. of Manpower     Hybrid Journal   (Followers: 2, SJR: 0.365, CiteScore: 1)
Intl. J. of Mentoring and Coaching in Education     Hybrid Journal   (Followers: 28, SJR: 0.426, CiteScore: 1)
Intl. J. of Migration, Health and Social Care     Hybrid Journal   (Followers: 12, SJR: 0.307, CiteScore: 1)
Intl. J. of Numerical Methods for Heat & Fluid Flow     Hybrid Journal   (Followers: 11, SJR: 0.697, CiteScore: 3)
Intl. J. of Operations & Production Management     Hybrid Journal   (Followers: 21, SJR: 2.052, CiteScore: 4)
Intl. J. of Organization Theory and Behavior     Hybrid Journal  
Intl. J. of Organizational Analysis     Hybrid Journal   (Followers: 3, SJR: 0.268, CiteScore: 1)
Intl. J. of Pervasive Computing and Communications     Hybrid Journal   (Followers: 3, SJR: 0.138, CiteScore: 1)
Intl. J. of Pharmaceutical and Healthcare Marketing     Hybrid Journal   (Followers: 4, SJR: 0.25, CiteScore: 1)
Intl. J. of Physical Distribution & Logistics Management     Hybrid Journal   (Followers: 11, SJR: 1.821, CiteScore: 4)
Intl. J. of Prisoner Health     Hybrid Journal   (Followers: 7, SJR: 0.303, CiteScore: 1)
Intl. J. of Productivity and Performance Management     Hybrid Journal   (Followers: 8, SJR: 0.578, CiteScore: 2)
Intl. J. of Public Sector Management     Hybrid Journal   (Followers: 31, SJR: 0.438, CiteScore: 1)
Intl. J. of Quality & Reliability Management     Hybrid Journal   (Followers: 8, SJR: 0.492, CiteScore: 2)
Intl. J. of Quality and Service Sciences     Hybrid Journal   (Followers: 2, SJR: 0.309, CiteScore: 1)
Intl. J. of Retail & Distribution Management     Hybrid Journal   (Followers: 6, SJR: 0.742, CiteScore: 3)
Intl. J. of Service Industry Management     Hybrid Journal   (Followers: 3)
Intl. J. of Social Economics     Hybrid Journal   (Followers: 5, SJR: 0.225, CiteScore: 1)
Intl. J. of Sociology and Social Policy     Hybrid Journal   (Followers: 54, SJR: 0.3, CiteScore: 1)
Intl. J. of Sports Marketing and Sponsorship     Hybrid Journal   (Followers: 1, SJR: 0.269, CiteScore: 1)
Intl. J. of Structural Integrity     Hybrid Journal   (Followers: 2, SJR: 0.228, CiteScore: 0)
Intl. J. of Sustainability in Higher Education     Hybrid Journal   (Followers: 14, SJR: 0.502, CiteScore: 2)
Intl. J. of Tourism Cities     Hybrid Journal   (Followers: 2, SJR: 0.502, CiteScore: 0)
Intl. J. of Web Information Systems     Hybrid Journal   (Followers: 4, SJR: 0.186, CiteScore: 1)
Intl. J. of Wine Business Research     Hybrid Journal   (Followers: 8, SJR: 0.562, CiteScore: 2)
Intl. J. of Workplace Health Management     Hybrid Journal   (Followers: 10, SJR: 0.303, CiteScore: 1)
Intl. Marketing Review     Hybrid Journal   (Followers: 15, SJR: 0.895, CiteScore: 3)
Irish J. of Occupational Therapy     Open Access   (Followers: 9)
ISRA Intl. J. of Islamic Finance     Open Access  
J. for Multicultural Education     Hybrid Journal   (Followers: 1, SJR: 0.237, CiteScore: 1)
J. of Accounting & Organizational Change     Hybrid Journal   (Followers: 6, SJR: 0.301, CiteScore: 1)
J. of Accounting in Emerging Economies     Hybrid Journal   (Followers: 9)
J. of Adult Protection, The     Hybrid Journal   (Followers: 16, SJR: 0.314, CiteScore: 1)
J. of Advances in Management Research     Hybrid Journal   (Followers: 2)
J. of Aggression, Conflict and Peace Research     Hybrid Journal   (Followers: 45, SJR: 0.222, CiteScore: 1)
J. of Agribusiness in Developing and Emerging Economies     Hybrid Journal   (SJR: 0.108, CiteScore: 0)
J. of Applied Accounting Research     Hybrid Journal   (Followers: 17, SJR: 0.227, CiteScore: 1)
J. of Applied Research in Higher Education     Hybrid Journal   (Followers: 49, SJR: 0.2, CiteScore: 0)
J. of Asia Business Studies     Hybrid Journal   (Followers: 2, SJR: 0.245, CiteScore: 1)
J. of Assistive Technologies     Hybrid Journal   (Followers: 20)
J. of Business & Industrial Marketing     Hybrid Journal   (Followers: 10, SJR: 0.652, CiteScore: 2)
J. of Business Strategy     Hybrid Journal   (Followers: 12, SJR: 0.333, CiteScore: 1)
J. of Capital Markets Studies     Open Access  
J. of Centrum Cathedra     Open Access  
J. of Children's Services     Hybrid Journal   (Followers: 5, SJR: 0.243, CiteScore: 1)
J. of Chinese Economic and Foreign Trade Studies     Hybrid Journal   (Followers: 1, SJR: 0.2, CiteScore: 0)
J. of Chinese Entrepreneurship     Hybrid Journal   (Followers: 4)
J. of Chinese Human Resource Management     Hybrid Journal   (Followers: 8, SJR: 0.173, CiteScore: 1)
J. of Communication Management     Hybrid Journal   (Followers: 6, SJR: 0.625, CiteScore: 1)
J. of Consumer Marketing     Hybrid Journal   (Followers: 20, SJR: 0.664, CiteScore: 2)
J. of Corporate Real Estate     Hybrid Journal   (Followers: 3, SJR: 0.368, CiteScore: 1)
J. of Criminal Psychology     Hybrid Journal   (Followers: 138, SJR: 0.268, CiteScore: 1)
J. of Criminological Research, Policy and Practice     Hybrid Journal   (Followers: 48, SJR: 0.254, CiteScore: 1)
J. of Cultural Heritage Management and Sustainable Development     Hybrid Journal   (Followers: 10, SJR: 0.257, CiteScore: 1)
J. of Defense Analytics and Logistics     Open Access  
J. of Documentation     Hybrid Journal   (Followers: 196, SJR: 0.613, CiteScore: 1)
J. of Economic and Administrative Sciences     Hybrid Journal   (Followers: 2)
J. of Economic Studies     Hybrid Journal   (Followers: 5, SJR: 0.733, CiteScore: 1)
J. of Economics, Finance and Administrative Science     Open Access   (Followers: 1, SJR: 0.217, CiteScore: 1)
J. of Educational Administration     Hybrid Journal   (Followers: 7, SJR: 1.252, CiteScore: 2)
J. of Enabling Technologies     Hybrid Journal   (Followers: 11, SJR: 0.369, CiteScore: 1)
J. of Engineering, Design and Technology     Hybrid Journal   (Followers: 16, SJR: 0.212, CiteScore: 1)
J. of Enterprise Information Management     Hybrid Journal   (Followers: 4, SJR: 0.827, CiteScore: 4)
J. of Enterprising Communities People and Places in the Global Economy     Hybrid Journal   (Followers: 1, SJR: 0.281, CiteScore: 1)
J. of Entrepreneurship and Public Policy     Hybrid Journal   (Followers: 8, SJR: 0.262, CiteScore: 1)
J. of European Industrial Training     Hybrid Journal   (Followers: 2)
J. of European Real Estate Research     Hybrid Journal   (Followers: 3, SJR: 0.268, CiteScore: 1)
J. of Facilities Management     Hybrid Journal   (Followers: 5, SJR: 0.33, CiteScore: 1)
J. of Family Business Management     Hybrid Journal   (Followers: 7)
J. of Fashion Marketing and Management     Hybrid Journal   (Followers: 12, SJR: 0.608, CiteScore: 2)

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
Information Technology & People
Journal Prestige (SJR): 0.671
Citation Impact (citeScore): 2
Number of Followers: 45  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 0959-3845
Published by Emerald Homepage  [356 journals]
  • How many facets does a “social robot” have' A review of scientific
           and popular definitions online
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose On the verge of what has been hailed as the next technological revolution, the purpose of this paper is to examine scientific and popular definitions of the social robot, reflecting on how expert and lay spheres of knowledge interact. Drawing on social representations theory, this paper aims to elucidate how social robots are named and classified, and to examine the dynamics contributing to their definition. Design/methodology/approach Scientific and popular definitions of the social robot were investigated by conducting: a systematic review of relevant articles published from 2009 to 2015 in the International Journal of Social Robotics; an analysis of the definitions retrievable from the scientific literature using Google Scholar; and an assessment of the interest in the public sphere, and of the popular definitions retrievable online (by inputting “social robot” in Google Trends, and in Google). Findings Scientific definitions of the social robot adopt two strategies, one drawing on and merging previous definitions, the other proposing new, visionary, forward-looking definitions. Popular online definitions of social robots attribute new emotional, linguistic and social capabilities to their physical body. Research limitations/implications The findings need to be confirmed by further research, given the limited size of the data sets considered, and the distortions in the data due to filters and the opacity of the online tools employed. Originality/value Both scientific and non-scientific definitions see social robots as being capable of interacting with and working for humans, but attribute them a different degree of (functional or full) autonomy. In future, any controversy over the connotation of social robots is likely to concern their sociality and autonomy rather than their functionality.
      Citation: Information Technology & People
      PubDate: 2019-04-12T12:26:07Z
      DOI: 10.1108/ITP-04-2018-0203
       
