for Journals by Title or ISSN
for Articles by Keywords
Journal Cover
International Journal of Information Management
Journal Prestige (SJR): 1.373
Citation Impact (citeScore): 6
Number of Followers: 283  
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 0268-4012
Published by Elsevier Homepage  [3159 journals]
  • Twitter as a tool for the management and analysis of emergency situations:
           A systematic literature review
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): María Martínez-Rojas, María del Carmen Pardo-Ferreira, Juan Carlos Rubio-RomeroAbstractThe importance of timely, accurate and effective use of available information is essential to the proper management of emergency situations. In recent years, emerging technologies have provided new approaches towards the distribution and acquisition of crowdsourced information to facilitate situational awareness and management during emergencies. In this regard, internet and social networks have shown potential to be an effective tool in disseminating and obtaining up-to-date information. Among the most popular social networks, research has pointed to Twitter as a source of information that offers valuable real-time data for decision-making. The objective of this paper is to conduct a systematic literature review that provides an overview of the current state of research concerning the use of Twitter to emergencies management, as well as presents the challenges and future research directions.
  • The impact of knowledge management processes on information systems: A
           systematic review
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Mostafa Al-Emran, Vitaliy Mezhuyev, Adzhar Kamaludin, Khaled ShaalanAbstractKnowledge Management (KM) processes play a significant role in the implementation of various Information Systems (IS). Several review studies were carried out to afford a better understanding of the current research trend of KM processes. However, this issue still needs to be examined from other perspectives. It is observed that previous research neglects the examination of KM processes studies with regard to ISs. The current study systematically reviews and sheds the light on KM processes studies related to ISs aiming to provide a comprehensive analysis of 41 research articles published in peer-reviewed journals from 2001 to 2018. The main findings of this study indicate that knowledge sharing is the most frequent KM process studied, followed by knowledge acquisition and knowledge application. Besides, questionnaire surveys were found to be the primarily relied research methods for data collection in the context of KM processes. In addition, 78% of the analyzed studies registered positive research outcomes. In terms of IS type, most of the analyzed studies focused on investigating the impact of KM processes on E-business systems, knowledge management systems, and IS outsourcing, respectively. Additionally, in terms of data collection, the majority of the analyzed studies were primarily focused on the participants who are IS executives/managers. Furthermore, most of the analyzed studies that achieved positive outcomes were carried out in China. To that end, this review study attempts to demonstrate and detail the recent increase in the interest and the advancement made in KM processes research considering ISs studies, which form an essential reference for scholars in KM field.
  • Understanding key skills for information security managers
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Husam Haqaf, Murat KoyuncuAbstractInformation security management is a necessity for all institutions and enterprises that regard company information as valuable assets. Developing, auditing and managing information security depends upon professional expertise in order to achieve the desired information security governance. This research seeks the key skills required for the position of information security management as well as the methods to develop these skills through professional training programs. The study adopts the Delphi method which requires building a list of items through a literature survey and involves experts with certain expertise to modify the list until a consensus on less than 20% of the items is reached. Through completing three rounds of the Delphi technique - data collection, relevance voting and ranking - sixteen skills are shortlisted as the key skills. In the final list, the majority belong to core information security skills, and the top two skills belong to project/process management skills and risk management skills, indicating the importance of these skills for the information security manager role. In addition, a series of related professional training programs and certifications are surveyed, the outcome of which highlights a number of most comprehensive and appropriate programs to develop these determined skills.
  • Developing human resource data risk management in the age of big data
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Thomas Stephen Calvard, Debora JeskeAbstractIn recent years, a great deal of attention has been devoted to trying to understand the risk challenges that arise in information management, and most recently, challenges that arise due to big data. In this article, the complexities of big data for employers are explored, drawing on a risk management on Human Resources (HR) perspective and normal accident theory (NAT) to illustrate the evolving characteristics of these complexities. The paper concludes with a series of recommendations that focus on education, design in data collection, and risk management, in the hope that these recommendations enable employers to better anticipate and address emerging big data challenges.
