Information Technology & PeopleTable of Contents for Information Technology & People. List of articles from the current issue, including Just Accepted (EarlyCite)https://www.emerald.com/insight/publication/issn/0959-3845/vol/37/iss/8?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestInformation Technology & PeopleEmerald Publishing LimitedInformation Technology & PeopleInformation Technology & Peoplehttps://www.emerald.com/insight/proxy/containerImg?link=/resource/publication/journal/98bd8ab77ef7d4ffd865b4a6c53db7ae/urn:emeraldgroup.com:asset:id:binary:itp.cover.jpghttps://www.emerald.com/insight/publication/issn/0959-3845/vol/37/iss/8?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestOnline privacy literacy and users' information privacy empowerment: the case of GDPR in Europehttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0467/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestResearch on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment. An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population. The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment. While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe
Christine Prince, Nessrine Omrani, Francesco Schiavone
Information Technology & People, Vol. 37, No. 8, pp.1-24

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

]]>
Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe10.1108/ITP-05-2023-0467Information Technology & People2024-01-15© 2023 Christine Prince, Nessrine Omrani and Francesco SchiavoneChristine PrinceNessrine OmraniFrancesco SchiavoneInformation Technology & People3782024-01-1510.1108/ITP-05-2023-0467https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0467/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Christine Prince, Nessrine Omrani and Francesco Schiavonehttp://creativecommons.org/licences/by/4.0/legalcode
Quantified academics: Heideggerian technology critical analysis of the academic ranking competitionhttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0032/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe competition in the academe has always been tough, but today, the academe seems to be more like an industry than an academic community as academics are evaluated through quantified and economic means. This article leans on Heidegger’s thoughts on the essence of technology and his ontological view on being to show the dangers that lie in this quantification of researchers and research. Despite the benefits that information systems (ISs) offer to people and research, it seems that technology has made it possible to objectify researchers and research. This has a negative impact on the academe and should thus be looked into especially by the IS field, which should note the problems that exist in its core. This phenomenon of quantified academics is clearly visible at academic quantification sites, where academics are evaluated using metrics that count their output. It seems that the essence of technology has disturbed the way research is valued by emphasising its quantifiable aspects. The study claims that it is important to look for other ways to evaluate researchers rather than trying to maximise research production, which has led to the flooding of articles that few have the time or interest to read. This paper offers new insights into the current phenomenon of quantification of academics and underlines the need for critical changes if in order to achieve the academic culture that is desirable for future academics.Quantified academics: Heideggerian technology critical analysis of the academic ranking competition
Jani Koskinen, Kai Kristian Kimppa, Janne Lahtiranta, Sami Hyrynsalmi
Information Technology & People, Vol. 37, No. 8, pp.25-42

The competition in the academe has always been tough, but today, the academe seems to be more like an industry than an academic community as academics are evaluated through quantified and economic means.

This article leans on Heidegger’s thoughts on the essence of technology and his ontological view on being to show the dangers that lie in this quantification of researchers and research.

Despite the benefits that information systems (ISs) offer to people and research, it seems that technology has made it possible to objectify researchers and research. This has a negative impact on the academe and should thus be looked into especially by the IS field, which should note the problems that exist in its core. This phenomenon of quantified academics is clearly visible at academic quantification sites, where academics are evaluated using metrics that count their output. It seems that the essence of technology has disturbed the way research is valued by emphasising its quantifiable aspects. The study claims that it is important to look for other ways to evaluate researchers rather than trying to maximise research production, which has led to the flooding of articles that few have the time or interest to read.

This paper offers new insights into the current phenomenon of quantification of academics and underlines the need for critical changes if in order to achieve the academic culture that is desirable for future academics.

]]>
Quantified academics: Heideggerian technology critical analysis of the academic ranking competition10.1108/ITP-01-2023-0032Information Technology & People2024-01-16© 2023 Jani Koskinen, Kai Kristian Kimppa, Janne Lahtiranta and Sami HyrynsalmiJani KoskinenKai Kristian KimppaJanne LahtirantaSami HyrynsalmiInformation Technology & People3782024-01-1610.1108/ITP-01-2023-0032https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0032/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Jani Koskinen, Kai Kristian Kimppa, Janne Lahtiranta and Sami Hyrynsalmihttp://creativecommons.org/licences/by/4.0/legalcode
Identification of research trends in emerging technologies implementation on public services using text mining analysishttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2021-0188/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery. VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services. The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage. The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services. The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services. Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.Identification of research trends in emerging technologies implementation on public services using text mining analysis
Manuel Pedro Rodríguez Bolívar, Laura Alcaide Muñoz
Information Technology & People, Vol. 37, No. 8, pp.43-65

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.

VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.

The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.

The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.

The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.

Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.

]]>
Identification of research trends in emerging technologies implementation on public services using text mining analysis10.1108/ITP-03-2021-0188Information Technology & People2022-04-28© 2022 Manuel Pedro Rodríguez Bolívar and Laura Alcaide MuñozManuel Pedro Rodríguez BolívarLaura Alcaide MuñozInformation Technology & People3782022-04-2810.1108/ITP-03-2021-0188https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2021-0188/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2022 Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñozhttp://creativecommons.org/licences/by/4.0/legalcode
The roles of conflict management and psychological empowerment in virtual teamshttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0265/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper aims to determine the impact of perceived virtuality on team dynamics and outcomes by adopting the Input-Mediators-Outcome (IMO) framework. Further, it also investigates the mediating role of team processes and emergent states. The authors collected survey data from 315 individuals working in virtual teams (VTs) in the information technology sector in India using both offline and online questionnaires. They performed the analysis using Partial Least Squares Structural Equation Modelling (PLS-SEM). The authors investigated two sets of hypotheses – both direct and indirect (or mediation interactions). Results show that psychological empowerment and conflict management are significant in managing VTs. Also, perceived virtuality impacts team outcomes, i.e. perceived team performance, team satisfaction and subjective well-being. The interplay between the behavioural team process (conflict management) and the emergent state (psychological empowerment) was examined. The study also helps broaden our understanding of the various psychological variables associated with teamwork in the context of VTs. Findings from this study will aid in assessing the consequences of virtual teamwork at both individual and organisational levels, such as guiding the design and sustainability of VT arrangements, achieving higher productivity in VTs, and designing effective and interactive solutions in the virtual space. The study examined the interplay between behavioural team processes (such as conflict management) and emergent states (such as psychological empowerment). The study also theorises and empirically tests the relationships between perceived virtuality and team outcomes (i.e. both affective and effectiveness). It may serve as a guide to understanding team dynamics in VTs better. This exploratory study attempts to enhance the current understanding of the research and practice of VTs within a developing economy.The roles of conflict management and psychological empowerment in virtual teams
Shubhi Gupta, Govind Swaroop Pathak, Baidyanath Biswas
Information Technology & People, Vol. 37, No. 8, pp.66-108

This paper aims to determine the impact of perceived virtuality on team dynamics and outcomes by adopting the Input-Mediators-Outcome (IMO) framework. Further, it also investigates the mediating role of team processes and emergent states.

The authors collected survey data from 315 individuals working in virtual teams (VTs) in the information technology sector in India using both offline and online questionnaires. They performed the analysis using Partial Least Squares Structural Equation Modelling (PLS-SEM).

The authors investigated two sets of hypotheses – both direct and indirect (or mediation interactions). Results show that psychological empowerment and conflict management are significant in managing VTs. Also, perceived virtuality impacts team outcomes, i.e. perceived team performance, team satisfaction and subjective well-being.

The interplay between the behavioural team process (conflict management) and the emergent state (psychological empowerment) was examined. The study also helps broaden our understanding of the various psychological variables associated with teamwork in the context of VTs.

Findings from this study will aid in assessing the consequences of virtual teamwork at both individual and organisational levels, such as guiding the design and sustainability of VT arrangements, achieving higher productivity in VTs, and designing effective and interactive solutions in the virtual space.

The study examined the interplay between behavioural team processes (such as conflict management) and emergent states (such as psychological empowerment). The study also theorises and empirically tests the relationships between perceived virtuality and team outcomes (i.e. both affective and effectiveness). It may serve as a guide to understanding team dynamics in VTs better.

This exploratory study attempts to enhance the current understanding of the research and practice of VTs within a developing economy.

]]>
The roles of conflict management and psychological empowerment in virtual teams10.1108/ITP-04-2022-0265Information Technology & People2023-07-03© 2020 Shubhi Gupta, Govind Swaroop Pathak and Baidyanath BiswasShubhi GuptaGovind Swaroop PathakBaidyanath BiswasInformation Technology & People3782023-07-0310.1108/ITP-04-2022-0265https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0265/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2020 Shubhi Gupta, Govind Swaroop Pathak and Baidyanath Biswashttp://creativecommons.org/licences/by/4.0/legalcode
Caught in the web: a meta-analysis of Internet addiction, excessive daytime sleepiness and depressive symptoms in adolescentshttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2023-0676/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestIn response to growing concerns over the negative consequences of Internet addiction on adolescents’ mental health, coupled with conflicting results in this literature stream, this meta-analysis sought to (1) examine the association between Internet addiction and depressive symptoms in adolescents, (2) examine the moderating role of Internet freedom across countries, and (3) examine the mediating role of excessive daytime sleepiness. In total, 52 studies were analyzed using robust variance estimation and meta-analytic structural equation modeling. There was a significant and moderate association between Internet addiction and depressive symptoms. Furthermore, Internet freedom did not explain heterogeneity in this literature stream before and after controlling for study quality and the percentage of female participants. In support of the displacement hypothesis, this study found that Internet addiction contributes to depressive symptoms through excessive daytime sleepiness (proportion mediated = 17.48%). As the evidence suggests, excessive daytime sleepiness displaces a host of activities beneficial for maintaining mental health. The results were subjected to a battery of robustness checks and the conclusions remain unchanged. The results underscore the negative consequences of Internet addiction in adolescents. Addressing this issue would involve interventions that promote sleep hygiene and greater offline engagement with peers to alleviate depressive symptoms. This study utilizes robust meta-analytic techniques to provide the most comprehensive examination of the association between Internet addiction and depressive symptoms in adolescents. The implications intersect with the shared interests of social scientists, health practitioners, and policy makers.Caught in the web: a meta-analysis of Internet addiction, excessive daytime sleepiness and depressive symptoms in adolescents
Hassam Waheed, Peter J.R. Macaulay, Hamdan Amer Ali Al-Jaifi, Kelly-Ann Allen, Long She
Information Technology & People, Vol. 37, No. 8, pp.109-129

In response to growing concerns over the negative consequences of Internet addiction on adolescents’ mental health, coupled with conflicting results in this literature stream, this meta-analysis sought to (1) examine the association between Internet addiction and depressive symptoms in adolescents, (2) examine the moderating role of Internet freedom across countries, and (3) examine the mediating role of excessive daytime sleepiness.

In total, 52 studies were analyzed using robust variance estimation and meta-analytic structural equation modeling.

There was a significant and moderate association between Internet addiction and depressive symptoms. Furthermore, Internet freedom did not explain heterogeneity in this literature stream before and after controlling for study quality and the percentage of female participants. In support of the displacement hypothesis, this study found that Internet addiction contributes to depressive symptoms through excessive daytime sleepiness (proportion mediated = 17.48%). As the evidence suggests, excessive daytime sleepiness displaces a host of activities beneficial for maintaining mental health. The results were subjected to a battery of robustness checks and the conclusions remain unchanged.

The results underscore the negative consequences of Internet addiction in adolescents. Addressing this issue would involve interventions that promote sleep hygiene and greater offline engagement with peers to alleviate depressive symptoms.

This study utilizes robust meta-analytic techniques to provide the most comprehensive examination of the association between Internet addiction and depressive symptoms in adolescents. The implications intersect with the shared interests of social scientists, health practitioners, and policy makers.

]]>
Caught in the web: a meta-analysis of Internet addiction, excessive daytime sleepiness and depressive symptoms in adolescents10.1108/ITP-07-2023-0676Information Technology & People2024-03-14© 2024 Hassam Waheed, Peter J.R. Macaulay, Hamdan Amer Ali Al-Jaifi, Kelly-Ann Allen and Long SheHassam WaheedPeter J.R. MacaulayHamdan Amer Ali Al-JaifiKelly-Ann AllenLong SheInformation Technology & People3782024-03-1410.1108/ITP-07-2023-0676https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2023-0676/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Hassam Waheed, Peter J.R. Macaulay, Hamdan Amer Ali Al-Jaifi, Kelly-Ann Allen and Long Shehttp://creativecommons.org/licences/by/4.0/legalcode
Depressive mood and compulsive social media usage: the mediating roles of contingent self-esteem and social interaction fearshttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2021-0057/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestGiven the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in developing compulsive social media use behavior. The authors also identify and hypothesize channels such as contingent self-esteem (CSE), social interaction anxiety (SIA) and fear of negative evaluation (FNE), which may explain how PDM affects compulsive social media use. The research model was empirically tested with a survey of 367 Chinese university students using structural equation modeling by drawing on the escape and self-presentation lenses. The findings indicate that PDM contributes to compulsive social media use behavior both directly and indirectly through CSE. Furthermore, the impact of CSE on compulsive social media use is mediated by the FNE, whereas SIA fails to mediate this effect. The results can advance the authors’ knowledge of the role and process by which depressive mood impacts compulsive social media use. These findings may add insights into psychological treatment and help in, for example, developing counseling programs or coping strategies for depressed people to protect them from using social media excessively. This research identifies the pathway mechanism between PDM and compulsive use of social media. It also increases the understanding of how CSE and social interaction deficiencies contribute to compulsive social media usage (CSMU).Depressive mood and compulsive social media usage: the mediating roles of contingent self-esteem and social interaction fears
Fayaz Ali, Muhammd Zubair Tauni, Muhammad Ashfaq, Qingyu Zhang, Tanveer Ahsan
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Given the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in developing compulsive social media use behavior. The authors also identify and hypothesize channels such as contingent self-esteem (CSE), social interaction anxiety (SIA) and fear of negative evaluation (FNE), which may explain how PDM affects compulsive social media use.

The research model was empirically tested with a survey of 367 Chinese university students using structural equation modeling by drawing on the escape and self-presentation lenses.

The findings indicate that PDM contributes to compulsive social media use behavior both directly and indirectly through CSE. Furthermore, the impact of CSE on compulsive social media use is mediated by the FNE, whereas SIA fails to mediate this effect.

The results can advance the authors’ knowledge of the role and process by which depressive mood impacts compulsive social media use. These findings may add insights into psychological treatment and help in, for example, developing counseling programs or coping strategies for depressed people to protect them from using social media excessively.

This research identifies the pathway mechanism between PDM and compulsive use of social media. It also increases the understanding of how CSE and social interaction deficiencies contribute to compulsive social media usage (CSMU).

]]>
Depressive mood and compulsive social media usage: the mediating roles of contingent self-esteem and social interaction fears10.1108/ITP-01-2021-0057Information Technology & People2023-03-22© 2023 Emerald Publishing LimitedFayaz AliMuhammd Zubair TauniMuhammad AshfaqQingyu ZhangTanveer AhsanInformation Technology & Peopleahead-of-printahead-of-print2023-03-2210.1108/ITP-01-2021-0057https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2021-0057/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Symbolic power, discourse, and underrepresentation of women in IThttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2021-0060/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe authors aim to contribute to the understanding of the enduring underrepresentation of women in the IT industry by analysing media discourse triggered by a campaign intended to encourage women to join the IT industry. Internet media coverage of the Little Miss Geek campaign in the UK was analysed as qualitative data to reveal systematic and coherent patterns contributing to the social construction of the role of women with respect to the IT industry and IT employment. While ostensibly supporting women's empowerment, the discourse framed women's participation in the IT industry as difficult to achieve, focused on women's presumed “feminine” essential features (thus, effectively implying that they are less suitable for IT employment than men), and tasked women with overcoming the barrier via individual efforts (thus, implicitly blaming them for the imbalance). In these ways, the discourse worked against the broader aims of the campaign. Campaigns and organisations that promote women's participation should work to establish new frames, rather than allowing the discourse to be shaped by the established frames. The authors interpret the framing in the discourse using Bourdieu's perspective on symbolic power: the symbolic power behind the existing patriarchal order expressed itself via framing, thus contributing to the maintenance of that order. By demonstrating the relevance of Bourdieu's symbolic power, the authors offer a novel understanding of how underrepresentation of women in the IT sector is produced and maintained.Symbolic power, discourse, and underrepresentation of women in IT
Tanya Jurado, Alexei Tretiakov, Jo Bensemann
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The authors aim to contribute to the understanding of the enduring underrepresentation of women in the IT industry by analysing media discourse triggered by a campaign intended to encourage women to join the IT industry.

Internet media coverage of the Little Miss Geek campaign in the UK was analysed as qualitative data to reveal systematic and coherent patterns contributing to the social construction of the role of women with respect to the IT industry and IT employment.

While ostensibly supporting women's empowerment, the discourse framed women's participation in the IT industry as difficult to achieve, focused on women's presumed “feminine” essential features (thus, effectively implying that they are less suitable for IT employment than men), and tasked women with overcoming the barrier via individual efforts (thus, implicitly blaming them for the imbalance). In these ways, the discourse worked against the broader aims of the campaign.

Campaigns and organisations that promote women's participation should work to establish new frames, rather than allowing the discourse to be shaped by the established frames.

The authors interpret the framing in the discourse using Bourdieu's perspective on symbolic power: the symbolic power behind the existing patriarchal order expressed itself via framing, thus contributing to the maintenance of that order. By demonstrating the relevance of Bourdieu's symbolic power, the authors offer a novel understanding of how underrepresentation of women in the IT sector is produced and maintained.

]]>
Symbolic power, discourse, and underrepresentation of women in IT10.1108/ITP-01-2021-0060Information Technology & People2023-06-28© 2023 Emerald Publishing LimitedTanya JuradoAlexei TretiakovJo BensemannInformation Technology & Peopleahead-of-printahead-of-print2023-06-2810.1108/ITP-01-2021-0060https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2021-0060/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities?https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2022-0034/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestGiven the popularity of online health communities (OHCs) and medical question-and-answer (Q&A) services, it is increasingly important to understand what constitutes useful answers and user-adopted standards in healthcare domain. However, few studies provide insights into how health information characteristics, provider characteristics and recipient characteristics jointly influence user information adoption decisions. To fill this research gap, this study examines the combined effects of physicians' certainty tone as information characteristics, seniority as provider characteristics and disease severity as recipient characteristics on patients' health information adoption. Drawing on dual-process theory and information adoption model, an extended information adoption model is established in this study to examine the effect of attitude certainty on patients' health information adoption, and the moderating effects of online seniority and offline seniority, as well as patient motivation level—disease severity. Utilizing logit regression models, the authors empirically tested the hypotheses based on 4,224 Q&A records from a popular Chinese OHC. The results show that (1) attitude certainty has a significant positive impact on patients' health information adoption, (2) the relationship between attitude certainty and information adoption is negatively moderated by physicians' online seniority, but is positively moderated by offline seniority; (3) there is a negative three-way interaction effect of attitude certainty, online seniority and disease severity on patients' health information adoption. This study extends the information adoption model to examine the two-way interaction between argument quality and source reliability, as well as the three-way interaction with user motivation level, especially for health information adoption in the healthcare field. These findings also provide direct practical applications for knowledge contributors and OHCs.Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities?
Jiahua Jin, Qin Chen, Xiangbin Yan
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Given the popularity of online health communities (OHCs) and medical question-and-answer (Q&A) services, it is increasingly important to understand what constitutes useful answers and user-adopted standards in healthcare domain. However, few studies provide insights into how health information characteristics, provider characteristics and recipient characteristics jointly influence user information adoption decisions. To fill this research gap, this study examines the combined effects of physicians' certainty tone as information characteristics, seniority as provider characteristics and disease severity as recipient characteristics on patients' health information adoption.

