for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover
International Journal of Information Management
Journal Prestige (SJR): 1.373
Citation Impact (citeScore): 6
Number of Followers: 298  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 0268-4012
Published by Elsevier Homepage  [3162 journals]
  • Mobile cloud computing based stroke healthcare system
    • Abstract: Publication date: Available online 12 October 2018Source: International Journal of Information ManagementAuthor(s): Yeliz Karaca, Majaz Moonis, Yu-Dong Zhang, Caner Gezgez Information technology has recently seen a huge progress in innovative healthcare technologies that rendered healthcare data bigger. Connectivity on 7/24 basis between human to device and device to device have a crucial role in individuals’ lives. Therefore, Mobile Cloud System (MCC) has become an indispensable tool. Parallel with the rapid developments in the Internet of Things, convergence has become an important issue. Our proposed method, accordingly, can be converged with mobile-cloud environments with cloud computing in handling healthcare information. This study uses Virtual Dedicated Server (VDS) as 4 VCPU and 8 GB RAM and proposes a model based on the Android based mobile phones for stroke patients with cardioembolic (689) and cryptogenic (528) subtypes. The system set up through this study has two basic application elements which are mobile application and server application. Artificial Neural Network (ANN) module is beneficial for classifying the two stroke subtypes while server application is used for saving the data from the patients. Accordingly, our model guarantees availability, security, and scalability as a system for stroke patients applying Stroke dataset for ANN algorithm, Multilayer Perceptron Algorithm (MLP), which has been done for the first time in literature with big data in this scope. The main contributions are: (1) The outcomes will display an individual unique social insurance framework. (2) The outcomes will be utilized for the distinguishing proof of stroke-related data to be gathered by cell phones that are Android based. (3) Stroke patients will find out about their condition of well-being through an ANN application programming interface, which will provide a sort of organization for the patients. Overall, an efficient and user-friendly stroke determination human services framework has been presented through this Healthcare System for patients.Graphical abstractMLP in Stroke Diagnosis Healthcare System seems to be crucial concerning the use of mobile cloud computing for the management of stroke data in healthcare systems. In general, life quality of the patients will be improved since they will have more agency over their disease. Once they enter the analysis results on the system set up, they can have direct access to the relevant data so they can have agency over their course of disease, which render them more aware and informed patients. The secondary benefit would be concerned with the psychological aspect since agency and more awareness would help reduce anxiety and concerns regarding the disease.
       
  • Adoption of O2O food delivery services in South Korea: The moderating role
           of moral obligation in meal preparation
    • Abstract: Publication date: Available online 11 October 2018Source: International Journal of Information ManagementAuthor(s): Minjung Roh, Kiwan Park Most studies on O2O services have focused solely on the technological merits of mobile applications, overlooking the role of the value systems that underlie people’s lifestyles.In contrast, this research sheds light on how people’s value systems influence their decision to adopt food delivery applications. Particularly, it proposes that people’s moral obligation in meal preparation can change the mode of thinking that guides their adoption decision. Namely, moral obligation is assumed to restrict people from acting on their basic convenience orientation in meal preparation. Empirical results have supported this assumption by showing that people with a high moral obligation (or married people) are more reluctant to convert their basic convenience-seeking tendencies into actual adoption intention than those with a low moral obligation (or single people). The important theoretical and managerial implications of these results are also discussed.
       
  • A reversible and secure patient information hiding system for IoT driven
           e-health
    • Abstract: Publication date: Available online 11 October 2018Source: International Journal of Information ManagementAuthor(s): Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, K. Muhammad, Javaid A. Sheikh, G.M. Bhat Internet of things (IoT) coupled with mobile cloud computing has made a paradigm shift in the service sector. IoT-assisted mobile cloud based e-healthcare services are making giant strides and are likely to change the conventional ways of healthcare service delivery. Though numerous approaches for preventing unauthorized access to information exchanged between a mobile phone and cloud platform do exist, but there is no security mechanism to prevent unauthorized access by the cloud administrators. With an aim to ensure security of client data such as Electronic Patient Records (EPR), we propose a novel high-capacity and reversible data hiding approach for securely embedding EPR within the medical images using Optimal Pixel Repetition (OPR). OPR converts every pixel of the input image to a 2 × 2 block to facilitate reversibility by ensuring all the pixels in a 2 × 2 block to have different values. Since a 2 × 2 block is comprised of 4-pixel elements, which could be arranged in sixteen possible ways; we generate a lookup table corresponding to sixteen possible positions of pixels. EPR hiding in each block is achieved by permuting the pixels of a block according to the four-bit word of secret data, resulting in a histogram invariant stego image. The histogram invariance improves the robustness of the proposed scheme to statistical attacks. A stego image is said to hide embedded data securely, when it provides better imperceptivity for an appreciably high payload. Thus, while using information embedding approach for securing client data on a mobile-cloud platform, high imperceptivity is a desirable feature. Experimental results show that average PSNR obtained is 42 dB for payload 1.25 bpp by our scheme, showing its effectiveness for preventing unauthorized access to client’s sensitive data.
       
  • Investigating factors influencing the physicians’ adoption of electronic
           health record (EHR) in healthcare system of Bangladesh: An empirical study
           
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Akram Hossain, Rui Quaresma, Habibur Rahman Electronic Health Record (EHR) can promote awareness or knowledge about healthcare among patients and healthcare professionals to improve collaboration between different governmental bodies, and enhance healthcare quality. The aim of the study is to identify the critical farctors affecting the physicians’ adoption of EHR in healthcare system of Bangladesh by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) to include Personal Innovativeness in Information Technology and Resistance to Change. A cross-sectional survey questionnaire was used to collect data from 300 participants in different private and public hospitals in Dhaka, the capital city of Bangladesh. The study used partial least square (PLS) method, a statistical analysis technique based on the structural equation modeling (SEM), to analyze the collected data. The results of the study determined that Social Influence (β = 0.19, P  0.05) had no significant influence. The findings suggest that policymakers should increase the adoption of the EHR system by developing social strategies to encourage physicians to stimulate each other to use the EHR system and ensuring technical sufficiency, training to facilitate the use of the EHR system. In addition, the policymakers should identify physicians who possess a propensity to experiment with new information technologies as well as reduce existing challenges and barriers such as computers crush, poor infrastructure with erratic power supply etc. Moreover, we identify future research areas that provide scholars opportunities to push theoretical and empirical boundaries and offer further insights into the study of the EHR system.
       