  • Cloud computing-enabled healthcare opportunities, issues, and
           applications: A systematic review
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Omar Ali, Anup Shrestha, Jeffrey Soar, Samuel Fosso WambaAbstractCloud computing offers an innovative method of delivering IT services efficiently. Extant literature suggests that cloud technology can enhance the level of services in various industries, including healthcare services. As with any technological innovation, cloud computing should be rigorously evaluated before its widespread adoption. This research study presents a systematic review of scholarly articles of cloud computing in the healthcare sector. We considered 316 articles and filtered down to 88 articles to present a classification framework that has three dimensions: cloud computing-enabled healthcare opportunities, issues, and applications. Implications to future research and practice are highlighted in the areas of value-added healthcare services towards medical decision-making, data security & privacy obligations of cloud service providers, health monitoring features and innovative IT service delivery models using cloud computing.
  • Management theory and big data literature: From a review to a research
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Paula de Camargo Fiorini, Bruno Michel Roman Pais Seles, Charbel Jose Chiappetta Jabbour, Enzo Barberio Mariano, Ana Beatriz Lopes de Sousa JabbourAbstract•The purpose of this study is to enrich the existing state-of-the-art literature on the impact of big data on business growth by examining how dozens of organizational theories can be applied to enhance the understanding of the effects of big data on organizational performance. While the majority of management disciplines have had research dedicated to the conceptual discussion of how to link a variety of organizational theories to empirically quantified research topics, the body of research into big data so far lacks an academic work capable of systematising the organizational theories supporting big data domain. The three main contributions of this work are: (a) it addresses the application of dozens of organizational theories to big data research; (b) it offers a research agenda on how to link organizational theories to empirical research in big data; and (c) it foresees promising linkages between organizational theories and the effects of big data on organizational performance, with the aim of contributing to further research in this field. This work concludes by presenting implications for researchers and managers, and by highlighting intrinsic limitations of the research.
  • Understanding the effect of cloud computing on organizational agility: An
           empirical examination
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Sen Liu, Felix T.S. Chan, Junai Yang, Ben NiuAbstractThe emergence of cloud computing has significantly changed the model used for existing information technology and enhanced agility of a firm through its pay per use mode. However, few studies have focused on this phenomenon, and prior studies are unclear regarding the impact of cloud computing on organizational agility. Therefore, this study investigates the link between cloud computing and organizational agility based on survey data from users of the Alibaba cloud in China. The empirical analysis is conducted using the partial least squares (PLS) based structural equation modeling with SmartPLS 2.0. We propose that two cloud computing related capabilities (i.e., CI flexibility and CI integration) are critical for firms to improve their agility. Based on the IT—agility contradiction, we analyze the moderating effect of IT spending on cloud computing. This study provides a new perspective for understanding cloud computing technology in practice and theory.
  • A health data analytics maturity model for hospitals information systems
    • Abstract: Publication date: Available online 26 July 2018Source: International Journal of Information ManagementAuthor(s): João Vidal Carvalho, Álvaro Rocha, José Vasconcelos, António AbreuAbstractIn the last five decades, maturity models have been introduced as reference frameworks for Information System (IS) management in organizations within different industries. In the healthcare domain, maturity models have also been used to address a wide variety of challenges and the high demand for hospital IS (HIS) implementations. The increasing volume of data, is exceeded the ability of health organizations to process it for improving clinical and financial efficiencies and quality of care. It is believed that careful and attentive use of Data Analytics in healthcare can transform data into knowledge that can improve patient outcomes and operational efficiency. A maturity model in this conjuncture, is a way of identifying strengths and weaknesses of the HIS maturity and thus, find a way for improvement and evolution. This paper presents a proposal to measure Hospitals Information Systems maturity with regard to Data Analytics. The outcome of this paper is a maturity model, which includes six stages of HIS growth and maturity progression.