  • Switching from hotels to peer-to-peer accommodation: an empirical study
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Peer-to-peer (P2P) accommodation has become increasingly popular in recent years, and hotels are facing unprecedented impacts. Attracting new consumers and retaining existing ones are critical to the success of P2P accommodation and hotels. The purpose of this paper is to examine three categories of antecedents for hotels consumers’ switching intention: push (i.e. satiation), pull (i.e. perceived value) and mooring (i.e. optimal stimulation level) factors using push–pull–mooring (PPM) model. Design/methodology/approach Airbnb was chosen as the research context. An online survey was conducted to examine the proposed research model and hypotheses. A total of 292 valid data were collected from Airbnb users through a survey. Findings The findings show that the three categories of factors have positive and significant effects on switching intention. Additionally, the mooring factor has a significant moderating effect on the relationship between pull factors and switching intention. Furthermore, the mooring factor affects both pull and push factors. Originality/value First, this is one of the early studies to pay attention to switching intention from hotels to P2P accommodation. Second, to provide a comprehensive understanding of consumers’ switching intention, the authors use PPM model to establish the research framework. This research improves the understanding of consumer’s switching intention by identifying the push and pull factors based on the differences between hotels and P2P accommodation in accordance with optimal stimulation level theory and consumer value theory.
      Citation: Information Technology & People
      PubDate: 2019-04-04T09:28:44Z
      DOI: 10.1108/ITP-12-2017-0444
       
  • Lose your weight with online buddies: behavioral contagion in an online
           weight-loss community
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose A question of interest is whether online social networks are effective in promoting behavioral changes and weight loss. The purpose of this paper is to examine the contagion effect of an online buddy network on individuals’ self-monitoring behavior. Design/methodology/approach This study collects data from an online weight-loss community and constructs an online buddy network. This study compares the effects of the network structure of the buddy network and the actor attributes when predicting self-monitoring performance by employing the auto-logistic actor attribute models. Findings This study confirms the contagion effect on weigh-in behavior in the online buddy network. The contagion effect is significantly predictive when controlling for actor attribute and other network structure effects. Originality/value There is limited evidence that one’s weight-related behavior can be affected by online social contacts. This study contributes to the literature on peer influence on health by examining the contagion effect on weight-related behavior between online buddies. The findings can assist in designing peer-based interventions to harness influence from online social contacts for weight loss.
      Citation: Information Technology & People
      PubDate: 2019-04-03T11:13:40Z
      DOI: 10.1108/ITP-11-2018-0525
       
  • Conceptualising an IT mindset and its relationship to IT knowledge and
           intention to explore IT in the workplace
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose An “IT mindset” significantly influences public sector information technology (IT) adoption in least developed countries (LDCs). The purpose of this paper is to explore the IT mindset concept and its relationship with IT knowledge and intention to explore IT in the workplace. Design/methodology/approach The research used a mixed-methods approach in two phases. Qualitative work was conducted to formulate the conceptual framework and hypotheses, followed by a survey of 228 public sector officials in Bangladesh to test the hypotheses. Findings The study showed that an IT mindset can be conceptualised as comprising personal innovativeness with IT and IT beliefs. The IT mindset was significantly related to intention to explore IT use in the workplace and its components were influenced by an individual’s IT skills and IT awareness. Research limitations/implications Future research could further explore the IT mindset concept and its antecedents and consequences in LDCs, where it is often related to successful IT adoption, and also in public and private organisations elsewhere. Practical implications The study furthers understanding of barriers to IT adoption in LDCs’ public sectors. Building IT knowledge through IT skills and awareness is required to orient mindsets to IT adoption. Social implications Improved efficiency, productivity and transparency in the public sector through IT use have flow-on societal and economic benefits. The paper provides insights into greater facilitation of e-government and IT in the public sector. Originality/value The study is theoretically significant because the IT mindset concept has lacked in-depth study and requires clarification of its nature and role.
      Citation: Information Technology & People
      PubDate: 2019-03-18T04:07:42Z
      DOI: 10.1108/ITP-04-2017-0115
       
  • Should I stay or should I go' A study of IT professionals during a
           national crisis
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to discuss two important behaviors related to job mobility in the IT profession, namely, changing jobs to move to another organization (turnover) and changing the profession entirely (turnaway), during a national crisis. Based on the theoretical foundation of the push–pull–mooring perspective, a research model is developed that includes professional self-efficacy (PSE), job insecurity (JI) and job satisfaction (JS) as important antecedents. Design/methodology/approach Using a positivist approach and a survey method, the authors analyzed data from IT professionals from different economic segments in Brazil. Data collection occurred in two distinctive moments of the largest crisis in modern Brazilian history – a pre-awareness moment (first half of year 2015) and a crisis-conscious moment (first half of year 2016). Findings The findings reveal that PSE negatively influences JI and positively influences JS, JI positively influences turnaway intention, and JS negatively influences both turnover intention and turnaway intention. The effect of the national crisis was observed in that it further accentuated the intention of IT professionals to leave the profession. Another effect was related to age, as older professionals are less willing to turn over but more willing to turn away. Research limitations/implications Besides developing a parsimonious model to study both the intention to leave the organization and the intention to leave the profession, the study sheds light on how IT professionals react to economic crises and how the reaction varies by age. Practical implications The study puts to question the common belief that IT professionals are secure in the job market due to high demand for their skills and investments made by organizations to keep them on the job. Employers must pay attention to JI and turnover/turnaway intentions. Originality/value This study is among the few to study JI and aspects of the theory of human migration in IT. It is also possibly the first to discuss the effects of a national crisis on the mobility patterns of IT professionals.
      Citation: Information Technology & People
      PubDate: 2019-03-18T04:06:01Z
      DOI: 10.1108/ITP-07-2017-0235
       
  • To stay or not to stay' Discontinuance intention of gamification apps
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose As the application of gamification is gaining great attention and has grown increasingly, thousands of these applications can be easily obtained from mobile phone stores, thus causing intensified competition and discontinuance of use accordingly. Besides, though understanding what factors influence the discontinuance of use of information systems (ISs) is critical for theoretical as well as practical reasons, studies pertaining to the saliency of the final phase, termination of an IS, are still limited. As such, the purpose of this paper is to propose a holistic view to fulfill the above-mentioned research gaps based on the expectation-confirmation model with other salient factors such regret, habit and gamification app values. Design/methodology/approach The context of a fitness gamification app is investigated. A total of 210 valid responses were received, and structural equation modeling was applied for data analysis. Findings The findings of this paper are as follows: among all factors influencing discontinuance intention, regret is the strongest, habit is second and gamification is third; among all factors affecting user satisfaction, gamification app value is the strongest, confirmation is second, perceived usefulness (PU) and perceived ease of use are third and regret is the last one; for factors influencing users’ habits, satisfaction is the strongest, following by PU and frequency of prior use; confirmation negatively influences the degree of regret; and confirmation positively influences PU. Originality/value This study highlights the important determinants influencing users’ discontinuance intentions in the context of gamification apps by incorporating two overlooked factors, regret and habit. Besides, this study suggests that app designers can not only increase user’s perceived value through external cooperation with other alternatives, but can be through internal enhancement with diverse services development as well.
      Citation: Information Technology & People
      PubDate: 2019-03-18T04:03:42Z
      DOI: 10.1108/ITP-08-2017-0271
       
  • Role of empowerment and sense of community on online social health support
           group
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Drawing on the taxonomy of patient empowerment and a sense of community (SoC), the purpose of this paper is to analyze the factors that impact the intention of the individual to continue using online social health support community for their chronic disease management. Design/methodology/approach A survey design was used to collect the data from multiple online social health support groups related to chronic disease management. The survey yielded a total of 246 usable responses. Findings The primary findings from this study indicate that the informational support – not the nurturant support such as emotional, network, and esteem support – are the major types of support people are seeking from an online social health support community. This research also found that patient empowerment and SoC would positively impact their intention to continue using the online health community. Research limitations/implications This study utilized a survey design method may limit precision and realism. Also, there is the self-selection bias as the respondents self-selected themselves to take the survey. Practical implications The findings can help the community managers or webmasters to design strategies for the promotion and diffusion of online social health group among patient of chronic disease. Those strategies should focus on patient’s empowerment through action facilitating and social support and through creating a SoC. Originality/value An innovative research model integrates patient empowerment and a SoC to study patient’s chronic disease management through online social health groups to fill the existing research gap.
      Citation: Information Technology & People
      PubDate: 2019-02-28T01:12:41Z
      DOI: 10.1108/ITP-09-2018-0410
       