Drawing on dual-process theory and information adoption model, an extended information adoption model is established in this study to examine the effect of attitude certainty on patients' health information adoption, and the moderating effects of online seniority and offline seniority, as well as patient motivation level—disease severity. Utilizing logit regression models, the authors empirically tested the hypotheses based on 4,224 Q&A records from a popular Chinese OHC.

The results show that (1) attitude certainty has a significant positive impact on patients' health information adoption, (2) the relationship between attitude certainty and information adoption is negatively moderated by physicians' online seniority, but is positively moderated by offline seniority; (3) there is a negative three-way interaction effect of attitude certainty, online seniority and disease severity on patients' health information adoption.

This study extends the information adoption model to examine the two-way interaction between argument quality and source reliability, as well as the three-way interaction with user motivation level, especially for health information adoption in the healthcare field. These findings also provide direct practical applications for knowledge contributors and OHCs.

]]>
Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities?10.1108/ITP-01-2022-0034Information Technology & People2023-10-30© 2023 Emerald Publishing LimitedJiahua JinQin ChenXiangbin YanInformation Technology & Peopleahead-of-printahead-of-print2023-10-3010.1108/ITP-01-2022-0034https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2022-0034/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Does training provision matter? Unravelling the impact of digital transformation on environmental sustainabilityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0007/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestMany firms are now pursuing large-scale change initiatives to accelerate their digital transformation (DT) and sustainable development. However, the success rate of DT projects is still low, and the extent to which DT enables firms to improve environmental sustainability (ES) remains unclear. Recently, researchers have argued that DT is more about people transformation rather than technology. Based on the contingent resource-based view, this study investigates how DT influences ES and examines the moderating role of training provision (TP). Survey data gathered from manufacturers in China were analysed to test the proposed theoretical framework. The results indicate that DT has a positive impact on ES, and that this effect is positively moderated by TP. The empirical findings provide insights for managers to understand the success of digital sustainability transformation requires necessary digital knowledge and skills derived from TP. This study provides an initial examination of digital sustainability, which is a new stream of literature for the digital age, and further extends existing knowledge by demonstrating the importance of people (i.e. TP) in strengthening the effectiveness of DT on ES.Does training provision matter? Unravelling the impact of digital transformation on environmental sustainability
Wantao Yu, Qi Liu, Roberto Chavez, Linchang Zheng
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Many firms are now pursuing large-scale change initiatives to accelerate their digital transformation (DT) and sustainable development. However, the success rate of DT projects is still low, and the extent to which DT enables firms to improve environmental sustainability (ES) remains unclear. Recently, researchers have argued that DT is more about people transformation rather than technology. Based on the contingent resource-based view, this study investigates how DT influences ES and examines the moderating role of training provision (TP).

Survey data gathered from manufacturers in China were analysed to test the proposed theoretical framework.

The results indicate that DT has a positive impact on ES, and that this effect is positively moderated by TP.

The empirical findings provide insights for managers to understand the success of digital sustainability transformation requires necessary digital knowledge and skills derived from TP.

This study provides an initial examination of digital sustainability, which is a new stream of literature for the digital age, and further extends existing knowledge by demonstrating the importance of people (i.e. TP) in strengthening the effectiveness of DT on ES.

]]>
Does training provision matter? Unravelling the impact of digital transformation on environmental sustainability10.1108/ITP-01-2023-0007Information Technology & People2023-12-20© 2023 Emerald Publishing LimitedWantao YuQi LiuRoberto ChavezLinchang ZhengInformation Technology & Peopleahead-of-printahead-of-print2023-12-2010.1108/ITP-01-2023-0007https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0007/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Artificial intelligence or human: when and why consumers prefer AI recommendationshttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0022/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestArtificial intelligence (AI) is revolutionizing product recommendations, but little is known about consumer acceptance of AI recommendations. This study examines how to improve consumers' acceptance of AI recommendations from the perspective of product type (material vs experiential). Four studies, including a field experiment and three online experiments, tested how consumers' preference for AI-based (vs human) recommendations differs between material and experiential product purchases. Results show that people perceive AI recommendations as more competent than human recommendations for material products, whereas they believe human recommendations are more competent than AI recommendations for experiential products. Therefore, people are more (less) likely to choose AI recommendations when buying material (vs experiential) products. However, this effect is eliminated when is used as an assistant to rather than a replacement for a human recommendation. This study is the first to focus on how products' material and experiential attributes influence people's attitudes toward AI recommendations. The authors also identify under what circumstances resistance to algorithmic advice is attenuated. These findings contribute to the research on the psychology of artificial intelligence and on human–technology interaction by investigating how experiential and material attributes influence preference for or resistance to AI recommenders.Artificial intelligence or human: when and why consumers prefer AI recommendations
Fei Jin, Xiaodan Zhang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Artificial intelligence (AI) is revolutionizing product recommendations, but little is known about consumer acceptance of AI recommendations. This study examines how to improve consumers' acceptance of AI recommendations from the perspective of product type (material vs experiential).

Four studies, including a field experiment and three online experiments, tested how consumers' preference for AI-based (vs human) recommendations differs between material and experiential product purchases.

Results show that people perceive AI recommendations as more competent than human recommendations for material products, whereas they believe human recommendations are more competent than AI recommendations for experiential products. Therefore, people are more (less) likely to choose AI recommendations when buying material (vs experiential) products. However, this effect is eliminated when is used as an assistant to rather than a replacement for a human recommendation.

This study is the first to focus on how products' material and experiential attributes influence people's attitudes toward AI recommendations. The authors also identify under what circumstances resistance to algorithmic advice is attenuated. These findings contribute to the research on the psychology of artificial intelligence and on human–technology interaction by investigating how experiential and material attributes influence preference for or resistance to AI recommenders.

]]>
Artificial intelligence or human: when and why consumers prefer AI recommendations10.1108/ITP-01-2023-0022Information Technology & People2023-10-06© 2023 Emerald Publishing LimitedFei JinXiaodan ZhangInformation Technology & Peopleahead-of-printahead-of-print2023-10-0610.1108/ITP-01-2023-0022https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0022/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Synergizing organizational inclusion and IT competencies through resource orchestration: a longitudinal explorationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0052/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study investigates the integration of information technology (IT) competencies with organizational inclusion initiatives and its impact on firm performance. It examines the role of organizational inclusion in promoting knowledge management capability (KMC) and the moderating effect of approach and avoidance motivation on the relationship between KMC and operational performance. The study is grounded in the resource orchestration theory (ROT), which conceptualizes the integration of IT competencies and organizational inclusion. It employs hierarchical regression analysis on data collected from 204 firms and 374 managerial respondents to test the proposed hypotheses. The results indicate that IT competencies enhance the relationship between organizational inclusion and KMC. Additionally, the relationship between KMC and operational performance is weaker when employees exhibit higher levels of avoidance motivation. This study offers theoretical and managerial insights for integrating IT competencies into organizational inclusion initiatives, providing guidance for organizations seeking to enhance their performance, with a specific focus on the relevance of China as the research context. This study enriches the scholarly discourse by examining the underexplored integration of IT competencies with organizational inclusion, notably in the context of China. It illuminates the moderating role of motivation in the KMC-operational performance relationship, benefiting both academia and practitioners. Furthermore, this work extends the literature by demonstrating how combining organizational inclusion and IT competencies can enhance workplace KMC, connecting it to internal knowledge resources. Theoretical implications extend beyond organizational inclusion and IT to show the broader application potential of ROT in management and information systems.Synergizing organizational inclusion and IT competencies through resource orchestration: a longitudinal exploration
Ayesha Masood, Anas A. Salameh, Ashraf Khalil, Qingyu Zhang, Armando Papa
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study investigates the integration of information technology (IT) competencies with organizational inclusion initiatives and its impact on firm performance. It examines the role of organizational inclusion in promoting knowledge management capability (KMC) and the moderating effect of approach and avoidance motivation on the relationship between KMC and operational performance.

The study is grounded in the resource orchestration theory (ROT), which conceptualizes the integration of IT competencies and organizational inclusion. It employs hierarchical regression analysis on data collected from 204 firms and 374 managerial respondents to test the proposed hypotheses.

The results indicate that IT competencies enhance the relationship between organizational inclusion and KMC. Additionally, the relationship between KMC and operational performance is weaker when employees exhibit higher levels of avoidance motivation.

This study offers theoretical and managerial insights for integrating IT competencies into organizational inclusion initiatives, providing guidance for organizations seeking to enhance their performance, with a specific focus on the relevance of China as the research context.

This study enriches the scholarly discourse by examining the underexplored integration of IT competencies with organizational inclusion, notably in the context of China. It illuminates the moderating role of motivation in the KMC-operational performance relationship, benefiting both academia and practitioners. Furthermore, this work extends the literature by demonstrating how combining organizational inclusion and IT competencies can enhance workplace KMC, connecting it to internal knowledge resources. Theoretical implications extend beyond organizational inclusion and IT to show the broader application potential of ROT in management and information systems.

]]>
Synergizing organizational inclusion and IT competencies through resource orchestration: a longitudinal exploration10.1108/ITP-01-2023-0052Information Technology & People2023-12-11© 2023 Emerald Publishing LimitedAyesha MasoodAnas A. SalamehAshraf KhalilQingyu ZhangArmando PapaInformation Technology & Peopleahead-of-printahead-of-print2023-12-1110.1108/ITP-01-2023-0052https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0052/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Implications of algorithmic management on careers and employment relationships in the gig economy – a developing country perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0064/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper aims to explore the implications of algorithmic management on careers and employment relationships in the Nigerian gig economy. Specifically, drawing on labour process theory (LPT), this study provides an understanding of the production relations beyond the “traditional standard” to “nonstandard” forms of employment in a gig economy mediated by digital platforms or digital forms of work, especially on ride-hailing platforms (Uber and Bolt). This study adopted the interpretive qualitative approach and a semi-structured interview of 49 participants, including 46 platform drivers and 3 platform managers from Uber and Bolt. This study addresses the theoretical underpinnings of the LPT as it relates to algorithmic management and control in the digital platform economy. The study revealed that, despite the ultra-precarious working conditions and persistent uncertainty in employment relations under algorithmic management, the underlying key factors that motivate workers to engage in digital platform work include higher job flexibility and autonomy, as well as having a source of income. This study captured the human-digital interface and labour processes related to digital platform work in Nigeria. Findings of this study also revealed that algorithmic management enables a transactional exchange between platform providers and drivers, while relational exchanges occur between drivers and customers/passengers. Finally, this study highlighted the perceived impact of algorithmic management on the attitude and performance of workers. The research presents an interesting case study to investigate the influence of algorithmic management and labour processes on employment relationships in the largest emerging economy in Africa.Implications of algorithmic management on careers and employment relationships in the gig economy – a developing country perspective
Olatunji David Adekoya, Chima Mordi, Hakeem Adeniyi Ajonbadi, Weifeng Chen
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This paper aims to explore the implications of algorithmic management on careers and employment relationships in the Nigerian gig economy. Specifically, drawing on labour process theory (LPT), this study provides an understanding of the production relations beyond the “traditional standard” to “nonstandard” forms of employment in a gig economy mediated by digital platforms or digital forms of work, especially on ride-hailing platforms (Uber and Bolt).

This study adopted the interpretive qualitative approach and a semi-structured interview of 49 participants, including 46 platform drivers and 3 platform managers from Uber and Bolt.

This study addresses the theoretical underpinnings of the LPT as it relates to algorithmic management and control in the digital platform economy. The study revealed that, despite the ultra-precarious working conditions and persistent uncertainty in employment relations under algorithmic management, the underlying key factors that motivate workers to engage in digital platform work include higher job flexibility and autonomy, as well as having a source of income. This study captured the human-digital interface and labour processes related to digital platform work in Nigeria. Findings of this study also revealed that algorithmic management enables a transactional exchange between platform providers and drivers, while relational exchanges occur between drivers and customers/passengers. Finally, this study highlighted the perceived impact of algorithmic management on the attitude and performance of workers.

The research presents an interesting case study to investigate the influence of algorithmic management and labour processes on employment relationships in the largest emerging economy in Africa.

]]>
Implications of algorithmic management on careers and employment relationships in the gig economy – a developing country perspective10.1108/ITP-01-2023-0064Information Technology & People2023-11-27© 2023 Emerald Publishing LimitedOlatunji David AdekoyaChima MordiHakeem Adeniyi AjonbadiWeifeng ChenInformation Technology & Peopleahead-of-printahead-of-print2023-11-2710.1108/ITP-01-2023-0064https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0064/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The effects of Experience-Technology Fit (ETF) on consumption behavior: Extended Reality (XR) visitor experiencehttps://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0100/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestTraditionally, Task–Technology Fit (TTF) theory has been applied to examine the usefulness of technology in the work environment. Can the same approach (based on experience rather than tasks) be applied to non-work, cultural heritage environments? This is the question the authors ask in this study. This study proposes a new variation of TTF based on the experience economy model, namely Experience–Technology Fit (ETF), for the non-work environment, in particular, in the context of cultural heritage, where visitor experience is enhanced by extended reality technology, which combines immersive technologies and artificial intelligence. Employing a quantitative survey method, the empirical analysis seeks to determine the influence of Mixed Reality (MR) characteristics (interactivity, vividness), Voice User Interface (VUI) characteristics (speech recognition, speech synthesis) and experience economy factors (education, entertainment, esthetic, escape) on satisfaction, revisit intention and actual purchase to propose a new ETF model. VUI, MR, and experience factors were significantly associated with ETF; when combined with MR-based experience, ETF was significantly associated with satisfaction. This study’s findings further demonstrate the relationship between users' satisfaction when engaging with MR-based experience and revisit intention, while purchase intention was significantly associated with the actual purchase. The novel contribution of this study is the proposal of the EFT model, a new variation of TTF based on the experience economy model. Overall, this study expands the applications of TTF to an experience-oriented business, thereby broadening the authors’ understanding of technological success with a specific focus on the technology fit of Extended Reality (XR) in the context of cultural heritage.The effects of Experience-Technology Fit (ETF) on consumption behavior: Extended Reality (XR) visitor experience
Timothy Jung, Sujin Bae, Natasha Moorhouse, Ohbyung Kwon
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Traditionally, Task–Technology Fit (TTF) theory has been applied to examine the usefulness of technology in the work environment. Can the same approach (based on experience rather than tasks) be applied to non-work, cultural heritage environments? This is the question the authors ask in this study. This study proposes a new variation of TTF based on the experience economy model, namely Experience–Technology Fit (ETF), for the non-work environment, in particular, in the context of cultural heritage, where visitor experience is enhanced by extended reality technology, which combines immersive technologies and artificial intelligence.

Employing a quantitative survey method, the empirical analysis seeks to determine the influence of Mixed Reality (MR) characteristics (interactivity, vividness), Voice User Interface (VUI) characteristics (speech recognition, speech synthesis) and experience economy factors (education, entertainment, esthetic, escape) on satisfaction, revisit intention and actual purchase to propose a new ETF model.

VUI, MR, and experience factors were significantly associated with ETF; when combined with MR-based experience, ETF was significantly associated with satisfaction. This study’s findings further demonstrate the relationship between users' satisfaction when engaging with MR-based experience and revisit intention, while purchase intention was significantly associated with the actual purchase.

The novel contribution of this study is the proposal of the EFT model, a new variation of TTF based on the experience economy model. Overall, this study expands the applications of TTF to an experience-oriented business, thereby broadening the authors’ understanding of technological success with a specific focus on the technology fit of Extended Reality (XR) in the context of cultural heritage.

]]>
The effects of Experience-Technology Fit (ETF) on consumption behavior: Extended Reality (XR) visitor experience10.1108/ITP-01-2023-0100Information Technology & People2023-07-10© 2023 Emerald Publishing LimitedTimothy JungSujin BaeNatasha MoorhouseOhbyung KwonInformation Technology & Peopleahead-of-printahead-of-print2023-07-1010.1108/ITP-01-2023-0100https://www.emerald.com/insight/content/doi/10.1108/ITP-01-2023-0100/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Effects of work interruption on employees' work performance: moderating role of social media usagehttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0103/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestWork interruptions (WIs) due to social media are becoming more and more common in the daily lives of organizations. However, the relationship between WI and work performance of employees is still unclear. This study aims to investigate the effects of WIs due to social media on employees' work performance in terms of different mechanisms; it also considers the moderating role of social media usage. Using the jobs demands-resource (JD-R) model, this paper proposes a research model to investigate the effects of WIs on employee work performance from the perspective of the enabling mechanism and burden mechanism. Structural equation modeling (SEM) was used to analyze the data of 444 employees. The results show that (1) with regard to the enabling mechanism path, WI has a positive effect on employees' sense of belonging, which further has a positive effect on employees' work performance; (2) with regard to the burden mechanism path, WI has a positive effect on employees' interruption overload; however, the effect of employee interruption overload on employees' work performance is not significant, and (3) social media used for either work or social purposes can strengthen the relationship between WI and interruption overload, while social media used for work-related purposes can reduce the relationship between WI and a sense of belonging. First, this paper contributes to the WI literature by clarifying how WI affects employees' work performance through different mechanisms, namely the enabling mechanism and the burden mechanism. Second, this paper contributes to the WI literature by revealing a boundary condition, namely social media use, between WI and a sense of belonging and between WI and employees' interruption overload.Effects of work interruption on employees' work performance: moderating role of social media usage
Liang Ma, Xin Zhang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Work interruptions (WIs) due to social media are becoming more and more common in the daily lives of organizations. However, the relationship between WI and work performance of employees is still unclear. This study aims to investigate the effects of WIs due to social media on employees' work performance in terms of different mechanisms; it also considers the moderating role of social media usage.

Using the jobs demands-resource (JD-R) model, this paper proposes a research model to investigate the effects of WIs on employee work performance from the perspective of the enabling mechanism and burden mechanism. Structural equation modeling (SEM) was used to analyze the data of 444 employees.

The results show that (1) with regard to the enabling mechanism path, WI has a positive effect on employees' sense of belonging, which further has a positive effect on employees' work performance; (2) with regard to the burden mechanism path, WI has a positive effect on employees' interruption overload; however, the effect of employee interruption overload on employees' work performance is not significant, and (3) social media used for either work or social purposes can strengthen the relationship between WI and interruption overload, while social media used for work-related purposes can reduce the relationship between WI and a sense of belonging.

First, this paper contributes to the WI literature by clarifying how WI affects employees' work performance through different mechanisms, namely the enabling mechanism and the burden mechanism. Second, this paper contributes to the WI literature by revealing a boundary condition, namely social media use, between WI and a sense of belonging and between WI and employees' interruption overload.