  • Bring your own device in organizations: Extending the reversed IT adoption
           logic to security paradoxes for CEOs and end users
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Paméla Baillette, Yves Barlette, Aurélie Leclercq-VandelannoitteAbstractThis research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome' A theoretical analysis is conducted with regard to the concept of the “reversed IT adoption logic” vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.
  • A value-justice model of knowledge integration in wikis: The moderating
           role of knowledge equivocality
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Nan Wang, Yongqiang Sun, Xiao-Liang Shen, Xi ZhangAbstractThe sustainability of Wikis heavily relies on the quality of knowledge that is collaboratively integrated by volunteers. Although the factors influencing one specific knowledge contribution or knowledge-sharing behavior (e.g., adding) have been widely examined, the research on the factors that affect another type of knowledge contribution, i.e., knowledge integration, is still rare. Considering the collaborative nature of knowledge integration, beyond the value-centric logic of knowledge contribution, we propose a value-justice model of knowledge integration. We further identify the boundary conditions under which the proposed value-justice model works by investigating the moderating role of knowledge equivocality. A survey was conducted in a well-known Wiki-based website in China, namely, Baidu Baike, to test the research model and hypotheses. Our results show that both perceived justice and perceived value influence knowledge integration, which in turn affects knowledge quality, and knowledge equivocality strengthens the relationship between perceived justice / perceived value and knowledge integration and the relationship between knowledge integration and knowledge quality. Implications for research and practice are also discussed.
  • “Technology enabled Health” – Insights from twitter analytics with a
           socio-technical perspective
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Purva Grover, Arpan Kumar Kar, Gareth DaviesAbstractTechnology had been used in health domain for various purposes such as for storing electronic health records; monitoring; education; communication; and for behavioural tracking. The evident benefits have triggered a huge amount of discussions surrounding health technology in the web 3.0 space and users around the globe are sharing their experiences and perspective on social media platforms. Social media had been used for creating awareness, sharing information and providing emotional support to public in different diseases. This study focuses on exploring the health technology related discussions in Twitter. For this study around 105,489 tweets were collected from Twitter by 15,587 unique users. These tweets were analysed through social media analytics approaches (i.e. CUP framework). The study presents the top technologies in health domain through hashtag analysis and top diseases (acute, chronic, communicable and non-communicable) through word analysis and their association through co-occurrence of words within the tweets. The association depicts technology had been used in treating, identifying and heeling of the various diseases. The discussion on social media is skewed towards computing algorithms. The acute and chronic diseases were discussed on social media, and our study indicates that statistically, there is no difference in the discussion of acute and chronic diseases. The communicable and non-communicable diseases are also discussed on social media, and our study indicates no statistically difference in the discussion of communicable and non-communicable diseases which signifies users are referring to Twitter for discussing various type of diseases irrespective of acute, chronic, communicable and non-communicable diseases. Future researchers can use the study as the evidence of extracting insights related to socio-technical perspective from Twitter data. The literature contains lot of evidences where technology had been useful in health domain, but the bigger picture of how the various technologies are being related to health domain is missing, therefore this study tries to contribute to this area by mining tweets.
  • An overview of assessing the quality of peer review reports of scientific
    • Abstract: Publication date: Available online 20 July 2018Source: International Journal of Information ManagementAuthor(s): Amanda Sizo, Adriano Lino, Luis Paulo Reis, Álvaro RochaAbstractAssuring the quality control of publications in the scientific literature is one of the main challenges of the peer review process. Consequently, there has been an increasing demand for computing solutions that will help to maintain the quality of this process. Recently, the use of Artificial Intelligence techniques has been highlighted, applied in the detection of plagiarism, bias, among other functions. The assessment of the reviewer’s review has also been considered as important in the process, but, little is known about it, for instance, which techniques have been applied in this assessment or which criteria have been assessed. Therefore, this systematic literature review aims to find evidence regarding the computational approaches that have been used to evaluate reviewers' reports. In order to achieve this, five online databases were selected, from which 72 articles were identified that met the inclusion criteria of this review, all of which have been published since 2000. The result returned 10 relevant studies meeting the evaluation requirements of scientific article reviews. The review revealed that mechanisms to rank review reports according to a score, as well as the word analysis, are the most common tools, and that there is no consensus on quality criteria. The systematic literature review has shown that reviewers’ report assessment is a valid tool for maintaining quality throughout the process. However, it still needs to be further developed if it is to be used as a resource which surpass a single conference or journal, making the peer review process more rigorous and less based on random choice.