  • Preventing identity theft
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Knowledge-sharing (KS) for preventing identity theft has become a major challenge for organisations. The purpose of this paper is to fill a gap in the literature by investigating barriers to effective KS in preventing identity theft in online retail organisations. Design/methodology/approach A framework was proposed based on a reconceptualisation and extension of the KS enablers framework (Chong et al., 2011). A qualitative case study research method was used for the data collection. In total, 34 semi-structured interviews were conducted in three online retail organisations in the UK. Findings The findings suggest that the major barriers to effective KS for preventing identify theft in online retail organisations are: lack of leadership support; lack of employee willingness to share knowledge; lack of employee awareness of KS; inadequate learning opportunities; lack of trust in colleagues; insufficient information-sourcing opportunities and information and communications technology infrastructure; a weak KS culture; lack of feedback on performance; and lack of job rotation. Practical implications The research provides solutions for removing existing barriers to KS in preventing identity theft. This is important to reduce the number of cases of identity theft in the UK. Originality/value This research extends knowledge of KS in a new context: preventing identity theft in online retail organisations. The proposed framework extends the KS enablers framework by identifying major barriers to KS in the context of preventing identity theft.
      Citation: Information Technology & People
      PubDate: 2019-02-26T09:58:01Z
      DOI: 10.1108/ITP-05-2018-0255
       
  • How does family support work when older adults obtain information from
           mobile internet'
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose More and more older adults begin to use the mobile internet to obtain information. However, the quality of information obtained through mobile internet by older adults is hard to be guaranteed. The purpose of this paper is to study the role of family support when older adults obtain information from mobile internet. Design/methodology/approach This study conducted a survey of 263 older adults who owned mobile internet devices such as smartphones or tablet PCs. The theory hypotheses are tested using partial least squares techniques. Findings For older adults, family support is the influencing factor of mobile internet literacy improvement. Family emotional support has stronger impacts on the improvement both of mobile internet skill literacy and of mobile internet information literacy than family cognitive support has. Furthermore, the improvement of both mobile internet skill literacy and of mobile internet information literacy hs positive impacts on the quality improvement of obtained information by older adults. Practical implications This paper gives advice on how family members can support older adults during their obtaining information from mobile internet to improve their mobile internet literacy and quality of obtained information. Originality/value This study examines the factors that influence mobile internet literacy and quality of obtained information among older adults from the perspective of family support in the Chinese mobile internet context. The research results enrich the internet literacy theory and the information quality theory.
      Citation: Information Technology & People
      PubDate: 2019-02-20T03:40:47Z
      DOI: 10.1108/ITP-02-2018-0060
       
  • Formal modeling and verification of a service composition approach in the
           social customer relationship management system
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to present a formal verification method to prove the correctness of social customer relationship management (CRM)-based service composition approach. The correctness of the proposed approach is analyzed to evaluate the customer behavioral interactions for discovering, selecting and composing social CRM-based services. In addition, a Kripke structure-based verification method is presented for verifying the behavioral models of the proposed approach. Design/methodology/approach Evaluating the customer behavioral interactions using the social CRM-based service composition approach is an important issue. In addition, formal verification has an important role in assessing the social CRM-based service composition. However, model checking can be efficient as a verification method to evaluate the functional properties of the social CRM-based service composition approach. Findings The results of model checking satisfied the logical problems in the proposed behavior model analysis. In the statistical testing, the proposed URM mechanism supported the four knowledge creation process conditions. It was also shown that the percentage of state reachability in the URM with KCP conditions is higher than the URM mechanism without supporting KCP conditions. Originality/value The comparison of time and memory consumption of the model checking method shows that the social CRM-based service composition approach covers knowledge process features, which makes it an efficient method.
      Citation: Information Technology & People
      PubDate: 2019-02-20T03:40:38Z
      DOI: 10.1108/ITP-02-2018-0109
       
  • Software piracy and bundling in the cloud-based software era
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose In the cloud computing era, three merging developments in software industry are: cloud and on-premises software may offer complementary value to each other; cloud software service requires the support of significant information technology infrastructure; and software piracy problems can be better managed in the cloud. However, how these developments together impact a vendor’s bundling strategy has not yet been investigated. The paper aims to discuss this issue. Design/methodology/approach Drawing on the product bundling framework, this research establishes stylized models to study a software vendor’s bundling decision in the cloud-based era with special consideration on the issue of software piracy. Findings The authors find different key parameters associated with the cloud era exert different effects on the bundling decision. When on-premises software and cloud software generate additional value by complementing each other, software vendors can make greater profits under the pure components (PC) strategy. Regarding a low infrastructure cost, software vendors should favor pure bundling (PB). The impact of piracy deterrence effectiveness is less straightforward – it favors PC when piracy deterrence effectiveness is low, but PB when piracy deterrence effectiveness is high. Originality/value This study makes key contributions to theory and practice. First, this is the first study to examine software bundling strategies in the cloud computing era, whereby the three factors relevant to the cloud phenomenon have been considered. Second, this paper contributes to the literature of bundling and software piracy by examining the intersection of these two streams of literature. Third, this paper sheds light on a vendor’s bundling decision when facing piracy problems in the emerging cloud software era.
      Citation: Information Technology & People
      PubDate: 2019-02-20T03:40:18Z
      DOI: 10.1108/ITP-05-2018-0210
       
  • Young adult consumers’ involvement in branded smartphone based
           service apps
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to investigate various factors that shape young adult consumers’ smartphone-based service app involvement and their subsequent development of brand loyalty for the app. Design/methodology/approach A survey was conducted to test the hypothesized relationships. The survey data were analyzed using SPSS-based PROCESS macro (Hayes, 2013). Findings The study results show that consumer can perceive an app to be largely hedonic or utilitarian, and the perceived app design (hedonic vs utilitarian) impacts consumers’ involvement with a particular service app category. Further, the findings elucidate that the impact of app hedonism on app category involvement is moderated by consumer’s surfing task orientation and the extent to which app arouses their imagination. On the other hand, the impact of app utilitarianism on app involvement is moderated by consumer’s information-seeking task orientation and perceived relevance of the information. Finally, app category involvement predicts loyalty toward a particular brand in the service app category. The effect of app involvement on brand loyalty is moderated by hot and cold brand relationship quality in cases of hedonic and utilitarian apps, respectively. Originality/value The value of this research lies in identifying relevant managerially actionable moderators that shape the relationships between perceived dominant app design (hedonic vs utilitarian), app category involvement and app brand loyalty.
      Citation: Information Technology & People
      PubDate: 2019-02-18T02:32:56Z
      DOI: 10.1108/ITP-04-2017-0128
       
  • Predicting Users’ willingness to diffuse healthcare knowledge in
           social media
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to investigate why users are willing to diffuse healthcare knowledge in social media by drawing on the communicative ecology theory (CET) and prior research on interpersonal communication. Design/methodology/approach This paper conducts a large-scale scenario-based online survey in WeChat (the most popular social media platform in China) to test the proposed research model and hypotheses. The final data set consists of 1,039 useful responses from WeChat users. Findings The results indicate that interestingness, emotionality and institution-based trust are the strongest antecedents in predicting healthcare knowledge-diffusing likelihood, followed by usefulness, source credibility and positivity. Further, the relationship between institution-based trust and healthcare knowledge-diffusing likelihood is partially mediated by source credibility. Practical implications Healthcare practitioners who seek to motivate individuals to disseminate healthcare knowledge need to phrase or frame healthcare knowledge in a way that draws greater interest, evokes stronger emotion, increases perceived usefulness or reflects positively on themselves. Healthcare organizations should also pay attention to strengthening users’ trust in the platform and source-related information that can indicate source authority. Originality/value This study is one of the first to investigate the dissemination of healthcare knowledge in the context of social media (WeChat in particular). Compared with other types of information, healthcare knowledge is more scientific and professional to the extent that most laypersons do not have relevant expertise to directly evaluate whether the content is credible and of high quality. Rather, their sharing likelihood is dependent more on other factors than perceived information quality and credibility; those factors include platform-related factors that may play an important role but has been overlooked in prior literature on interpersonal communication. By combining CET with interpersonal communication-related research and including institution-based trust as an important determinant of healthcare knowledge dissemination, this study provides a comprehensive analysis of healthcare knowledge diffusion process.
      Citation: Information Technology & People
      PubDate: 2019-02-18T02:32:27Z
      DOI: 10.1108/ITP-03-2018-0143
       
  • Experiences of internet users regarding cyberhate
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form and a survey (Cyberhate Experience Survey) of which reliability and validity indexes were ensured. Findings The results indicated that participants have observed and experienced cyberhate at different levels targeting their ethnic, religious, gender-based and political identities. The findings also pointed out that gender, income and socio-political identities are significant variables on exposure to cyberhate regardless of cultural and educational boundaries. The majority of survey respondents reported that they had encountered cyberhate mostly on social media platforms. Social implications The findings of the study imply that to address the hate speech problem comprehensively, the author must enlighten people, change their way of thinking and broaden their perspectives by using measures such as intercultural dialogue, critical thinking, media literacy, education on tolerance and diversity. Originality/value This research was intended to contribute into the need to elaborate on various aspects of cyberhate, which is shared by academics, thinkers, journalists and educators. It may also serve to clarify how frequently internet users encounter hateful content and harassment online, which can have social consequences and influence young people’s trust to other people.
      Citation: Information Technology & People
      PubDate: 2019-01-25T03:13:18Z
      DOI: 10.1108/ITP-01-2018-0009
       