  • The role of a digital engineering platform in appropriating the creation
           of new work-related mind-set and organisational discourse in a large
           multi-national company
    • Abstract: Publication date: Available online 8 October 2018Source: International Journal of Information ManagementAuthor(s): Zahid I. Hussain, Uthayasankar Sivarajah, Naveed Hussain This paper reports on a case study involving a strategic and innovative approach to creation of an in-house multifaceted digital engineering platform (the DEP) in overcoming a number of organisational problems at a multinational engineering company. The DEP was to be used strategically for simplifying the operational complexity and to create and appropriate new work-related mind-set and new organisational discourse to achieve homogenous working across the organisation, which is a huge challenge. The need for this system emerged from the need to resolve many organisational services related problems that carried phenomenal amount of processes, health and safety risks and to regulate, and, control the running of engineering project. Research data were collected using a longitudinal case study approach over a period of six months. In order to make sense of how the DEP helped the organisation, the study used certain elements of Extended Structuration Theory as a lens to assess the case study. This research discovered that the DEP succeeded in creating and appropriating work-related mind-set and organisational discourse. It also had real influence on working processes and employees at all levels while encouraging transparency, responsiveness, agility and accountability. It continues to help the organisation to govern, manage and maintain good standard of service but many barriers still remain.
       
  • Examining the role of trust and quality dimensions in the actual usage of
           mobile banking services: An empirical investigation
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Sujeet Kumar Sharma, Manisha Sharma Mobile banking (m-banking) has emerged dynamically over the years due to consumers' increased use of mobile technologies, their ever-growing lifestyle choices and also the several different economic factors. This paper proposes a new research model by extending the DeLone & McLean information systems (D&M IS) success model to understand users’ actual usage of m-banking. The research model was tested and validated using data collected by survey from 227 Omani residents. This study employed a two-staged analytical approach by combining structural equation modeling and neural network analysis. The results divulge that satisfaction and intention to use stand as two important precedents of actual usage, and the satisfaction also mediates the relationship between service quality, information quality and trust with intention to use m-banking and negates with that of system quality. We have provided the theoretical as well as practical implications of the findings.
       
  • Fans as a source of extended innovation capabilities: A case study of
           Xiaomi Technology
    • Abstract: Publication date: Available online 4 October 2018Source: International Journal of Information ManagementAuthor(s): Mingwei Li, Suling Jia, Wenyu (Derek) Du In the digital era, many companies are developing extended capabilities with external stakeholders. Fans are an important, but often untapped, source of extended capabilities, especially innovation capabilities. Our study intends to fill that gap by examining how companies develop extended innovation capabilities with fans. Although extant studies have examined user-based innovation, their findings may not be readily applicable to fan-based innovation because fans are more committed and have more demanding needs than regular users. We conducted a case study of Xiaomi Technology, a leading smartphone manufacturer, which grew rapidly by cultivating a group of motivated fans and soliciting their opinions. Our case analysis uncovers three important lessons that can help companies leverage fans to build extended innovation capabilities: 1) companies can build an online community to foster communal relationships with fans; 2) companies can assign different types of fans different roles; and 3) companies can organize internal operations around fans.
       
  • Cross-company customer churn prediction in telecommunication: A comparison
           of data transformation methods
    • Abstract: Publication date: Available online 27 September 2018Source: International Journal of Information ManagementAuthor(s): Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, we devised a model for CCCP using data transformation methods (i.e., log, z-score, rank and box-cox) and presented not only an extensive comparison to validate the impact of these transformation methods in CCCP, but also evaluated the performance of underlying baseline classifiers (i.e., Naive Bayes (NB), K-Nearest Neighbour (KNN), Gradient Boosted Tree (GBT), Single Rule Induction (SRI) and Deep learner Neural net (DP)) for customer churn prediction in telecommunication sector using the above mentioned data transformation methods. We performed experiments on publicly available datasets related to the telecommunication sector. The results demonstrated that most of the data transformation methods (e.g., log, rank, and box-cox) improve the performance of CCCP significantly. However, the Z-Score data transformation method could not achieve better results as compared to the rest of the data transformation methods in this study. Moreover, it is also investigated that the CCCP model based on NB outperform on transformed data and DP, KNN and GBT performed on the average, while SRI classifier did not show significant results in term of the commonly used evaluation measures (i.e., probability of detection, probability of false alarm, area under the curve and g-mean).
       
  • ‘Understanding consumers’ reactance of online personalized
           advertising: A new scheme of rational choice from a perspective of
           negative effects
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Qi Chen, Yuqiang Feng, Luning Liu, Xianyun Tian Consumer reactance appears to be a major inhibiting result in the personalization paradox of online personalized advertising. The objective of this study is to uncover consumer reactance of online personalized advertising. We identify the rational choice factors rooted in the rational choice theory from a negative-effect perspective and examine their impacts on consumer reactance with consideration of affective factors. Our results confirm that three rational choice factors from a negative-effect perspective have significant impacts on consumer reactance, and affective factors such as ownership and vulnerability are dominant determinants of these rational choice factors. The effects of these affective factors on consumer reactance can be mediated by individual rational choice factors. The findings provide a new perspective on the paradox phenomenon and offer online personalized advertising providers new approaches to improving their performance.
       
  • Social media data and post-disaster recovery
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Mehdi Jamali, Ali Nejat, Souparno Ghosh, Fang Jin, Guofeng Cao This study introduces a multi-step methodology for analyzing social media data during the post-disaster recovery phase of Hurricane Sandy. Its outputs include identification of the people who experienced the disaster, estimates of their physical location, assessments of the topics they discussed post-disaster, analysis of the tract-level relationships between the topics people discussed and tract-level internal attributes, and a comparison of these outputs to those of people who did not experience the disaster. Faith-based, community, assets, and financial topics emerged as major topics of discussion within the context of the disaster experience. The differences between predictors of these topics compared to those of people who did not experience the disaster were investigated in depth, revealing considerable differences among vulnerable populations. The use of this methodology as a new Machine Learning Algorithm to analyze large volumes of social media data is advocated in the conclusion.
       
  • Relationships between IT department culture and agile software development
           practices: An empirical investigation
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Manjul Gupta, Joey F. George, Weidong Xia IT department culture has been widely recognized as an important factor that influences the adoption of agile practices. Yet, the research pertaining to the relationship between IT department culture and agile practices usage remains underexplored. This study proposes and tests the relationships between four competing cultural forms and two types of agile practices - social and technical. The findings contribute to the extant literature by integrating the competing values model of culture into the literature on factors affecting agile development at the IT department level.
       