  • Examining the core knowledge on facebook
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Wen-Lung Shiau, Yogesh K. Dwivedi, He-Hong LaiAbstractSocial networks have become an indispensable activity in people’s lives. A number of previous studies have investigated various social networks and probed in the core knowledge of integrated social networks. While social network knowledge is general and extensive, few studies have delved into the core knowledge of individual social networks, especially Facebook, which is a social network with over 1.7 billion users worldwide. Therefore, this study aimed to elaborate on the core knowledge of Facebook. In this study, a total of 4429 relevant academic papers were collected from the Web of Science, an online electronic database. Then, citation analysis and co-citation analysis were adopted to identify 50 highly cited academic papers to form a co-citation matrix. Finally, cluster analysis and multi-dimensional scaling analysis were employed to determine the core knowledge of Facebook. The research results showed that there are six points of core knowledge: (1) the behavior analysis of users; (2) the social impact of social networks; (3) the influence and application of Facebook in universities; (4) the evaluation of use motivation and theoretical models; (5) privacy risk and interpersonal impression; and (6) the strategies of social networks. The research results could be useful for academic studies and practice in the future.
  • Online learning: Adoption, continuance, and learning outcome—A
           review of literature
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Ritanjali Panigrahi, Praveen Ranjan Srivastava, Dheeraj SharmaAbstractThe use of Technology to facilitate better learning and training is gaining momentum worldwide, reducing the temporal and spatial problems associated with traditional learning. Despite its several benefits, retaining students in online platforms is challenging. Through a literature review of the factors affecting adoption, the continuation of technology use, and learning outcomes, this paper discusses an integration of online learning with virtual communities to foster student engagement for obtaining better learning outcomes. Future directions have been discussed, the feedback mechanism which is an antecedent of students’ continuation intention has a lot of scopes to be studied in the virtual community context. The use of Apps in m-learning and the use of cloud services can boost the ease and access of online learning to users and organizations.
  • Incorporating polarity of relationships in ISM and TISM for theory
           building in information and organization management
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): SushilAbstractSome mapping methods are used for the conceptualization of theories in information and organization management which may help in modeling both feedback and hierarchical structures. Total Interpretive Structural Modelling (TISM) is an enhancement of interpretive structural modeling (ISM) to explore hierarchical models that aid in theory building in information and organization management. It is based on pair comparison method to generate a hierarchical digraph, which is then translated into the interpretive model by interpreting both nodes and links in the digraph. The relationships in both ISM and TISM could be binary or fuzzy. However, a missing dimension of these structural models is the polarity or direction of relationships. A relationship between a pair of elements could be having positive or negative polarity. This aspect has been widely used in the feedback structures as causal influence diagrams (CIDs) in system dynamics methodology. This paper is using the learning from CIDs to introduce polarity of relationships in ISM and TISM. The polarity of relationships will further refine ISM/TISM as a more explanatory model for theory building. This enhanced model not only provides hypothesis formulation simply as a driver-dependence relationship but also addresses whether the driving variable(s) will influence the dependent variable positively or negatively. The paper illustrates modified TISM process incorporating polarity with an example in the context of information and organizational change management and discusses the nuances of such an enhanced model.