  • The integration of video games in family-life dynamics
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Empirical studies using the technology acceptance model (TAM) have mainly focussed on utilitarian technologies. The purpose of this paper is to extend the TAM in order to develop a more nuanced understanding of the family dynamic around video game acceptance within households. Design/methodology/approach This paper proposes a new and unique adaptation of the TAM to study the acceptance of hedonic technologies in the context of parents’/carers’ acceptance and integration of video games within family-life dynamics. This adaptation of the TAM attempts to shed light on the social influences and intrinsic motivations behind parents’ and carers’ intentions to purchase video games for their children’s consumption. Findings The usefulness of video games lies in how enjoyable and entertaining they are, and this seems to be influenced by the convenience and ease of use that ultimately affects the behavioural intention towards video games. Convenience of use brings in social influences on perceived enjoyment and on parents’ actual behaviour towards video games. Some social influences seem to play a direct role in affecting children’s behaviour towards video games. Research limitations/implications The authors acknowledge that using Facebook as a tool for data collection has limitations attributed to selection bias. Another limitation is not giving voice to the children to account for their own subjective experience of video games and relying on their parents’ perceptions on the matter. Social implications This study advocated extending TAM within a hedonic framework in the context of examining parents’/carers’ acceptance of video games, while re-validating past theories of TAM and introducing new contextual variables adapted to address hedonic technologies. Originality/value Empirical studies using TAM have focussed on the utilitarian nature of technologies and very few considered hedonic technologies. This study’s key contribution to research lies in explaining the effects of parents’ perceived enjoyment, ease of use and convenience on the intention to purchase and play video games. The findings feed into work on the ethics and developmental issues around the marketing of video games to and for children.
      Citation: Information Technology & People
      PubDate: 2019-01-08T11:49:54Z
      DOI: 10.1108/ITP-11-2017-0375
       
  • Impact of BYOD on organizational commitment: an empirical investigation
    • Pages: 246 - 268
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 246-268, April 2019.
      Purpose Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF. Design/methodology/approach Survey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling. Findings The SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment. Practical implications The findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment. Originality/value The expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.
      Citation: Information Technology & People
      PubDate: 2018-07-12T03:01:01Z
      DOI: 10.1108/ITP-11-2017-0378
       
  • Duality of self-promotion on social networking sites
    • Pages: 269 - 296
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 269-296, April 2019.
      Purpose Self-promotion on social networking sites (SNSs) is a controversial issue as it has been attributed to various positive and negative consequences. To better understand the reasons for the mixed consequences and the nature of self-promotion on SNSs, the purpose of this paper is to theorize and empirically investigate the duality of SNS self-promotion and its underlying socio-psychological mechanisms. Design/methodology/approach By drawing on the motivational affordance lens and self-determination theory, this study develops a theoretical account of the duality of self-promotion on SNSs. The author places subjective vitality and SNS addiction as the positive and negative consequences of self-promotion. The model was tested using partial least squares technique with data collected from 289 Finnish Facebook users using a survey. Findings The results show that self-promotion contributes to both subjective vitality and to SNS addiction. Importantly, exhibitionism attenuates the effect of self-promotion on subjective vitality and amplifies the effect of self-promotion on SNS addiction. The feature-level analysis shows that status updates, adding photos, commenting in others’ posts and profile completeness are the main determinants of self-promotion. Status updates, adding photos and check-ins, in turn, have high exhibitionistic appeal. Originality/value To date, the empirical attempts to investigate the duality of SNS use have been rare. In particular, prior research is largely silent in explaining what tilt the outcomes of self-promotion either toward positive or negative direction. The paper fills this theoretical and empirical gap and thus contributes to literature on dualities of SNS use.
      Citation: Information Technology & People
      PubDate: 2018-08-07T03:21:57Z
      DOI: 10.1108/ITP-07-2017-0213
       
  • The influence of big data analytics management capabilities on supply
           chain preparedness, alertness and agility
    • Pages: 297 - 318
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 297-318, April 2019.
      Purpose The importance of big data analytics (BDA) on the development of supply chain (SC) resilience is not clearly understood. To address this, the purpose of this paper is to explore the impact of BDA management capabilities, namely, BDA planning, BDA investment decision making, BDA coordination and BDA control on SC resilience dimensions, namely, SC preparedness, SC alertness and SC agility. Design/methodology/approach The study relied on perceptual measures to test the proposed associations. Using extant measures, the scales for all the constructs were contextualized based on expert feedback. Using online survey, 249 complete responses were collected and were analyzed using partial least squares in SmartPLS 2.0.M3. The study targeted professionals with sufficient experience in analytics in different industry sectors for survey participation. Findings Results indicate BDA planning, BDA coordination and BDA control are critical enablers of SC preparedness, SC alertness and SC agility. BDA investment decision making did not have any prominent influence on any of the SC resilience dimensions. Originality/value The study is important as it addresses the contribution of BDA capabilities on the development of SC resilience, an important gap in the extant literature.
      Citation: Information Technology & People
      PubDate: 2018-08-17T11:29:26Z
      DOI: 10.1108/ITP-11-2017-0386
       
  • What makes you feel attached to smartwatches' The
           stimulus–organism–response (S–O–R) perspectives
    • Pages: 319 - 343
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 319-343, April 2019.
      Purpose The purpose of this paper is to answer the question of whether smartwatches will survive and gain their own niche within the consumer electronics market. Based on the stimulus–organism–response (S–O–R) framework, this study identifies and validates the impacts of both technological and fashion-related factors (interactivity, autonomy, visual aesthetics and self-expression) on product attachment towards smartwatches through user satisfaction and pleasure derived from their smartwatches. Design/methodology/approach The authors collected the survey data via online surveys from 198 respondents and tested measurement and structural models with the partial least square technique. Findings The authors found that both technological characteristics (interactivity and autonomy) and fashion-related characteristics (visual aesthetics and self-expression) have an impact on product attachment through pleasure. Research limitations/implications Several other important characteristics of traditional wrist-watches such as durability or workmanship are not considered in this study, but should be included in future studies. The three-item measure of autonomy may be insufficient for more sophisticated wearable devices in the future. In future studies, the impact of product attachment on users’ continued usage should be examined. Practical implications This study provides important practical implications for smartwatch makers interested in product development, as users were found to consider fashion-related characteristics to be as important as technological characteristics. Originality/value This study is the first study that considers both aesthetic and technological factors for IT acceptance in the context of wearable devices. Also, instead of traditional IT acceptance measures such as continued use, this study investigates users’ product attachment, which is more relevant to the case of wearable devices.
      Citation: Information Technology & People
      PubDate: 2018-08-14T09:04:25Z
      DOI: 10.1108/ITP-05-2017-0152
       
  • Assessing timebanking use and coordination: implications for service
           exchange tools
    • Pages: 344 - 363
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 344-363, April 2019.
      Purpose Timebanking is a generalized, voluntary service exchange that promotes use of otherwise idle resources in a community and facilitates community building. Participants offer and request services through the mediation of the timebank software. In timebanking, giving help and accepting help are both contributions; contributions are recognized and quantified through exchange of time-based currency. The purpose of this paper is to explore how users perceive timebank offers and requests differently and how they influence actual use. Design/methodology/approach This survey study, conducted in over 120 timebanks across the USA, examines users’ timebanking participation, adapting dimensions of Technology Acceptance Model (TAM). Findings The authors found that perceived ease of use in timebanking platforms was positively associated with positive attitudes toward both requests and offers, whereas perceived usefulness was negatively associated with positive attitudes toward requests and offers. The authors also found that having positive attitudes toward requests was important to elicit behavioral intention to make a request, but that positive attitudes toward offers did not affect behavioral intentions to make offers. Practical implications The authors discussed these results and proposed design suggestions for future service exchange tools to address the issues the authors raised. Originality/value The study is among the first few studies that examine timebanking participation using large-scale survey data. The authors evaluate sociotechnical factors of timebanking participation through adapting dimensions of TAM.
      Citation: Information Technology & People
      PubDate: 2018-08-24T12:09:28Z
      DOI: 10.1108/ITP-09-2017-0311
       
  • Citizens’ intention to use and recommend e-participation
    • Pages: 364 - 386
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 364-386, April 2019.
      Purpose The purpose of this paper is to investigate how citizens’ perception of empowerment can influence the intention to use and intention to recommend e-participation. Design/methodology/approach A research model is evaluated using structural equation modelling. An online survey questionnaire was used to collect data from 210 users of e-participation. Findings The results show that psychological empowerment influences the intention to use and recommend e-participation. Performance expectancy and facilitating conditions were the strongest predictors of intention to use; effort expectancy and social influence had no significant effect on the prediction of intention to use e-participation. Research limitations/implications The use of psychological empowerment as a higher-order multidimensional construct is still insufficiently researched. Future research may explore the effect of each dimension of psychological empowerment in different scenarios of e-participation adoption. Caution is needed when generalising our findings towards the adoption of e-participation in different locations or with different participants. Practical implications The findings can help the local governments to design strategies for the promotion and diffusion of e-participation amongst the citizenry. Those strategies should focus on citizens’ perception of empowerment, thereby creating a positive attitude towards intention to use and recommend e-participation. Originality/value An innovative research model integrates the unified theory of acceptance, use of technology and psychological empowerment; the last as a higher-order construct.
      Citation: Information Technology & People
      PubDate: 2018-08-14T02:00:29Z
      DOI: 10.1108/ITP-08-2017-0257
       