  • Towards a big data framework for analyzing social media content
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Jose Luis Jimenez-Marquez, Israel Gonzalez-Carrasco, Jose Luis Lopez-Cuadrado, Belen Ruiz-Mezcua Modern companies generate value by digitalizing their services and products. Knowing what customers are saying about the firm through reviews in social media content constitutes a key factor to succeed in the big data era. However, social media data analysis is a complex discipline due to the subjectivity in text review and the additional features in raw data. Some frameworks proposed in the existing literature involve many steps that thereby increase their complexity. A two-stage framework to tackle this problem is proposed: the first stage is focused on data preparation and finding an optimal machine learning model for this data; the second stage relies on established layers of big data architectures focused on getting an outcome of data by taking most of the machine learning model of stage one. Thus, a first stage is proposed to analyze big and small datasets in a non-big data environment, whereas the second stage analyzes big datasets by applying the first stage machine learning model of. Then, a study case is presented for the first stage of the framework to analyze reviews of hotel-related businesses. Several machine learning algorithms were trained for two, three and five classes, with the best results being found for binary classification.
       
  • Consumer use of mobile banking (M-Banking) in Saudi Arabia: Towards an
           integrated model
    • Abstract: Publication date: February 2019Source: International Journal of Information Management, Volume 44Author(s): Abdullah M. Baabdullah, Ali Abdallah Alalwan, Nripendra P. Rana, Hatice Kizgin, Pushp Patil Mobile banking is one of the most promising technologies that has emerged in recent years and could prove to have considerable value to both banks and customers. Thus, this study recognises the need to test the main factors that could predict the use of mobile banking as well as how using such a system could contribute to both customer satisfaction and customer loyalty. The conceptual model of this study combines two models (i.e. UTAUT2 and the D&M IS Success Model). A questionnaire survey was conducted to collect the required data from convenience sampling of Saudi bank customers. The main factors – performance expectancy, price value, facilitating conditions, hedonic motivation, habit, system quality and service quality – were found to have a significant impact on actual use behaviour. This study was cross-sectional, therefore future studies should implement longitudinal studies in order to re-collect the findings. Further, this study adopted convenience sampling of Saudi M-Banking users. This may adversely impact the issue of generalisability to the whole population. The gap in the M-Banking literature in Saudi Arabia would be bridged by proposing a comprehensive conceptual model that scrupulously clarifies the use of M-Banking from the perspective of Saudi users. Furthermore, this study would consider the adoption of numeric data in order to inferentially analyse them using SEM. This in turn would assist in generalising the findings to the whole Saudi population.
       
  • Mobile edge computing based QoS optimization in medical healthcare
           applications
    • Abstract: Publication date: Available online 25 September 2018Source: International Journal of Information ManagementAuthor(s): Ali Hassan Sodhro, Zongwei Luo, Arun Kumar Sangaiah, Sung Wook Baik Emerging trends in mobile edge computing for developing the efficient healthcare application such as, remote monitoring of the patients with central electronics clouds (e-Clouds) and their increasing voluminous multimedia have caught the attention of everyone in industry and academia. So, clear visualization, big sensing level, and better quality of service (QoS) is the foremost priority. This paper proposes the window-based Rate Control Algorithm (w-RCA) to optimize the medical quality of service (m-QoS) in the mobile edge computing based healthcare by considering the network parameters for instance, peak-to-mean ratio (PMR), standard deviation (Std.dev), delay and jitter during 8 min medical video stream named “Navigation to the Uterine Horn, transection of the horn and re-anastomosis’ transmission over 5 G networks. The performance of the proposed w-RCA is evaluated and compared with the conventional battery smoothing algorithm (BSA) and Baseline by using MPEG-4 encoder for optimizing m-QoS at the source or the server side. The experimental results demonstrate that the w-RCA outperforms the BSA and Baseline by optimizing QoS in remote healthcare application i.e., Tele-surgery. Besides, it is observed and analyzed that w-RCA produces better and effective results at small buffer and window sizes unlike BSA and Baseline by adopting large buffer size during QoS optimization.
       
  • A lossless DNA data hiding approach for data authenticity in mobile cloud
           based healthcare systems
    • Abstract: Publication date: Available online 25 September 2018Source: International Journal of Information ManagementAuthor(s): Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi We present a lossless Deoxyribonucleic Acid (DNA) sequence hiding method that can be used for ensuring authenticity of DNA sequence in the context of Mobile Cloud based healthcare systems. Hiding data within DNA sequence results in permanent information loss in DNA sequence. Therefore, providing DNA sequence authenticity using data hiding is challenging. Moreover, existing works on DNA data hiding require a reference DNA sequence data to retrieve hidden data. Hence, current methods are not blind approaches and inappropriate for ensuring authenticity of DNA sequence in the Mobile Cloud. The proposed method hides authentication data within DNA sequence, extracts authentication data, and reconstructs the DNA sequence without any loss of information. From there, our proposed approach guarantees DNA sequence authenticity and integrity in Mobile Cloud based healthcare systems. We present a security analysis of our method to show that the method is secured. We conduct several experiments to demonstrate the performance of our proposed method.
       
  • How perceived value drives the use of mobile financial services apps
    • Abstract: Publication date: Available online 25 September 2018Source: International Journal of Information ManagementAuthor(s): Heikki Karjaluoto, Aijaz A. Shaikh, Hannu Saarijärvi, Saila Saraniemi Mobile information services have revolutionized business models and service delivery methods by facilitating consumer access to information and order placement via mobile apps. In developed markets, mobile banking (m-banking) and mobile payment (m-payment) applications have replaced text-based mobile services. However, extant research has not addressed these mobile financial services apps (MFSAs) adequately from the perspective of consumer behavior. Thus, the present study developed and tested a series of hypotheses related to the antecedents of perceived value of MFSA use; it also examined how such use affects the development of customers’ overall relationships with banks. Our hypotheses were tested using two samples (N = 992; N = 524) comprising different types of MFSA end-users in one of the leading countries in digital banking, Finland. The results supported most of the hypotheses and revealed that self-congruence and new product novelty are the principal drivers of perceived MFSA value. In addition, the findings show that the perceived value of MFSAs yields strong positive effects on customers’ overall satisfaction and commitment to their bank. The present study’s key managerial implication is that banks’ investments in developing MFSAs result in improved relationships with customers and increased business.
       
  • Measuring the impact of spammers on e-mail and Twitter networks
    • Abstract: Publication date: Available online 24 September 2018Source: International Journal of Information ManagementAuthor(s): Andrea Fronzetti Colladon, Peter A. Gloor This paper investigates the research question if senders of large amounts of irrelevant or unsolicited information – commonly called “spammers” – distort the network structure of social networks. Two large social networks are analyzed, the first extracted from the Twitter discourse about a big telecommunication company, and the second obtained from three years of email communication of 200 managers working for a large multinational company. This work compares network robustness and the stability of centrality and interaction metrics, as well as the use of language, after removing spammers and the most and least connected nodes. The results show that spammers do not significantly alter the structure of the information-carrying network, for most of the social indicators. The authors additionally investigate the correlation between e-mail subject line and content by tracking language sentiment, emotionality, and complexity, addressing the cases where collecting email bodies is not permitted for privacy reasons. The findings extend the research about robustness and stability of social networks metrics, after the application of graph simplification strategies. The results have practical implication for network analysts and for those company managers who rely on network analytics (applied to company emails and social media data) to support their decision-making processes.
       
