Journal Cover International Journal of Information Management
  [SJR: 1.173]   [H-I: 67]   [236 followers]  Follow
    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
   ISSN (Print) 0268-4012
   Published by Elsevier Homepage  [3089 journals]
  • Developing and validating a technology upgrade model
    • Authors: Yu-Yin Wang; Yi-Shun Wang; Tung-Ching Lin
      Pages: 7 - 26
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Yu-Yin Wang, Yi-Shun Wang, Tung-Ching Lin
      While prior research has recognized users’ upgrading behavior as a key to successful tech-innovation adoption, few studies have investigated the determinants of the behavioral intention to upgrade. The current paper bridges this gap through an exploration of upgrade intentions that incorporates the status quo bias (SQB) theory with Warshaw’s purchase intention model (PIM). Data collected from 213 system users was analyzed using partial least squares (PLS). The results show that perceived need (positively) and inertia (negatively) influenced users’ behavioral intentions to upgrade to a new generation system. The indirect effects of inertia mediated the impact of incumbent system habit, procedural switching costs, and benefit loss costs on the behavioral intention to upgrade. In addition, perceived need mediated the impacts of procedural switching costs, benefit loss costs, and social norms on the behavioral intention to upgrade. Finally, inertia significantly weakened the positive relationship between perceived need and behavioral intention to upgrade. Based on these findings, this study proposed a theoretical framework of a technology upgrade model (TUM) and provided valuable information to both academics and practitioners that is highly pertinent to understanding IT upgrading behaviors.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.07.003
       
  • Information Communication Technology (ICT) use among PLHIV in China: A
           promising but underutilized venue for HIV prevention and care
    • Authors: Yao Zhang; Xiaoming Li; Shan Qiao; Yuejiao Zhou; Zhiyong Shen
      Pages: 27 - 33
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Yao Zhang, Xiaoming Li, Shan Qiao, Yuejiao Zhou, Zhiyong Shen
      In this paper, we report the use of information and communication technology (ICT) among people living with HIV (PLHIV) in Guangxi, China. A total 2987 participants were recruited from 12 sites with the highest number of cumulative HIV incidence, including 2 cities and 10 counties. A questionnaire survey was conducted to collect data on the participants’ social demographic characteristics, clinical outcomes, infections and coinfections, pattern of ICT use, and use and intention of using ICT in HIV and AIDS management. The data was analyzed using SPSS, version 24. The results showed 78.7% (n=2347) never used a computer, 86.9% (n=2587) had a cellphone, 32.7% (n=207) owned an email account, and 85.4% (n=544) owned a social media account. Less than half of the participants reported ever using ICTs for HIV management. Only 26.2% (n=266) were willing to join a web-based HIV prevention program. Findings of this study suggest that there was an imbalance in the participants’ ICT device ownership and choices of media platform. Social media appeared to be a potential platform for health intervention among this group. There was a low penetration of computer use among rural participants and a large disparity between the urban and rural participants, which indicated a need to expand the current infrastructure related to ICTs and increase people’s health literacy. Future research also needs to pay attention to security and trustworthiness of the intervention program to better promote ICTs as an efficient and reliable platform for HIV prevention and care.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.09.003
       
  • Characterizing information propagation patterns in emergencies: A case
           study with Yiliang Earthquake
    • Authors: Lifang Li; Qingpeng Zhang; Jun Tian; Haolin Wang
      Pages: 34 - 41
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Lifang Li, Qingpeng Zhang, Jun Tian, Haolin Wang
      Social media has been playing an increasingly important role in information publishing and event monitoring in emergencies like natural disasters. The propagation of different types of information on social media is critical in understanding the reaction and mobility of social media users during natural disasters. In this research, we analyzed the dynamic social networks formed by the reposting (retweeting) behaviors in Weibo.com (the major microblog service in China) during Yiliang Earthquake. We developed a Multinomial Naïve Bayes Classifier to categorize the microblog posts into five types based on the content, and then characterized the information propagation patterns of the five types of information at different stages after the earthquake occurred. We found that the type of information has significant influence on the propagation patterns in terms of scale and topological features. This research revealed the important role of information type in the publicity and propagation of disaster-related information, thus generated data-driven insights for timely and efficient emergency management using the publicly available social media data.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.08.008
       
  • Analyze encryption and public key infrastructure (PKI)
    • Authors: Vincent Lozupone
      Pages: 42 - 44
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Vincent Lozupone
      The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.08.004
       
  • A framework for evaluating the analytic maturity of an organization
    • Authors: Robert L. Grossman
      Pages: 45 - 51
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Robert L. Grossman
      We introduce a framework called the Analytic Processes Maturity Model (APMM) for evaluating the analytic maturity of an organization. The APMM identifies analytic-related processes in six key process areas: i) building analytic models; ii) deploying analytic models; iii) managing and operating analytic infrastructure; iv) protecting analytic assets through appropriate policies and procedures; v) operating an analytic governance structure; and vi) identifying analytic opportunities, making decisions, and allocating resources based upon an analytic strategy. Based upon the maturity of these processes, the APMM divides organizations into five maturity levels: 1) organizations that can build reports; 2) organizations that can build and deploy models; 3) organizations that have repeatable processes for building and deploying analytics; 4) organizations that have consistent enterprise-wide processes for analytics; and 5) enterprises whose analytics is strategy driven. The APMM is broadly based upon the Capability Maturity Model that is the basis for measuring the maturity of processes for developing software.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.08.005
       
  • Improving the agility of employees through enterprise social media: The
           mediating role of psychological conditions
    • Authors: Zhao Cai; Qian Huang; Hefu Liu; Xiaoyan Wang
      Pages: 52 - 63
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Zhao Cai, Qian Huang, Hefu Liu, Xiaoyan Wang
      Enterprise social media (ESM) is an emerging platform that can help employees handle uncertainties. This study examines whether and how ESM usage is positively associated with agility performance (i.e., proactivity, adaptability, and resilience). Drawing on Kahn’s framework, this study investigates the mediating effects of psychological conditions (i.e., psychological meaningfulness, psychological availability, and psychological safety). Through data collected from 167 employees who adopted ESM in the workplace, the current research validates most of the proposed hypotheses on mediating effects. It specifically validates the following claims: (1) psychological availability mediates the relationships between ESM usage and the three dimensions of agility performance; (2) psychological meaningfulness mediates the link between ESM usage and proactivity; and (3) the associations of ESM usage with proactivity and adaptability are significantly mediated by psychological safety. This study contributes to extant ESM literature through incorporating Kahn’s framework in investigating the role of ESM and suggesting that managers enhance employees’ psychological conditions in order to realize the value of ESM.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.09.001
       