]]>
Effects of work interruption on employees' work performance: moderating role of social media usage10.1108/ITP-02-2022-0103Information Technology & People2023-09-13© 2023 Emerald Publishing LimitedLiang MaXin ZhangInformation Technology & Peopleahead-of-printahead-of-print2023-09-1310.1108/ITP-02-2022-0103https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0103/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Work engagement of online car-hailing drivers: the effects of platforms' algorithmic managementhttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0122/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestAlgorithms are widely used to manage various activities in the gig economy. Online car-hailing platforms, such as Uber and Lyft, are exemplary embodiments of such algorithmic management, where drivers are managed by algorithms for task allocation, work monitoring and performance evaluation. Despite employing substantially, the platforms face the challenge of maintaining and fostering drivers' work engagement. Thus, this study aims to examine how the algorithmic management of online car-hailing platforms affects drivers' work engagement. Drawing on the transactional theory of stress, the authors examined the effects of algorithmic monitoring and fairness on online car-hailing drivers' work engagement and revealed the mediation effects of challenge-hindrance appraisals. Based on survey data collected from 364 drivers, the authors' hypotheses were examined using partial least squares structural equation modeling (PLS-SEM). The authors also applied path comparison analyses to further compare the effects of algorithmic monitoring and fairness on the two types of appraisals. This study finds that online car-hailing drivers' challenge-hindrance appraisals mediate the relationship between algorithmic management characteristics and work engagement. Algorithmic monitoring positively affects both challenge and hindrance appraisals in online car-hailing drivers. However, algorithmic fairness promotes challenge appraisal and reduces hindrance appraisal. Consequently, challenge and hindrance appraisals lead to higher and lower work engagement, respectively. Further, the additional path comparison analysis showed that the hindering effect of algorithmic monitoring exceeds its challenging effect, and the challenge-promoting effect of algorithmic fairness is greater than the algorithm's hindrance-reducing effect. This paper reveals the underlying mechanisms concerning how algorithmic monitoring and fairness affect online car-hailing drivers' work engagement and fills the gap in the research on algorithmic management in the context of online car-hailing platforms. The authors' findings also provide practical guidance for online car-hailing platforms on how to improve the platforms' algorithmic management systems.Work engagement of online car-hailing drivers: the effects of platforms' algorithmic management
Weimo Li, Yaobin Lu, Peng Hu, Sumeet Gupta
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Algorithms are widely used to manage various activities in the gig economy. Online car-hailing platforms, such as Uber and Lyft, are exemplary embodiments of such algorithmic management, where drivers are managed by algorithms for task allocation, work monitoring and performance evaluation. Despite employing substantially, the platforms face the challenge of maintaining and fostering drivers' work engagement. Thus, this study aims to examine how the algorithmic management of online car-hailing platforms affects drivers' work engagement.

Drawing on the transactional theory of stress, the authors examined the effects of algorithmic monitoring and fairness on online car-hailing drivers' work engagement and revealed the mediation effects of challenge-hindrance appraisals. Based on survey data collected from 364 drivers, the authors' hypotheses were examined using partial least squares structural equation modeling (PLS-SEM). The authors also applied path comparison analyses to further compare the effects of algorithmic monitoring and fairness on the two types of appraisals.

This study finds that online car-hailing drivers' challenge-hindrance appraisals mediate the relationship between algorithmic management characteristics and work engagement. Algorithmic monitoring positively affects both challenge and hindrance appraisals in online car-hailing drivers. However, algorithmic fairness promotes challenge appraisal and reduces hindrance appraisal. Consequently, challenge and hindrance appraisals lead to higher and lower work engagement, respectively. Further, the additional path comparison analysis showed that the hindering effect of algorithmic monitoring exceeds its challenging effect, and the challenge-promoting effect of algorithmic fairness is greater than the algorithm's hindrance-reducing effect.

This paper reveals the underlying mechanisms concerning how algorithmic monitoring and fairness affect online car-hailing drivers' work engagement and fills the gap in the research on algorithmic management in the context of online car-hailing platforms. The authors' findings also provide practical guidance for online car-hailing platforms on how to improve the platforms' algorithmic management systems.

]]>
Work engagement of online car-hailing drivers: the effects of platforms' algorithmic management10.1108/ITP-02-2022-0122Information Technology & People2023-05-19© 2023 Emerald Publishing LimitedWeimo LiYaobin LuPeng HuSumeet GuptaInformation Technology & Peopleahead-of-printahead-of-print2023-05-1910.1108/ITP-02-2022-0122https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0122/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Continuous knowledge contribution in social Q&A communities: the moderation effects of self-presentation and motivational affordanceshttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0128/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestBased on the perspectives of social capital, image motivation and motivation affordances, this paper explores the direct and moderation effects of different kinds of motivations (i.e. relationship-based motivation, community-based motivation and individual-based motivation) on users' continuous knowledge contributions in social question and answer (Q&A) communities. The authors collect the panel data of 10,193 users from a popular social Q&A community in China. Then, a negative binomial regression model is adopted to analyze the collected data. The paper demonstrates that social learning, peer recognition and knowledge seeking positively affect users' continuous contribution behaviors. However, the results also show that social exposure has the opposite effect. In addition, self-presentation is found to moderate the influence of social factors on users' continuous use behaviors, while the moderation effect of motivation affordances has no significance. First, this study develops a comprehensive motivation framework that helps gain deeper insights into the underlying mechanism of knowledge contribution in social Q&A communities. Second, this study conducts panel data analysis to capture the impacts of motivations over time, rather than intentions at a fixed time point. Third, the findings can help operators of social Q&A communities to optimize community norms and incentive mechanisms.Continuous knowledge contribution in social Q&A communities: the moderation effects of self-presentation and motivational affordances
Lijuan Luo, Yuwei Wang, Siqi Duan, Shanshan Shang, Baojun Ma, Xiaoli Zhou
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Based on the perspectives of social capital, image motivation and motivation affordances, this paper explores the direct and moderation effects of different kinds of motivations (i.e. relationship-based motivation, community-based motivation and individual-based motivation) on users' continuous knowledge contributions in social question and answer (Q&A) communities.

The authors collect the panel data of 10,193 users from a popular social Q&A community in China. Then, a negative binomial regression model is adopted to analyze the collected data.

The paper demonstrates that social learning, peer recognition and knowledge seeking positively affect users' continuous contribution behaviors. However, the results also show that social exposure has the opposite effect. In addition, self-presentation is found to moderate the influence of social factors on users' continuous use behaviors, while the moderation effect of motivation affordances has no significance.

First, this study develops a comprehensive motivation framework that helps gain deeper insights into the underlying mechanism of knowledge contribution in social Q&A communities. Second, this study conducts panel data analysis to capture the impacts of motivations over time, rather than intentions at a fixed time point. Third, the findings can help operators of social Q&A communities to optimize community norms and incentive mechanisms.

]]>
Continuous knowledge contribution in social Q&A communities: the moderation effects of self-presentation and motivational affordances10.1108/ITP-02-2022-0128Information Technology & People2023-07-04© 2023 Emerald Publishing LimitedLijuan LuoYuwei WangSiqi DuanShanshan ShangBaojun MaXiaoli ZhouInformation Technology & Peopleahead-of-printahead-of-print2023-07-0410.1108/ITP-02-2022-0128https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0128/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Cloud computing adoption decision-making process: a sensemaking analysishttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0139/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe authors study how cloud adoption decision making unfolds in organizations and present the dynamic process leading to a decision to adopt or reject cloud computing. The authors thus complement earlier literature on factors that influence cloud adoption. The authors adopt an interpretive epistemology to understand the process of cloud adoption decision making. Following an empirical investigation drawing on interviews with senior managers who led the cloud adoption decision making in organizations from across Europe. The authors outline a framework that shows how cloud adoptions follow multiple cycles in three broad phases. The study findings demonstrate that cloud adoption decision making is a recursive process of learning about cloud through three broad phases: building perception about cloud possibilities, contextualizing cloud possibilities in terms of current computing resources and exposing the cloud proposition to others involved in making the decision. Building on these findings, the authors construct a framework of this process which can inform practitioners in making decisions on cloud adoption. This work contributes to authors understanding of how cloud adoption decisions unfold and provides a framework for cloud adoption decisions that has theoretical and practical value. The study further demonstrates the role of the decision-leader, typically the CIO, in this process and identifies how other internal and external stakeholders are involved. It sheds light on the relevance of the phases of the cloud adoption decision-making process to different cloud adoption factors identified in the extant literature.Cloud computing adoption decision-making process: a sensemaking analysis
Ariana Polyviou, Nancy Pouloudi, Will Venters
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The authors study how cloud adoption decision making unfolds in organizations and present the dynamic process leading to a decision to adopt or reject cloud computing. The authors thus complement earlier literature on factors that influence cloud adoption.

The authors adopt an interpretive epistemology to understand the process of cloud adoption decision making. Following an empirical investigation drawing on interviews with senior managers who led the cloud adoption decision making in organizations from across Europe. The authors outline a framework that shows how cloud adoptions follow multiple cycles in three broad phases.

The study findings demonstrate that cloud adoption decision making is a recursive process of learning about cloud through three broad phases: building perception about cloud possibilities, contextualizing cloud possibilities in terms of current computing resources and exposing the cloud proposition to others involved in making the decision. Building on these findings, the authors construct a framework of this process which can inform practitioners in making decisions on cloud adoption.

This work contributes to authors understanding of how cloud adoption decisions unfold and provides a framework for cloud adoption decisions that has theoretical and practical value. The study further demonstrates the role of the decision-leader, typically the CIO, in this process and identifies how other internal and external stakeholders are involved. It sheds light on the relevance of the phases of the cloud adoption decision-making process to different cloud adoption factors identified in the extant literature.

]]>
Cloud computing adoption decision-making process: a sensemaking analysis10.1108/ITP-02-2022-0139Information Technology & People2023-09-07© 2023 Emerald Publishing LimitedAriana PolyviouNancy PouloudiWill VentersInformation Technology & Peopleahead-of-printahead-of-print2023-09-0710.1108/ITP-02-2022-0139https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2022-0139/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Work-related computing at home and nonwork-related computing at work: a self-determination perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0127/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study investigates why employees' cyber-loafing is affected by work-related computing at home. Based on the self-determination theory, the authors propose the mediating role of sense of control and the moderating role of work/family segmentation preference. To test the authors' hypotheses, the authors conducted a multi-wave, multi-source field study with 224 paired employee-leader dyads at three time points. The hypotheses were tested by the SPSS macro application in Hayes (2018) with a bootstrap approach to obtain confidence intervals. The work-related computing at home promotes employee cyber-loafing as compensation for their impaired sense of control. Moreover, such a relationship is stronger for employees with a stronger desire for self-control (i.e. high work/family segmentation preference). This study reveals the underlying mechanism linking the work-related computing at home and employee cyber-loafing, as well as the boundary condition of this relationship. Specifically, sense of control serves as a vital mechanism and work/family segmentation preference as a key boundary condition. In addition, the authors enrich the application of self-determination theory in management research.Work-related computing at home and nonwork-related computing at work: a self-determination perspective
Tingxi Wang, Qianyu Lin, Zhaobiao Zong, Yue Zhou
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study investigates why employees' cyber-loafing is affected by work-related computing at home. Based on the self-determination theory, the authors propose the mediating role of sense of control and the moderating role of work/family segmentation preference.

To test the authors' hypotheses, the authors conducted a multi-wave, multi-source field study with 224 paired employee-leader dyads at three time points. The hypotheses were tested by the SPSS macro application in Hayes (2018) with a bootstrap approach to obtain confidence intervals.

The work-related computing at home promotes employee cyber-loafing as compensation for their impaired sense of control. Moreover, such a relationship is stronger for employees with a stronger desire for self-control (i.e. high work/family segmentation preference).

This study reveals the underlying mechanism linking the work-related computing at home and employee cyber-loafing, as well as the boundary condition of this relationship. Specifically, sense of control serves as a vital mechanism and work/family segmentation preference as a key boundary condition. In addition, the authors enrich the application of self-determination theory in management research.

]]>
Work-related computing at home and nonwork-related computing at work: a self-determination perspective10.1108/ITP-02-2023-0127Information Technology & People2023-12-29© 2023 Emerald Publishing LimitedTingxi WangQianyu LinZhaobiao ZongYue ZhouInformation Technology & Peopleahead-of-printahead-of-print2023-12-2910.1108/ITP-02-2023-0127https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0127/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0150/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study develops and validates a theoretical model of real-time mobile connectivity, examining how employees' perceptions of their relationship with supervisors influence their emotional experiences. Through quasi-experiments, the authors investigate the behavioral patterns and emotional responses associated with real-time mobile connectivity in organizations, with a focus on messaging apps that indicate message read status. Specifically, they explore how supervisors' attentiveness or inattentiveness in mobile connectivity impacts emotional ambivalence (anxiety and pride) among subordinates. Additionally, they examine the downstream effects of this emotional ambivalence on employees' workplace thriving and job performance across various dimensions. To address the paradox of real-time mobile connectivity, a quasi-experimental design involving 320 team members from 46 teams was implemented. Multi-level structural equation modeling was employed to analyze within-person variance and evaluate the proposed hypotheses. The findings indicate that employees who do not receive timely indications from their supervisors are more likely to experience elevated levels of anxiety, while those who receive prompt indications experience a sense of pride. Moreover, the indirect effects of the real-time mobile connectivity paradox on employee performance, mediated by anxiety (negatively) and pride (positively), are fully explained through workplace thriving. This study provides insights into the emotional ambivalence experienced in the workplace due to real-time mobile connectivity, highlighting its implications for organizational competitiveness. Integrating resource conservation theory and cognitive appraisal theory of emotion, the study explores the mediating role of workplace thriving and the impact on employee performance through pride and anxiety. Generalizability requires considering organizational settings and cultural contexts while acknowledging limitations such as a focus on messaging apps and specific samples. Future research should explore these dynamics in diverse contexts and identify additional factors influencing the relationship between real-time mobile connectivity and employee outcomes. This study provides valuable insights for managers regarding the significance of message indications, as their attentiveness can elicit emotional reactions from employees that subsequently impact workplace thriving and job performance. This study pioneers the exploration of the paradox of real-time mobile connectivity in the workplace, uncovering the discrete emotions experienced by employees. Furthermore, it elucidates the subsequent opposing effects on workplace thriving and job performance, contributing to the existing literature and knowledge in this area.Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspective
Yubing Sui, Adeel Luqman, Manish Unhale, Francesco Schiavone, Maria Teresa Cuomo
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study develops and validates a theoretical model of real-time mobile connectivity, examining how employees' perceptions of their relationship with supervisors influence their emotional experiences. Through quasi-experiments, the authors investigate the behavioral patterns and emotional responses associated with real-time mobile connectivity in organizations, with a focus on messaging apps that indicate message read status. Specifically, they explore how supervisors' attentiveness or inattentiveness in mobile connectivity impacts emotional ambivalence (anxiety and pride) among subordinates. Additionally, they examine the downstream effects of this emotional ambivalence on employees' workplace thriving and job performance across various dimensions.

To address the paradox of real-time mobile connectivity, a quasi-experimental design involving 320 team members from 46 teams was implemented. Multi-level structural equation modeling was employed to analyze within-person variance and evaluate the proposed hypotheses.

The findings indicate that employees who do not receive timely indications from their supervisors are more likely to experience elevated levels of anxiety, while those who receive prompt indications experience a sense of pride. Moreover, the indirect effects of the real-time mobile connectivity paradox on employee performance, mediated by anxiety (negatively) and pride (positively), are fully explained through workplace thriving.

This study provides insights into the emotional ambivalence experienced in the workplace due to real-time mobile connectivity, highlighting its implications for organizational competitiveness. Integrating resource conservation theory and cognitive appraisal theory of emotion, the study explores the mediating role of workplace thriving and the impact on employee performance through pride and anxiety. Generalizability requires considering organizational settings and cultural contexts while acknowledging limitations such as a focus on messaging apps and specific samples. Future research should explore these dynamics in diverse contexts and identify additional factors influencing the relationship between real-time mobile connectivity and employee outcomes.

This study provides valuable insights for managers regarding the significance of message indications, as their attentiveness can elicit emotional reactions from employees that subsequently impact workplace thriving and job performance.

This study pioneers the exploration of the paradox of real-time mobile connectivity in the workplace, uncovering the discrete emotions experienced by employees. Furthermore, it elucidates the subsequent opposing effects on workplace thriving and job performance, contributing to the existing literature and knowledge in this area.

]]>
Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspective10.1108/ITP-02-2023-0150Information Technology & People2023-11-14© 2023 Emerald Publishing LimitedYubing SuiAdeel LuqmanManish UnhaleFrancesco SchiavoneMaria Teresa CuomoInformation Technology & Peopleahead-of-printahead-of-print2023-11-1410.1108/ITP-02-2023-0150https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0150/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriershttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0168/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestBlockchain-based traceability technology (BTT) is an emerging digital technology that claims to have the potential to fulfil the demand for traceability to safeguard fruit safety. Drawing on the technological, organisational and environmental (TOE) framework, this study aims to investigate the perceived facilitators and barriers that influence the behavioural intentions of multiple stakeholders in the Vietnamese fruit supply chain (i.e., farmers, trading enterprises and consumers) to adopt BTT. This study utilised a qualitative approach of semi-structured in-depth interviews with 60 stakeholders in the Vietnamese fruit supply chain to achieve the research objectives. NVivo 12 was employed to analyse the collected data using content and thematic analysis. The findings identify several perceived facilitators that motivate BTT adoption. These include trust, transparency, business performance, the formation of alliances, consumer awareness of food safety and ethical agricultural practices, fruit branding and the pivotal role of farmers' cooperatives. Meanwhile, the perceived barriers to BTT adoption include a lack of digital literacy amongst the stakeholders, poor organisational culture, the high cost of traceability-enabled products and data privacy and security governance. This study suggests that technology awareness and perceived facilitators and barriers should be incorporated into the design and deployment of blockchain-based traceability technology in the agri-food supply chain in developing countries. To the best of the authors' knowledge, this study is the first qualitative paper that attempts to fill the research gap of understanding the perceived facilitators and barriers that influence the intentions of multiple stakeholders in the fruit supply chain to adopt BTT in the context of a developing economy.Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriers
Teck Lee Yap, Rajkishore Nayak, Nhung T.H. Vu, Duy Tung Bui, Thi Thu Tra Pham, Darcy W.E. Allen
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Blockchain-based traceability technology (BTT) is an emerging digital technology that claims to have the potential to fulfil the demand for traceability to safeguard fruit safety. Drawing on the technological, organisational and environmental (TOE) framework, this study aims to investigate the perceived facilitators and barriers that influence the behavioural intentions of multiple stakeholders in the Vietnamese fruit supply chain (i.e., farmers, trading enterprises and consumers) to adopt BTT.

This study utilised a qualitative approach of semi-structured in-depth interviews with 60 stakeholders in the Vietnamese fruit supply chain to achieve the research objectives. NVivo 12 was employed to analyse the collected data using content and thematic analysis.

The findings identify several perceived facilitators that motivate BTT adoption. These include trust, transparency, business performance, the formation of alliances, consumer awareness of food safety and ethical agricultural practices, fruit branding and the pivotal role of farmers' cooperatives. Meanwhile, the perceived barriers to BTT adoption include a lack of digital literacy amongst the stakeholders, poor organisational culture, the high cost of traceability-enabled products and data privacy and security governance.

This study suggests that technology awareness and perceived facilitators and barriers should be incorporated into the design and deployment of blockchain-based traceability technology in the agri-food supply chain in developing countries.

To the best of the authors' knowledge, this study is the first qualitative paper that attempts to fill the research gap of understanding the perceived facilitators and barriers that influence the intentions of multiple stakeholders in the fruit supply chain to adopt BTT in the context of a developing economy.