  • Call for papers Theme: Revisiting Electronic Health in the Era of Digital
           Lifestyles
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s):
       
  • What factors influence the mobile health service adoption' A
           meta-analysis and the moderating role of age
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Yang Zhao, Qi Ni, Ruoxin Zhou As an emerging field in the healthcare industry, mobile health service has been paid more and more attention in recent years. To explore the key determinants of individual attitude and behavioral intention, this study, based on 35 related empirical researches, conducted a meta-analysis to develop a comprehensive framework regarding the adoption of individual mobile health services and analyzed the moderating effect of age. Through descriptive statistics, reliability statistics, and correlation analysis, the results of meta-analysis indicate that perceived usefulness, perceived ease of use, perceived vulnerability and perceived severity all have significant impacts on individual attitude, while perceived usefulness, perceived ease of use, subjective norm, trust, perceived risk and attitude significantly influence behavioral intention. The moderator analysis confirmed that different age groups have specific moderating effects on mobile health services adoption, and results suggest that perceived ease of use, perceived vulnerability and perceived severity are more important factors for middle-aged and older users to use mobile health services.
       
  • The sharing economy and digital platforms: A review and research agenda
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Will Sutherland, Mohammad Hossein Jarrahi Over the last few years the sharing economy has been changing the way that people share and conduct transactions in digital spaces. This research phenomenon has drawn scholars from a large number of disparate fields and disciplines into an emerging research area. Given the variety of perspectives represented, there is a great need to collect and connect what has been done, and to identify some common themes, which will serve as a basis for future discussions on the crucial roles played by digital platforms in the sharing economy. Drawing on a collection of 435 publications on the sharing economy and related terms, we identify some trends in the literature and underlying research interests. Specifically, we organize the literature around the concept of platform mediation, and draw a set of essential affordances of sharing economy technologies from the reviewed literature. We present the notion of platform centralization/decentralization as an effective organizing principle for the variety of perspectives on the sharing economy, and also evaluate scholars' treatment of technology itself. Finally, we identify important gaps in the existing literature on the relationship between digital platforms and sharing economy, and provide directions for future investigations.
       
  • Harnessing user innovation for social media marketing: Case study of a
           crowdsourced hamburger
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Darius Pacauskas, Risto Rajala, Mika Westerlund, Matti Mäntymäki This study investigates how user innovation can be used as an engagement mechanism for crowdsourcing-based marketing initiatives. By building on an in-depth case study of a hamburger chain’s crowdsourcing initiative, we analyze key activities in customers’ value-creating processes, the crowdsourcer’s value-creating processes, and innovation encounter processes. We further identify three key activities by which a crowdsourcer can facilitate the realization of desired outcomes from the crowdsourcing initiative: (1) the development of opportunities for user innovation, (2) the planning of user innovation activities, and (3) the implementation and assessment of the outcomes. Our results emphasize the importance of activities and technical features that enable socializing with other participants, support active participation, and create a participatory experience. Our study will inform research and practice on crowdsourcing and user innovation for marketing purposes.
       
  • The role of compatibility in predicting business intelligence and
           analytics use intentions
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Jurij Jaklič, Tanja Grublješič, Aleš Popovič Research shows that data-driven decision-making using Business Intelligence and Analytics (BI&A) can create competitive advantages for organizations. However, this can only happen if users successfully accept BI&A and use it effectively. Analytical decision processes are often characterized by non-routine and ill-structured tasks and decisions, making individuals’ work styles more pronounced. Aligning on one hand what a BI&A solution can offer and, on the other, the changing needs and expectations of users, the way they like to work – their work style, can thus be difficult. This illustrates the importance of compatibility evaluations in the BI&A context, including perceptions of the technology fit with the user’s work needs and style, along with the fit with the organizational decision processes and organizational values when deciding to use BI&A. These issues have not yet been thoroughly researched in the existing BI&A literature. In response, we conduct a quantitative survey-based study to examine the interrelated role of compatibility in predicting BI&A use intentions. The model is empirically tested with the partial least squares (PLS) approach through to structural equation modeling (SEM). Our results show that compatibility perceptions have a direct positive impact on use intentions, mediate the impact of performance perceptions on use intentions, while the socio-organizational considerations of result demonstrability and social influence have interaction effects by positively strengthening the perceived relevance of compatibility in impacting use intentions.
       
  • Real-time big data processing for anomaly detection: A Survey
    • Abstract: Publication date: Available online 8 September 2018Source: International Journal of Information ManagementAuthor(s): Riyaz Ahamed Ariyaluran Habeeb, Fariza Nasaruddin, Abdullah Gani, Ibrahim Abaker Targio Hashem, Ejaz Ahmed, Muhammad Imran The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.
       
  • Impact of ESN implementation on communication and knowledge-sharing in a
           multi-national organization
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Nadeem Azaizah, Iris Reychav, Daphne R. Raban, Tomer Simon, Roger McHaney Organizations often focus on their employees’ abilities to effectively communicate and share knowledge in online collaborative activities. Social media technologies facilitate that process in organizations, where they are known as Enterprise Social Networks (ESN). To increase potential benefits, organizations may run an implementation process to increase the ESN’s acceptance and use. This study focused on one such platform, Yammer, which is making inroads into numerous industries. Specifically, we addressed Yammer’s impact on communication and knowledge-sharing among organizational units in a multinational organization. This study unobtrusively assessed communication patterns before and after an ESN implementation process to measure impact. Data analysis performed on message interactions between employees on the Yammer platform suggested the implementation process had a positive impact on the number of messages, number of users, and weighted-degree SNA metric. This study also revealed that the implementation process positively impacted inter- and intra-organizational unit interactions.
       