  • Understanding mandatory IS use behavior: How outcome expectations affect
           conative IS use
    • Authors: Kee-Young Kwahk; Hyunchul Ahn; Young U. Ryu
      Pages: 64 - 76
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Kee-Young Kwahk, Hyunchul Ahn, Young U. Ryu
      Implementing enterprise systems (ES) suffers from a high failure rate despite their promised benefits. A commonly cited reason for ES implementation failures in the context of mandatory use is end users’ unwillingness to adopt or use systems or their sabotage thereof. Considering that expectations toward using newly implemented systems may promote positive user behavior, we examine the effects of outcome expectations on information systems (IS) use activity from the viewpoint of social cognitive theory. In addition, we propose a new surrogate variable for IS use activity in the mandatory use context, conative IS use, which is conceptualized as a second-order aggregate construct comprising three dimensions: immersion, reinvention, and learning. Conative IS use here refers to IS use that is proactively motivated by intentional and personal causes. The empirical results, based on data collected from 208 ES users, are found to support the conceptualization of the proposed variable. They also reveal that conative IS use is positively affected by outcome expectations. The findings of this study thus imply that the appropriate management of expectations may promote IS use behavior in the mandatory use context.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.07.001
       
  • National culture and consumer trust in e-commerce
    • Authors: Heli Hallikainen; Tommi Laukkanen
      Pages: 97 - 106
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Heli Hallikainen, Tommi Laukkanen
      This study uses Hofstede’s cultural dimensions theory to explain variance in consumer trust in e-commerce. We model trust as a combination of a consumer’s disposition to trust and context specific trustworthiness of an online store. The study hypothesizes direct effects of national cultural dimensions on disposition to trust, and of disposition to trust on dimensions of trustworthiness. We also examine whether and how disposition to trust mediates the effects between national culture and trustworthiness of an online store. We test the hypotheses with a sample of 616 online bookstore customers from China and Finland, countries that represent opposite cultural poles in many respects. We find that national culture solely explain 23% of the variance in the consumer’s general disposition to trust, and that disposition to trust is a highly significant predictor of the perceived trustworthiness of an online store. We further find that the mediating role of disposition to trust between national culture and trustworthiness depends greatly on the individual cultural dimension studied.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.07.002
       
  • Search engine marketing is not all gold: Insights from Twitter and
           SEOClerks
    • Authors: Reema Aswani; Arpan Kumar Kar; P. Vigneswara Ilavarasan; Yogesh K. Dwivedi
      Pages: 107 - 116
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Reema Aswani, Arpan Kumar Kar, P. Vigneswara Ilavarasan, Yogesh K. Dwivedi
      The study highlights how digital marketing is often detrimental, when it is done by unskilled service providers. It highlights how the hyped services of search engine marketing (SEM) are not as successful as they seem to be and sometimes affect firms negatively. This study uses social media analytics to derive insights from Twitter using descriptive, content and network analytics. Methods like hashtag analysis, polarity and emotion analysis, word analysis, topic modeling and other relevant approaches have been used to mine user generated content. A qualitative case study on an e-market is used for validation of findings. SEM services provided by small organizations and freelancers are not as beneficial as the ones by established players. The services provided by these firms proved detrimental for the customers based on user experiences surrounding these services in the social media and forum specific discussions. This study highlights how SEM often not only fails to provide benefits but also destructs value if not done properly. Transaction costs like agency problems, coordination costs, loss of non-contractible value and cost of fit are also identified with potential fallouts which affect the long-term benefits. Inputs will be beneficial to practice in planning SEM and outsourcing.

      PubDate: 2017-09-26T09:31:12Z
      DOI: 10.1016/j.ijinfomgt.2017.07.005
       
  • Understanding the role of interpersonal identification in online review
           evaluation: An information processing perspective
    • Authors: Joshua M. Davis; Deepti Agrawal
      Pages: 140 - 149
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Joshua M. Davis, Deepti Agrawal
      While the proliferation of online reviews has increased consumers’ access to resources for informing the purchase decision, it has also substantially increased the cognitive effort required for finding personally relevant information through this channel. In the face of this challenge, an increasingly valuable capability of online review platforms relates to delivering the right reviews to the right consumer at the right time. Many platforms have sought to develop this capability by leveraging generic review characteristics like recency and valence, or crowd-level performance metrics like helpfulness score. While useful, these approaches may be overlooking important individual-to-individual (dyadic) social mechanisms that underpin review evaluation and selection. In an effort to inform the development of more robust information management capabilities of online review platforms, we introduce and test a model that highlights the influence of dyadic social information processing in online review evaluation. Results from model testing support most of the hypotheses and reveal important social selection mechanisms consumers employ in this context, which could be leveraged to add additional value through online review platforms.

      PubDate: 2017-10-04T09:57:22Z
      DOI: 10.1016/j.ijinfomgt.2017.08.001
       
  • The role of online product recommendations on customer decision making and
           loyalty in social shopping communities
    • Authors: Hong Zhang; Ling Zhao; Sumeet Gupta
      Pages: 150 - 166
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Hong Zhang, Ling Zhao, Sumeet Gupta
      Online product recommendation (OPR) provided by product recommender systems as well as consumers is a crucial service in social shopping communities (SSCs) for improving consumers’ shopping experience and fostering long-term relationships. However, little is understood about how these two sources of recommendations influence consumers' decision-making and their implications for customer loyalty. This study develops a model to examine how the positive (enablers) and negative (inhibitors) factors of OPR’s quality influence consumer decision process, and how the decision process ultimately influences customer loyalty. The results indicate that consumer product screening cost and decision-making quality significantly influence customer loyalty. Consumer product screening cost is negatively associated with self reference and positively associated with deceptiveness and information overload. Product evaluation cost is positively affected by self reference, deceptiveness and information overload and negatively affected by vividness. And consumer decision-making quality is positively associated with self reference and negatively associated with deceptiveness and information overload. Consumer product screening cost and product evaluation cost are comparatively more negatively influenced by inhibitors than enablers. Moreover, UGC level plays a negative moderating role on the relationships between product screening cost and customer loyalty, and between product evaluation cost and customer loyalty.