  • An investigation of relationships among privacy concerns, affective
           responses, and coping behaviors in location-based services
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): Yoonhyuk Jung, Jonghwa ParkAbstractAlthough information privacy has been extensively investigated in the information systems discipline, research heavily focuses on cognitive frameworks and underestimates the influence of affect on users’ privacy behaviors. Psychological literature demonstrates that affect plays a significant role in individuals’ decisions in risky situations. This study aims to explore associations between cognitive factors, affective responses, and coping behaviors in the context of privacy threats. For this purpose, we conducted a laddering interview with 56 users of location-based services. Elements elicited by an emerging coding procedure were mapped by their causal relations as described in interviews. The results revealed idiosyncratic associations among privacy concerns, affects, and coping behaviors, which implies that privacy concerns can result in different coping behaviors according to the affects following the concern. Thus, the result suggests that cognition-affect appraisals can offer a reliable framework for explaining users’ privacy behaviors. This study proposes a new direction for the cognition-affect perspective in information privacy research by providing an alternative approach that reflects both cognition and affects to explain coping behaviors.
  • Affordances for sharing domain-specific and complex knowledge on
           enterprise social media
    • Abstract: Publication date: December 2018Source: International Journal of Information Management, Volume 43Author(s): L.G. PeeAbstractMany organizations have implemented enterprise social media (ESM) to better connect employees and promote knowledge sharing. Prior studies indicate that employees often use ESM to access knowledge in other domains or complex knowledge. But connecting employees is only part of the picture – while ESM offer the possibility of accessing domain specific and complex knowledge, the flow of such knowledge might remain inhibited by the perceived effort required to codify them for sharing. This study identifies salient ESM affordances that can alleviate the perceived effort of sharing domain-specific and complex knowledge. Results of a survey of 303 employees working in organizations using ESM indicate that domain-specific knowledge is perceived as less effortful to codify when the affordance of visibility is strong (i.e., the affordance negatively moderates the positive relationship between knowledge specificity and perceived codification effort), and complex knowledge is perceived as less effortful to codify when the affordances of association and editability are strong. These findings indicate that it is necessary to consider both knowledge attributes and ESM affordances and their interactions when understanding knowledge sharing using ESM.
  • Big data with cognitive computing: A review for the future
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Shivam Gupta, Arpan Kumar Kar, Abdullah Baabdullah, Wassan A.A. Al-KhowaiterAbstractAnalysis of data by humans can be a time-consuming activity and thus use of sophisticated cognitive systems can be utilized to crunch this enormous amount of data. Cognitive computing can be utilized to reduce the shortcomings of the concerns faced during big data analytics. The aim of the study is to provide readers a complete understanding of past, present and future directions in the domain big data and cognitive computing. A systematic literature review has been adopted for this study by using the Scopus, DBLP and Web of Science databases. The work done in the field of big data and cognitive computing is currently at the nascent stage and this is evident from the publication record. The characteristics of cognitive computing, namely observation, interpretation, evaluation and decision were mapped to the five V’s of big data namely volume, variety, veracity, velocity and value. Perspectives which touch all these parameters are yet to be widely explored in existing literature.
  • Investigating the impact of social media advertising features on customer
           purchase intention
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Ali Abdallah AlalwanAbstractSocial media is being increasingly used as a platform to conduct marketing and advertising activities. Organizations have spent a lot of time, money, and resources on social media ads. However, there is always a challenge in how organizations can design social media advertising to successfully attract customers and motivate them to purchase their brands. Thus, this study aims to identify and test the main factors related to social media advertising that could predict purchase intention. The conceptual model was proposed based on three factors from the extending Unified Theory of Acceptance and Use of Technology (UTAUT2) (performance expectancy, hedonic motivation, and habit) along with interactivity, informativeness, and perceived relevance. The data was collected using a questionnaire survey of 437 participants. The key results of structural equation modelling (SEM) largely supported the current model’s validity and the significant impact of performance expectancy, hedonic motivation, interactivity, informativeness, and perceived relevance on purchase intentions. This study will hopefully provide a number of theoretical and practical guidelines on how marketers can effectively plan and implement their ads over social media platforms.