]]>
Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriers10.1108/ITP-02-2023-0168Information Technology & People2023-10-19© 2023 Emerald Publishing LimitedTeck Lee YapRajkishore NayakNhung T.H. VuDuy Tung BuiThi Thu Tra PhamDarcy W.E. AllenInformation Technology & Peopleahead-of-printahead-of-print2023-10-1910.1108/ITP-02-2023-0168https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0168/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Digital innovation in social cash organizations – the effects of the institutional interactions for transforming organizational practiceshttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0176/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestWhile the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations. The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders. The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation. The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities. The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement. The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change. This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.Digital innovation in social cash organizations – the effects of the institutional interactions for transforming organizational practices
Atika Ahmad Kemal, Mahmood Hussain Shah
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations.

The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders.

The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation.

The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities.

The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement.

The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change.

This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.

]]>
Digital innovation in social cash organizations – the effects of the institutional interactions for transforming organizational practices10.1108/ITP-02-2023-0176Information Technology & People2023-08-02© 2023 Emerald Publishing LimitedAtika Ahmad KemalMahmood Hussain ShahInformation Technology & Peopleahead-of-printahead-of-print2023-08-0210.1108/ITP-02-2023-0176https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0176/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Comparing job applicant deception in asynchronous vs synchronous video interviews, with and without AI-assisted assessmentshttps://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0189/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestAsynchronous Video Interviews (AVIs) incorporating Artificial Intelligence (AI)-assisted assessment has become popular as a pre-employment screening method. The extent to which applicants engage in deceptive impression management (IM) behaviors during these interviews remains uncertain. Furthermore, the accuracy of human detection in identifying such deceptive IM behaviors is limited. This study seeks to explore differences in deceptive IM behaviors by applicants across video interview modes (AVIs vs Synchronous Video Interviews (SVIs)) and the use of AI-assisted assessment (AI vs non-AI). The study also investigates if video interview modes affect human interviewers' ability to detect deceptive IM behaviors. The authors conducted a field study with four conditions based on two critical factors: the synchrony of video interviews (AVI vs SVI) and the presence of AI-assisted assessment (AI vs Non-AI): Non-AI-assisted AVIs, AI-assisted AVIs, Non-AI-assisted SVIs and AI-assisted SVIs. The study involved 144 pairs of interviewees and interviewers/assessors. To assess applicants' deceptive IM behaviors, the authors employed a combination of interviewee self-reports and interviewer perceptions. The results indicate that AVIs elicited fewer instances of deceptive IM behaviors across all dimensions when compared to SVIs. Furthermore, using AI-assisted assessment in both video interview modes resulted in less extensive image creation than non-AI settings. However, the study revealed that human interviewers had difficulties detecting deceptive IM behaviors regardless of the mode used, except for extensive faking in AVIs. The study is the first to address the call for research on the impact of video interview modes and AI on interviewee faking and interviewer accuracy. This research enhances the authors’ understanding of the practical implications associated with the use of different video interview modes and AI algorithms in the pre-employment screening process. The study contributes to the existing literature by refining the theoretical model of faking likelihood in employment interviews according to media richness theory and the model of volitional rating behavior based on expectancy theory in the context of AVIs and AI-assisted assessment.Comparing job applicant deception in asynchronous vs synchronous video interviews, with and without AI-assisted assessments
Hung-Yue Suen, Kuo-En Hung
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Asynchronous Video Interviews (AVIs) incorporating Artificial Intelligence (AI)-assisted assessment has become popular as a pre-employment screening method. The extent to which applicants engage in deceptive impression management (IM) behaviors during these interviews remains uncertain. Furthermore, the accuracy of human detection in identifying such deceptive IM behaviors is limited. This study seeks to explore differences in deceptive IM behaviors by applicants across video interview modes (AVIs vs Synchronous Video Interviews (SVIs)) and the use of AI-assisted assessment (AI vs non-AI). The study also investigates if video interview modes affect human interviewers' ability to detect deceptive IM behaviors.

The authors conducted a field study with four conditions based on two critical factors: the synchrony of video interviews (AVI vs SVI) and the presence of AI-assisted assessment (AI vs Non-AI): Non-AI-assisted AVIs, AI-assisted AVIs, Non-AI-assisted SVIs and AI-assisted SVIs. The study involved 144 pairs of interviewees and interviewers/assessors. To assess applicants' deceptive IM behaviors, the authors employed a combination of interviewee self-reports and interviewer perceptions.

The results indicate that AVIs elicited fewer instances of deceptive IM behaviors across all dimensions when compared to SVIs. Furthermore, using AI-assisted assessment in both video interview modes resulted in less extensive image creation than non-AI settings. However, the study revealed that human interviewers had difficulties detecting deceptive IM behaviors regardless of the mode used, except for extensive faking in AVIs.

The study is the first to address the call for research on the impact of video interview modes and AI on interviewee faking and interviewer accuracy. This research enhances the authors’ understanding of the practical implications associated with the use of different video interview modes and AI algorithms in the pre-employment screening process. The study contributes to the existing literature by refining the theoretical model of faking likelihood in employment interviews according to media richness theory and the model of volitional rating behavior based on expectancy theory in the context of AVIs and AI-assisted assessment.

]]>
Comparing job applicant deception in asynchronous vs synchronous video interviews, with and without AI-assisted assessments10.1108/ITP-02-2023-0189Information Technology & People2023-12-13© 2023 Emerald Publishing LimitedHung-Yue SuenKuo-En HungInformation Technology & Peopleahead-of-printahead-of-print2023-12-1310.1108/ITP-02-2023-0189https://www.emerald.com/insight/content/doi/10.1108/ITP-02-2023-0189/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agencyhttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0156/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of this research is to study how compliance evaluation becomes performed in practice. Compliance evaluation is a common practice among organizations that need to evaluate their posture against a set of criteria (e.g. a standard, legislative framework and “best practices”). The results of these evaluations have significant importance for organizations, especially in the context of information security and continuity. The author argues that how these evaluations become performed is not merely a “social” activity but shaped by the materiality of the evaluation criteria The authors adopt a sociomaterial practice-based view to study the compliance evaluation through in situ participant observations from compliance evaluation workshops to evaluate organizational compliance against a information security and business continuity criteria. The empirical material was analyzed to construct vignettes that serve to illustrate the practice of compliance evaluation. The research analysis shows how the information security and business continuity criteria themselves partake in the compliance evaluations by operating through (ventriloqually) the evaluators on three strata: the material, the textual and the structural. The author also provides a conceptualization of a hybrid agency. This research contributes to lack of studies on the organizational-level compliance. Further, the research is an original contribution to information security and business continuity management by focusing on the practices of compliance evaluation. Further, the research has theoretical novelty by adopting the ventriloqual agency as a hybrid agency to study the sociomateriality of a phenomenon.Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency
Marko Niemimaa
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of this research is to study how compliance evaluation becomes performed in practice. Compliance evaluation is a common practice among organizations that need to evaluate their posture against a set of criteria (e.g. a standard, legislative framework and “best practices”). The results of these evaluations have significant importance for organizations, especially in the context of information security and continuity. The author argues that how these evaluations become performed is not merely a “social” activity but shaped by the materiality of the evaluation criteria

The authors adopt a sociomaterial practice-based view to study the compliance evaluation through in situ participant observations from compliance evaluation workshops to evaluate organizational compliance against a information security and business continuity criteria. The empirical material was analyzed to construct vignettes that serve to illustrate the practice of compliance evaluation.

The research analysis shows how the information security and business continuity criteria themselves partake in the compliance evaluations by operating through (ventriloqually) the evaluators on three strata: the material, the textual and the structural. The author also provides a conceptualization of a hybrid agency.

This research contributes to lack of studies on the organizational-level compliance. Further, the research is an original contribution to information security and business continuity management by focusing on the practices of compliance evaluation. Further, the research has theoretical novelty by adopting the ventriloqual agency as a hybrid agency to study the sociomateriality of a phenomenon.

]]>
Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency10.1108/ITP-03-2022-0156Information Technology & People2023-11-07© 2023 Emerald Publishing LimitedMarko NiemimaaInformation Technology & Peopleahead-of-printahead-of-print2023-11-0710.1108/ITP-03-2022-0156https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0156/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding online reviews adoption in social network communities: an extension of the information adoption modelhttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0158/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestOnline reviews derived from peer communications have been increasingly viewed as an important approach for consumers to gather pre-purchase information. This study aims to examine factors affecting online reviews adoption in social network communities and then indicates the underlying mechanism of this process based on an extended information adoption model (IAM). Using the data collected from 242 users of a social network community via an online survey, the proposed model is empirically assessed by partial least squares-based structural equation model (PLS-SEM). The results show that both perceived diagnosticity and perceived serendipity are drivers of online reviews adoption in social network communities. Meanwhile, community identification is not only an antecedent of diagnosticity and serendipity perceived by community members, but also motivates source credibility which, in turn, positively influences argument quality. Finally, the importance of argument quality and source credibility in reviews adoption process is also presented. This study extends the IAM and enriches the literature regarding online reviews adoption. It deepens the understanding of serendipitous experiences and community identification in social networking context by addressing their important roles in the authors' extended IAM.Understanding online reviews adoption in social network communities: an extension of the information adoption model
Zheshi Bao, Yun Zhu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Online reviews derived from peer communications have been increasingly viewed as an important approach for consumers to gather pre-purchase information. This study aims to examine factors affecting online reviews adoption in social network communities and then indicates the underlying mechanism of this process based on an extended information adoption model (IAM).

Using the data collected from 242 users of a social network community via an online survey, the proposed model is empirically assessed by partial least squares-based structural equation model (PLS-SEM).

The results show that both perceived diagnosticity and perceived serendipity are drivers of online reviews adoption in social network communities. Meanwhile, community identification is not only an antecedent of diagnosticity and serendipity perceived by community members, but also motivates source credibility which, in turn, positively influences argument quality. Finally, the importance of argument quality and source credibility in reviews adoption process is also presented.

This study extends the IAM and enriches the literature regarding online reviews adoption. It deepens the understanding of serendipitous experiences and community identification in social networking context by addressing their important roles in the authors' extended IAM.

]]>
Understanding online reviews adoption in social network communities: an extension of the information adoption model10.1108/ITP-03-2022-0158Information Technology & People2023-09-01© 2023 Emerald Publishing LimitedZheshi BaoYun ZhuInformation Technology & Peopleahead-of-printahead-of-print2023-09-0110.1108/ITP-03-2022-0158https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0158/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
“Technology is killing me!”: the moderating effect of organization home-work interface on the linkage between technostress and stress at workhttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0169/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe fear of the pandemic, confinement at home and the need to work created a unique situation. The pandemic catalyzed work-from-anywhere practice by adopting information and communication technologies (ICT) across all industries. While ICT saved organizations, it increased technostress among the workforce. A better understanding of the adverse effects of ICT usage might enable organizations to manage the mental well-being of the workforce. While technostress is gaining increasing interest, scholarly work investigating the dimensions of technostress and its impact on creating stress across various employee demographics and industry types is missing. Contrary to the prevalent assumptions, the authors theorized and tested the adverse moderation effect of the home-work interface on the linkage between technostress dimensions and stress. This paper aims to discuss the aforementioned objective. The study captures dimensions of technostress and the resulting stress at work using a survey-based analysis of 881 working employees in India, representing multiple industries and functions. The study indicates that techno-overload, techno-complexity and techno-invasion significantly impact employees during the pandemic. The authors further found that the home-work-interface is a powerful factor in understanding the complex linkage between dimensions of technostress and its outcomes. Based on the Conservation of Resources Theory and the Job-Demand-Resources model, this study highlights the adverse impact of this trend on employee well-being. However, the study suffers from a cross-sectional research design. The technostress research has focused primarily on static, at-premise environments and mostly on high ICT usage industries. Due to the pandemic, it has neglected the impact of various technostress dimensions across employee cohorts subjected to rapid technology-enabled working. Further, most studies focus on the voluntary choice of remote work. Employees struggle with the unexpected and involuntary shift to technology-enabled remote work. This study contributes to the literature by examining the consequences of technostress in the context of non-voluntary remote work. Contrary to prevailing assumptions, this study highlights the adverse effect of organizational home-work interface in influencing ICT-created stress. The increasing use of ICT enables telecommuting across the workforce while increasing organizational productivity. Due to the pandemic, these trends will likely change the future of work permanently. To minimize employee stress, practitioners need to reconsider the dimensions of technostress. Further, the study cautions against the prevalent interventions used by practitioners. While practitioners facilitate a home-work interface, it could have adverse consequences. Practitioners may consider the adverse consequences of home-work interface while designing organizational policies. This study during the pandemic is crucial as research forecasts the likelihood of other cataclysmic events, such as future pandemics and political or climate change events, which may sustain technology-driven remote work practices and remain a feature of the future workplace. Hence understanding the implications of the dimensions of technostress would help organizations and policymakers to implement necessary interventions to minimize employee stress. The present study examines the dimensions of technostress across multiple industries and job functions in an emerging market marked by a high economic growth rate and an Eastern cultural context. This study presents the dark side of excessive ICT adoption and indicates how organizations and HRM practices can help mitigate some of these effects.“Technology is killing me!”: the moderating effect of organization home-work interface on the linkage between technostress and stress at work
Debolina Dutta, Sushanta Kumar Mishra
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The fear of the pandemic, confinement at home and the need to work created a unique situation. The pandemic catalyzed work-from-anywhere practice by adopting information and communication technologies (ICT) across all industries. While ICT saved organizations, it increased technostress among the workforce. A better understanding of the adverse effects of ICT usage might enable organizations to manage the mental well-being of the workforce. While technostress is gaining increasing interest, scholarly work investigating the dimensions of technostress and its impact on creating stress across various employee demographics and industry types is missing. Contrary to the prevalent assumptions, the authors theorized and tested the adverse moderation effect of the home-work interface on the linkage between technostress dimensions and stress. This paper aims to discuss the aforementioned objective.

The study captures dimensions of technostress and the resulting stress at work using a survey-based analysis of 881 working employees in India, representing multiple industries and functions.

The study indicates that techno-overload, techno-complexity and techno-invasion significantly impact employees during the pandemic. The authors further found that the home-work-interface is a powerful factor in understanding the complex linkage between dimensions of technostress and its outcomes.

Based on the Conservation of Resources Theory and the Job-Demand-Resources model, this study highlights the adverse impact of this trend on employee well-being. However, the study suffers from a cross-sectional research design. The technostress research has focused primarily on static, at-premise environments and mostly on high ICT usage industries. Due to the pandemic, it has neglected the impact of various technostress dimensions across employee cohorts subjected to rapid technology-enabled working. Further, most studies focus on the voluntary choice of remote work. Employees struggle with the unexpected and involuntary shift to technology-enabled remote work. This study contributes to the literature by examining the consequences of technostress in the context of non-voluntary remote work. Contrary to prevailing assumptions, this study highlights the adverse effect of organizational home-work interface in influencing ICT-created stress.

The increasing use of ICT enables telecommuting across the workforce while increasing organizational productivity. Due to the pandemic, these trends will likely change the future of work permanently. To minimize employee stress, practitioners need to reconsider the dimensions of technostress. Further, the study cautions against the prevalent interventions used by practitioners. While practitioners facilitate a home-work interface, it could have adverse consequences. Practitioners may consider the adverse consequences of home-work interface while designing organizational policies.

This study during the pandemic is crucial as research forecasts the likelihood of other cataclysmic events, such as future pandemics and political or climate change events, which may sustain technology-driven remote work practices and remain a feature of the future workplace. Hence understanding the implications of the dimensions of technostress would help organizations and policymakers to implement necessary interventions to minimize employee stress.

The present study examines the dimensions of technostress across multiple industries and job functions in an emerging market marked by a high economic growth rate and an Eastern cultural context. This study presents the dark side of excessive ICT adoption and indicates how organizations and HRM practices can help mitigate some of these effects.

]]>
“Technology is killing me!”: the moderating effect of organization home-work interface on the linkage between technostress and stress at work10.1108/ITP-03-2022-0169Information Technology & People2023-08-15© 2023 Emerald Publishing LimitedDebolina DuttaSushanta Kumar MishraInformation Technology & Peopleahead-of-printahead-of-print2023-08-1510.1108/ITP-03-2022-0169https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0169/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The effect of social support on teleworker environment and work engagement: a multimethod analysishttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0194/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestEmploying the “Job demands-resources (JD-R)” framework, this study examines the impact of co-occurring social supports (supervisor, coworker, and family support) on the telework environment and employee engagement. The study uses a multimethod approach. Data from 294 employees belonging to Indian technology organizations were collected and analyzed using the partial least squares (PLS)-based structure equation modeling software SmartPLS4. Following this, necessary condition analysis (NCA) was carried out using the NCA package for R. Telework environment was found to mediate the relationship between social support and work engagement. Supervisor support and instrumental family support were identified as predictors as well as necessary conditions for telework environment. Coworker support was identified both as a predictor and necessary condition for telework environment. Although emotional family support was found to be a predictor of telework environment, it was not identified as a necessary condition. The findings indicate that coworker support and family instrumental support are as important for telework success as supervisor support. Moreover, our findings suggest that varying levels of telework environments (low, moderate, and high) may necessitate distinct social support configurations. Consequently, organizations should match their social support configuration to match their overall teleworking strategy. A basic premise of the JD-R framework is that resources exist in caravans (bundles). However, previous research (in telework) has concentrated on only one or two kinds of social support, that too in varying situational contexts, limiting generalizability of the findings. This has also produced inconsistent conclusions concerning the role of support providers such as coworkers and family. Recent developments in JD-R also suggest that the role of resources may vary in terms of their importance (necessity) for work engagement. By augmenting standard regression-based techniques with NCA, the authors explore these issues to provide a more thorough understanding of the influence of social supports on work engagement in telework situations.The effect of social support on teleworker environment and work engagement: a multimethod analysis
Shiva Kakkar, Samvet Kuril, Surajit Saha, Parul Gupta, Swati Singh
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Employing the “Job demands-resources (JD-R)” framework, this study examines the impact of co-occurring social supports (supervisor, coworker, and family support) on the telework environment and employee engagement.

The study uses a multimethod approach. Data from 294 employees belonging to Indian technology organizations were collected and analyzed using the partial least squares (PLS)-based structure equation modeling software SmartPLS4. Following this, necessary condition analysis (NCA) was carried out using the NCA package for R.

Telework environment was found to mediate the relationship between social support and work engagement. Supervisor support and instrumental family support were identified as predictors as well as necessary conditions for telework environment. Coworker support was identified both as a predictor and necessary condition for telework environment. Although emotional family support was found to be a predictor of telework environment, it was not identified as a necessary condition.

The findings indicate that coworker support and family instrumental support are as important for telework success as supervisor support. Moreover, our findings suggest that varying levels of telework environments (low, moderate, and high) may necessitate distinct social support configurations. Consequently, organizations should match their social support configuration to match their overall teleworking strategy.

A basic premise of the JD-R framework is that resources exist in caravans (bundles). However, previous research (in telework) has concentrated on only one or two kinds of social support, that too in varying situational contexts, limiting generalizability of the findings. This has also produced inconsistent conclusions concerning the role of support providers such as coworkers and family. Recent developments in JD-R also suggest that the role of resources may vary in terms of their importance (necessity) for work engagement. By augmenting standard regression-based techniques with NCA, the authors explore these issues to provide a more thorough understanding of the influence of social supports on work engagement in telework situations.