      PubDate: 2017-10-11T18:03:11Z
      DOI: 10.1016/j.ijinfomgt.2017.07.006
       
  • Big data technologies: An empirical investigation on their adoption,
           benefits and risks for companies
    • Authors: Elisabetta Raguseo
      Pages: 187 - 195
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Elisabetta Raguseo
      Companies currently have to deal with profound changes in the way they manage their business, their customers and their business models, since they are overrun by a data-driven revolution in management. This revolution is due to the wide availability of big data and the fast evolution of big data technologies. Big data is recognized as one of the most important areas of future technology, and is fast gaining the attention of many industries, since it can provide high value to companies. This article investigates the adoption levels of big data technologies in companies, and the big data sources used by them. This article also points out the most frequently recognized strategic, transactional, transformational and informational benefits and risks related to the usage of big data technologies by companies. In order to achieve these aims, the paper looks at the differences that exist among companies of different sizes, by comparing medium-sized and large companies, and the differences among companies of different industrial sectors. It provides evidence that only in a few cases these differences are significant. This study could serve as a reference for managers who wish to initiate an evaluation cycle on the adoption and usage of big data technologies.

      PubDate: 2017-10-18T08:42:06Z
      DOI: 10.1016/j.ijinfomgt.2017.07.008
       
  • Data quality challenges in the UK social housing sector
    • Authors: Caroline Duvier; Daniel Neagu; Crina Oltean-Dumbrava; Dave Dickens
      Pages: 196 - 200
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Caroline Duvier, Daniel Neagu, Crina Oltean-Dumbrava, Dave Dickens
      The social housing sector has yet to realise the potential of high data quality. While other businesses, mainly in the private sector, reap the benefits of data quality, the social housing sector seems paralysed, as it is still struggling with recent government regulations and steep revenue reduction. This paper offers a succinct review of relevant literature on data quality and how it relates to social housing. The Housing and Development Board in Singapore offers a great example on how to integrate data quality initiatives in the social housing sector. Taking this example, the research presented in this paper is extrapolating cross-disciplinarily recommendations on how to implement data quality initiatives in social housing providers in the UK.

      PubDate: 2017-10-18T08:42:06Z
      DOI: 10.1016/j.ijinfomgt.2017.09.008
       
  • Assessing web sites quality: A systematic literature review by text and
           association rules mining
    • Authors: Rim Rekik; Ilhem Kallel; Jorge Casillas; Adel M. Alimi
      Pages: 201 - 216
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Rim Rekik, Ilhem Kallel, Jorge Casillas, Adel M. Alimi
      Nowadays society is deeply affected by web content. A web site, regardless of its category, can provide or not for users their needs. To identify its strengths and weaknesses, a process of analyzing and assessing its quality, via some criteria, is necessary. Assessing web sites is considered as a Multiple Criteria Decision Making problem (MCDM), with a massive number of criteria; a reduction phase is needed. This paper presents, firstly a Systematic Literature Review (SLR) to identify the purposes of recent researches from the assessment and determine the affected categories; secondly, it proposes a process of collecting and extracting data (criteria featuring web sites) from a list of studies. Text mining is applied for this SLR to construct a dataset. Then, a method based on Apriori algorithm is assigned and implemented to find association rules between criteria and the category of the web site, and to get a set of frequent criteria. This paper also presents a review on soft computing assessing methods. It aims to help the research community to have a scope in existing research and to derive future developments. The obtained results motivate us to further probe datasets and association rule mining.

      PubDate: 2017-10-18T08:42:06Z
      DOI: 10.1016/j.ijinfomgt.2017.06.007
       
  • Rival precedence and open platform adoption: An empirical analysis
    • Authors: Seonyoung Shim; Byungtae Lee; Sojung Lucia Kim
      Pages: 217 - 231
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Seonyoung Shim, Byungtae Lee, Sojung Lucia Kim
      Herding in open platform adoption decisions appears to prevail even when the systems adopted represent high risks with enterprise-wide impact. We present a model of organizational open platform adoption that integrates six different theoretical mechanisms based on a technology-organization-environment framework that drives herding: network effect benefits, new platform benefits, new platform risk, organizational learning, mimetic pressures, and competitive pressures. To find which mechanisms work significantly in organizational IT decision-making in accordance with IT diffusion and rival precedence, we empirically test the model by splitting the samples according to the proportion of rivals that have already adopted innovations. The empirical results demonstrate that among the six herding mechanisms, new platform risk and organizational learning drives herding in the earlier stage of diffusion and new platform benefits and competitive pressure drives herding in the later stage of diffusion. The results imply that organizations react conservatively to new platforms when they perceive less platform diffusion. However, as diffusion increases, organizations react more strategically to maintain competitive parity with rivals by imitating rival decisions.

      PubDate: 2017-10-25T20:12:56Z
      DOI: 10.1016/j.ijinfomgt.2017.10.001
       
  • Impact of online gamers’ personality traits on interdependence, network
           convergence, and continuance intention: Perspective of social exchange
           theory
    • Authors: Han-Chung Huang; T.C.E. Cheng; Wei-Fan Huang; Ching-I Teng
      Pages: 232 - 242
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Han-Chung Huang, T.C.E. Cheng, Wei-Fan Huang, Ching-I Teng
      Interdependence and network convergence among users characterize strong online social networks and fuel continuance intention. However, little is known about what personality traits are related to interdependence and network convergence. This study answers this question by utilizing social exchange theory to develop the hypotheses. We survey 2212 online gamers and analyse the data with structural equation modelling. We find that extraversion and openness are positively related to interdependence and network convergence, while conscientiousness is negatively related to interdependence and network convergence. Moreover, agreeableness is positively related to interdependence, while neuroticism is negatively related to interdependence. Finally, both interdependence and network convergence are positively related to continuance intention. This study is the first to examine how personality traits are related to interdependence and network convergence, which fuel continuance intention of online gamers.