  • Big data, knowledge co-creation and decision making in fashion industry
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Abhilash Acharya, Sanjay Kumar Singh, Vijay Pereira, Poonam SinghAbstractBig data has become a buzzword and has been one of the most sought after topics for research. The applications of big data have been studied in various important contexts. However, very little has been explored in the realm of integrating knowledge co-creation with the usage of big data when it comes to evidence-based decision-making. The current study empirically investigates data from four fashion retailing organizations. Evidence from our findings suggests that knowledge-based interactions between the customers and the salesforce in those organizations form the core of knowledge co-creation. The findings have revealed that big data indeed can assist in knowledge co-creation, which can in turn adequately lead to evidence-based, effective and efficient decision making for better business returns.
  • The dark triad and knowledge hiding
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Wei Pan, Qingpu Zhang, Thompson S.H. Teo, Vivien K.G. LimAbstractBy drawing on psychological contract theory, this study examined the effects of the dark triad of personality traits (Machiavellianism, narcissism, and psychopathy) on knowledge hiding within organizations. We obtained 251 matched-pair data from respondents in a manufacturing company. Results showed that all three dimensions of the dark triad were positively related to knowledge hiding through transactional psychological contract. Different dimensions of the dark triad were most strongly related to different knowledge hiding strategies. Furthermore, gender moderated the relationships between narcissism and psychopathy with transactional psychological contract. The indirect relationships between narcissism and psychopathy with knowledge hiding via transactional psychological contract were stronger for men than women.
  • Identifying reputation collectors in community question answering (CQA)
           sites: Exploring the dark side of social media
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Pradeep K. Roy, Jyoti P. Singh, Abdullah M. Baabdullah, Hatice Kizgin, Nripendra P. RanaAbstractThis research aims to identify users who are posting as well as encouraging others to post low quality and duplicate contents on community question answering sites. The good guys called Caretakers and the bad guys called Reputation Collectors are characterised by their behaviour, answering pattern and reputation points. The proposed system is developed and analysed over publicly available Stack Exchange data dump. A graph-based methodology is employed to derive the characteristic of Reputation Collectors and Caretakers. Results reveal that Reputation Collectors are primary sources of low-quality answers as well as answers to duplicate questions posted on the site. The Caretakers answer limited questions of challenging nature and fetches maximum reputation against those questions whereas Reputation Collectors answers have so many low quality and duplicate questions to gain the reputation point. We have developed algorithms to identify the Caretakers and Reputation Collectors of the site. Our analysis finds that 1.05% of Reputation Collectors post 18.88% of low-quality answers. This study extends previous research by identifying the Reputation Collectors and how they collect their reputation points.
  • Big data analytics for disaster response and recovery through sentiment
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): J. Rexiline Ragini, P.M. Rubesh Anand, Vidhyacharan BhaskarAbstractBig data created by social media and mobile networks provide an exceptional opportunity to mine valuable insights from them. This information is harnessed by business entities to measure the level of customer satisfaction but its application in disaster response is still in its inflection point. Social networks are increasingly used for emergency communications and help related requests. During disaster situations, such emergency requests need to be mined from the pool of big data for providing timely help. Though government organizations and emergency responders work together through their respective national disaster response framework, the sentiment of the affected people during and after the disaster determines the success of the disaster response and recovery process. In this paper, we propose a big data driven approach for disaster response through sentiment analysis. The proposed model collects disaster data from social networks and categorize them according to the needs of the affected people. The categorized disaster data are classified through machine learning algorithm for analyzing the sentiment of the people. Various features like, parts of speech and lexicon are analyzed to identify the best classification strategy for disaster data. The results show that lexicon based approach is suitable for analyzing the needs of the people during disaster. The practical implication of the proposed methodology is the real-time categorization and classification of social media big data for disaster response and recovery. This analysis helps the emergency responders and rescue personnel to develop better strategies for effective information management of the rapidly changing disaster environment.