  • Antecedents and outcomes of collaborative innovation capabilities on the
           platform collaboration environment
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Maomao Chi, Weijun Wang, Xinyuan Lu, Joey F. George The application of emerging collaborative digital technologies enhanced firms’ collaborative innovation and firm performance. This paper examines the drivers of collaborative innovation capability, and its effects on the digital collaboration capability. Based on the technology-push and need-pull perspective as well as operational capability hierarchy view, we proposed the model of antecedents and outcomes of higher-level operational capability, such as collaborative innovation capability. We tested the research hypotheses using a field survey of 184 Chinese corporations. The research model was validated using hierarchical regression analysis with the data collected from the survey data. The results provide strong support for the proposed research model. In particular, we found that as hypothesized, the fit of platform technology and collaborative business need is the critical driver of collaborative innovation capability. Furthermore, the higher-level operational capability (i.e., collaborative innovation capability) impacts on the lower-level operational capability (i.e., digital collaboration capability). Especially, the impact of the fit on digital collaboration capability is completely mediated by collaborative innovation capability. By integrating the technology-push and need-pull perspective as well as operational capability hierarchy literature, this paper provides significant implications for antecedents and outcomes of collaborative innovation capabilities under the platform collaboration environment.
       
  • A case analysis of securing organisations against information leakage
           through online social networking
    • Abstract: Publication date: Available online 5 September 2018Source: International Journal of Information ManagementAuthor(s): Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang The inadvertent leakage of sensitive information through Online Social Networking (OSN) represents a significant source of security risk to organisations. Leakage of sensitive information such as trade secrets, intellectual property and personal details of employees can result in a loss of competitive advantage, loss of reputation, and erosion of client trust. We present 4 case studies which examine drivers for employee leakage behaviour and corresponding security management strategies. Drawing on these case studies, we present a maturity framework for organisational OSN Leakage Mitigation Capability (OSN-LMC) and lessons learned from the case analysis.
       
  • Towards a theory of SocioCitizenry: Quality anticipation, trust
           configuration, and approved adaptation of governmental social media
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Adel M. Aladwani, Yogesh K. Dwivedi The past few years have witnessed growing governmental interest in engaging citizens through social media. With this interest comes a genuine need to understand the process and outcomes of government–citizen interactions. Therefore, this article seeks to address this important issue by proposing and validating a SocioCitizenry theory that depicts government–citizen interaction through social media. The present study uses data gathered through two field surveys and analyses the relationships among three main SocioCitizenry constructs: quality anticipation, trust configuration, and approved adaptation. The following factors are examined with respect to the aforementioned three constructs: differential influences of familiarity with social media and government services; perceived importance of interactions with government services; social media quality reputation; and family members’ and friends’ perceptions of social media quality. Overall, results show that anticipated governmental social media quality influences configured trust, which in turn influences the extent of approved adaptation. The implications of these results in research and practice are discussed.
       
  • People analytics—A scoping review of conceptual boundaries and value
           propositions
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Aizhan Tursunbayeva, Stefano Di Lauro, Claudia Pagliari This mixed-method ‘scoping review’ mapped the emergence of the term People Analytics (PA), the value propositions offered by vendors of PA tools and services and the PA skillsets being sought by professionals. Analysis of academic research and online search traffic since 2002 revealed changes in the relative trajectory of PA and conceptually related terms over the past fifteen years, indicating both the re-branding of similar innovations and a differentiation of priorities and communities of practice. The market in commercial PA tools and services is diverse, offering numerous functional and strategic benefits, although published evidence of these outcomes remains sparse. Companies marketing PA systems and services emphasise benefits to employers more than to personnel. Across the sources examined, including specialised online courses, PA was largely aligned with HRM, however its development reflects the shifting focus of HR departments from supporting functional to strategic organisational requirements. Consideration of ethical issues was largely absent.
       
  • Cybersecurity risk analysis model using fault tree analysis and fuzzy
           decision theory
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Ana Paula Henriques de Gusmão, Maisa Mendonça Silva, Thiago Poleto, Lúcio Camara e Silva, Ana Paula Cabral Seixas Costa Cybersecurity, which is defined as information security aimed at averting cyberattacks, which are among the main issues caused by the extensive use of networks in industrial control systems. This paper proposes a model that integrates fault tree analysis, decision theory and fuzzy theory to (i) ascertain the current causes of cyberattack prevention failures and (ii) determine the vulnerability of a given cybersecurity system. The model was applied to evaluate the cybersecurity risks involved in attacking a website, e-commerce and enterprise resource planning (ERP), and to assess the possible consequences of such attacks; we evaluate these consequences, which include data dissemination, data modification, data loss or destruction and service interruption, in terms of criteria related to financial losses and time for restoration. The results of the model application demonstrate its usefulness and illustrate the increased vulnerability of e-commerce to cybersecurity attacks, relative to websites or ERP, due partly to frequent operator access, credit transactions and users’ authentication problems characteristic of e-commerce.
       
  • The impact of users’ sense of belonging on social media habit formation:
           Empirical evidence from social networking and microblogging websites in
           China
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Qian Liu, Zhen Shao, Weiguo Fan Continued usage is critical to the success of social media applications. Although usage tends to become routine, little is known about the development of these habits, particularly with regard to users’ sense of belonging. Drawing upon the theoretical framework of habit formation, we propose a conceptual model that introduces users’ sense of belonging to explore the formation of usage habit from an affective perspective. The empirical results (for two samples of 594 social network users and 608 microbloggers in China) suggest that sense of belonging positively influences the strength of usage habit. In addition, sense of belonging attenuates the effect of frequency of past behavior on usage habit. These findings offer rich insights for understanding how and why social media usage habit arises. The implications for both theory and practice are discussed.
       
  • Twitter as a tool for the management and analysis of emergency situations:
           A systematic literature review
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): María Martínez-Rojas, María del Carmen Pardo-Ferreira, Juan Carlos Rubio-Romero The importance of timely, accurate and effective use of available information is essential to the proper management of emergency situations. In recent years, emerging technologies have provided new approaches towards the distribution and acquisition of crowdsourced information to facilitate situational awareness and management during emergencies. In this regard, internet and social networks have shown potential to be an effective tool in disseminating and obtaining up-to-date information. Among the most popular social networks, research has pointed to Twitter as a source of information that offers valuable real-time data for decision-making. The objective of this paper is to conduct a systematic literature review that provides an overview of the current state of research concerning the use of Twitter to emergencies management, as well as presents the challenges and future research directions.
       