      PubDate: 2017-11-03T02:35:22Z
      DOI: 10.1016/j.ijinfomgt.2017.08.009
       
  • An empirical investigation on knowledge use in virtual communities–A
           relationship development perspective
    • Authors: Shih-Wei Chou; Chia-Shiang Hsu
      Pages: 243 - 255
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Shih-Wei Chou, Chia-Shiang Hsu


      PubDate: 2017-11-03T02:35:22Z
      DOI: 10.1016/j.ijinfomgt.2017.10.003
       
  • Untangling the relationship between surveillance concerns and
           acceptability
    • Authors: Taewoo Nam
      Pages: 262 - 269
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Taewoo Nam
      In this study, a two-stage least squares regression analysis of data from the Pew Research Center’s Privacy Panel Survey sought to untangle the relationships among surveillance concern, its antecedents, and the acceptability of surveillance as an attitudinal outcome. The analysis assumes the endogeneity of surveillance concerns, drawing from theoretical arguments. Surveillance concerns, as predicted by empirical antecedents (perception of privacy control, past negative experiences, surveillance awareness, and information sensitivity), significantly influence surveillance acceptability. Significant exogenous determinants of surveillance acceptability include perceived public benefit and self-identified ideological stance.

      PubDate: 2017-11-03T02:35:22Z
      DOI: 10.1016/j.ijinfomgt.2017.10.007
       
  • Engaging in knowledge exchange: The instrumental psychological ownership
           in open innovation communities
    • Authors: Henri Pirkkalainen; Jan M. Pawlowski; Markus Bick; Anne-Christin Tannhäuser
      Pages: 277 - 287
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Henri Pirkkalainen, Jan M. Pawlowski, Markus Bick, Anne-Christin Tannhäuser
      Online communities have become a vital channel for professionals to expand their networks and initiate new strategic collaborations. Such online behaviors have led to multiple types of innovation potential that are based on the co-creation of ideas toward new solutions. Yet, very little is known about the role of psychological ownership of knowledge in professionals’ knowledge exchange in these communities that are based on voluntary contributions. We apply the psychological ownership theory and posit that psychological ownership of knowledge is instrumental to increased knowledge exchange intentions of professionals. Informed by the theory, our model incorporates several enablers of online engagement which could be associated with psychological ownership. Our exploratory quantitative study evidences that perceived ownership of knowledge plays a critical instrumental role in idea exchange behavior. We evidence how personal outcome expectations, organizational innovativeness and affective community commitment are associated with psychological ownership of knowledge which is an important predictor of intentions to exchange knowledge in open innovation communities. Implications for theory and practice are discussed.

      PubDate: 2017-11-10T03:10:34Z
      DOI: 10.1016/j.ijinfomgt.2017.09.006
       
  • Predicting service industry performance using decision tree analysis
    • Authors: Benjamin Yeo; Delvin Grant
      Pages: 288 - 300
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Benjamin Yeo, Delvin Grant
      Using global industry data on service industries from the World Bank, we investigated the impact of ICTs within the financial context, on service industry performance. This is motivated by the lack of consensus on the impact of ICTs at the industry level of analysis, and insufficient attention given to service industries. Our decision tree analysis is framed by the Technology, Organization, and Environment (TOE) framework. We discover that financial factors are better predictors than ICTs on service industry performance. Access to loans and lines of credit was the strongest predictor. It is often assumed that websites expand markets and increase revenues, but we found that they negatively affect sales revenue growth in Africa and Eastern Europe. These findings help companies and policy makers understand that ICTs alone are insufficient to improve service industry performance. Our findings lead to theoretical contributions in the form of nine hypotheses for future research.

      PubDate: 2017-11-10T03:10:34Z
      DOI: 10.1016/j.ijinfomgt.2017.10.002
       
  • Misreading of consumer dissatisfaction in online product reviews: Writing
           style as a cause for bias
    • Authors: Michael Antioco; Kristof Coussement
      Pages: 301 - 310
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Michael Antioco, Kristof Coussement
      This study improves our understanding of managers’ misreading of negative online reviews. Our findings are derived from a sample of 1014 written online reviews and 507 experienced marketing managers. By building on the judgment-bias literature and psychometric language-style analysis, we find several key results that can ultimately contribute to more effective information management for marketing decisions. Managers tend to better interpret negative reviews when consumers use more cognitive language markers in the form of insight and discrepancy words and more third-person pronouns (i.e., undefined social referents) in their reviews. The inverse relationship exists for the use of causality words and future tenses (i.e., behavioral intentions), as managers tend to underestimate the gravity of the situation under these conditions. Expressions of positive and negative emotions in reviews do not significantly affect managers’ readings of negative reviews. Furthermore, more experienced managers and female managers are better at identifying negative reviews, and longer consumer reviews make it more difficult for managers to correctly identify negative reviews.

      PubDate: 2017-11-10T03:10:34Z
      DOI: 10.1016/j.ijinfomgt.2017.10.009
       
  • The process of Technology Leapfrogging: Case analysis of the national ICT
           infrastructure development journey of Azerbaijan
    • Authors: Barney Tan; Evelyn Ng; Junhui Jiang
      Pages: 311 - 316
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Barney Tan, Evelyn Ng, Junhui Jiang
      Technology Leapfrogging is one of the most cost efficient and effective ways for developing countries to attain an advanced state of ICT development and connectivity. And yet, despite its numerous benefits, there is currently little research on the process of Technology Leapfrogging. To address this knowledge gap, we conducted a case study of the national ICT infrastructure development journey of Azerbaijan, one of the top developing countries in the world in terms of ICT connectivity and development. With an in-depth exploration of how Azerbaijan charted the overall direction of ICT development, as well as the specific initiatives implemented in the areas of infrastructure development, e-government, information management and security, business and entrepreneurship, and research and education, a process model of Technology Leapfrogging was then inductively derived. More specifically, our study reveals that ICT development in Azerbaijan unfolded as a “stage-skipping” variant of Technology Leapfrogging that consists of four stages: (1) Psyching, (2) Planting, (3) Propelling and (4) Perpetuating. Analogous to the mechanics of a physical leapfrog, traversing the four stages enabled Azerbaijan to achieve an advanced state of ICT connectivity quickly and cost effectively in spite of its limited resources, which served to generate a variety of economic and social benefits for the country.