]]>
The effect of social support on teleworker environment and work engagement: a multimethod analysis10.1108/ITP-03-2022-0194Information Technology & People2023-06-20© 2023 Emerald Publishing LimitedShiva KakkarSamvet KurilSurajit SahaParul GuptaSwati SinghInformation Technology & Peopleahead-of-printahead-of-print2023-06-2010.1108/ITP-03-2022-0194https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0194/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Examination the effects of organizational innovation and knowledge management strategy in information technology companies in R&D departments on service quality and product innovationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0196/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of the article is to examine the concepts of knowledge management strategies, innovation and service quality in information technology companies that have research and development (R&D) departments in the technoparks of research universities. The research was carried out in information technology companies with R&D departments in the technoparks of universities. Due to the “innovation” focus of the research, 302 engineers were selected by random sampling from engineers working in information technology companies in technoparks, and the prepared scale was sent to them via e-mail. In total, 302 units of data were subjected to path analysis and mediation effect analysis using the SmartPLS program. In the research, it is supported by hypotheses that both knowledge management strategies and organizational innovation have a positive effect on the success of service quality and product innovation in information technology companies with R&D departments. At the same time, it can be explained as a result of analysis that innovation capability has both an independent and an intermediary variable effect. Considering the limitations of the research, it is not correct to generalize the results of the analysis because the research was conducted only in information technology companies located in technoparks, and the data were collected from engineers working in these companies. For this reason, it is recommended that similar studies that are planned to be conducted in the future should do their research by taking this situation into account. At the same time, it is recommended to carry out future studies in different sectors and to bring the results obtained to the literature by comparing them. The importance of information is increasing in technology-oriented companies where competition is increasing. Companies that cannot go beyond imitation or offer similar products and/or services cannot compete with their competitors in a competitive environment. The fact that companies can be successful in a competitive environment is supported by hypotheses as a result of the analysis that they need to develop organizational innovation and knowledge, as well as develop innovation capability at the same time. The research is an original study in terms of examining the R&D departments of information technology companies operating in the technoparks of universities. Innovation and knowledge management strategies are examined within the scope of the research model by collecting data from information technology companies with R&D departments.Examination the effects of organizational innovation and knowledge management strategy in information technology companies in R&D departments on service quality and product innovation
Fatma Sonmez Cakir, Ozan Kalaycioglu, Zafer Adiguzel
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of the article is to examine the concepts of knowledge management strategies, innovation and service quality in information technology companies that have research and development (R&D) departments in the technoparks of research universities.

The research was carried out in information technology companies with R&D departments in the technoparks of universities. Due to the “innovation” focus of the research, 302 engineers were selected by random sampling from engineers working in information technology companies in technoparks, and the prepared scale was sent to them via e-mail. In total, 302 units of data were subjected to path analysis and mediation effect analysis using the SmartPLS program.

In the research, it is supported by hypotheses that both knowledge management strategies and organizational innovation have a positive effect on the success of service quality and product innovation in information technology companies with R&D departments. At the same time, it can be explained as a result of analysis that innovation capability has both an independent and an intermediary variable effect.

Considering the limitations of the research, it is not correct to generalize the results of the analysis because the research was conducted only in information technology companies located in technoparks, and the data were collected from engineers working in these companies. For this reason, it is recommended that similar studies that are planned to be conducted in the future should do their research by taking this situation into account. At the same time, it is recommended to carry out future studies in different sectors and to bring the results obtained to the literature by comparing them.

The importance of information is increasing in technology-oriented companies where competition is increasing. Companies that cannot go beyond imitation or offer similar products and/or services cannot compete with their competitors in a competitive environment. The fact that companies can be successful in a competitive environment is supported by hypotheses as a result of the analysis that they need to develop organizational innovation and knowledge, as well as develop innovation capability at the same time.

The research is an original study in terms of examining the R&D departments of information technology companies operating in the technoparks of universities. Innovation and knowledge management strategies are examined within the scope of the research model by collecting data from information technology companies with R&D departments.

]]>
Examination the effects of organizational innovation and knowledge management strategy in information technology companies in R&D departments on service quality and product innovation10.1108/ITP-03-2022-0196Information Technology & People2023-05-18© 2023 Emerald Publishing LimitedFatma Sonmez CakirOzan KalayciogluZafer AdiguzelInformation Technology & Peopleahead-of-printahead-of-print2023-05-1810.1108/ITP-03-2022-0196https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0196/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding smartphone users’ app usage with restricted permissionshttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0200/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestSmartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap. Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA). The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions. Based on the findings, the authors provided several implications for app stores, app developers and app marketers. This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.Understanding smartphone users’ app usage with restricted permissions
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross, Mehak Rehman
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

]]>
Understanding smartphone users’ app usage with restricted permissions10.1108/ITP-03-2022-0200Information Technology & People2024-03-27© 2023 Emerald Publishing LimitedHaroon Iqbal MaseehCharles JebarajakirthyAchchuthan SivapalanMitchell RossMehak RehmanInformation Technology & Peopleahead-of-printahead-of-print2024-03-2710.1108/ITP-03-2022-0200https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0200/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Helping middle-aged and elderly short-video creators attract followers: a mixed-methods study on Douyin usershttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0203/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDrawing on information foraging theory and the SERVQUAL model, this study built a research model to investigate the roles of middle-aged and elderly short-video creators' online attributes in attracting short-video viewers to be their followers. Taking Douyin (a famous short-video platform in China) as an example, this study used a sequential triangulation mixed-methods approach (quantitative → qualitative) to examine the proposed model by investigating both creators and viewers. Viewers who clicked the “like” button for the middle-aged and elderly creators' videos are more likely to follow the creators. Viewers will believe that middle-aged and elderly creators who received more likes are more popular. Thus, middle-aged and elderly creators with more likes usually have more followers. Viewers usually believe that middle-aged and elderly creators who more frequently publish professional and high-quality videos have invested more effort and who have official verification also have a high level of authority and are recognized by the platform. Thus, middle-aged and elderly creators with more professional videos and verification usually have more followers. Moreover, verification, the number of videos and the professionalism of videos can enhance the transformation of viewers who liked middle-aged and elderly creators' videos into their followers, and thus strengthen the positive relationship between the number of likes and the number of followers; however, the number of bio words will have an opposite effect. These findings have implications for platform managers, middle-aged and elderly creators and the brands aiming to develop a “silver economy” by attracting more followers. This study researches short-video platforms by using a mixed-methods approach to develop an understanding of viewers' decision-making when following middle-aged and elderly creators based on information foraging theory and the SERVQUAL model from the perspectives of both short-video creators and viewers.Helping middle-aged and elderly short-video creators attract followers: a mixed-methods study on Douyin users
Changyu Wang, Jin Yan, Lijing Huang, Ningyue Cao
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Drawing on information foraging theory and the SERVQUAL model, this study built a research model to investigate the roles of middle-aged and elderly short-video creators' online attributes in attracting short-video viewers to be their followers.

Taking Douyin (a famous short-video platform in China) as an example, this study used a sequential triangulation mixed-methods approach (quantitative → qualitative) to examine the proposed model by investigating both creators and viewers.

Viewers who clicked the “like” button for the middle-aged and elderly creators' videos are more likely to follow the creators. Viewers will believe that middle-aged and elderly creators who received more likes are more popular. Thus, middle-aged and elderly creators with more likes usually have more followers. Viewers usually believe that middle-aged and elderly creators who more frequently publish professional and high-quality videos have invested more effort and who have official verification also have a high level of authority and are recognized by the platform. Thus, middle-aged and elderly creators with more professional videos and verification usually have more followers. Moreover, verification, the number of videos and the professionalism of videos can enhance the transformation of viewers who liked middle-aged and elderly creators' videos into their followers, and thus strengthen the positive relationship between the number of likes and the number of followers; however, the number of bio words will have an opposite effect.

These findings have implications for platform managers, middle-aged and elderly creators and the brands aiming to develop a “silver economy” by attracting more followers.

This study researches short-video platforms by using a mixed-methods approach to develop an understanding of viewers' decision-making when following middle-aged and elderly creators based on information foraging theory and the SERVQUAL model from the perspectives of both short-video creators and viewers.

]]>
Helping middle-aged and elderly short-video creators attract followers: a mixed-methods study on Douyin users10.1108/ITP-03-2022-0203Information Technology & People2023-04-18© 2023 Emerald Publishing LimitedChangyu WangJin YanLijing HuangNingyue CaoInformation Technology & Peopleahead-of-printahead-of-print2023-04-1810.1108/ITP-03-2022-0203https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0203/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Exploiting organizations' innovation performance via big data analytics: an absorptive knowledge perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0237/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe advantages of applying big data analytics for organizations to boost innovation performance are enormous. By collecting and analysing substantial amounts of data, firms can discern what works for their customer needs and update existing products while innovating new ones. Notwithstanding the evidence about the effects of big data analytics, the link between big data analytics and innovation performance is still underestimated. Especially in today's fast-changing and complicated environments, companies cannot simply take big data analytics as one innovative technical tool without fully understanding how to deploy it effectively. This study tries to investigate this relationship by building on the knowledge absorptive capacity perspective. The authors conceptualized effective use of big data analytics tools as one general absorptive capacity rather than a simple technical element or skill. Specifically, effectively utilize big data analytics tools can provide values and insights for new product innovation performance in a turbulent environment. Using online survey data from 108 managers, the authors assessed their hypotheses by applying the structural equation modelling method. The authors found that big data analytics capacity, which can be conceptualized as one absorptive capacity, can positively influence product innovation performance. The authors also found that environmental turbulence has strong moderation effects on these two main relationships. These results establish big data analytics can be regarded as one absorptive capacity, which can positively boost an organization's innovation performance.Exploiting organizations' innovation performance via big data analytics: an absorptive knowledge perspective
Hsiao-Ting Tseng, Shizhen (Jasper) Jia, Tahir M. Nisar, Nick Hajli
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The advantages of applying big data analytics for organizations to boost innovation performance are enormous. By collecting and analysing substantial amounts of data, firms can discern what works for their customer needs and update existing products while innovating new ones. Notwithstanding the evidence about the effects of big data analytics, the link between big data analytics and innovation performance is still underestimated. Especially in today's fast-changing and complicated environments, companies cannot simply take big data analytics as one innovative technical tool without fully understanding how to deploy it effectively.

This study tries to investigate this relationship by building on the knowledge absorptive capacity perspective. The authors conceptualized effective use of big data analytics tools as one general absorptive capacity rather than a simple technical element or skill. Specifically, effectively utilize big data analytics tools can provide values and insights for new product innovation performance in a turbulent environment. Using online survey data from 108 managers, the authors assessed their hypotheses by applying the structural equation modelling method.

The authors found that big data analytics capacity, which can be conceptualized as one absorptive capacity, can positively influence product innovation performance. The authors also found that environmental turbulence has strong moderation effects on these two main relationships.

These results establish big data analytics can be regarded as one absorptive capacity, which can positively boost an organization's innovation performance.

]]>
Exploiting organizations' innovation performance via big data analytics: an absorptive knowledge perspective10.1108/ITP-03-2022-0237Information Technology & People2023-09-04© 2023 Emerald Publishing LimitedHsiao-Ting TsengShizhen (Jasper) JiaTahir M. NisarNick HajliInformation Technology & Peopleahead-of-printahead-of-print2023-09-0410.1108/ITP-03-2022-0237https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2022-0237/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Unpacking dual effects of ambivalence toward technologies in online live streaming learninghttps://www.emerald.com/insight/content/doi/10.1108/ITP-03-2023-0246/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestShifting to OLSL classes during the pandemic can bring learners ambivalent experiences: negative, positive or both appraisals toward the technologies. However, few studies have examined how ambivalent experiences can influence students' learning behaviors, specifically cyberslacking and active participation. Using the challenge-hindrance stressor framework, this study investigates the impact of challenge and hindrance appraisals on these learning behaviors. This study uses a mixed methods approach to answer research questions. An interview was conducted to identify the key components of ambivalent appraisals, and a survey was conducted to empirically examine the impact of challenge and hindrance appraisals on learners' behaviors in online live streaming learning (OLSL) contexts. The data of 675 university students were analyzed using structural equation modeling. This study found that hindrance appraisal leads to cyberslacking while challenge appraisal leads to active participation, but it can also cause cyberslacking. Social presence has a double-edged effect, acting as both a facilitator and inhibitor, strengthening the effect of hindrance appraisal on cyberslacking and the impact of challenge appraisal on active participation. Prior studies have primarily focused on the negative side (techno-distress) of technology appraisals. This study simultaneously examines the positive side, techno-eustress, on learners' behaviors in OLSL contexts, and explores the moderating effects of social presence. This study contributes to the technostress and technology adaptation literature by revealing how technology-induced ambivalent appraisals impact behavioral responses. It offers important theoretical and practical implications for education tool designers.Unpacking dual effects of ambivalence toward technologies in online live streaming learning
Shixuan Fu, Jianhua Jordan Yu, Huimin Gu, Xiaoxiao Song
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Shifting to OLSL classes during the pandemic can bring learners ambivalent experiences: negative, positive or both appraisals toward the technologies. However, few studies have examined how ambivalent experiences can influence students' learning behaviors, specifically cyberslacking and active participation. Using the challenge-hindrance stressor framework, this study investigates the impact of challenge and hindrance appraisals on these learning behaviors.

This study uses a mixed methods approach to answer research questions. An interview was conducted to identify the key components of ambivalent appraisals, and a survey was conducted to empirically examine the impact of challenge and hindrance appraisals on learners' behaviors in online live streaming learning (OLSL) contexts. The data of 675 university students were analyzed using structural equation modeling.

This study found that hindrance appraisal leads to cyberslacking while challenge appraisal leads to active participation, but it can also cause cyberslacking. Social presence has a double-edged effect, acting as both a facilitator and inhibitor, strengthening the effect of hindrance appraisal on cyberslacking and the impact of challenge appraisal on active participation.

Prior studies have primarily focused on the negative side (techno-distress) of technology appraisals. This study simultaneously examines the positive side, techno-eustress, on learners' behaviors in OLSL contexts, and explores the moderating effects of social presence. This study contributes to the technostress and technology adaptation literature by revealing how technology-induced ambivalent appraisals impact behavioral responses. It offers important theoretical and practical implications for education tool designers.

]]>
Unpacking dual effects of ambivalence toward technologies in online live streaming learning10.1108/ITP-03-2023-0246Information Technology & People2023-12-05© 2023 Emerald Publishing LimitedShixuan FuJianhua Jordan YuHuimin GuXiaoxiao SongInformation Technology & Peopleahead-of-printahead-of-print2023-12-0510.1108/ITP-03-2023-0246https://www.emerald.com/insight/content/doi/10.1108/ITP-03-2023-0246/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systemshttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2021-0297/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDisasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions. Drawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model. The results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks. The study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems
Annette Mills, Nelly Todorova, Jing Zhang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.

Drawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.

The results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.

The study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.

]]>
The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems10.1108/ITP-04-2021-0297Information Technology & People2024-01-16© 2023 Emerald Publishing LimitedAnnette MillsNelly TodorovaJing ZhangInformation Technology & Peopleahead-of-printahead-of-print2024-01-1610.1108/ITP-04-2021-0297https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2021-0297/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The effect of social media use on job performance with moderating effects of Cyberloafing and job complexityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0249/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study aims to investigate whether social media use (SMU) at work has a curvilinear effect on job performance and whether Cyberloafing (non-work-related use) and job complexity moderate this effect. Online surveys were conducted in China among WeChat users from multiple organizations working in the office environment, generating 350 valid responses. The results revealed that there is an inverted U-shaped relationship between SMU at work and job performance through mediations of communication, information sharing and entertainment; such that the relationship is initially positive but becomes weaker as SMU increases and exceeds the optimal level. Notably, it is found that Cyberloafing negatively moderates the relationship between SMU and job performance, and there is a significant joint moderating effect of job complexity and Cyberloafing. This study improves the research of information system use. It also provides implications for organizations concerned about formulating policies related to individuals' SMU and suggests that SM users and managers should find strategies to arrive at without surpassing the optimal level to maximize productivity. This paper enriches the job demands-resources model to extend the literature on the advantages and disadvantages of SMU at work, which indirectly affect performance through two job conditions (job resources and demands). The study finds that employees benefit from a moderate amount of SMU at work, once it surpasses the optimal level, job demands surpass job resources and counterproductivity will appear. In addition, Cyberloafing and job complexity moderate the optimal level of SMU at work, which have not yet been investigated.The effect of social media use on job performance with moderating effects of Cyberloafing and job complexity
Elmira Zahmat Doost, Wei Zhang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study aims to investigate whether social media use (SMU) at work has a curvilinear effect on job performance and whether Cyberloafing (non-work-related use) and job complexity moderate this effect.

Online surveys were conducted in China among WeChat users from multiple organizations working in the office environment, generating 350 valid responses.

The results revealed that there is an inverted U-shaped relationship between SMU at work and job performance through mediations of communication, information sharing and entertainment; such that the relationship is initially positive but becomes weaker as SMU increases and exceeds the optimal level. Notably, it is found that Cyberloafing negatively moderates the relationship between SMU and job performance, and there is a significant joint moderating effect of job complexity and Cyberloafing.

This study improves the research of information system use. It also provides implications for organizations concerned about formulating policies related to individuals' SMU and suggests that SM users and managers should find strategies to arrive at without surpassing the optimal level to maximize productivity.

This paper enriches the job demands-resources model to extend the literature on the advantages and disadvantages of SMU at work, which indirectly affect performance through two job conditions (job resources and demands). The study finds that employees benefit from a moderate amount of SMU at work, once it surpasses the optimal level, job demands surpass job resources and counterproductivity will appear. In addition, Cyberloafing and job complexity moderate the optimal level of SMU at work, which have not yet been investigated.

]]>
The effect of social media use on job performance with moderating effects of Cyberloafing and job complexity10.1108/ITP-04-2022-0249Information Technology & People2023-07-11© 2023 Emerald Publishing LimitedElmira Zahmat DoostWei ZhangInformation Technology & Peopleahead-of-printahead-of-print2023-07-1110.1108/ITP-04-2022-0249https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0249/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How the interaction of innovation and ERP systems on business intelligence affects the performance of Mexican manufacturing companieshttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0262/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe present study shows that the implementation and development of enterprise resource planning (ERP) systems as a technological innovation provide a competitive advantage that helps to improve the functionality of business intelligence (BI) systems in the digital transformation of manufacturing companies, in addition to improving overall firm performance. The research uses the structural equation approach based on PLS-SEM technique with a sample of 120 firms in the manufacturing industry in Coahuila, Mexico. The paper provides empirical insights into how the interaction of ERP systems and innovation significantly affects the functionality of BI Systems and has a substantial effect on overall firm performance. Empirical evidence of how advanced digital management systems (ERP and BI) impact digitalization processes in organizations by improving performance is still scarce.How the interaction of innovation and ERP systems on business intelligence affects the performance of Mexican manufacturing companies
Jorge Alfonso Lara-Pérez, Francisco Canibe-Cruz, Antonio Duréndez
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The present study shows that the implementation and development of enterprise resource planning (ERP) systems as a technological innovation provide a competitive advantage that helps to improve the functionality of business intelligence (BI) systems in the digital transformation of manufacturing companies, in addition to improving overall firm performance.

The research uses the structural equation approach based on PLS-SEM technique with a sample of 120 firms in the manufacturing industry in Coahuila, Mexico.

The paper provides empirical insights into how the interaction of ERP systems and innovation significantly affects the functionality of BI Systems and has a substantial effect on overall firm performance.