  • How younger elderly realize usefulness of cognitive training video games
           to maintain their independent living
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Amir Talaei-Khoei, Jay DanielAbstractThe objective of this paper is to understand the perception that younger elderly persons have towards the usefulness of playing Xbox Kinect video games as an assistive technology that is designed to maintain their cognitive abilities. Available literature highlights two kinds of assistive technologies; the first being Supportive Technologies that provide aid for already-declined functional abilities (such as hearing aids), and the second being Empowering Technologies that maintain functional abilities which have not yet declined (such as Xbox Kinect cognitive games). The difference in the nature between supportive and empowering technologies plays an important role in perceiving their benefits. For instance, while hearing aids as a supportive technology are perceived as useful through the improvement of hearing abilities, cognitive training games as an empowering technology have a long-term usefulness for cognitive abilities. This study conducts twenty-one qualitative interviews (range 65–87 years; mean = 71; SD = 3.81) and introduces perceived transfer effect. This effect allows the elderly to perceive the usefulness of playing cognitive training video games, which are designed to cultivate the cognitive abilities. In addition, this study found that the elderly value their independent living, and through cognitive video games, the elderly may remain capable of living independently.
  • Social tie formation in Chinese online social commerce: The role of IT
    • Abstract: Publication date: October 2018Source: International Journal of Information Management, Volume 42Author(s): Xueyan Dong, Tienan WangAbstractSocial media technology creates an opportunity to shift the formation of impersonal relationships from offline to online. The theory of IT affordances provides a basis for theorizing how the use of online social commerce (OSC) technology facilitates the formation of social ties in an OSC context. In this paper, integrating theories of IT affordances and social ties, we develop a model to explore how the six sub-dimensions of OSC IT affordances (i.e., visibility, metavoicing, triggered attending, guidance shopping, social connecting, and trading) aid buyers and sellers in building strong and weak OSC ties. A survey of 511 buyers from WeChat shows that five of the six IT affordances enhance the quality of interactivity, and thereby facilitate social ties (both strong and weak), which in turn contribute to buyers’ repurchase intentions. Additionally, the findings confirm the positive moderating effect of perceived effectiveness of e-commerce institutional mechanisms (PEEIM) on the strong tie formation process. This paper advances the affordances and social tie literature by examining the antecedents and outcomes of OSC social ties in more detail. Our findings not only benefit the researchers in interpreting how technology helps form different types of relationships in OSC, but also assists practitioners in developing better OSC management strategy.
  • An m-health application for cerebral stroke detection and monitoring using
           cloud services
    • Abstract: Publication date: Available online 30 June 2018Source: International Journal of Information ManagementAuthor(s): Laura García, Jesús Tomás, Lorena Parra, Jaime LloretAbstractOver 25 million people suffered from cerebral strokes in a span of 23 years. Many systems are being developed to monitor and improve the life of patients that suffer from different diseases. However, solutions for cerebral strokes are hard to find. Moreover, due to their widespread utilization, smartphones have presented themselves as the most appropriate devices for many e-health systems. In this paper, we propose a cerebral stroke detection solution that employs the cloud to store and analyze data in order to provide statistics to public institutions. Moreover, the prototype of the application is presented. The three most important symptoms of cerebral strokes were considered to develop the tasks that are conducted. Thus, the first task detects smiles, the second task employs voice recognition to determine if a sentence is repeated correctly and, the third task determines if the arms can be raised. Several tests were performed in order to verify the application. Results show its ability to determine whether users have the symptoms of cerebral stroke or not.