      PubDate: 2017-11-17T07:45:36Z
      DOI: 10.1016/j.ijinfomgt.2017.10.008
       
  • GAWA – Manager for accessibility Wayfinding apps
    • Authors: M.C. Rodriguez-Sanchez; Juan Martinez-Romo
      Pages: 505 - 519
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): M.C. Rodriguez-Sanchez, Juan Martinez-Romo
      With this work, we propose and validate a new service system in the context of Wayfinding services to improve the SmartCities mechanism: smart mobility, smart people, smart governance and smart living services. Steering and navigation tasks through an environment constitute an essential activity in our daily lives. They have a high degree of practical value in a variety of domains, such as public area design, architectural Wayfinding, geo-positioning and navigation, as well as urban planning and environmental design. At times, people with a visual impairment may also have problems in navigating autonomously and without personal assistance, especially in unknown environments (outdoor and indoor) using a smartphone. There could also be emergency situations in which the receiving of information in real time could be crucial. People with motor disabilities usually need information to avoid environments with obstacles, to arrive at a target or to manage touchscreens in daily activities and different environments. The use of landmarks is therefore vitally important in human navigation. Wayfinding systems must change, given that according to the United Nations (UN) Development Program, people with a disability represent around 10% of the world’s population, which is approximately 650 million people. Additionally, according to the World Health Organization, the world’s population of people 60 years of age and older has doubled since 1980 and is predicted to reach 2 billion by 2050. Most Wayfinding applications in the Smartphone market suffer from at least one of the following problems: the information is not dynamic, the design is not universal or the interface is not adapted to different users and preferences. Accordingly, apps do not currently have a universal design. The GAWA platform provides a universal and accessible solution to manage Wayfinding applications that focuses on people with a disability in outdoor and indoor environments in Smartcities. According to the results, the platform could be used for performing activities in their daily lives.
      Graphical abstract image

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.011
       
  • Online shopping post-payment dissonance: Dissonance reduction strategy
           using online consumer social experiences
    • Authors: Tze-Hsien Liao
      Pages: 520 - 538
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Tze-Hsien Liao
      This study applied the concept of online consumer social experiences (OCSEs) to reduce online shopping post-payment dissonance (i.e., dissonance occurring between online payment and product receipt). Two types of OCSEs were developed: indirect social experiences (IDSEs) and virtual social experiences (VSEs). Two studies were conducted, in which 447 college students were enrolled. Study 1 compared the effects of OCSEs and non-OCSEs when online shopping post-payment dissonance occurred. The results indicate that providing consumers affected by online shopping post-payment dissonance with OCSEs reduces dissonance and produces higher satisfaction, higher repurchase intention, and lower complaint intention than when no OCSEs are provided. In addition, consumers’ interpersonal trust (IPT) and susceptibility to interpersonal informational influence (SIII) moderated the positive effects of OCSEs. Study 2 compared the effects of IDSEs and VSEs when online shopping post-payment dissonance occurred. The results suggest that the effects of IDSEs and VSEs on satisfaction, repurchase intention, and complaint intention are moderated by consumers’ computing need for control (CNC) and computer-mediated communication apprehension (CMCA). The consumers with high CNC and low CMCA preferred VSEs, whereas the consumers with low CNC and high CMCA preferred IDSEs. The effects of VSEs and IDSEs on consumers with high CNC and CMCA and those with low CNC and CMCA were not significantly different.

      PubDate: 2017-07-23T13:45:31Z
      DOI: 10.1016/j.ijinfomgt.2017.03.006
       
  • Uncovering the value stream of digital content business from users’
           viewpoint
    • Authors: Changsu Kim; Dan J. Kim
      Pages: 553 - 565
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Changsu Kim, Dan J. Kim
      Although digital content (DC) business has been increasingly recognized as one of the core industries in a knowledge-based economy, little is known about its value stream from DC users’ perspective. This study suggests a DC value chain framework involving the stream of DC value from DC creation to use from users’ perspective, which has three key components of DC-value stream: (1) DC-value creation, (2) DC-value interaction, and (3) DC-value use. Drawing upon the DC value chain framework, we propose a research model exploring the direct relationships between DC-value creation and DC-value interaction and between DC-value interaction and DC-value use. It also explains the moderating role of DC types between DC-value and DC-value interactions. The empirical results of the study indicate that DC-value interactions play an intermediary role between DC creation value and DC use value and that users’ perceptions of DC value vary in different types of DC. We discuss theoretical contributions and practical implications along with some avenues for future research.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.004
       
  • A pragmatic approach to managing enterprise IT infrastructures in the era
           of consumerization and individualization of IT
    • Authors: Mohammad Hossein Jarrahi; Kevin Crowston; Kateryna Bondar; Bernhard Katzy
      Pages: 566 - 575
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Mohammad Hossein Jarrahi, Kevin Crowston, Kateryna Bondar, Bernhard Katzy
      Historically, organizations owned and controlled the information technologies (IT) their employees used: telephone, inter-office memos, mainframes and timesharing systems. Today, employees often want to use their own IT: not only personal smart phones and tablets, but also Twitter and Google Docs. This new trend can diversify and extend enterprise IT infrastructure, but leaves organizations struggling with technology uses that they cannot control. With the emergence of new technological paradigms in consumer markets and organizations, the management of IT infrastructure requires a more pragmatic and holistic approach that goes beyond simple technological considerations. In this paper, we present a three-part framework—technology, people and practice—that helps managers understand and mitigate these tensions. Drawing on two empirical studies of European executives and consultants form multiple management consulting firms, the paper further outlines changes taking place along the three aspects of the framework. It concludes by discussing three distinct approaches to the management of organizational IT infrastructure (passive, reactive, and pragmatic), and by offering greater insight regarding a pragmatic approach.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.016
       
  • Compatible quality of social media content: Conceptualization,
           measurement, and affordances
    • Authors: Adel M. Aladwani
      Pages: 576 - 582
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Adel M. Aladwani
      Building and maintaining favorable social media relationships with customers require that organizations produce quality content that fits customers’ needs. So far, little if any research has conceptualized and measured this kind of content quality in the context of social media. Therefore, this study proposes and empirically examines a new construct, compatible quality of social media content, which adds to knowledge by expanding prior online content quality research beyond the traditional focus on non-fit quality beliefs. The results of structural equation modeling of responses collected from a sample of active social media users reveal at least three worth noting findings. First, the study confirmed the multidimensionality of compatible quality of social media content, which encompasses reflective, stimulated, practiced, and advocated components. Second, there was equivalence in the measurements of the studied constructs and the structural weights of the proposed network of relationships across the different gender and experience subgroups. Third, compatible quality of social media content was found to influence continued interest, active confidence, and feedback openness. The practical and research implications of these results are discussed.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.014
       