Empirical evidence of how advanced digital management systems (ERP and BI) impact digitalization processes in organizations by improving performance is still scarce.

]]>
How the interaction of innovation and ERP systems on business intelligence affects the performance of Mexican manufacturing companies10.1108/ITP-04-2022-0262Information Technology & People2024-02-01© 2024 Emerald Publishing LimitedJorge Alfonso Lara-PérezFrancisco Canibe-CruzAntonio DuréndezInformation Technology & Peopleahead-of-printahead-of-print2024-02-0110.1108/ITP-04-2022-0262https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0262/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitmenthttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0271/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study aims to investigate the configurational effects of five rules – artificial intelligence (AI)-based hiring decision transparency, consistency, voice, explainability and human involvement – on applicants' procedural justice perception (APJP) and applicants' interactional justice perception (AIJP). In addition, this study examines whether the identified configurations could further enhance applicants' organisational commitment (OC). Drawing on the justice model of applicants' reactions, the authors conducted a longitudinal survey of 254 newly recruited employees from 36 Chinese companies that utilise AI in their hiring. The authors employed fuzzy-set qualitative comparative analysis (fsQCA) to determine which configurations could improve APJP and AIJP, and the authors used propensity score matching (PSM) to analyse the effects of these configurations on OC. The fsQCA generates three patterns involving five configurations that could improve APJP and AIJP. For pattern 1, when AI-based recruitment with high interpersonal rule (AI human involvement) aims for applicants' justice perception (AJP) through the combination of high informational rule (AI explainability) and high procedural rule (AI voice), there must be high levels of AI consistency and AI voice to complement AI explainability, and only this pattern of configurations can further enhance OC. In pattern 2, for the combination of high informational rule (AI explainability) and low procedural rule (absent AI voice), AI recruitment with high interpersonal rule (AI human involvement) should focus on AI transparency and AI explainability rather than the implementation of AI voice. In pattern 3, a mere combination of procedural rules could sufficiently improve AIJP. This study, which involved real applicants, is one of the few empirical studies to explore the mechanisms behind the impact of AI hiring decisions on AJP and OC, and the findings may inform researchers and managers on how to best utilise AI to make hiring decisions.The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitment
Jun Yu, Zhengcong Ma, Lin Zhu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study aims to investigate the configurational effects of five rules – artificial intelligence (AI)-based hiring decision transparency, consistency, voice, explainability and human involvement – on applicants' procedural justice perception (APJP) and applicants' interactional justice perception (AIJP). In addition, this study examines whether the identified configurations could further enhance applicants' organisational commitment (OC).

Drawing on the justice model of applicants' reactions, the authors conducted a longitudinal survey of 254 newly recruited employees from 36 Chinese companies that utilise AI in their hiring. The authors employed fuzzy-set qualitative comparative analysis (fsQCA) to determine which configurations could improve APJP and AIJP, and the authors used propensity score matching (PSM) to analyse the effects of these configurations on OC.

The fsQCA generates three patterns involving five configurations that could improve APJP and AIJP. For pattern 1, when AI-based recruitment with high interpersonal rule (AI human involvement) aims for applicants' justice perception (AJP) through the combination of high informational rule (AI explainability) and high procedural rule (AI voice), there must be high levels of AI consistency and AI voice to complement AI explainability, and only this pattern of configurations can further enhance OC. In pattern 2, for the combination of high informational rule (AI explainability) and low procedural rule (absent AI voice), AI recruitment with high interpersonal rule (AI human involvement) should focus on AI transparency and AI explainability rather than the implementation of AI voice. In pattern 3, a mere combination of procedural rules could sufficiently improve AIJP.

This study, which involved real applicants, is one of the few empirical studies to explore the mechanisms behind the impact of AI hiring decisions on AJP and OC, and the findings may inform researchers and managers on how to best utilise AI to make hiring decisions.

]]>
The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitment10.1108/ITP-04-2022-0271Information Technology & People2023-11-07© 2023 Emerald Publishing LimitedJun YuZhengcong MaLin ZhuInformation Technology & Peopleahead-of-printahead-of-print2023-11-0710.1108/ITP-04-2022-0271https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0271/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Unpacking the privacy–personalisation paradox in GDPR-2018 regulated environments: consumer vulnerability and the curse of personalisationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0275/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its implications remain underexplored. The research question is: How do consumers perceive the matter of personal data collection for the use of highly targeted and personalised ads post-GDPR-2018? The invasion of privacy vs the benefits of highly personalised digital marketing. To address the research question, this qualitative study conducts semi-structured interviews with 14 individuals, consisting of average users and digital experts. This paper reports on increasing consumer vulnerability post-GDPR-2018 due to increased awareness of personal data collection yet incessant lack of control, particularly regarding the repercussions of the digital footprint. The privacy paradox remains an issue except among experts, and personalisation remains necessary, yet critical challenges arise (e.g. filter bubbles and intrusion). Policy implications include education, regulating consent platforms and encouraging consensual sharing of personal data. While the privacy–personalisation paradox has been widely studied, the impact of GDPR-2018 has rarely been addressed in the literature. GDPR-2018 has seemingly had little impact on instilling a sense of security for consumers; if anything, this paper highlights greater concerns for privacy as users sign away their rights on consent forms to access websites, thus contributing novel insights to this area of research.Unpacking the privacy–personalisation paradox in GDPR-2018 regulated environments: consumer vulnerability and the curse of personalisation
Fatema Kawaf, Annaleis Montgomery, Marius Thuemmler
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its implications remain underexplored. The research question is: How do consumers perceive the matter of personal data collection for the use of highly targeted and personalised ads post-GDPR-2018? The invasion of privacy vs the benefits of highly personalised digital marketing.

To address the research question, this qualitative study conducts semi-structured interviews with 14 individuals, consisting of average users and digital experts.

This paper reports on increasing consumer vulnerability post-GDPR-2018 due to increased awareness of personal data collection yet incessant lack of control, particularly regarding the repercussions of the digital footprint. The privacy paradox remains an issue except among experts, and personalisation remains necessary, yet critical challenges arise (e.g. filter bubbles and intrusion).

Policy implications include education, regulating consent platforms and encouraging consensual sharing of personal data.

While the privacy–personalisation paradox has been widely studied, the impact of GDPR-2018 has rarely been addressed in the literature. GDPR-2018 has seemingly had little impact on instilling a sense of security for consumers; if anything, this paper highlights greater concerns for privacy as users sign away their rights on consent forms to access websites, thus contributing novel insights to this area of research.

]]>
Unpacking the privacy–personalisation paradox in GDPR-2018 regulated environments: consumer vulnerability and the curse of personalisation10.1108/ITP-04-2022-0275Information Technology & People2023-06-14© 2023 Emerald Publishing LimitedFatema KawafAnnaleis MontgomeryMarius ThuemmlerInformation Technology & Peopleahead-of-printahead-of-print2023-06-1410.1108/ITP-04-2022-0275https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0275/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
To be, or not to be, happy? That's the question: a study on three levels of the digital divide and individual happiness in Chinahttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0278/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms. This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels. First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust. The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.To be, or not to be, happy? That's the question: a study on three levels of the digital divide and individual happiness in China
Zhiqin Lu, Peng Li, Qinghai Li, Heng Zhang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.

This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.

First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.

The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.

]]>
To be, or not to be, happy? That's the question: a study on three levels of the digital divide and individual happiness in China10.1108/ITP-04-2022-0278Information Technology & People2023-06-15© 2023 Emerald Publishing LimitedZhiqin LuPeng LiQinghai LiHeng ZhangInformation Technology & Peopleahead-of-printahead-of-print2023-06-1510.1108/ITP-04-2022-0278https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0278/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How enterprise social media affordances affect employee agility: a self-determination theory perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0306/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper aims to investigate whether and how enterprise social media (ESM) affordances affect employee agility. Adopting self-determination theory (SDT), this study examines a model in which the four ESM affordances (i.e. visibility, association, editability and persistence) impact employee agility through the three basic psychological needs satisfaction (i.e. perceived autonomy, perceived relatedness and perceived competence) of employees. Mplus 7.4 was used to analyze survey data gathered from 304 employees who used ESM in the workplace. The authors’ findings show that all four ESM affordances contribute to perceived relatedness and perceived competence; visibility and association affordances also have positive impacts on perceived autonomy; and all three psychological needs satisfaction positively impact employee agility. First, this study adapted SDT to explore how ESM influences employee agility. Second, this study enriches the relevant research on the antecedents of employee agility and also provides new evidence and theoretical support for employee agility. Third, this study effectively expands the antecedents and outcomes of employee basic psychological needs satisfaction in the domain of ESM and agility.How enterprise social media affordances affect employee agility: a self-determination theory perspective
Yuan Sun, Zhu Mengyi, Anand Jeyaraj
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This paper aims to investigate whether and how enterprise social media (ESM) affordances affect employee agility.

Adopting self-determination theory (SDT), this study examines a model in which the four ESM affordances (i.e. visibility, association, editability and persistence) impact employee agility through the three basic psychological needs satisfaction (i.e. perceived autonomy, perceived relatedness and perceived competence) of employees. Mplus 7.4 was used to analyze survey data gathered from 304 employees who used ESM in the workplace.

The authors’ findings show that all four ESM affordances contribute to perceived relatedness and perceived competence; visibility and association affordances also have positive impacts on perceived autonomy; and all three psychological needs satisfaction positively impact employee agility.

First, this study adapted SDT to explore how ESM influences employee agility. Second, this study enriches the relevant research on the antecedents of employee agility and also provides new evidence and theoretical support for employee agility. Third, this study effectively expands the antecedents and outcomes of employee basic psychological needs satisfaction in the domain of ESM and agility.

]]>
How enterprise social media affordances affect employee agility: a self-determination theory perspective10.1108/ITP-04-2022-0306Information Technology & People2023-09-18© 2023 Emerald Publishing LimitedYuan SunZhu MengyiAnand JeyarajInformation Technology & Peopleahead-of-printahead-of-print2023-09-1810.1108/ITP-04-2022-0306https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0306/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding the determinants of technology upgrade: an integration of retrospective and prospective perspectiveshttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0312/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestTechnology upgrade has been adopted as a strategy for technology vendors to modify and improve their incumbent technologies. However, user resistance is widespread in practice. In order to understand user technology upgrade behavior, this study integrates the retrospective and prospective sides of actions and proposes an inertia-mindfulness ambidexterity perspective to explore the antecedents of technology upgrade. An online survey was conducted to collect data from 520 Microsoft Windows users to test this research model. Structural equation modeling (SEM) approach was used to evaluate measurement model and structural model. Inertia can induce individuals' psychological reactance and thus reduce their intention to upgrade. In contrast, mindfulness can decrease users' psychological reactance and then motivate them to upgrade to a new version of technology. Finally, individuals' dissatisfaction with the current version of technology would weaken the negative impact of psychological reactance on upgrade intention. This study generates an inertia-mindfulness ambidexterity perspective to investigate the factors that influence user technology upgrade intention from both retrospective and prospective sides and then identifies psychological reactance as underlying mechanism to explain how inertia and mindfulness work. Finally, this study posits that user dissatisfaction with current version of technology can moderate the relationship between psychological reactance and technology upgrade intention.Understanding the determinants of technology upgrade: an integration of retrospective and prospective perspectives
Yan Zhang, Nan Wang, Yongqiang Sun
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Technology upgrade has been adopted as a strategy for technology vendors to modify and improve their incumbent technologies. However, user resistance is widespread in practice. In order to understand user technology upgrade behavior, this study integrates the retrospective and prospective sides of actions and proposes an inertia-mindfulness ambidexterity perspective to explore the antecedents of technology upgrade.

An online survey was conducted to collect data from 520 Microsoft Windows users to test this research model. Structural equation modeling (SEM) approach was used to evaluate measurement model and structural model.

Inertia can induce individuals' psychological reactance and thus reduce their intention to upgrade. In contrast, mindfulness can decrease users' psychological reactance and then motivate them to upgrade to a new version of technology. Finally, individuals' dissatisfaction with the current version of technology would weaken the negative impact of psychological reactance on upgrade intention.

This study generates an inertia-mindfulness ambidexterity perspective to investigate the factors that influence user technology upgrade intention from both retrospective and prospective sides and then identifies psychological reactance as underlying mechanism to explain how inertia and mindfulness work. Finally, this study posits that user dissatisfaction with current version of technology can moderate the relationship between psychological reactance and technology upgrade intention.

]]>
Understanding the determinants of technology upgrade: an integration of retrospective and prospective perspectives10.1108/ITP-04-2022-0312Information Technology & People2023-07-20© 2023 Emerald Publishing LimitedYan ZhangNan WangYongqiang SunInformation Technology & Peopleahead-of-printahead-of-print2023-07-2010.1108/ITP-04-2022-0312https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2022-0312/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Risking it all in the metaverse ecosystem: forecasting resistance towards the enterprise metaversehttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2023-0374/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study investigates organizations' non-adoption intention towards the enterprise metaverse. The innovation resistance theory (IRT) is used as an underpinning theory to examine the impact of various risks on non-adoption intention towards the enterprise metaverse. A total of 294 responses were collected to examine the proposed hypotheses. A structural equation modelling technique was used to investigate the hypotheses using SPSS AMOS and PROCESS MACRO. The results of this study reveal that performance, security and psychological risks are significantly associated with non-adoption intention towards enterprise metaverse. Further, distrust significantly meditates the association between performance risk, social risk, technological dependence risk, security risk and psychological risk and non-adoption intention towards enterprise metaverse. Moreover, the results of moderated-mediation hypotheses indicate that the mediating effect of distrust on the association among performance risk, social risk, psychological risk and non-adoption intention towards enterprise metaverse is higher for individuals having high technostress compared to individuals having low technostress. The study's findings will enrich the metaverse literature. Further, it provides a deeper understanding of enterprise metaverse adoption from a B2B perspective using the underpinnings of IRT. The study helps organizations understand the risks associated with the adoption of the enterprise metaverse.Risking it all in the metaverse ecosystem: forecasting resistance towards the enterprise metaverse
Aman Kumar, Amit Shankar, Aqueeb Sohail Shaik, Girish Jain, Areej Malibari
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study investigates organizations' non-adoption intention towards the enterprise metaverse. The innovation resistance theory (IRT) is used as an underpinning theory to examine the impact of various risks on non-adoption intention towards the enterprise metaverse.

A total of 294 responses were collected to examine the proposed hypotheses. A structural equation modelling technique was used to investigate the hypotheses using SPSS AMOS and PROCESS MACRO.

The results of this study reveal that performance, security and psychological risks are significantly associated with non-adoption intention towards enterprise metaverse. Further, distrust significantly meditates the association between performance risk, social risk, technological dependence risk, security risk and psychological risk and non-adoption intention towards enterprise metaverse. Moreover, the results of moderated-mediation hypotheses indicate that the mediating effect of distrust on the association among performance risk, social risk, psychological risk and non-adoption intention towards enterprise metaverse is higher for individuals having high technostress compared to individuals having low technostress.

The study's findings will enrich the metaverse literature. Further, it provides a deeper understanding of enterprise metaverse adoption from a B2B perspective using the underpinnings of IRT. The study helps organizations understand the risks associated with the adoption of the enterprise metaverse.

]]>
Risking it all in the metaverse ecosystem: forecasting resistance towards the enterprise metaverse10.1108/ITP-04-2023-0374Information Technology & People2023-09-26© 2023 Emerald Publishing LimitedAman KumarAmit ShankarAqueeb Sohail ShaikGirish JainAreej MalibariInformation Technology & Peopleahead-of-printahead-of-print2023-09-2610.1108/ITP-04-2023-0374https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2023-0374/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The service attributes of robo-advisors: a choice-based conjoint analysishttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2023-0375/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestAs an alternative to hiring financial specialists or investment consultants, robo-advisors offer financially automated investment services. This study aims to investigate how robo-advisors' service attributes, risk attitude and financial self-efficacy influence customers' choice preferences of adopting robo-advisors. Two hundred fifty-one online surveys were used to collect data, and choice-based conjoint analysis was conducted. Results show that increasing annual fees negatively impact customers' choice preferences. Promotion, general investment education and additional human assistance have a positive impact. Furthermore, risk-seeking and risk-averse customers require more human assistance than risk-neutral customer and customers with high levels of financial self-efficacy prefer more general investment education and additional human assistance than those with lower levels. In addition, customers in the older age group prefer promotion, general investment education and additional human assistance, while wealthy customers prefer lower annual fees, higher general investment education and more additional human assistance compared to middle-class and low-income groups. This study contributes to robo-advisor providers to provide appropriate service attributes for each customer group.The service attributes of robo-advisors: a choice-based conjoint analysis
Jian-Ren Hou, Yen-Hsi Li, Sarawut Kankham
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

As an alternative to hiring financial specialists or investment consultants, robo-advisors offer financially automated investment services. This study aims to investigate how robo-advisors' service attributes, risk attitude and financial self-efficacy influence customers' choice preferences of adopting robo-advisors.

Two hundred fifty-one online surveys were used to collect data, and choice-based conjoint analysis was conducted.

Results show that increasing annual fees negatively impact customers' choice preferences. Promotion, general investment education and additional human assistance have a positive impact. Furthermore, risk-seeking and risk-averse customers require more human assistance than risk-neutral customer and customers with high levels of financial self-efficacy prefer more general investment education and additional human assistance than those with lower levels. In addition, customers in the older age group prefer promotion, general investment education and additional human assistance, while wealthy customers prefer lower annual fees, higher general investment education and more additional human assistance compared to middle-class and low-income groups.

This study contributes to robo-advisor providers to provide appropriate service attributes for each customer group.

]]>
The service attributes of robo-advisors: a choice-based conjoint analysis10.1108/ITP-04-2023-0375Information Technology & People2023-09-26© 2023 Emerald Publishing LimitedJian-Ren HouYen-Hsi LiSarawut KankhamInformation Technology & Peopleahead-of-printahead-of-print2023-09-2610.1108/ITP-04-2023-0375https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2023-0375/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Modeling digital skills beyond the IT workforce: construct definition, measurement and impact on digitalization valuehttps://www.emerald.com/insight/content/doi/10.1108/ITP-04-2023-0385/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestInformation technology (IT) personnels’ technical, business and behavioral skills are critical enablers for generating IT value. In an increasingly digitalized working environment where non-IT employees participate in digital innovations, a focus on IT personnels’ skills only doesn’t meet researchers’ need for a framework to study digital skills and managers’ need to address digital skills challenges across an enterprise’s workforce. Nevertheless, the digital skills topic is complicated by conceptual ambiguity and a lack of theoretically derived and empirically validated model. The purpose of this study is to address this problem. Theoretically, this study draws on human capital (HC) and resource-based view (RBV) theories. Empirically, it follows mixed method combining interviews and a survey. The digital skills construct is a multidimensional second order reflective construct. While its development is influenced by an organization’s commitment and exposure to digitalization, it influences the value organizations obtain from digitalization. This study conceptualizes the digital skills construct, identifying technology agnostic subdimensions that are meaningful beyond a particular digital domain [information and communication technology (ICT), information, Internet, Inter of Things (IoT)] and establishing a valid measure. Other researchers can improve both the indicators of the existing four conceptually distinct and managerially recognizable workplace digital skills dimensions as well as testing new ones. Managers can use the instrument to assess the extent to which their non-IT workforces are equipped with digital skills and get strategic insights for specific interventions such as upskilling or buying in skills. The main theoretical contribution of the paper is the conceptualization and validation of the digital skills construct for the non-IT workforce. Furthermore, we provide a theoretical framework to explain the factors that could influence the development of digital skills and demonstrate the impact that digital skills have on selected digitalization value indicators. This contribution provides the foundation for investigating the drivers, outcomes and the relationship of digital skills to other constructs such as digital transformation, innovation and firm performance.Modeling digital skills beyond the IT workforce: construct definition, measurement and impact on digitalization value
Alemayehu Molla, Victor Gekara, Stan Karanasios, Darryn Snell
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Information technology (IT) personnels’ technical, business and behavioral skills are critical enablers for generating IT value. In an increasingly digitalized working environment where non-IT employees participate in digital innovations, a focus on IT personnels’ skills only doesn’t meet researchers’ need for a framework to study digital skills and managers’ need to address digital skills challenges across an enterprise’s workforce. Nevertheless, the digital skills topic is complicated by conceptual ambiguity and a lack of theoretically derived and empirically validated model. The purpose of this study is to address this problem.