  • The impact of knowledge management processes on information systems: A
           systematic review
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Mostafa Al-Emran, Vitaliy Mezhuyev, Adzhar Kamaludin, Khaled Shaalan Knowledge Management (KM) processes play a significant role in the implementation of various Information Systems (IS). Several review studies were carried out to afford a better understanding of the current research trend of KM processes. However, this issue still needs to be examined from other perspectives. It is observed that previous research neglects the examination of KM processes studies with regard to ISs. The current study systematically reviews and sheds the light on KM processes studies related to ISs aiming to provide a comprehensive analysis of 41 research articles published in peer-reviewed journals from 2001 to 2018. The main findings of this study indicate that knowledge sharing is the most frequent KM process studied, followed by knowledge acquisition and knowledge application. Besides, questionnaire surveys were found to be the primarily relied research methods for data collection in the context of KM processes. In addition, 78% of the analyzed studies registered positive research outcomes. In terms of IS type, most of the analyzed studies focused on investigating the impact of KM processes on E-business systems, knowledge management systems, and IS outsourcing, respectively. Additionally, in terms of data collection, the majority of the analyzed studies were primarily focused on the participants who are IS executives/managers. Furthermore, most of the analyzed studies that achieved positive outcomes were carried out in China. To that end, this review study attempts to demonstrate and detail the recent increase in the interest and the advancement made in KM processes research considering ISs studies, which form an essential reference for scholars in KM field.
       
  • Understanding key skills for information security managers
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Husam Haqaf, Murat Koyuncu Information security management is a necessity for all institutions and enterprises that regard company information as valuable assets. Developing, auditing and managing information security depends upon professional expertise in order to achieve the desired information security governance. This research seeks the key skills required for the position of information security management as well as the methods to develop these skills through professional training programs. The study adopts the Delphi method which requires building a list of items through a literature survey and involves experts with certain expertise to modify the list until a consensus on less than 20% of the items is reached. Through completing three rounds of the Delphi technique - data collection, relevance voting and ranking - sixteen skills are shortlisted as the key skills. In the final list, the majority belong to core information security skills, and the top two skills belong to project/process management skills and risk management skills, indicating the importance of these skills for the information security manager role. In addition, a series of related professional training programs and certifications are surveyed, the outcome of which highlights a number of most comprehensive and appropriate programs to develop these determined skills.
       
  • Developing human resource data risk management in the age of big data
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Thomas Stephen Calvard, Debora Jeske In recent years, a great deal of attention has been devoted to trying to understand the risk challenges that arise in information management, and most recently, challenges that arise due to big data. In this article, the complexities of big data for employers are explored, drawing on a risk management on Human Resources (HR) perspective and normal accident theory (NAT) to illustrate the evolving characteristics of these complexities. The paper concludes with a series of recommendations that focus on education, design in data collection, and risk management, in the hope that these recommendations enable employers to better anticipate and address emerging big data challenges.
       
  • Cloud computing-enabled healthcare opportunities, issues, and
           applications: A systematic review
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Omar Ali, Anup Shrestha, Jeffrey Soar, Samuel Fosso Wamba Cloud computing offers an innovative method of delivering IT services efficiently. Extant literature suggests that cloud technology can enhance the level of services in various industries, including healthcare services. As with any technological innovation, cloud computing should be rigorously evaluated before its widespread adoption. This research study presents a systematic review of scholarly articles of cloud computing in the healthcare sector. We considered 316 articles and filtered down to 88 articles to present a classification framework that has three dimensions: cloud computing-enabled healthcare opportunities, issues, and applications. Implications to future research and practice are highlighted in the areas of value-added healthcare services towards medical decision-making, data security & privacy obligations of cloud service providers, health monitoring features and innovative IT service delivery models using cloud computing.
       
  • Management theory and big data literature: From a review to a research
           agenda
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Paula de Camargo Fiorini, Bruno Michel Roman Pais Seles, Charbel Jose Chiappetta Jabbour, Enzo Barberio Mariano, Ana Beatriz Lopes de Sousa Jabbour •The purpose of this study is to enrich the existing state-of-the-art literature on the impact of big data on business growth by examining how dozens of organizational theories can be applied to enhance the understanding of the effects of big data on organizational performance. While the majority of management disciplines have had research dedicated to the conceptual discussion of how to link a variety of organizational theories to empirically quantified research topics, the body of research into big data so far lacks an academic work capable of systematising the organizational theories supporting big data domain. The three main contributions of this work are: (a) it addresses the application of dozens of organizational theories to big data research; (b) it offers a research agenda on how to link organizational theories to empirical research in big data; and (c) it foresees promising linkages between organizational theories and the effects of big data on organizational performance, with the aim of contributing to further research in this field. This work concludes by presenting implications for researchers and managers, and by highlighting intrinsic limitations of the research.
       
  • Understanding the effect of cloud computing on organizational agility: An
           empirical examination
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Sen Liu, Felix T.S. Chan, Junai Yang, Ben Niu The emergence of cloud computing has significantly changed the model used for existing information technology and enhanced agility of a firm through its pay per use mode. However, few studies have focused on this phenomenon, and prior studies are unclear regarding the impact of cloud computing on organizational agility. Therefore, this study investigates the link between cloud computing and organizational agility based on survey data from users of the Alibaba cloud in China. The empirical analysis is conducted using the partial least squares (PLS) based structural equation modeling with SmartPLS 2.0. We propose that two cloud computing related capabilities (i.e., CI flexibility and CI integration) are critical for firms to improve their agility. Based on the IT—agility contradiction, we analyze the moderating effect of IT spending on cloud computing. This study provides a new perspective for understanding cloud computing technology in practice and theory.
       
  • A health data analytics maturity model for hospitals information systems
    • Abstract: Publication date: Available online 26 July 2018Source: International Journal of Information ManagementAuthor(s): João Vidal Carvalho, Álvaro Rocha, José Vasconcelos, António Abreu In the last five decades, maturity models have been introduced as reference frameworks for Information System (IS) management in organizations within different industries. In the healthcare domain, maturity models have also been used to address a wide variety of challenges and the high demand for hospital IS (HIS) implementations. The increasing volume of data, is exceeded the ability of health organizations to process it for improving clinical and financial efficiencies and quality of care. It is believed that careful and attentive use of Data Analytics in healthcare can transform data into knowledge that can improve patient outcomes and operational efficiency. A maturity model in this conjuncture, is a way of identifying strengths and weaknesses of the HIS maturity and thus, find a way for improvement and evolution. This paper presents a proposal to measure Hospitals Information Systems maturity with regard to Data Analytics. The outcome of this paper is a maturity model, which includes six stages of HIS growth and maturity progression.
       
  • Bring your own device in organizations: Extending the reversed IT adoption
           logic to security paradoxes for CEOs and end users
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Paméla Baillette, Yves Barlette, Aurélie Leclercq-Vandelannoitte This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome' A theoretical analysis is conducted with regard to the concept of the “reversed IT adoption logic” vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.
       