  • Do firms still need to be social' Firm generated content in social
           media
    • Pages: 387 - 404
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 387-404, April 2019.
      Purpose The purpose of this paper is to investigate how firm-generated content (FGC) impacts consumer brand awareness, brand loyalty and electronic word of mouth (eWOM), and how this, in turn, influences consumer purchase intention. Design/methodology/approach In order to test this conceptual framework, statistical analysis was carried out employing structural equation modelling. Findings The findings indicate that FGC has a positive impact on brand awareness, brand loyalty, eWOM and purchase intention. Furthermore, the results reveal that a link exists between consumer eWOM behaviour and brand awareness and loyalty. This study also demonstrates that company communication through Facebook and Instagram has a positive effect on consumer purchase intention. Finally, it has been shown that, regarding eWOM and purchase intention, FGC posted on Instagram has a greater impact on its users than that posted on Facebook. Originality/value Consumer purchase intention is increasingly impacted by the growing use of social media by companies and marketers. This changing environment has opened up new challenges. However, there is still much work to be done in understanding the full effects of FGC communication, and how this influences consumer brand perception and purchase intention.
      Citation: Information Technology & People
      PubDate: 2018-08-10T03:24:45Z
      DOI: 10.1108/ITP-03-2018-0134
       
  • Knowledge sharing by entrepreneurs in a virtual community of practice
           (VCoP)
    • Pages: 405 - 429
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 405-429, April 2019.
      Purpose The purpose of this paper is to examine how entrepreneurs engage in a virtual community of practice (VCoP) to share knowledge. Intensity of engagement is taken as a proxy to measure the strength of knowledge sharing. Design/methodology/approach The archival data spanning over a three-year period from “Start-up-Nation©” (a VCoP purposefully setup for entrepreneurs) are used for analysis. A set of indices are introduced to measure participants’ intensity of engagement in terms of message length, message frequency and reciprocity in the knowledge sharing process. Content analysis is employed to test a sample of “highly engaged”, “moderately engaged”, “low engaged” and “not engaged” discussion topics as part of the online discourse. Findings The authors find that entrepreneurs normally use short (fewer than 100 words) or medium (fewer than 250 words) message size to contribute to the discussions. In addition, the authors find that senior members and discussion moderators play important roles in igniting the “reciprocity” behaviour in stimulating the interest of the community with the topic discussion. The authors also find that highly engaged topics usually lead to further discussion threads. Originality/value This is the first study of its kind to explore how entrepreneurs engage in a VCoP to share their knowledge and experiences. The set of measurement indices tested here provide a tool for the owner, designer and moderator of the VCoP to measure the utility of their website in terms of its members’ participation. In addition, the set of textual and subjective interventions identified here enables the moderator (administrator) of a VCoP to design effective interventions to facilitate online discourse and augments the knowledge sharing process amongst its community members.
      Citation: Information Technology & People
      PubDate: 2018-08-15T11:55:27Z
      DOI: 10.1108/ITP-09-2016-0202
       
  • E-mail load, workload stress and desired e-mail load: a cybernetic
           approach
    • Pages: 430 - 452
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 430-452, April 2019.
      Purpose Using e-mail is a time-consuming activity that can increase workload stress. The purpose of this paper is to investigate the relationship between the individual’s e-mail load, workload stress and desired e-mail load, drawing from the cybernetic theory of stress. Design/methodology/approach Based on prior theory, the authors first hypothesized relationships among e-mail load, workplace stress and desired e-mail load. The authors then tested these relationships on a sample of 504 full-time workers in the USA, using survey data and covariance-based structural equation modeling techniques. Findings The authors find that higher e-mail load is associated with higher workload stress; higher workload stress is associated with lower desired e-mail load; lower desired e-mail load is associated with lower e-mail load; and higher workload stress is associated with higher psychological strain, higher negative emotions and lower organizational commitment. Originality/value The study provides a novel understanding of workload stress due to e-mail load, through the lens of cybernetic theory. It contributes to the e-mail overload and technostress literatures by conceptualizing desired e-mail load as a potential outcome of workplace stress and as a regulator for e-mail load. For practitioners, the study highlights the importance of managing employees’ e-mail load to prevent the negative effects of workplace stress and associated strains.
      Citation: Information Technology & People
      PubDate: 2018-08-23T10:53:22Z
      DOI: 10.1108/ITP-10-2017-0321
       
  • Homo prostheticus' Intercorporeality and the emerging adult-smartphone
           assemblage
    • Pages: 453 - 474
      Abstract: Information Technology & People, Volume 32, Issue 2, Page 453-474, April 2019.
      Purpose Young people’s attachment to their smartphones is well-documented, with smartphones often described as prostheses. While prior studies typically assume a clear human/machine divide, this paper aims to build on posthuman perspectives, exploring intercorporeality, the blurring of human/technology boundaries, between emerging adults and their smartphones. The paper aims to discuss these issues. Design/methodology/approach Drawing on assemblage theory, this interpretive study uses smartphone diaries and friendship pair/small group discussions with 27 British emerging adults. Findings Participants in this study are characterized as homo prostheticus, living with and through their phones, treating them as extensions of their mind and part of their selves as they navigated between their online and offline, private and social lives. Homo prostheticus was part of a broader assemblage or amalgamation of human and non-human components. As these components interacted with each other, the assemblage could be strengthened or weakened by various technological, personal and social factors. Research limitations/implications These qualitative findings are based on a particular sample at a particular point in time, within a particular culture. Further research could explore intercorporeality in human–smartphone relationships among other groups, in other cultures. Originality/value Although other studies have used prosthetic metaphors, this paper contributes to understanding of smartphones as a prostheses in the lives of emerging adults, highlighting intercorporeality as a key feature of homo prostheticus. It also uses assemblage theory to contextualize homo prostheticus and explores factors strengthening or weakening the broader human–smartphone assemblage.
      Citation: Information Technology & People
      PubDate: 2018-09-05T10:49:30Z
      DOI: 10.1108/ITP-07-2017-0209
       
  • Prevention of cybercrimes in smart cities of India: from a citizen’s
           perspective
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India. Design/methodology/approach A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares. Findings The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities. Research limitations/implications The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes. Practical implications This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes. Originality/value There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.
      Citation: Information Technology & People
      PubDate: 2018-12-17T11:18:47Z
      DOI: 10.1108/ITP-05-2018-0251
       
  • Imagine, feel “there”, and flow! Immersive experiences on m-Facebook,
           and their affective and behavioural effects
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Mobile Facebook (m-Facebook) creates many business opportunities for brands and firms while increasingly drawing interest in scientific literature. However, research is scarce on the immersive experiences prompted by m-Facebook, and how these experiences facilitate users’ engagement, their positive attitude towards Facebook and their continued use of it. The paper aims to discuss these issues. Design/methodology/approach This paper theoretically and empirically analyses m-Facebook users’ immersive experiences, along with their affective and behavioural effects. Findings The results reveal the important role of imagery, presence and flow in the context of m-Facebook; the interplay between these three immersive phenomena; and the influence the user’s optimum stimulation level has on them. Originality/value The investigation offers a foundation for understanding users’ immersive experiences on m-Facebook, and informs practitioners who aim to enhance users’ engagement with, attitude towards, and continued use of m-Facebook content.
      Citation: Information Technology & People
      PubDate: 2018-11-06T11:24:21Z
      DOI: 10.1108/ITP-10-2017-0358
       
  • Does more accessibility lead to more disclosure' Exploring the
           influence of information accessibility on self-disclosure in online social
           networks
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Given the importance of online social network (OSN) media features, many studies have focused on how different types of OSNs with various media features influence users’ usage and engagement. However, a recent literature review indicates that few empirical studies have considered how different types of OSNs with different information accessibility levels influence users’ beliefs and self-disclosure. By comparing two OSN platforms (OSNs with high-level information accessibility vs OSNs with low-level information accessibility), the purpose of this paper is to address this opportunity by investigating the differential impacts of the two platforms on individuals’ psychological cognition – particularly users’ social exchange beliefs – and explaining how these beliefs translate into OSN self-disclosure. Design/methodology/approach This study used a factorial design approach in an experimental setting to examine how different levels of information accessibility (high vs low), influence the social exchange beliefs (i.e. perceived social capital bridging, perceived social capital bonding and perceived privacy risks) of OSN users and subsequently influence OSN self-disclosure. Findings The results show that users on OSNs with high-level information accessibility express significantly higher perceived social capital bridging and perceived privacy risks than users on OSNs with low-level information accessibility. However, users on OSNs with low-level information accessibility express higher social bonding beliefs than users on OSNs with high-level information accessibility, indicating that there are different effect mechanisms toward OSN self-disclosure. Originality/value The focus of this research helps unveil the complex relationships between OSN design features (e.g. information accessibility), psychological cognition (e.g. social capital bridging, social capital bonding and privacy risks) and OSN self-disclosure. First, it clarifies the relationship between information accessibility and self-disclosure by examining the mediating effect of three core social exchange beliefs. Second, it uncovers the distinct effects of high-level information-accessible OSNs and low-level information-accessible OSNs on OSN self-disclosure.
      Citation: Information Technology & People
      PubDate: 2018-11-01T09:23:55Z
      DOI: 10.1108/ITP-04-2017-0134
       