Theoretically, this study draws on human capital (HC) and resource-based view (RBV) theories. Empirically, it follows mixed method combining interviews and a survey.

The digital skills construct is a multidimensional second order reflective construct. While its development is influenced by an organization’s commitment and exposure to digitalization, it influences the value organizations obtain from digitalization.

This study conceptualizes the digital skills construct, identifying technology agnostic subdimensions that are meaningful beyond a particular digital domain [information and communication technology (ICT), information, Internet, Inter of Things (IoT)] and establishing a valid measure. Other researchers can improve both the indicators of the existing four conceptually distinct and managerially recognizable workplace digital skills dimensions as well as testing new ones.

Managers can use the instrument to assess the extent to which their non-IT workforces are equipped with digital skills and get strategic insights for specific interventions such as upskilling or buying in skills.

The main theoretical contribution of the paper is the conceptualization and validation of the digital skills construct for the non-IT workforce. Furthermore, we provide a theoretical framework to explain the factors that could influence the development of digital skills and demonstrate the impact that digital skills have on selected digitalization value indicators. This contribution provides the foundation for investigating the drivers, outcomes and the relationship of digital skills to other constructs such as digital transformation, innovation and firm performance.

]]>
Modeling digital skills beyond the IT workforce: construct definition, measurement and impact on digitalization value10.1108/ITP-04-2023-0385Information Technology & People2024-02-28© 2024 Emerald Publishing LimitedAlemayehu MollaVictor GekaraStan KaranasiosDarryn SnellInformation Technology & Peopleahead-of-printahead-of-print2024-02-2810.1108/ITP-04-2023-0385https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2023-0385/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
Understanding consumers' interest in social commerce: the role of privacy, trust and securityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2020-0322/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestConsumers may enjoy the information sharing and social support made available when a social media platform is used for pre-purchase research; however, do consumers reevaluate the privacy and security of the platform differently when ordering and payment capabilities are added? As social media systems have evolved into social commerce platforms (SCPs), individuals are often faced with whether to complete a purchase they have been researching or switch to a traditional e-commerce platform to complete the transaction. This research examines consumer trust formation in the SCP channel and how consumer interest and engagement in the channel are maintained and influence consumer decisions to purchase via the SCP. Based on trust and involvement literature, a research model was conceptualized to capture consumer beliefs about SCP privacy and security and whether the SCP can be trusted, using these inputs into subsequent consumer interest, engagement and decisions on whether to use the SCP for purchasing. The research model was empirically tested using the panel data's structural equation modeling (AMOS) (n = 405). The data showed acceptable reliability and convergent validity, while the original research model provides predictive validity and theory-confirming insights. Results confirm that consumer perceptions of privacy and security play a crucial role as decision criteria, informing their judgments of whether a new social commerce channel can be trusted enough to conduct purchases. Further, consumer trust supports their interest in the SCP, resulting in enduring and enhanced behavioral use and, to a lesser extent, purchase intent. Still, a majority of this sample declined to purchase using the SCP and rather preferred to transact on tried and trusted traditional e-commerce sites. This study is among the first to examine trust formation in new SCPs, where consumers are deciding to expand their engagement level from social and informational to commercial.Understanding consumers' interest in social commerce: the role of privacy, trust and security
Hsiao-Ting Tseng, Waqar Nadeem, M. Sam Hajli, Mauricio Featherman, Nick Hajli
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Consumers may enjoy the information sharing and social support made available when a social media platform is used for pre-purchase research; however, do consumers reevaluate the privacy and security of the platform differently when ordering and payment capabilities are added? As social media systems have evolved into social commerce platforms (SCPs), individuals are often faced with whether to complete a purchase they have been researching or switch to a traditional e-commerce platform to complete the transaction. This research examines consumer trust formation in the SCP channel and how consumer interest and engagement in the channel are maintained and influence consumer decisions to purchase via the SCP.

Based on trust and involvement literature, a research model was conceptualized to capture consumer beliefs about SCP privacy and security and whether the SCP can be trusted, using these inputs into subsequent consumer interest, engagement and decisions on whether to use the SCP for purchasing. The research model was empirically tested using the panel data's structural equation modeling (AMOS) (n = 405). The data showed acceptable reliability and convergent validity, while the original research model provides predictive validity and theory-confirming insights.

Results confirm that consumer perceptions of privacy and security play a crucial role as decision criteria, informing their judgments of whether a new social commerce channel can be trusted enough to conduct purchases. Further, consumer trust supports their interest in the SCP, resulting in enduring and enhanced behavioral use and, to a lesser extent, purchase intent. Still, a majority of this sample declined to purchase using the SCP and rather preferred to transact on tried and trusted traditional e-commerce sites.

This study is among the first to examine trust formation in new SCPs, where consumers are deciding to expand their engagement level from social and informational to commercial.

]]>
Understanding consumers' interest in social commerce: the role of privacy, trust and security10.1108/ITP-05-2020-0322Information Technology & People2023-11-07© 2023 Emerald Publishing LimitedHsiao-Ting TsengWaqar NadeemM. Sam HajliMauricio FeathermanNick HajliInformation Technology & Peopleahead-of-printahead-of-print2023-11-0710.1108/ITP-05-2020-0322https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2020-0322/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding the challenges of blockchain technology adoption: evidence from China’s developing carbon marketshttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2021-0379/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestBlockchain is a disruptive technology that has matured to deliver robust, global, IT systems, yet adoption lags predictions. The authors explore barriers to adoption in the context of a global challenge with multiple stakeholders: integration of carbon markets. Going beyond the dominant economic-rationalistic paradigm of information system (IS) innovation adoption, the authors reduce pro-innovation bias and broaden inter-organizational scope by using technological frames theory to capture the cognitive framing of the challenges perceived within the world’s largest carbon emitter: China. Semi-structured interviews with 15 key experts representing three communities in China’s carbon markets: IT experts in carbon markets; carbon market experts with conceptual knowledge of blockchain and carbon market experts with practical blockchain experience. Perceived technical challenges were found to be the least significant in explaining adoption. Significant challenges in five areas: social, political legal and policy (PLP), data, organizational and managerial (OM) and economic, with PLP and OM given most weight. Mapping to frames developed to encompass these challenges: nature of technology, strategic use of technology and technology readiness resolved frame incongruence that, in the case explored, did not lead to rejection of blockchain, but a decision to defer investment, increase the scope of analysis and delay the adoption decision. Increases scope and resolution of IS adoption research. Technological frames theory moves from predominant economic-rational models to a social cognitive perspective. Broadens understanding of blockchain adoption in a context combining the world’s most carbon emissions with ownership of most blockchain patents, detailing socio-technical challenges and delivering practical guidance for policymakers and practitioners.Understanding the challenges of blockchain technology adoption: evidence from China’s developing carbon markets
Xing Chen, Ashley D. Lloyd
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Blockchain is a disruptive technology that has matured to deliver robust, global, IT systems, yet adoption lags predictions. The authors explore barriers to adoption in the context of a global challenge with multiple stakeholders: integration of carbon markets. Going beyond the dominant economic-rationalistic paradigm of information system (IS) innovation adoption, the authors reduce pro-innovation bias and broaden inter-organizational scope by using technological frames theory to capture the cognitive framing of the challenges perceived within the world’s largest carbon emitter: China.

Semi-structured interviews with 15 key experts representing three communities in China’s carbon markets: IT experts in carbon markets; carbon market experts with conceptual knowledge of blockchain and carbon market experts with practical blockchain experience.

Perceived technical challenges were found to be the least significant in explaining adoption. Significant challenges in five areas: social, political legal and policy (PLP), data, organizational and managerial (OM) and economic, with PLP and OM given most weight. Mapping to frames developed to encompass these challenges: nature of technology, strategic use of technology and technology readiness resolved frame incongruence that, in the case explored, did not lead to rejection of blockchain, but a decision to defer investment, increase the scope of analysis and delay the adoption decision.

Increases scope and resolution of IS adoption research. Technological frames theory moves from predominant economic-rational models to a social cognitive perspective. Broadens understanding of blockchain adoption in a context combining the world’s most carbon emissions with ownership of most blockchain patents, detailing socio-technical challenges and delivering practical guidance for policymakers and practitioners.

]]>
Understanding the challenges of blockchain technology adoption: evidence from China’s developing carbon markets10.1108/ITP-05-2021-0379Information Technology & People2024-01-16© 2023 Emerald Publishing LimitedXing ChenAshley D. LloydInformation Technology & Peopleahead-of-printahead-of-print2024-01-1610.1108/ITP-05-2021-0379https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2021-0379/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The role of capabilities in digital service development and delivery: the case of start-up organisationshttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2021-0404/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDigital technologies create myriad innovation opportunities and have inspired the establishment of many new start-ups in recent years. Despite the growing knowledge on digital entrepreneurship, few studies explore how start-ups exploit these opportunities to achieve entrepreneurial success. The purpose of this paper is to explore start-ups’ capabilities for successful delivery of digital artefacts in a cloud computing infrastructure. Empirical data were collected during a qualitative case study of an established start-up in the Chinese market by interviewing 41 interviewees. Informed by the notion of dynamic capabilities and using the Gioia methodology, the case firm's life cycle was analysed in detail. The study identifies start-ups’ ordinary and dynamic capabilities for successful development and delivery of digital services. The findings provide insights into a portfolio of start-ups’ capabilities, namely adaptation, networking, reengineering and refinement. The study suggests that start-ups’ capabilities and underlying entrepreneurial actions determine the degree to which adoption of digital technologies create and transfer value to customers. The study offers specific insights into how start-ups successfully develop and deliver digital artefacts in a cloud infrastructure based on entrepreneurs' prior expertise, vision and accumulated experience.The role of capabilities in digital service development and delivery: the case of start-up organisations
Gongtao Zhang, M.N. Ravishankar
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Digital technologies create myriad innovation opportunities and have inspired the establishment of many new start-ups in recent years. Despite the growing knowledge on digital entrepreneurship, few studies explore how start-ups exploit these opportunities to achieve entrepreneurial success. The purpose of this paper is to explore start-ups’ capabilities for successful delivery of digital artefacts in a cloud computing infrastructure.

Empirical data were collected during a qualitative case study of an established start-up in the Chinese market by interviewing 41 interviewees. Informed by the notion of dynamic capabilities and using the Gioia methodology, the case firm's life cycle was analysed in detail.

The study identifies start-ups’ ordinary and dynamic capabilities for successful development and delivery of digital services. The findings provide insights into a portfolio of start-ups’ capabilities, namely adaptation, networking, reengineering and refinement.

The study suggests that start-ups’ capabilities and underlying entrepreneurial actions determine the degree to which adoption of digital technologies create and transfer value to customers. The study offers specific insights into how start-ups successfully develop and deliver digital artefacts in a cloud infrastructure based on entrepreneurs' prior expertise, vision and accumulated experience.

]]>
The role of capabilities in digital service development and delivery: the case of start-up organisations10.1108/ITP-05-2021-0404Information Technology & People2023-04-11© 2023 Emerald Publishing LimitedGongtao ZhangM.N. RavishankarInformation Technology & Peopleahead-of-printahead-of-print2023-04-1110.1108/ITP-05-2021-0404https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2021-0404/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Exploring the ineffectiveness of gamification health management: a U-shaped relationship between competition and technological exhaustionhttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0347/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestGamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have investigated the positive effect of gamification competition on users, little research has considered gamification's ineffectiveness and negative effects. In particular, how gamification competition affects users' technological exhaustion remains unclear. According to flow theory and related research on gamification, this study discusses the nonlinear relationship between gamification competition and users' technological exhaustion. Furthermore, the authors analyze the moderating effect of user type (socializers and achievers) and users' health condition on this nonlinear relationship. Based on flow theory, the authors propose a series of research hypotheses. To test all research hypotheses, the authors collected information from 407 users via a questionnaire as the data for this study. The empirical results found a U-shaped relationship between gamification competition and technological exhaustion. Technological exhaustion gradually decreases as competition increases until reaching the lowest point; after that, technological exhaustion gradually increases as competition increases. Further, being a socializer and health condition play a moderating role in the U-shaped relationship between competition and technological exhaustion. This study's findings not only enrich the related research in flow theory and gamification, but also contribute to the effective design of gamification in health management platforms.Exploring the ineffectiveness of gamification health management: a U-shaped relationship between competition and technological exhaustion
Dan Li, Hualong Yang, Zhibin Hu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Gamification design is considered an effective way of changing users' health behavior and improving their health management performance. Even though numerous studies have investigated the positive effect of gamification competition on users, little research has considered gamification's ineffectiveness and negative effects. In particular, how gamification competition affects users' technological exhaustion remains unclear.

According to flow theory and related research on gamification, this study discusses the nonlinear relationship between gamification competition and users' technological exhaustion. Furthermore, the authors analyze the moderating effect of user type (socializers and achievers) and users' health condition on this nonlinear relationship. Based on flow theory, the authors propose a series of research hypotheses. To test all research hypotheses, the authors collected information from 407 users via a questionnaire as the data for this study.

The empirical results found a U-shaped relationship between gamification competition and technological exhaustion. Technological exhaustion gradually decreases as competition increases until reaching the lowest point; after that, technological exhaustion gradually increases as competition increases. Further, being a socializer and health condition play a moderating role in the U-shaped relationship between competition and technological exhaustion.

This study's findings not only enrich the related research in flow theory and gamification, but also contribute to the effective design of gamification in health management platforms.

]]>
Exploring the ineffectiveness of gamification health management: a U-shaped relationship between competition and technological exhaustion10.1108/ITP-05-2022-0347Information Technology & People2023-04-12© 2023 Emerald Publishing LimitedDan LiHualong YangZhibin HuInformation Technology & Peopleahead-of-printahead-of-print2023-04-1210.1108/ITP-05-2022-0347https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0347/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Abusive supervision and cyberloafing: an investigation based on Stressor-Emotion-CWB theoryhttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0353/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestCyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits. Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses. Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC. This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.Abusive supervision and cyberloafing: an investigation based on Stressor-Emotion-CWB theory
Arindam Bhattacharjee, Anita Sarkar
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.

Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.

Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.

This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.

]]>
Abusive supervision and cyberloafing: an investigation based on Stressor-Emotion-CWB theory10.1108/ITP-05-2022-0353Information Technology & People2023-04-07© 2023 Emerald Publishing LimitedArindam BhattacharjeeAnita SarkarInformation Technology & Peopleahead-of-printahead-of-print2023-04-0710.1108/ITP-05-2022-0353https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0353/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Stickiness formation among mobile apps of different social levels: multigroup analysis using the cognitive–affective–conative frameworkhttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0358/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels. This study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels. This study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust. This study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.Stickiness formation among mobile apps of different social levels: multigroup analysis using the cognitive–affective–conative framework
Xingchen Zhou, Pei-Luen Patrick Rau, Zhuoni Jie
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.

This study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels.

This study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust.

This study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.

]]>
Stickiness formation among mobile apps of different social levels: multigroup analysis using the cognitive–affective–conative framework10.1108/ITP-05-2022-0358Information Technology & People2023-04-11© 2023 Emerald Publishing LimitedXingchen ZhouPei-Luen Patrick RauZhuoni JieInformation Technology & Peopleahead-of-printahead-of-print2023-04-1110.1108/ITP-05-2022-0358https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0358/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Examining the role of social media influencers in service failure and recovery strategies: an empirical investigation of millennials' viewshttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0371/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestPrior research has advanced several explanations for social media influencers' (SMIs’) success in the burgeoning computer-mediated marketing environments but leaves one key topic unexplored: the moderating role of SMIs in service failure and recovery strategies. Drawing on a social constructivist perspective and an inductive approach, 59 in-depth interviews were conducted with millennials from three European countries (Italy, France and the United Kingdom). Building on social influence theory and commitment-trust theory, this study conceptualises four distinct pathways unifying SMIs' efforts in the service failure recovery process. The emergent model illustrates how source credibility and message content moderate service failure severity and speed of recovery. The insights gained from this study model contribute to research on the pivotal uniqueness of SMIs in service failure recovery processes and offer practical explanations of variations in the implementation of influencer marketing. This study examines a perspective of SMIs that considers the cycle of their influence on customers through service failure and recovery. The study suggests that negative reactions towards service failure and recovery are reduced if customers have a relationship with influencers prior to the service failure and recovery compared with the reactions of customers who do not have a relationship with the influencer.Examining the role of social media influencers in service failure and recovery strategies: an empirical investigation of millennials' views
Wilson Ozuem, Michelle Willis, Silvia Ranfagni, Kerry Howell, Serena Rovai
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Prior research has advanced several explanations for social media influencers' (SMIs’) success in the burgeoning computer-mediated marketing environments but leaves one key topic unexplored: the moderating role of SMIs in service failure and recovery strategies.

Drawing on a social constructivist perspective and an inductive approach, 59 in-depth interviews were conducted with millennials from three European countries (Italy, France and the United Kingdom). Building on social influence theory and commitment-trust theory, this study conceptualises four distinct pathways unifying SMIs' efforts in the service failure recovery process.

The emergent model illustrates how source credibility and message content moderate service failure severity and speed of recovery. The insights gained from this study model contribute to research on the pivotal uniqueness of SMIs in service failure recovery processes and offer practical explanations of variations in the implementation of influencer marketing. This study examines a perspective of SMIs that considers the cycle of their influence on customers through service failure and recovery.

The study suggests that negative reactions towards service failure and recovery are reduced if customers have a relationship with influencers prior to the service failure and recovery compared with the reactions of customers who do not have a relationship with the influencer.

]]>
Examining the role of social media influencers in service failure and recovery strategies: an empirical investigation of millennials' views10.1108/ITP-05-2022-0371Information Technology & People2023-07-20© 2023 Emerald Publishing LimitedWilson OzuemMichelle WillisSilvia RanfagniKerry HowellSerena RovaiInformation Technology & Peopleahead-of-printahead-of-print2023-07-2010.1108/ITP-05-2022-0371https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0371/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Looking for accommodations? What motivates consumer information search behavior on Instagram, Facebook groups and personal profiles on social networking siteshttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0389/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper aims to examine the association between the perceived values of information (economic, hedonic, functional, psychological) and the actual use of social networking channels (Instagram/Facebook groups/SNS personal profiles or messaging) for seeking information on accommodations. 879 respondents aged 18–55, who travel abroad as individual tourists at least once a year and are responsible for their own accommodation choice, were surveyed. The study shows that all the values of information are more likely to be provided through posting a question on one's profile/messaging options (i.e. friends and relatives), than through Facebook groups and Instagram. The multivariate findings show that different values are associated with different SNS channel choices for seeking information. The study provides an innovative approach to the motivations behind the use of different SNS platforms for travel information search by consumers. It offers practical implications, suggesting how to provide the relevant content on each channel.Looking for accommodations? What motivates consumer information search behavior on Instagram, Facebook groups and personal profiles on social networking sites
Ofrit Kol, Sabina Lissitsa
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This paper aims to examine the association between the perceived values of information (economic, hedonic, functional, psychological) and the actual use of social networking channels (Instagram/Facebook groups/SNS personal profiles or messaging) for seeking information on accommodations.