  • A value-justice model of knowledge integration in wikis: The moderating
           role of knowledge equivocality
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Nan Wang, Yongqiang Sun, Xiao-Liang Shen, Xi Zhang The sustainability of Wikis heavily relies on the quality of knowledge that is collaboratively integrated by volunteers. Although the factors influencing one specific knowledge contribution or knowledge-sharing behavior (e.g., adding) have been widely examined, the research on the factors that affect another type of knowledge contribution, i.e., knowledge integration, is still rare. Considering the collaborative nature of knowledge integration, beyond the value-centric logic of knowledge contribution, we propose a value-justice model of knowledge integration. We further identify the boundary conditions under which the proposed value-justice model works by investigating the moderating role of knowledge equivocality. A survey was conducted in a well-known Wiki-based website in China, namely, Baidu Baike, to test the research model and hypotheses. Our results show that both perceived justice and perceived value influence knowledge integration, which in turn affects knowledge quality, and knowledge equivocality strengthens the relationship between perceived justice / perceived value and knowledge integration and the relationship between knowledge integration and knowledge quality. Implications for research and practice are also discussed.
       
  • “Technology enabled Health” – Insights from twitter analytics with a
           socio-technical perspective
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Purva Grover, Arpan Kumar Kar, Gareth Davies Technology had been used in health domain for various purposes such as for storing electronic health records; monitoring; education; communication; and for behavioural tracking. The evident benefits have triggered a huge amount of discussions surrounding health technology in the web 3.0 space and users around the globe are sharing their experiences and perspective on social media platforms. Social media had been used for creating awareness, sharing information and providing emotional support to public in different diseases. This study focuses on exploring the health technology related discussions in Twitter. For this study around 105,489 tweets were collected from Twitter by 15,587 unique users. These tweets were analysed through social media analytics approaches (i.e. CUP framework). The study presents the top technologies in health domain through hashtag analysis and top diseases (acute, chronic, communicable and non-communicable) through word analysis and their association through co-occurrence of words within the tweets. The association depicts technology had been used in treating, identifying and heeling of the various diseases. The discussion on social media is skewed towards computing algorithms. The acute and chronic diseases were discussed on social media, and our study indicates that statistically, there is no difference in the discussion of acute and chronic diseases. The communicable and non-communicable diseases are also discussed on social media, and our study indicates no statistically difference in the discussion of communicable and non-communicable diseases which signifies users are referring to Twitter for discussing various type of diseases irrespective of acute, chronic, communicable and non-communicable diseases. Future researchers can use the study as the evidence of extracting insights related to socio-technical perspective from Twitter data. The literature contains lot of evidences where technology had been useful in health domain, but the bigger picture of how the various technologies are being related to health domain is missing, therefore this study tries to contribute to this area by mining tweets.
       
  • An overview of assessing the quality of peer review reports of scientific
           articles
    • Abstract: Publication date: Available online 20 July 2018Source: International Journal of Information ManagementAuthor(s): Amanda Sizo, Adriano Lino, Luis Paulo Reis, Álvaro Rocha Assuring the quality control of publications in the scientific literature is one of the main challenges of the peer review process. Consequently, there has been an increasing demand for computing solutions that will help to maintain the quality of this process. Recently, the use of Artificial Intelligence techniques has been highlighted, applied in the detection of plagiarism, bias, among other functions. The assessment of the reviewer’s review has also been considered as important in the process, but, little is known about it, for instance, which techniques have been applied in this assessment or which criteria have been assessed. Therefore, this systematic literature review aims to find evidence regarding the computational approaches that have been used to evaluate reviewers' reports. In order to achieve this, five online databases were selected, from which 72 articles were identified that met the inclusion criteria of this review, all of which have been published since 2000. The result returned 10 relevant studies meeting the evaluation requirements of scientific article reviews. The review revealed that mechanisms to rank review reports according to a score, as well as the word analysis, are the most common tools, and that there is no consensus on quality criteria. The systematic literature review has shown that reviewers’ report assessment is a valid tool for maintaining quality throughout the process. However, it still needs to be further developed if it is to be used as a resource which surpass a single conference or journal, making the peer review process more rigorous and less based on random choice.
       
  • Examining the core knowledge on facebook
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Wen-Lung Shiau, Yogesh K. Dwivedi, He-Hong Lai Social networks have become an indispensable activity in people’s lives. A number of previous studies have investigated various social networks and probed in the core knowledge of integrated social networks. While social network knowledge is general and extensive, few studies have delved into the core knowledge of individual social networks, especially Facebook, which is a social network with over 1.7 billion users worldwide. Therefore, this study aimed to elaborate on the core knowledge of Facebook. In this study, a total of 4429 relevant academic papers were collected from the Web of Science, an online electronic database. Then, citation analysis and co-citation analysis were adopted to identify 50 highly cited academic papers to form a co-citation matrix. Finally, cluster analysis and multi-dimensional scaling analysis were employed to determine the core knowledge of Facebook. The research results showed that there are six points of core knowledge: (1) the behavior analysis of users; (2) the social impact of social networks; (3) the influence and application of Facebook in universities; (4) the evaluation of use motivation and theoretical models; (5) privacy risk and interpersonal impression; and (6) the strategies of social networks. The research results could be useful for academic studies and practice in the future.
       
  • Online learning: Adoption, continuance, and learning outcome—A
           review of literature
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Ritanjali Panigrahi, Praveen Ranjan Srivastava, Dheeraj Sharma The use of Technology to facilitate better learning and training is gaining momentum worldwide, reducing the temporal and spatial problems associated with traditional learning. Despite its several benefits, retaining students in online platforms is challenging. Through a literature review of the factors affecting adoption, the continuation of technology use, and learning outcomes, this paper discusses an integration of online learning with virtual communities to foster student engagement for obtaining better learning outcomes. Future directions have been discussed, the feedback mechanism which is an antecedent of students’ continuation intention has a lot of scopes to be studied in the virtual community context. The use of Apps in m-learning and the use of cloud services can boost the ease and access of online learning to users and organizations.
       
  • Incorporating polarity of relationships in ISM and TISM for theory
           building in information and organization management
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Sushil Some mapping methods are used for the conceptualization of theories in information and organization management which may help in modeling both feedback and hierarchical structures. Total Interpretive Structural Modelling (TISM) is an enhancement of interpretive structural modeling (ISM) to explore hierarchical models that aid in theory building in information and organization management. It is based on pair comparison method to generate a hierarchical digraph, which is then translated into the interpretive model by interpreting both nodes and links in the digraph. The relationships in both ISM and TISM could be binary or fuzzy. However, a missing dimension of these structural models is the polarity or direction of relationships. A relationship between a pair of elements could be having positive or negative polarity. This aspect has been widely used in the feedback structures as causal influence diagrams (CIDs) in system dynamics methodology. This paper is using the learning from CIDs to introduce polarity of relationships in ISM and TISM. The polarity of relationships will further refine ISM/TISM as a more explanatory model for theory building. This enhanced model not only provides hypothesis formulation simply as a driver-dependence relationship but also addresses whether the driving variable(s) will influence the dependent variable positively or negatively. The paper illustrates modified TISM process incorporating polarity with an example in the context of information and organizational change management and discusses the nuances of such an enhanced model.
       