  • Digital innovation in context
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to investigate how digital innovation processes emerge and evolve in organizational settings, and how serendipitous and unbounded digital innovations affect organizations’ overall digital directions. Design/methodology/approach The authors draw on an interpretive case study of the Church of Sweden, tracing in detail the design, deployment and governance of an interactive website for digital prayer, the Prayer Web (PW). Findings The findings show how the site came about in a serendipitous manner, created by an advertising agency as part of a marketing campaign. In turn, the unbounded nature of digital innovation was revealed as the wide and rapid adoption of the PW raised issues concerning the church’s overall digital direction linked to centralized control, as well as the nature and role of pastors, prayer and communities, as the site allowed people to post prayers and spread their messages (initially with no moderation). Originality/value The authors explore the serendipitous and unbounded ways in which digital innovation emerged and evolved in a traditional organization with a long legacy as an important societal institution. The paper contributes by generating rich insights on the role of the distinct aspects of digital technology in serendipitous and unbounded digital innovation. It particularly highlights how the editability and reprogrammability of digital artifacts triggered unexpected new behaviors and governance requirements in the organization under study. The authors encourage further research into the interrelationship between multiple unbounded and serendipitous digital innovations in an organization over time.
      Citation: Information Technology & People
      PubDate: 2018-10-31T03:26:54Z
      DOI: 10.1108/ITP-05-2017-0148
       
  • The effects of moral disengagement and organizational ethical climate on
           insiders’ information security policy violation behavior
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to develop a model that integrates moral disengagement (MD) and organizational ethical climate (OEC) to understand information security policy (ISP) violation behavior in the workplace. This study extends prior work by identifying the moderating mechanisms of the ethical culture of OECs in the relationship between employees’ MD and ISP violation behavior intention. Design/methodology/approach By using scenario-based survey data from 433 employees in Chinese enterprises and by applying PLS-based structural equation modeling, the authors test a series of hypotheses. Findings Our empirical results highlight that the concept of MD has a significant effect on employees’ intention to violate ISPs. The authors also find that the OEC has a moderating role in the relationship between MD and ISP violation intention: the moderating role of law-and-rule-oriented OEC is significantly negative, but instrumentalism-oriented OEC positively moderates this relationship. Originality/value This study contributes to the literature on information security behavior by integrating two ethical theory frameworks MD and OECs into one theoretical model, and it calls attention to how ethical factors at the individual cognition level and organizational climate level work together to influence personal information security behavior. This study provides a new perspective of OEC from which to understand policy violation caused by moral self-regulation failure, and empirically explores its moderating role.
      Citation: Information Technology & People
      PubDate: 2018-10-30T03:21:14Z
      DOI: 10.1108/ITP-12-2017-0421
       
  • An empirical study of purchase behaviour on social platforms
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Social media users’ purchasing behaviour is yet to be fully understood by research. The purpose of this paper is to investigate how purchase intention is affected by social media user traits, cognitive factors (such as perceived control and trust) and individual beliefs, such as risk propensity and trustworthiness. Design/methodology/approach The authors propose and empirically test a model of purchase intention on social platforms. The study of over 500 active social media users finds the links between risk propensity, trust, technical efficacy and perceived control and explores the moderating effect of age and gender. Findings Purchase intention on social platforms is influenced by demographic factors, cognitive factors and beliefs. Both age and gender moderate the effects of beliefs and cognitive factors: age is a determinant of purchase intention for men, while beliefs are significant for younger women and cognitive factors are significant for older women. Research limitations/implications This study involved a cross-sectional design via online survey of social networking users. Gender differences in purchase intentions are found which are, in turn, influenced by age. Further empirical testing of social purchase intention could include less experienced users or non-users. Practical implications The results of this study provide guidance for SNS providers and technology developers in social networking commerce in terms of the different drivers of purchase intention. Originality/value Social media users’ purchasing behaviour is yet to be fully understood. The study shows that purchase intention antecedents vary between genders and age groups of users. The identified connection between users’ perceptions of social networking sites (SNS) usage of personal information and purchase behaviour has an impact on the likelihood of user engagement in social transactions.
      Citation: Information Technology & People
      PubDate: 2018-10-30T03:19:55Z
      DOI: 10.1108/ITP-08-2017-0267
       
  • Purchase intention in an electronic commerce environment
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to understand the integrated impact of the application of protection measures against identity theft on consumers’ synergistic perception of trust, the cost of products/services and operational performance (OP) – all of which in turn is postulated to contribute to purchase intention (PI) when shopping online. Design/methodology/approach In order to accomplish the specified aim, this study first conducted an experiment by involving the students from a university in Bangladesh. Then a survey was conducted to capture their opinion based on the previous experiment. Findings The study identified that in e-commerce, OP and trust have potential impact on pursuing consumers’ PI. Traditionally, price is always an issue in marketing; however, for e-commerce, this issue does not have direct impact on PI. Research limitations/implications The main limitation of this study is that a less established e-commerce example was utilized to conduct the experiment and survey for validating the model. Also, the study was conducted only in the context of Bangladesh and a student sample was utilized. Future studies can test the model in different contexts (particularly to verify the impact of privacy) by utilizing data from consumers. Practical implications This study has resolved a controversial issue by generating clear guidelines that the overall conjoint effect of OP, trust, and price on PI is neither negative nor neutral. Synergistically, the application of these controlling tools of identity theft can substantially enhance consumers’ trust, which is the single most predictor to pursue consumer PI. Originality/value This study has provided in-depth insight into the impact of different controlling measures in e-commerce PI. Practitioners have potential learning from this study that if consumers find the application of different controlling mechanisms against cybercrimes, particularly identity theft, enhancing the reliability, authenticity and security of transactions in this virtual medium, they do not mind paying a higher price. Such insights have not been provided by existing studies on this topic. Developing trust on e-commerce purchase is the driving force, not the price.
      Citation: Information Technology & People
      PubDate: 2018-10-16T02:34:28Z
      DOI: 10.1108/ITP-05-2018-0241
       
  • The mobile phone as an argument for good governance in sub-Saharan Africa
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to present theoretical and empirical arguments for the role of mobile telephony in promoting good governance in 47 sub-Saharan African countries for the period 2000–2012. Design/methodology/approach The empirical inquiry uses an endogeneity-robust GMM approach with forward orthogonal deviations to analyze the linkage between mobile phone usage and the variation in three broad governance categories – political, economic and institutional. Findings Three key findings are established: first, in terms of individual governance indicators, mobile phones consistently stimulated good governance by the same magnitude, with the exception of the effect on the regulation component of economic governance. Second, when indicators are combined, the effect of mobile phones on general governance is three times higher than that on the institutional governance category. Third, countries with lower levels of governance indicators are catching-up with their counterparts with more advanced dynamics. Originality/value The study makes both theoretical and empirical contributions by highlighting the importance of various combinations of governance indicators and their responsiveness to mobile phone usage.
      Citation: Information Technology & People
      PubDate: 2018-10-12T01:20:06Z
      DOI: 10.1108/ITP-01-2018-0011
       
  • Do employees in a “good” company comply better with information
           security policy' A corporate social responsibility perspective
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to investigate the impact of corporate social responsibility (CSR) on employees’ compliance behavior concerning information security policy (ISP). A research model includes CSR activities as an antecedent of ISP compliance and as a mediator of the relationship between ISP compliance intention and the perceived costs of compliance. Design/methodology/approach In total, 162 respondents were surveyed from organizations with more than 500 employees. This study used partial least squares (SmartPLS 3.0) to analyze and examine hypotheses. Findings The results show CSR’s influence as a mediator in the context of ISP compliance. In particular, moral CSR can affect employees’ ISP compliance intention positively and fully mediate the relationship between the costs of compliance and ISP compliance intention. Employees would like to comply with ISP when they recognize the benefits of ISP compliance and the costs of ISP noncompliance. Originality/value This study examines influential factors on ISP compliance considering cost-benefit factors from rational choice theory. Moreover, the study contributes to ISP compliance research by being the first attempt to consider CSR in an ISP compliance research context. The results provide insights on how to strategically implement CSR activities in terms of organizational information security.
      Citation: Information Technology & People
      PubDate: 2018-10-11T02:02:26Z
      DOI: 10.1108/ITP-09-2017-0298
       
  • Establishing a partnership between top and IT managers
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose A poor relationship between top management and IT personnel is often denoted as a business–IT gap. In an era of digital transformation, bridging this gap and establishing a strong relationship between business and IT are more important than ever before. The purpose of this paper is thus to examine a particular link between business and IT managers – a partnership relationship – together with the factors facilitating it. Design/methodology/approach A partnership construct is developed based on interdisciplinary studies and transferred to the business–IT context since it is not generally used in IT disciplines. The model was empirically tested with structural equation modelling using data obtained from 221 IT managers in Slovenian companies. Findings The results show that both the perceived value of IT and the business orientation of the IT department exert a positive influence on the partnership, while a mere technology-oriented IT department has a negative effect on the partnership relationship. Furthermore, the paper also presents the prerequisites for a business-oriented IT department. Originality/value In this digitalisation era, IT is becoming even more important for its strategic role in organisations. There is thus a strong need to bridge the business–IT gap. Despite significant efforts made to close this gap, it remains a major issue. This research contributes to understanding the business–IT gap and presents the key factors for ensuring a partnership relationship is in place. The study also combines the views of social exchange theory and knowledge-based theory and upgrades findings concerning the influence of social facilitators on collaboration outcomes.
      Citation: Information Technology & People
      PubDate: 2018-10-11T02:01:07Z
      DOI: 10.1108/ITP-01-2017-0001
       