  • Exploring factors affecting social e-commerce service adoption: The case
           of Facebook Gifts
    • Authors: Stanislav Mamonov; Raquel Benbunan-Fich
      Pages: 590 - 600
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Stanislav Mamonov, Raquel Benbunan-Fich
      Although social commerce is an important trend in practice, relatively few research studies have explored the impact of social commerce innovations launched within social networking sites. The deployment of a gift-giving service within a social networking site provides a unique opportunity to study the intersection of technological innovations and social norms and its potential to generate new revenue for ecommerce sites. Using Facebook Gifts as a real-world context for the study, we explore the factor structure of salient user beliefs influencing usage intention, and examine the relationships between beliefs and intention to use the service in a broader nomological network. Instead of adopting constructs from existing models, we started with the elicitation of salient beliefs and proceeded with successive stages of refinement to develop a suitable model. The empirical results show countervailing effects of perceived social utility and perceived convenience of the service on one hand, and low perceived value and privacy concerns on the other. A notable finding is the potential conflict arising between the expectations of effort associated with the procurement of a gift and the common perception of technology as reducing the required effort. The net result is that a technology-mediated gift service in the context of a social networking site runs counter to the social norms associated with traditional gift exchanges. This insight provides evidence of the dual challenge for social commerce initiatives. In order to be successful, new services in this area must leverage the potential of the technology as well as social practices.
      Graphical abstract image

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.005
       
  • Impact of avatar identification on online gamer loyalty: Perspectives of
           social identity and social capital theories
    • Authors: Ching-I Teng
      Pages: 601 - 610
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Ching-I Teng
      Online games have created significant opportunities for electronic commerce managers. The degree to which online gamers regard their avatars—their gaming representations— as themselves is known to be influential to gamers’ behavior but little is known about how such identification impacts online gamer loyalty (i.e., gamers’ continued intention to play). This study filled this gap by developing its research framework from the perspective of the social identity theory and the social capital theory. Responses from 1384 online gamers were collected, and structural equation modeling was used to test the hypotheses. The analytical results indicate that avatar identification (the degree to which users regard avatars as themselves) is positively related to participation in gaming communities and social presence (the degree of awareness of other persons and interpersonal relationships). These were further positively related to online gamer loyalty. This study is the first using the two theories, i.e., the social identity and social capital theoretical perspectives, to clarify the mechanism underlying the impact of avatar identification on online gamer loyalty, assisting electronic commerce managers to create a loyal user base.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.06.006
       
  • On the integration of model-based feature information in Product Lifecycle
           Management systems
    • Authors: Jorge D. Camba; Manuel Contero; Pedro Company; David Pérez
      Pages: 611 - 621
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Jorge D. Camba, Manuel Contero, Pedro Company, David Pérez
      As CAD models continue to become more critical information sources in the product’s lifecycle, it is necessary to develop efficient mechanisms to store, retrieve, and manage larger volumes of increasingly complex data. Because of their unique characteristics, 3D annotations can be used to embed design and manufacturing information directly into a CAD model, which makes models effective vehicles to describe aspects of the geometry or provide additional information that can be connected to a particular geometric element. However, access to this information is often limited, difficult, and even unavailable to external applications. As model complexity and volume of information continue to increase, new and more powerful methods to interrogate these annotations are needed. In this paper, we demonstrate how 3D annotations can be effectively structured and integrated into a Product Lifecycle Management (PLM) system to provide a cohesive view of product-related information in a design environment. We present a strategy to organize and manage annotation information which is stored internally in a CAD model, and make it fully available through the PLM. Our method involves a dual representation of 3D annotations with enhanced data structures that provides shared and easy access to the information. We describe the architecture of a system which includes a software component for the CAD environment and a module that integrates with the PLM server. We validate our approach through a software prototype that uses a parametric modeling application and two commercial PLM packages with distinct data models.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.06.002
       
  • Disaster recovery plan for medical records company
    • Authors: Vincent Lozupone
      Pages: 622 - 626
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Vincent Lozupone
      Computer systems have become a critical part of many businesses. Businesses rely on computer systems to perform many daily tasks. It is important that businesses have a valid strategy to recover their data in the event of fires, hurricanes, other natural disasters, sabotage, or security incidents. This paper describes the concepts of a disaster recovery and data replication plan that The Medical Record Company will adhere.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.015
       
  • Customers’ purchase decision-making process in social commerce: A
           social learning perspective
    • Authors: Aihui Chen; Yaobin Lu; Bin Wang
      Pages: 627 - 638
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): Aihui Chen, Yaobin Lu, Bin Wang
      The proliferation of social commerce has changed customers’ purchase decision-making process. However, few studies have investigated the roles of social commerce factors on customers’ purchase decision-making. Based on the social learning theory, we develop a research model to examine how customers’ learning behavior along three main social commerce components (SCCs) affects customers’ attitude in both cognitive and affective dimensions and how such attitude determines customers’ purchase intention. The results from a survey of 243 actual users of social commerce websites suggest that cognitive and affective appraisals are the main predictors of purchase intention, with cognitive appraisal having a higher predictive power than affective appraisal. In addition, learning from forums and communities and learning from ratings and reviews have significant influences on both cognitive and affective appraisals, while learning from forums and communities plays a more important role in formulating affective appraisal and learning from ratings and reviews plays a more important role in determining cognitive appraisal. Contrary to our expectation, learning from social recommendations has no significant influence on either cognitive or affective appraisal. In summary, these findings provide a comprehensive understanding about customers’ purchase decision-making process and extend the application scope of social learning theory. The findings also provide social commerce managers guidance in designing more effective websites and allocating resources and efforts reasonably on different SCCs.

      PubDate: 2017-07-09T13:08:08Z
      DOI: 10.1016/j.ijinfomgt.2017.05.001
       
  • Special section on data science and business intelligence
    • Authors: José Braga de Vasconcelos; Álvaro Rocha
      Pages: 716 - 717
      Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6
      Author(s): José Braga de Vasconcelos, Álvaro Rocha


      PubDate: 2017-10-04T09:57:22Z
      DOI: 10.1016/j.ijinfomgt.2017.07.014
       
  • Improving records management to promote transparency and prevent
           corruption
    • Authors: Mingo
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Anahí Casadesús de Mingo, Agustí Cerrillo-i-Martínez
      This paper pursues to show how regulation can facilitate the incorporation of transparency obligations into a record’s lifecycle (transparency by design) to prevent the occurrence of any risk of corruption associated with the management of the information created by a public administration (missing or disappearance of information, lack of evidence, modification of documents, etc.). The paper analyses the mechanisms available to Spain’s public administrations for managing these irregularities in records management though the raft of regulations and protocols that have been approved in the country. It assesses how the lack of specific regulations providing for transparency by design currently represents a limitation on the role of records management as a tool for preventing and fighting corruption. The paper shows that there is a need to guarantee proper records management, which includes transparency throughout a record’s lifecycle. It concludes that legislation assessed does not properly reflect these ideals. Nevertheless, this concern is only partially and insufficiently reflected in legislation. Legislators usually ignore the instrumental and methodological fundamentals of records management. Therefore, there is a need to update legislation on archives and records management with regard to access to information, transparency and accountability.