  • An investigation of relationships among privacy concerns, affective
           responses, and coping behaviors in location-based services
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Yoonhyuk Jung, Jonghwa Park Although information privacy has been extensively investigated in the information systems discipline, research heavily focuses on cognitive frameworks and underestimates the influence of affect on users’ privacy behaviors. Psychological literature demonstrates that affect plays a significant role in individuals’ decisions in risky situations. This study aims to explore associations between cognitive factors, affective responses, and coping behaviors in the context of privacy threats. For this purpose, we conducted a laddering interview with 56 users of location-based services. Elements elicited by an emerging coding procedure were mapped by their causal relations as described in interviews. The results revealed idiosyncratic associations among privacy concerns, affects, and coping behaviors, which implies that privacy concerns can result in different coping behaviors according to the affects following the concern. Thus, the result suggests that cognition-affect appraisals can offer a reliable framework for explaining users’ privacy behaviors. This study proposes a new direction for the cognition-affect perspective in information privacy research by providing an alternative approach that reflects both cognition and affects to explain coping behaviors.
       
  • Affordances for sharing domain-specific and complex knowledge on
           enterprise social media
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): L.G. Pee Many organizations have implemented enterprise social media (ESM) to better connect employees and promote knowledge sharing. Prior studies indicate that employees often use ESM to access knowledge in other domains or complex knowledge. But connecting employees is only part of the picture – while ESM offer the possibility of accessing domain specific and complex knowledge, the flow of such knowledge might remain inhibited by the perceived effort required to codify them for sharing. This study identifies salient ESM affordances that can alleviate the perceived effort of sharing domain-specific and complex knowledge. Results of a survey of 303 employees working in organizations using ESM indicate that domain-specific knowledge is perceived as less effortful to codify when the affordance of visibility is strong (i.e., the affordance negatively moderates the positive relationship between knowledge specificity and perceived codification effort), and complex knowledge is perceived as less effortful to codify when the affordances of association and editability are strong. These findings indicate that it is necessary to consider both knowledge attributes and ESM affordances and their interactions when understanding knowledge sharing using ESM.
       
  • An m-health application for cerebral stroke detection and monitoring using
           cloud services
    • Abstract: Publication date: Available online 30 June 2018Source: International Journal of Information ManagementAuthor(s): Laura García, Jesús Tomás, Lorena Parra, Jaime Lloret Over 25 million people suffered from cerebral strokes in a span of 23 years. Many systems are being developed to monitor and improve the life of patients that suffer from different diseases. However, solutions for cerebral strokes are hard to find. Moreover, due to their widespread utilization, smartphones have presented themselves as the most appropriate devices for many e-health systems. In this paper, we propose a cerebral stroke detection solution that employs the cloud to store and analyze data in order to provide statistics to public institutions. Moreover, the prototype of the application is presented. The three most important symptoms of cerebral strokes were considered to develop the tasks that are conducted. Thus, the first task detects smiles, the second task employs voice recognition to determine if a sentence is repeated correctly and, the third task determines if the arms can be raised. Several tests were performed in order to verify the application. Results show its ability to determine whether users have the symptoms of cerebral stroke or not.
       
  • Deep gesture interaction for augmented anatomy learning
    • Abstract: Publication date: Available online 28 March 2018Source: International Journal of Information ManagementAuthor(s): Ahmad Karambakhsh, Aouaidjia Kamel, Bin Sheng, Ping Li, Po Yang, David Dagan Feng Augmented reality is very useful in medical education because of the problem of having body organs in a regular classroom. In this paper, we propose to apply augmented reality to improve the way of teaching in medical schools and institutes. We propose a novel convolutional neural network (CNN) for gesture recognition, which recognizes the human's gestures as a certain instruction. We use augmented reality technology for anatomy learning, which simulates the scenarios where students can learn Anatomy with HoloLens instead of rare specimens. We have used the mesh reconstruction to reconstruct the 3D specimens. A user interface featured augment reality has been designed which fits the common process of anatomy learning. To improve the interaction services, we have applied gestures as an input source and improve the accuracy of gestures recognition by an updated deep convolutional neural network. Our proposed learning method includes many separated train procedures using cloud computing. Each train model and its related inputs have been sent to our cloud and the results are returned to the server. The suggested cloud includes windows and android devices, which are able to install deep convolutional learning libraries. Compared with previous gesture recognition, our approach is not only more accurate but also has more potential for adding new gestures. Furthermore, we have shown that neural networks can be combined with augmented reality as a rising field, and the great potential of augmented reality and neural networks to be employed for medical learning and education systems.
       
  • Business analytics use in CRM: A nomological net from IT competence to CRM
           performance
    • Abstract: Publication date: Available online 1 February 2018Source: International Journal of Information ManagementAuthor(s): Dalwoo Nam, Junyeong Lee, Heeseok Lee Business analytics (BA) becomes increasingly important under rapidly changing business environment. A research challenge is that BA use is not fully understood. We tackle this challenge from the perspective of dynamic capability by using an empirical model with the emphasis on BA use in customer relationship management (CRM). Based on 170 samples from firm-level survey, we analyze the nomological linkage from IT competence to CRM performance. The results show data management capability fully mediates between IT competence and BA use, while customer response capability partially mediates between BA use and CRM performance.
       
  • Making a case for speech analytics to improve customer service quality:
           Vision, implementation, and evaluation
    • Abstract: Publication date: Available online 10 January 2018Source: International Journal of Information ManagementAuthor(s): Scott Scheidt, Q.B. Chung Firms operating in highly competitive markets must find ways to deliver customer value beyond offering competitive prices. Providing superior customer service in such environments becomes a strategic initiative because it can create a competitive advantage by fostering customer loyalty, which can also help ease pressure on profit margins and secure continued revenue flow. In this case study we report a case of utilizing speech analytics to improve customer service quality at a call center of a pharmaceutical supply chain service provider in the U.S. We first describe the strategic rationale behind enhancing customer service quality, followed by the implementation of a quality management program using a novel approach of speech analytics. We then present a longitudinal study that evaluated customer service performance using the data gathered from a team of 120 customer service agents during an 8-month period. Two categories of key performance indicators were established and measured, namely “workforce management” metrics and “customer experience” metrics, which served as the primary indicators in the analysis of the level of success in attaining three strategically identified performance goals to improve customer service quality.
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.224.247.42
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-