  • Social informatics of intelligent manufacturing ecosystems: A case study
           of KuteSmart
    • Abstract: Publication date: Available online 19 May 2018Source: International Journal of Information ManagementAuthor(s): Wenchi Ying, Loo Geok Pee, Suling JiaAbstractIntelligent manufacturing involves developing a vertically and horizontally connected manufacturing system that allows efficient mass customization. Research has mainly focused on connections between information technology and manufacturing equipment in a cyber-physical system. This case study analyses major changes in the development of an intelligent manufacturing ecosystem by a traditional manufacturer that connects customers to manufactories for the mass customization of suits. Findings highlight the importance of social informatics, that is, connections that involve technology, as well as people, organizations, and their activities, and show how they are enabled by experience-based knowledge. They indicate key connections accounting for social and institutional milieus that should be studied in further research, for a more complete understanding of the successful implementation of intelligent manufacturing.
  • Deep gesture interaction for augmented anatomy learning
    • Abstract: Publication date: Available online 28 March 2018Source: International Journal of Information ManagementAuthor(s): Ahmad Karambakhsh, Aouaidjia Kamel, Bin Sheng, Ping Li, Po Yang, David Dagan FengAbstractAugmented reality is very useful in medical education because of the problem of having body organs in a regular classroom. In this paper, we propose to apply augmented reality to improve the way of teaching in medical schools and institutes. We propose a novel convolutional neural network (CNN) for gesture recognition, which recognizes the human's gestures as a certain instruction. We use augmented reality technology for anatomy learning, which simulates the scenarios where students can learn Anatomy with HoloLens instead of rare specimens. We have used the mesh reconstruction to reconstruct the 3D specimens. A user interface featured augment reality has been designed which fits the common process of anatomy learning. To improve the interaction services, we have applied gestures as an input source and improve the accuracy of gestures recognition by an updated deep convolutional neural network. Our proposed learning method includes many separated train procedures using cloud computing. Each train model and its related inputs have been sent to our cloud and the results are returned to the server. The suggested cloud includes windows and android devices, which are able to install deep convolutional learning libraries. Compared with previous gesture recognition, our approach is not only more accurate but also has more potential for adding new gestures. Furthermore, we have shown that neural networks can be combined with augmented reality as a rising field, and the great potential of augmented reality and neural networks to be employed for medical learning and education systems.
  • Business analytics use in CRM: A nomological net from IT competence to CRM
    • Abstract: Publication date: Available online 1 February 2018Source: International Journal of Information ManagementAuthor(s): Dalwoo Nam, Junyeong Lee, Heeseok LeeAbstractBusiness analytics (BA) becomes increasingly important under rapidly changing business environment. A research challenge is that BA use is not fully understood. We tackle this challenge from the perspective of dynamic capability by using an empirical model with the emphasis on BA use in customer relationship management (CRM). Based on 170 samples from firm-level survey, we analyze the nomological linkage from IT competence to CRM performance. The results show data management capability fully mediates between IT competence and BA use, while customer response capability partially mediates between BA use and CRM performance.
  • Making a case for speech analytics to improve customer service quality:
           Vision, implementation, and evaluation
    • Abstract: Publication date: Available online 10 January 2018Source: International Journal of Information ManagementAuthor(s): Scott Scheidt, Q.B. ChungAbstractFirms operating in highly competitive markets must find ways to deliver customer value beyond offering competitive prices. Providing superior customer service in such environments becomes a strategic initiative because it can create a competitive advantage by fostering customer loyalty, which can also help ease pressure on profit margins and secure continued revenue flow. In this case study we report a case of utilizing speech analytics to improve customer service quality at a call center of a pharmaceutical supply chain service provider in the U.S. We first describe the strategic rationale behind enhancing customer service quality, followed by the implementation of a quality management program using a novel approach of speech analytics. We then present a longitudinal study that evaluated customer service performance using the data gathered from a team of 120 customer service agents during an 8-month period. Two categories of key performance indicators were established and measured, namely “workforce management” metrics and “customer experience” metrics, which served as the primary indicators in the analysis of the level of success in attaining three strategically identified performance goals to improve customer service quality.
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-