      PubDate: 2017-11-03T02:35:22Z
       
  • Why do young people tag photos on social networking sites' Explaining
           user intentions
    • Authors: Amandeep Dhir; Puneet Kaur Risto Rajala
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Amandeep Dhir, Puneet Kaur, Risto Rajala
      Scholars have emphasized an urgent need to investigate the determinants of user intentions to share content on social networking sites (SNS). A growing share of the content in social media is visual − including Photos − which users can share by tagging. To improve the understanding of the determinants of social media users’ behavioral intention to share content, this study investigates why people tag photos on SNS. A comprehensive research model was developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT2) and Social Cognitive Theory (SCT). The validity of the extended UTAUT2 model was tested on a new form of technology use which is not only timely but is much desired by the scholars engaged in information systems research. The research model investigates the role of habit, hedonic motivation, facilitating conditions, social influence, effort expectancy, performance expectancy, social presence, social status, and self-efficacy in influencing the user intentions to engage in photo-tagging. The research model was tested using a cross-sectional study of 780 adolescent Facebook users. The findings suggest that only habit and hedonic motivation have a significant direct influence on the user’s intentions to tag photos. The study contributes to the theorizing of the role of habits and hedonic motivations in user behaviors in the SNS and provides new insights into these factors for the managers of social media sites.

      PubDate: 2017-10-11T18:03:11Z
       
  • Knowledge management in OSS communities: Relationship between dense and
           sparse network structures
    • Authors: Stefan Kambiz; Behfar Ekaterina Turkina Thierry Burger-Helmchen
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Stefan Kambiz Behfar, Ekaterina Turkina, Thierry Burger-Helmchen
      Some authors in the literature have addressed knowledge transfer via weak ties between organization’s units which are themselves strongly tied inside (e.g. Hansen, 1999). Some others have investigated knowledge management among open-source-software (OSS) developers and discussed factors influencing knowledge transfer within development teams (e.g. Joshi and Sarker, 2006). In the domain of open source software (OSS) communities, more companies are now attempting to establish relationships to benefit from these potential value-creating communities; and project managers could in fact target different goals within software development teams including knowledge transfer within and between teams. We step forward to distinguish knowledge transfer within groups as opposed to knowledge transfer between groups; where relevant projects are bundled into separate strongly intra-connected groups. In knowledge management literature there is a trade-off between sparse network structures (Burt, 2000, 2002) versus dense network structures (Walker et al., 1997; Coleman, 1988). It is argued that the former facilitates the diffusion and generation of ideas among groups, while the latter affects the implementation of idea within each dense group. To our best knowledge, there has been no study to investigate the relationship between dense and sparse network structures. We propose that knowledge transfer within dense groups has a positive influence on knowledge transfer between sparse groups, in that intragroup density, group size, developers centrality and betweenness could impact intergroup coupling. To prove our hypothesis, we use a complex network of open source software (OSS) as the domain of interest, where developers represent nodes and two developers contributing to a project task represent a network tie. Developers contributing to tasks in groups other than their own can explore novel ideas via sharing knowledge, whereas developers contributing to tasks inside groups exploit ideas to improve those projects. We investigate the idea both analytically and empirically within 4 months, 8 months and 1year lagged time, and finally show that intragroup density has a positive whereas developers’ centrality has a negative influence on intergroup coupling.

      PubDate: 2017-10-11T18:03:11Z
       
  • Explaining the unpredictability: A social capital perspective on ICT
           intervention
    • Authors: Zafor Ahmed
      Abstract: Publication date: February 2018
      Source:International Journal of Information Management, Volume 38, Issue 1
      Author(s): Zafor Ahmed
      The significance of social capital and its role in the domain of information systems is ostensive from the extensive application of this concept in ICT (Information and Communication Technology)-related research. Despite overwhelming research to support social capital theory’s central predictions, evidence exists for deviations from these predictions. Therefore, the relationship between ICT and social capital often appears largely to be an ambivalent one. By adopting a systematic review approach, the current study attempts to present a suitable explanation for the varied effectiveness of social capital in ICT intervention. The contribution of the current research can be seen as two-fold. The first is the identification of distinct contexts associated with social capital and ICT intervention. This proposed contextual link seeks to reconcile conflicting views and explain contradictory findings surrounding the effectiveness of social capital in an ICT intervention. The second contribution is the identification of distinct contextual factors that act as enablers in different social capital dimensions. Being cognizant of these factors is essential not only for researchers to better understand the effectiveness of social capital in different scenarios, but is also critical for practitioners to be able to select the correct form of ICT during an ICT intervention so as to favourably leverage the contextual enablers

      PubDate: 2017-10-11T18:03:11Z
       
  • Aims & Scope/Editorial Board
    • Abstract: Publication date: December 2017
      Source:International Journal of Information Management, Volume 37, Issue 6


      PubDate: 2017-10-04T09:57:22Z
       
  • The data scientist profile and its representativeness in the European
           e-Competence framework and the skills framework for the information age
    • Authors: Carlos Costa; Maribel Yasmina Santos
      Abstract: Publication date: Available online 6 September 2017
      Source:International Journal of Information Management
      Author(s): Carlos Costa, Maribel Yasmina Santos
      The activities in our current world are mainly supported by data-driven web applications, making extensive use of databases and data services. Such phenomenon led to the rise of Data Scientists as professionals of major relevance, which extract value from data and create state-of-the-art data artifacts that generate even more increased value. During the last years, the term Data Scientist attracted significant attention. Consequently, it is relevant to understand its origin, knowledge base and skills set, in order to adequately describe its profile and distinguish it from others like Business Analyst. This work proposes a conceptual model for the professional profile of a Data Scientist and evaluates the representativeness of this profile in two commonly recognized competences/skills frameworks in the field of Information and Communications Technology (ICT), namely in the European e-Competence (e-CF) framework and the Skills Framework for the Information Age (SFIA). The results indicate that a significant part of the knowledge base and skills set of Data Scientists are related with ICT competences/skills, including programming, machine learning and databases. The Data Scientist professional profile has an adequate representativeness in these two frameworks, but it is mainly seen as a multi-disciplinary profile, combining contributes from different areas, such as computer science, statistics and mathematics.