  • How stage theorizing can improve recommendations against phishing attacks
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Phishing remains a major cybersecurity problem. Mainly adopting variance approaches, researchers have suggested several recommendations to help users avoid being victimized in phishing attacks. However, the evidence suggests that anti-phishing recommendations are not very effective. The purpose of this paper is threefold: first, to analyze why the existing anti-phishing recommendations may not be very effective; second, to propose stage theorizing as an additional approach for studying phishing that can contribute toward more effective recommendations; and third, to demonstrate using a stage theory, how IS researchers can utilize the concept of stages in phishing research. Design/methodology/approach The study draws on findings from previous empirical phishing research to assess whether the reasons why people are victimized in phishing attacks can be categorized into stages. The criteria for stages of the Transtheoretical Model (TTM) are used as an example. Findings Analysis indicates support for the existence of stages of phishing victims. The criteria for stages of the TTM were applied to the reasons that subjects in previous studies gave for clicking on phishing links and to the anti-phishing recommendations proposed in previous studies. There was overall support for four of the five criteria of the TTM. The results from the current study indicate that a targeted approach is a better approach to proposing anti-phishing recommendations. Practical implications The analysis identified the stages of phishing victims and the processes of change for each stage. It is suggested that recommendations against phishing should target individuals based on their resident stages. Moreover, the processes of change should be applied to the correct stage for the recommendations to be effective. Originality/value From a phishing perspective, there is a lack of research based on stage theorizing. The current study presents stage theorizing as an additional approach to the existing approaches and demonstrates how a stage theory can be used to make more effective recommendations against phishing. The study has thrown light on the benefits of stage theorizing and how its approach to targeted recommendations can be useful in IS security research.
      Citation: Information Technology & People
      PubDate: 2018-10-02T12:54:09Z
      DOI: 10.1108/ITP-12-2017-0434
       
  • Value co-creation through digital service capabilities: the role of human
           factors
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to explore the different human factor characteristics that are emphasized when co-creating value through digital service capabilities. Design/methodology/approach Empirical data are gathered from two small companies that deliver digital services and products in business-to-business markets. Findings The study highlights the role and importance of human factors as reflected in employees’ customer orientation while delivering digital service capabilities. The role of human factors also changes during the digital service production process. Originality/value Developing digital service capability is positively associated with value co-creation, but it requires new skills: firms need to evaluate their mechanisms for supporting continuous learning about the properties of digital technologies. To the authors’ knowledge, this is the first study to focus on the role of human factors in in developing digital service capabilities.
      Citation: Information Technology & People
      PubDate: 2018-09-19T12:39:02Z
      DOI: 10.1108/ITP-10-2016-0224
       
  • The allure of luxury brands’ social media activities: a uses and
           gratifications perspective
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to explore the social media marketing activities of luxury brands, guided by uses and gratifications theory (UGT). It examines the gratifications sought by millennials, a new core luxury consumer group, and the gratifications obtained when following and connecting with luxury brands. Design/methodology/approach Online data are gathered from Facebook, Instagram and Twitter accounts of five top luxury brands. In addition, 30 in-depth interviews with millennials, the new generation of luxury consumers, were conducted. Thematic analysis strategy was followed to analyze the data and present the findings. Findings Luxury brands remain distant and aloof, which helps them to maintain a sense of exclusivity. User activity, ranging from observations to commenting on and liking luxury brand content, leads to the gratification of two types of need: affective and cognitive. Two affective needs that are satisfied by luxury brands’ social media marketing activities are aesthetic appreciation and entertainment. Cognitive needs are satisfied through the functional use of social media as an information source. Originality/value Several studies have investigated social media from the perspective of UGT, but this study is the first to investigate the implications of luxury brands’ social media usage with the lenses of UGT.
      Citation: Information Technology & People
      PubDate: 2018-08-23T10:54:41Z
      DOI: 10.1108/ITP-01-2018-0017
       
  • Exploring player behavior and motivations to continue playing Pokémon
           GO
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to identify the determinants of players’ continuance intentions to play Pokémon GO (PG) and ultimately make in-app purchases, mainly from the perspectives of psychological, social and gaming motivational factors. Design/methodology/approach The research model was empirically assessed based on 362 validated responses from current players of PG in Malaysia. Analysis was carried out using the partial least squares path modeling method. Findings The results indicated that enjoyment, network externalities, community involvement and the need-to-collect significantly influence players’ continuance intention. Furthermore, the findings reveal that flow and nostalgia have indirect effects on players’ continuance intention, which in turn significantly influences their purchase intention. Originality/value This study provides empirical support for an integrated model for understanding the antecedents of the players’ behavioral intentions that incorporates psychological, social and gaming motivational factors in the context of an augmented reality mobile game.
      Citation: Information Technology & People
      PubDate: 2018-08-17T11:07:44Z
      DOI: 10.1108/ITP-07-2017-0216
       
  • Critical success factors for Lean implementation in IT outsourcing
           relationships
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Following positive results of Lean implementation in manufacturing environments, Lean has become an emerging philosophy for clients and suppliers of information technology (IT) services. However, how to implement Lean in IT outsourcing relationships has been addressed sparsely in academic literature. The purpose of this paper is to investigate critical success factors (CSFs) for implementing Lean in IT outsourcing relationships. Key findings, implications and avenues for future research are discussed. Design/methodology/approach Six IT outsourcing relationships were qualitatively investigated by means of 36 semi-structured interviews. CSFs were identified based on interview transcription analyses, selection techniques and expert reviews. Findings In total, 16 CSFs for Lean implementation in IT outsourcing relationships are identified and described. Practical implications The CSFs presented in this paper indicate key areas that deserve managerial attention to steer Lean implementation efforts in IT outsourcing relationships in a favorable direction. Originality/value This study is the first to describe the phenomenon of “Lean IT outsourcing” and provides researchers and practitioners with a foundation to further examine Lean implementation in IT outsourcing relationships.
      Citation: Information Technology & People
      PubDate: 2018-08-15T11:56:47Z
      DOI: 10.1108/ITP-01-2016-0002
       
  • The contribution of ICT adoption to sustainability: households’
           perspective
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to advance the information society research by examining and better understanding the impact of the adoption information and communication technologies (ICT) within households on improving sustainability. Design/methodology/approach The survey questionnaire was used and data collected from 679 Polish households were statistically analyzed to understand the phenomena of ICT adoption and sustainability as well as identify correlations between them. Findings The research findings reveal that the ICT adoption is well described by the ICT outlay, information culture, ICT management and ICT quality, whereas sustainability is composed of ecological, economic, socio-cultural and political sustainability. Furthermore, the ICT quality, ICT management and information culture have a significant impact on sustainability, whereas the ICT outlay does not have such an impact. Research limitations/implications The research sample included Polish households only. Researchers may use the proposed approach and methodology to do similar analyses with different sample groups in other countries. Practical implications Households may find the results appealing and useful in enhancing the adoption of ICT, experiencing the full potential of ICT and deriving various benefits from the ICT adoption. The findings can help governments develop sound ICT adoption plans for implementing the 2030 Agenda for Sustainable Development. Originality/value The paper provides and verifies a new theoretical model of sustainable information society to depict various dimensions shaping the ICT adoption and their impact on different types of sustainability in the context of households.
      Citation: Information Technology & People
      PubDate: 2018-08-14T02:02:21Z
      DOI: 10.1108/ITP-02-2018-0090
       
  • Determinants of visual analytics adoption in organizations
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Visual analytics is increasingly becoming a prominent technology for organizations seeking to gain knowledge and actionable insights from heterogeneous and big data to support decision-making. Whilst a broad range of visual analytics platforms exists, limited research has been conducted to explore the specific factors that influence their adoption in organizations. The purpose of this paper is to develop a framework for visual analytics adoption that synthesizes the factors related to the specific nature and characteristics of visual analytics technology. Design/methodology/approach This study applies a directed content analysis approach to online evaluation reviews of visual analytics platforms to identify the salient determinants of visual analytics adoption in organizations from the standpoint of practitioners. The online reviews were gathered from Gartner.com, and included a sample of 1,320 reviews for six widely adopted visual analytics platforms. Findings Based on the content analysis of online reviews, 34 factors emerged as key predictors of visual analytics adoption in organizations. These factors were synthesized into a conceptual framework of visual analytics adoption based on the diffusion of innovations theory and technology–organization–environment framework. The findings of this study demonstrated that the decision to adopt visual analytics technologies is not merely based on the technological factors. Various organizational and environmental factors have also significant influences on visual analytics adoption in organizations. Research limitations/implications This study extends the previous work on technology adoption by developing an adoption framework that is aligned with the specific nature and characteristics of visual analytics technology and the factors involved to increase the utilization and business value of visual analytics in organizations. Practical implications This study highlights several factors that organizations should consider to facilitate the broad adoption of visual analytics technologies among IT and business professionals. Originality/value This study is among the first to use the online evaluation reviews to systematically explore the main factors involved in the acceptance and adoption of visual analytics technologies in organizations. Thus, it has potential to provide theoretical foundations for further research in this important and emerging field. The development of an integrative model synthesizing the salient determinants of visual analytics adoption in enterprises should ultimately allow both information systems researchers and practitioners to better understand how and why users form perceptions to accept and engage in the adoption of visual analytics tools and applications.
      Citation: Information Technology & People
      PubDate: 2018-08-10T03:26:06Z
      DOI: 10.1108/ITP-10-2017-0359
       