      PubDate: 2017-09-07T12:28:19Z
      DOI: 10.1016/j.ijinfomgt.2017.07.010
       
  • A Big Data system supporting Bosch Braga Industry 4.0 strategy
    • Authors: Maribel Yasmina Santos; Jorge Oliveira e Sá; Carina Andrade; Francisca Vale Lima; Eduarda Costa; Carlos Costa; Bruno Martinho; João Galvão
      Abstract: Publication date: Available online 12 August 2017
      Source:International Journal of Information Management
      Author(s): Maribel Yasmina Santos, Jorge Oliveira e Sá, Carina Andrade, Francisca Vale Lima, Eduarda Costa, Carlos Costa, Bruno Martinho, João Galvão
      People, devices, infrastructures and sensors can constantly communicate exchanging data and generating new data that trace many of these exchanges. This leads to vast volumes of data collected at ever increasing velocities and of different variety, a phenomenon currently known as Big Data. In particular, recent developments in Information and Communications Technologies are pushing the fourth industrial revolution, Industry 4.0, being data generated by several sources like machine controllers, sensors, manufacturing systems, among others. Joining volume, variety and velocity of data, with Industry 4.0, makes the opportunity to enhance sustainable innovation in the Factories of the Future. In this, the collection, integration, storage, processing and analysis of data is a key challenge, being Big Data systems needed to link all the entities and data needs of the factory. Thereby, this paper addresses this key challenge, proposing and implementing a Big Data Analytics architecture, using a multinational organisation (Bosch Car Multimedia – Braga) as a case study. In this work, all the data lifecycle, from collection to analysis, is handled, taking into consideration the different data processing speeds that can exist in the real environment of a factory (batch or stream).

      PubDate: 2017-09-02T08:16:28Z
      DOI: 10.1016/j.ijinfomgt.2017.07.012
       
  • A knowledge management approach to capture organizational learning
           networks
    • Authors: Alexandre Barão; José Braga de Vasconcelos; Álvaro Rocha; Ruben Pereira
      Abstract: Publication date: Available online 9 August 2017
      Source:International Journal of Information Management
      Author(s): Alexandre Barão, José Braga de Vasconcelos, Álvaro Rocha, Ruben Pereira
      Effective knowledge management practices in organizations are focused on knowledge creation and knowledge transfer activities. Thus, intelligence and competencies matters at the organizational workplace. For most knowledge intensive organizations is fundamental the continuous availability and development of domain expertise. This paper describes an ongoing research project to develop an organizational knowledge architecture that is being specified and developed to support collaboration tasks as well as design and model predictive data analysis and insights for organizational development. The primary goal of this research is to create a suitable architecture for use, initially, in intranet (corporate portal) collaborative procedures, but also scalable for later use in more generic forms of ontology-driven knowledge management systems. The designed architecture and functionalities aim to create coherent web data layers for intranet learning and predictive analysis, defining the vocabulary and semantics for knowledge sharing and reuse projects. Regarding intellectual capital definition, this research argues that effective knowledge management are based on the dynamic nature of the organizational knowledge, and predictive data analysis and insights identification can transform and add value to an organization. This paper presents a knowledge management and engineering perspective (ontology based) for the application of predictive analysis and insights at the organizational (corporate) workplace towards the development of the organizational learning network.

      PubDate: 2017-09-02T08:16:28Z
      DOI: 10.1016/j.ijinfomgt.2017.07.013
       
  • A framework for social well-being and skills management at the workplace
    • Authors: José Araújo; Gabriel Pestana
      Abstract: Publication date: Available online 5 August 2017
      Source:International Journal of Information Management
      Author(s): José Araújo, Gabriel Pestana
      Employees are the human capital that contributes to the success of high-performance and sustainable organizations. In the digital economy, organizations need to be competitive and differentiate them self through the knowledge they detained. This requires the adoption of innovative solutions that valorize and recognize workers who invest their time to keep up-to-date with areas of knowledge that are relevant to the organization. Indeed, organizations are investing in retaining skilled workers, in particular senior workers whose knowledge and experience are a valuable asset that should be passed to younger co-workers. One way to address these concerns is to create conditions to promote a feeling of employee’s wellness in their work environment. In this paper, the two perception of well-being at the workplace (i.e. physical and social) are combined with gamification techniques and analyzed how it might help employees to acquire the expertise (“soft and hard-skills”) they need to improve their curriculum. This is particularly relevant for older adults to whom the feeling of fulfilment and recognition is much appreciated. The case study relates to the Active@Work project. The proposed solution incorporates an “intelligent behavior” to keep the user aware of their well-being status, triggering notifications to mitigate the risk of fatigue or stress at work. The solution also provides support for workers to engage in new and rewarding activities, where his/her knowledge and experience is considered as a relevant contribution, promoting in this way employee recognition and social well-being at the workplace. Team management and tutoring of younger co-workers by older adults will be, together with a Skill Development Tool, some of the innovative features within the project.

      PubDate: 2017-09-02T08:16:28Z
      DOI: 10.1016/j.ijinfomgt.2017.07.009
       
  • Enhancing information source selection using a genetic algorithm and
           social tagging
    • Authors: Fatma Zohra Lebib; Hakima Mellah; Habiba Drias
      Abstract: Publication date: Available online 5 August 2017
      Source:International Journal of Information Management
      Author(s): Fatma Zohra Lebib, Hakima Mellah, Habiba Drias
      The selection of information sources in a distributed information retrieval environment remains a critical issue. In this context, it is known that a distributed information retrieval system consists of a huge number of sources. Ensuring retrieval effectiveness is to search only sources which are likely to contain relevant information for a query. An important number of heuristics exist among which we quote genetic algorithm that is used to solve the above problem. The proposed genetic algorithm consists in finding the best selection in large space of potential solutions; where a solution is represented as a combination of a set of sources. The improvement of selection accuracy is assured based on the user’s track through the use of sources, to say that source description is enriched with tags from the tagging history.

      PubDate: 2017-09-02T08:16:28Z
      DOI: 10.1016/j.ijinfomgt.2017.07.011
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.147.40.153
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016