  • Solutions for counteracting human deception in social engineering attacks
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to investigate the top three cybersecurity issues in organizations related to social engineering and aggregate solutions for counteracting human deception in social engineering attacks. Design/methodology/approach A total of 20 experts within Information System Security Association participated in a three-round Delphi study for aggregating and condensing expert opinions. Three rounds moved participants toward consensus for solutions to counteract social engineering attacks in organizations. Findings Three significant issues: compromised data; ineffective practices; and lack of ongoing education produced three target areas for implementing best practices in countering social engineering attacks. The findings offer counteractions by including education, policies, processes and continuous training in security practices. Research limitations/implications Study limitations include lack of prior data on effective social engineering defense. Research implications stem from the psychology of human deception and trust with the ability to detect deception. Practical implications Practical implications relate to human judgment in complying with effective security policies and programs and consistent education and training. Future research may include exploring financial, operational and educational costs of implementing social engineering solutions. Social implications Social implications apply across all knowledge workers who benefit from technology and are trusted to protect organizational assets and intellectual property. Originality/value This study contributes to the field of cybersecurity with a focus on trust and human deception to investigate solutions to counter social engineering attacks. This paper adds to under-represented cybersecurity research regarding effective implementation for social engineering defense.
      Citation: Information Technology & People
      PubDate: 2018-08-10T03:21:48Z
      DOI: 10.1108/ITP-12-2017-0422
       
  • Software platform establishment: effectuation and entrepreneurial
           awareness
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Faced with environments rife with technological uncertainties, software platforms have gained interest as enablers of innovative businesses and development processes. While extant research has focused on mature platforms, the authors know less about the early phases in a platform’s life cycle. Drawing inspiration from the effectual perspective on entrepreneurship, the purpose of this paper is to further the understanding of how software platforms are established. Design/methodology/approach The authors develop a framework that describes four types of entrepreneurial awareness and then apply it to a qualitative case study of a platform that has emerged from the initial “creation” phase and is now in a period of rapid growth. Findings The study indicates that successful establishment of a software platform depends upon the provider’s ability to integrate business acumen with technical proficiency and leverage these combined skills to ensure short-term viability and long-term relevance in the market. Research limitations/implications This paper contributes to literature on platform strategy, which has previously focused on mature platforms, by addressing entrepreneurial behavior during a software platform’s establishment. As it is based on a single qualitative study, additional studies of different platforms are needed to verify the results. Originality/value The paper highlights the dependence of software platform establishment on the ability to enact both explorative and exploitative activity patterns, and embrace both strategic foresight and systemic insight cognitive patterns. The combined patterns of activity and cognition form four types of awareness, pertaining to markets, resources, technology and contexts.
      Citation: Information Technology & People
      PubDate: 2018-07-17T06:19:23Z
      DOI: 10.1108/ITP-11-2016-0285
       
  • Impact of referral reward program on innovative customers’ follow-up
           e-referral
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose With the rise of customer engagement in online products and services innovation, enterprises are seeking effective referral reward program (RRP) to encourage customers’ follow-up electronic-referral (e-referral) behaviors. Therefore, how to stimulate more customers to participate in the RRP is very important to enterprises. However, little empirical work has systemically investigated the impact of RRP on customers’ follow-up e-referral, as well as the moderating effects of customers’ characteristics. To fill those research gaps, the purpose of this paper is to explore the effects of RRP (particularly, reward amount and reward type) on customers’ follow-up e-referral, and the role of creative self-efficacy. Design/methodology/approach Based on the self-perception theory and the context of online customer innovation, this paper establishes a theoretical model and uses an experiment with 160 participants to test the hypotheses on the role of reward (amount and type) and the moderating effect of creative self-efficacy. Findings The results of the experiment suggest that both reward amount and reward type in RRP positively impact customers’ follow-up e-referral. Furthermore, customers’ creative self-efficacy moderates the relationship between rewards and customers’ follow-up e-referral. Customers with low creative self-efficacy, reward amount significantly stimulate their follow-up e-referral, but such effect is insignificant when customers’ creative self-efficacy is high. In terms of reward type, gift reward has more positive effect on customers’ follow-up e-referral when they have high (rather than low) creative self-efficacy, but cash reward has more positive effect on those with low (rather than high) creative self-efficacy. Originality/value First, based on the self-perception theory, the study clarifies the inconsistent relationship between reward and customers’ e-referral and contributes to related research. Second, the study broadens the existing research perspective by introducing creative self-efficacy, which shows interesting and powerful moderating effect but has been ignored in previous studies. Third, the study provides valuable advice on how enterprises design an effective RRP to enhance customers’ follow-up e-referral.
      Citation: Information Technology & People
      PubDate: 2018-07-16T07:47:34Z
      DOI: 10.1108/ITP-06-2017-0188
       
  • How digital natives make their self-disclosure decisions: a cross-cultural
           comparison
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose Digital natives have become significant users of social network sites (SNSs); therefore, their disclosed personal information can be misused by SNS providers and/or other users. The purpose of this paper is to understand how digital natives make their self-disclosure decisions on SNSs, as well as whether the concept of culture can still be relevant to digital natives. Design/methodology/approach The hypotheses were tested with survey data collected from the USA and China. Findings The results show that trust in SNSs and trust in SNS users are positively related to social rewards. Social rewards are positively related to intention to self-disclose, while privacy risk is positively related to privacy concerns. Further, culture significantly moderates the relationship between trust and social rewards. Research limitations/implications The study clarifies the effects of different types of trust on privacy in the context of SNSs. Further, the study shows the effects of culture when digital natives make self-disclosure decisions. Practical implications SNS providers also need to focus on different types of trust when operating in different cultural contexts. Further, SNS providers expanding their markets should emphasize social rewards to increase the likelihood of self-disclosure. Originality/value The results show that while culture can still be helpful to explain digital natives’ trust beliefs, digital natives have started to converge regarding their perceptions about privacy concerns and self-disclosure.
      Citation: Information Technology & People
      PubDate: 2018-07-16T07:44:55Z
      DOI: 10.1108/ITP-10-2017-0339
       
  • Organizational cloud security and control: a proactive approach
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to unfold the perceptions around additional security in cloud environments by highlighting the importance of controlling mechanisms as an approach to the ethical use of the systems. The study focuses on the effects of the controlling mechanisms in maintaining an overall secure position for the cloud and the mediating role of the ethical behavior in this relationship. Design/methodology/approach A case study was conducted, examining the adoption of managed cloud security services as a means of control, as well as a large-scale survey with the views of IT decision makers about the effects of such adoption to the overall cloud security. Findings The findings indicate that there is indeed a positive relationship between the adoption of controlling mechanisms and the maintenance of overall cloud security, which increases when the users follow an ethical behavior in the use of the cloud. A framework based on the findings is built suggesting a research agenda for the future and a conceptualization of the field. Research limitations/implications One of the major limitations of the study is the fact that the data collection was based on the perceptions of IT decision makers from a cross-section of industries; however the proposed framework should also be examined in industry-specific context. Although the firm size was indicated as a high influencing factor, it was not considered for this study, as the data collection targeted a range of organizations from various sizes. Originality/value This study extends the research of IS security behavior based on the notion that individuals (clients and providers of cloud infrastructure) are protecting something separate from themselves, in a cloud-based environment, sharing responsibility and trust with their peers. The organization in this context is focusing on managed security solutions as a proactive measurement to preserve cloud security in cloud environments.
      Citation: Information Technology & People
      PubDate: 2018-07-12T02:59:00Z
      DOI: 10.1108/ITP-04-2017-0131
       
  • Technological media and development
    • Abstract: Information Technology & People, Ahead of Print.
      Purpose The purpose of this paper is to characterize and identify the existing studies on the relationship between technological media and development Design/methodology/approach The authors conducted a systematic mapping study to identify and analyze the related literature. The authors identified 196 primary studies, dated from 2000 to 2017 and categorized them with respect to research focus, types of research and research method. Findings A total of 97 studies were identified and mapped, synthesizing the available evidence on the relationship between technological media and development. “Social development” with 54 articles and “communication” with 34 articles were the dominant research focus. Regarding the research type, “Solution proposal” is the most frequently employed research type. “Case study,” “discussion paper” and “interview,” respectively were the most used research methods. However, “SNA,” “focus group” and “time series” were used less often. “Solution proposal” was the most common research type between 2015 and 2017, and after that “philosophical paper” was the dominant research paper type. Further, the number of publications has increased between 2006 and 2017. Originality/value This mapping study is the first systematic exploration of the state-of-art on technological media-development nexus. The existing body of knowledge is limited to a few high quality studies.
      Citation: Information Technology & People
      PubDate: 2018-07-06T01:11:40Z
      DOI: 10.1108/ITP-11-2017-0383
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 18.234.236.14
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-