879 respondents aged 18–55, who travel abroad as individual tourists at least once a year and are responsible for their own accommodation choice, were surveyed.

The study shows that all the values of information are more likely to be provided through posting a question on one's profile/messaging options (i.e. friends and relatives), than through Facebook groups and Instagram. The multivariate findings show that different values are associated with different SNS channel choices for seeking information.

The study provides an innovative approach to the motivations behind the use of different SNS platforms for travel information search by consumers. It offers practical implications, suggesting how to provide the relevant content on each channel.

]]>
Looking for accommodations? What motivates consumer information search behavior on Instagram, Facebook groups and personal profiles on social networking sites10.1108/ITP-05-2022-0389Information Technology & People2023-06-12© 2023 Emerald Publishing LimitedOfrit KolSabina LissitsaInformation Technology & Peopleahead-of-printahead-of-print2023-06-1210.1108/ITP-05-2022-0389https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0389/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The future of working from home: a mixed-methods study with IT professionals to learn from enforced working from homehttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0399/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestPositive experiences with working from home (WFH) during the Corona pandemic (COVID-19) have motivated many employees to continue WFH after the pandemic. However, factors influencing employees' WFH intentions against the backdrop of experiences during pandemic-induced enforced working from home (EWFH) are heterogeneous. This study investigates factors linked to information technology (IT) professionals' WFH intentions. This mixed-methods study with 92 IT professionals examines the effects of seven predictors for IT professionals' WFH intentions. The predictors are categorized according to the trichotomy of (1) characteristics of the worker, (2) characteristics of the workspace and (3) the work context. Structural equation modeling is used to analyze the quantitative survey data. In addition, IT professionals' responses to six open questions in which they reflect on past experiences and envision future work are examined. Quantitative results suggest that characteristics of the worker, such as segmentation preference, are influencing WFH intentions stronger than characteristics of the workspace or the work context. Furthermore, perceived productivity during EWFH and gender significantly predict WFH intentions. Contextualizing these quantitative insights, the qualitative data provides a rich yet heterogeneous list of factors why IT professionals prefer (not) to work from home. Reasons influencing WFH intentions vary due to individual preferences and constraints. Therefore, a differentiated organizational approach is recommended for designing future work arrangements. In addition, the findings suggest that team contracts to formalize working patterns, e.g. to agree on the needed number of physical meetings, can be helpful levers to reduce the complexity of future work that is most likely a mix of WFH and office arrangements. This study extends literature reflecting on COVID-19-induced changes, specifically the emerging debate about why employees want to continue WFH. It is crucial for researchers and practitioners to understand which factors influence IT professionals' WFH intentions and how they impact the design and implementation of future hybrid work arrangements.The future of working from home: a mixed-methods study with IT professionals to learn from enforced working from home
Simon Lansmann, Jana Mattern, Simone Krebber, Joschka Andreas Hüllmann
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Positive experiences with working from home (WFH) during the Corona pandemic (COVID-19) have motivated many employees to continue WFH after the pandemic. However, factors influencing employees' WFH intentions against the backdrop of experiences during pandemic-induced enforced working from home (EWFH) are heterogeneous. This study investigates factors linked to information technology (IT) professionals' WFH intentions.

This mixed-methods study with 92 IT professionals examines the effects of seven predictors for IT professionals' WFH intentions. The predictors are categorized according to the trichotomy of (1) characteristics of the worker, (2) characteristics of the workspace and (3) the work context. Structural equation modeling is used to analyze the quantitative survey data. In addition, IT professionals' responses to six open questions in which they reflect on past experiences and envision future work are examined.

Quantitative results suggest that characteristics of the worker, such as segmentation preference, are influencing WFH intentions stronger than characteristics of the workspace or the work context. Furthermore, perceived productivity during EWFH and gender significantly predict WFH intentions. Contextualizing these quantitative insights, the qualitative data provides a rich yet heterogeneous list of factors why IT professionals prefer (not) to work from home.

Reasons influencing WFH intentions vary due to individual preferences and constraints. Therefore, a differentiated organizational approach is recommended for designing future work arrangements. In addition, the findings suggest that team contracts to formalize working patterns, e.g. to agree on the needed number of physical meetings, can be helpful levers to reduce the complexity of future work that is most likely a mix of WFH and office arrangements.

This study extends literature reflecting on COVID-19-induced changes, specifically the emerging debate about why employees want to continue WFH. It is crucial for researchers and practitioners to understand which factors influence IT professionals' WFH intentions and how they impact the design and implementation of future hybrid work arrangements.

]]>
The future of working from home: a mixed-methods study with IT professionals to learn from enforced working from home10.1108/ITP-05-2022-0399Information Technology & People2023-11-17© 2023 Emerald Publishing LimitedSimon LansmannJana MatternSimone KrebberJoschka Andreas HüllmannInformation Technology & Peopleahead-of-printahead-of-print2023-11-1710.1108/ITP-05-2022-0399https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0399/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding social media discontinuance behavior in China: a perspective of social cognitive theoryhttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0403/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestTo understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of social cognitive theory (SCT). Based on SCT, this study puts forward a theoretical model incorporating habit, excessive use and negative emotions to predict social media discontinuance behavior. The proposed research model was empirically tested with 465 responses collected from WeChat users in China via an online survey. WeChat is one of the most popular social media in China. However, WeChat also faces the challenges of reduced or terminated usage among its users. Partial least squares structural equation modeling (PLS-SEM) technique was used to analyze the data. The research results in this study show that habit exerts a negative effect on social media discontinuance behavior, while exhaustion and regret have positive influences. In addition, habit positively affects excessive use, which further leads to negative emotions of social media exhaustion and regret. Moreover, gender moderates the relationship between habit and social media discontinuance behavior. This study adds to the literature of information system (IS) use lifecycle by investigating user behavioral changes regarding a transition from habituated to excessive use and further to discontinuance behavior. This study also helps elucidate the complex role of habit by explaining social media discontinuance from the social cognitive view. Furthermore, this study advances the current understanding of gender difference in social media discontinuance in the Chinese context. The study also offers insights to practitioners on how to prevent individuals from discontinuing their use of social media.Understanding social media discontinuance behavior in China: a perspective of social cognitive theory
Chunmei Gan, Hongxiu Li, Yong Liu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

To understand the mechanisms underlying social media discontinuance behavior, this study explores factors affecting social media discontinuance behavior from the perspective of social cognitive theory (SCT).

Based on SCT, this study puts forward a theoretical model incorporating habit, excessive use and negative emotions to predict social media discontinuance behavior. The proposed research model was empirically tested with 465 responses collected from WeChat users in China via an online survey. WeChat is one of the most popular social media in China. However, WeChat also faces the challenges of reduced or terminated usage among its users. Partial least squares structural equation modeling (PLS-SEM) technique was used to analyze the data.

The research results in this study show that habit exerts a negative effect on social media discontinuance behavior, while exhaustion and regret have positive influences. In addition, habit positively affects excessive use, which further leads to negative emotions of social media exhaustion and regret. Moreover, gender moderates the relationship between habit and social media discontinuance behavior.

This study adds to the literature of information system (IS) use lifecycle by investigating user behavioral changes regarding a transition from habituated to excessive use and further to discontinuance behavior. This study also helps elucidate the complex role of habit by explaining social media discontinuance from the social cognitive view. Furthermore, this study advances the current understanding of gender difference in social media discontinuance in the Chinese context. The study also offers insights to practitioners on how to prevent individuals from discontinuing their use of social media.

]]>
Understanding social media discontinuance behavior in China: a perspective of social cognitive theory10.1108/ITP-05-2022-0403Information Technology & People2023-04-13© 2023 Emerald Publishing LimitedChunmei GanHongxiu LiYong LiuInformation Technology & Peopleahead-of-printahead-of-print2023-04-1310.1108/ITP-05-2022-0403https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0403/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Examining the effects of disinformation and trust on social media users' COVID-19 vaccine decision-makinghttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0410/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDisinformation on social media is a serious issue. This study examines the effects of disinformation on COVID-19 vaccination decision-making to understand how social media users make healthcare decisions when disinformation is presented in their social media feeds. It examines trust in post owners as a moderator on the relationship between information types (i.e. disinformation and factual information) and vaccination decision-making. This study conducts a scenario-based web survey experiment to collect extensive survey data from social media users. This study reveals that information types differently affect social media users' COVID-19 vaccination decision-making and finds a moderating effect of trust in post owners on the relationship between information types and vaccination decision-making. For those who have a high degree of trust in post owners, the effect of information types on vaccination decision-making becomes large. In contrast, information types do not affect the decision-making of those who have a very low degree of trust in post owners. Besides, identification and compliance are found to affect trust in post owners. This study contributes to the literature on online disinformation and individual healthcare decision-making by demonstrating the effect of disinformation on vaccination decision-making and providing empirical evidence on how trust in post owners impacts the effects of information types on vaccination decision-making. This study focuses on trust in post owners, unlike prior studies that focus on trust in information or social media platforms.Examining the effects of disinformation and trust on social media users' COVID-19 vaccine decision-making
Zulma Valedon Westney, Inkyoung Hur, Ling Wang, Junping Sun
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Disinformation on social media is a serious issue. This study examines the effects of disinformation on COVID-19 vaccination decision-making to understand how social media users make healthcare decisions when disinformation is presented in their social media feeds. It examines trust in post owners as a moderator on the relationship between information types (i.e. disinformation and factual information) and vaccination decision-making.

This study conducts a scenario-based web survey experiment to collect extensive survey data from social media users.

This study reveals that information types differently affect social media users' COVID-19 vaccination decision-making and finds a moderating effect of trust in post owners on the relationship between information types and vaccination decision-making. For those who have a high degree of trust in post owners, the effect of information types on vaccination decision-making becomes large. In contrast, information types do not affect the decision-making of those who have a very low degree of trust in post owners. Besides, identification and compliance are found to affect trust in post owners.

This study contributes to the literature on online disinformation and individual healthcare decision-making by demonstrating the effect of disinformation on vaccination decision-making and providing empirical evidence on how trust in post owners impacts the effects of information types on vaccination decision-making. This study focuses on trust in post owners, unlike prior studies that focus on trust in information or social media platforms.

]]>
Examining the effects of disinformation and trust on social media users' COVID-19 vaccine decision-making10.1108/ITP-05-2022-0410Information Technology & People2023-05-04© 2023 Emerald Publishing LimitedZulma Valedon WestneyInkyoung HurLing WangJunping SunInformation Technology & Peopleahead-of-printahead-of-print2023-05-0410.1108/ITP-05-2022-0410https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2022-0410/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0434/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship. A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country. The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values. The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India. The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspective
Ben Krishna, Satish Krishnan, M.P. Sebastian
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.

A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.

The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.

The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.

The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.

]]>
Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspective10.1108/ITP-05-2023-0434Information Technology & People2023-12-04© 2023 Emerald Publishing LimitedBen KrishnaSatish KrishnanM.P. SebastianInformation Technology & Peopleahead-of-printahead-of-print2023-12-0410.1108/ITP-05-2023-0434https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0434/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Unpacking the sociomaterial parameters of connectivity management practices in the Saudi academic contexthttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0442/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestExisting research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies, mobile technology is perceived as a tool or an enabler that supports otherwise human-centric connectivity decisions. This view sees technology as separate or external to the organisation, missing out on its nuanced role in shaping connectivity decisions. Our study aims to bring technology back into the sociomaterially imbricated context of connectivity and to unpack its parameters. Drawing on data collected from documents and semi-structured interviews, we adopt the framework of “sociomaterial imbrications” (Leonardi, 2011) to understand the social and material parameters that influence connectivity management practices at two different academic institutions in Saudi Arabia. The study identifies a set of social and material parameters (organisational, individual, technological and situational) that imbricate to shape, collectively and not individually, professionals’ connectivity management practices. Connectivity decisions to change practice (such as decisions of where, when or why to connect) or technology (how to connect) are not as distinct as they appear but originate from, and are founded on, imbricated sociomaterial parameters. Our study further suggests that connectivity decisions are shaped by individuals’ perceptions of sociomaterial imbrications, but decisions are not solely idiosyncratic. The context within which connectivity decisions are taken influences the type of decisions made. Connectivity management emerged from sociomaterial imbrications within a context constitutive of four interacting parameters: organisational, technological, situational and individual. Decisions around the “how” and the “what” of connectivity – i.e. the practice of connectivity and its underpinning technology – originate from how people perceive sociomaterial imbrications as enabling or constraining within a context. Individual perceptions account for changes in practice and in technology, but the context they find themselves in is also important. For instance, we show that professionals may perceive a certain technology as affording, but eventually they may use another technology for communications due to social norms.Unpacking the sociomaterial parameters of connectivity management practices in the Saudi academic context
Njod Aljabr, Dimitra Petrakaki, Petros Chamakiotis
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies, mobile technology is perceived as a tool or an enabler that supports otherwise human-centric connectivity decisions. This view sees technology as separate or external to the organisation, missing out on its nuanced role in shaping connectivity decisions. Our study aims to bring technology back into the sociomaterially imbricated context of connectivity and to unpack its parameters.

Drawing on data collected from documents and semi-structured interviews, we adopt the framework of “sociomaterial imbrications” (Leonardi, 2011) to understand the social and material parameters that influence connectivity management practices at two different academic institutions in Saudi Arabia.

The study identifies a set of social and material parameters (organisational, individual, technological and situational) that imbricate to shape, collectively and not individually, professionals’ connectivity management practices. Connectivity decisions to change practice (such as decisions of where, when or why to connect) or technology (how to connect) are not as distinct as they appear but originate from, and are founded on, imbricated sociomaterial parameters. Our study further suggests that connectivity decisions are shaped by individuals’ perceptions of sociomaterial imbrications, but decisions are not solely idiosyncratic. The context within which connectivity decisions are taken influences the type of decisions made.

Connectivity management emerged from sociomaterial imbrications within a context constitutive of four interacting parameters: organisational, technological, situational and individual. Decisions around the “how” and the “what” of connectivity – i.e. the practice of connectivity and its underpinning technology – originate from how people perceive sociomaterial imbrications as enabling or constraining within a context. Individual perceptions account for changes in practice and in technology, but the context they find themselves in is also important. For instance, we show that professionals may perceive a certain technology as affording, but eventually they may use another technology for communications due to social norms.

]]>
Unpacking the sociomaterial parameters of connectivity management practices in the Saudi academic context10.1108/ITP-05-2023-0442Information Technology & People2024-03-29© 2024 Emerald Publishing LimitedNjod AljabrDimitra PetrakakiPetros ChamakiotisInformation Technology & Peopleahead-of-printahead-of-print2024-03-2910.1108/ITP-05-2023-0442https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0442/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
She’s worth IT: challenges for female CIOs in ensuring IT security compliancehttps://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0524/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestIT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions. A controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US. The findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations. This study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019). This study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities. This study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization. This study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect. In addition, the study elucidates how gender roles shape employees' responses to different leadership styles through gender stereotyping and internalization.She’s worth IT: challenges for female CIOs in ensuring IT security compliance
Gaurav Bansal, Zhuoli Axelton
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

IT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.

A controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.

The findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.

This study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).

This study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.

This study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.

This study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect. In addition, the study elucidates how gender roles shape employees' responses to different leadership styles through gender stereotyping and internalization.

]]>
She’s worth IT: challenges for female CIOs in ensuring IT security compliance10.1108/ITP-05-2023-0524Information Technology & People2024-01-10© 2023 Emerald Publishing LimitedGaurav BansalZhuoli AxeltonInformation Technology & Peopleahead-of-printahead-of-print2024-01-1010.1108/ITP-05-2023-0524https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2023-0524/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Big data innovation and implementation in projects teams: towards a SEM approach to conflict preventionhttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2019-0286/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDespite an enormous body of literature on conflict management, intra-group conflicts vis-à-vis team performance, there is currently no study investigating the conflict prevention approach to handling innovation-induced conflicts that may hinder smooth implementation of big data technology in project teams. This study uses constructs from conflict theory, and team power relations to develop an explanatory framework. The study proceeded to formulate theoretical hypotheses from task-conflict, process-conflict, relationship and team power conflict. The hypotheses were tested using Partial Least Square Structural Equation Model (PLS-SEM) to understand key preventive measures that can encourage conflict prevention in project teams when implementing big data technology. Results from the structural model validated six out of seven theoretical hypotheses and identified Relationship Conflict Prevention as the most important factor for promoting smooth implementation of Big Data Analytics technology in project teams. This is followed by power-conflict prevention, prevention of task disputes and prevention of Process conflicts respectively. Results also show that relationship and power conflicts interact on the one hand, while task and relationship conflict prevention also interact on the other hand, thus, suggesting the prevention of one of the conflicts could minimise the outbreak of the other. The study has been conducted within the context of big data adoption in a project-based work environment and the need to prevent innovation-induced conflicts in teams. Similarly, the research participants examined are stakeholders within UK projected-based organisations. The study urges organisations wishing to embrace big data innovation to evolve a multipronged approach for facilitating smooth implementation through prevention of conflicts among project frontlines. This study urges organisations to anticipate both subtle and overt frictions that can undermine relationships and team dynamics, effective task performance, derail processes and create unhealthy rivalry that undermines cooperation and collaboration in the team. The study also addresses the uncertainty and disruption that big data technology presents to employees in teams and explore conflict prevention measure which can be used to mitigate such in project teams. The study proposes a Structural Model for establishing conflict prevention strategies in project teams through a multidimensional framework that combines constructs like team power conflict, process, relationship and task conflicts; to encourage Big Data implementation.Big data innovation and implementation in projects teams: towards a SEM approach to conflict prevention
Hakeem A. Owolabi, Azeez A. Oyedele, Lukumon Oyedele, Hafiz Alaka, Oladimeji Olawale, Oluseyi Aju, Lukman Akanbi, Sikiru Ganiyu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Despite an enormous body of literature on conflict management, intra-group conflicts vis-à-vis team performance, there is currently no study investigating the conflict prevention approach to handling innovation-induced conflicts that may hinder smooth implementation of big data technology in project teams.

This study uses constructs from conflict theory, and team power relations to develop an explanatory framework. The study proceeded to formulate theoretical hypotheses from task-conflict, process-conflict, relationship and team power conflict. The hypotheses were tested using Partial Least Square Structural Equation Model (PLS-SEM) to understand key preventive measures that can encourage conflict prevention in project teams when implementing big data technology.

Results from the structural model validated six out of seven theoretical hypotheses and identified Relationship Conflict Prevention as the most important factor for promoting smooth implementation of Big Data Analytics technology in project teams. This is followed by power-conflict prevention, prevention of task disputes and prevention of Process conflicts respectively. Results also show that relationship and power conflicts interact on the one hand, while task and relationship conflict prevention also interact on the other hand, thus, suggesting the prevention of one of the conflicts could minimise the outbreak of the other.

The study has been conducted within the context of big data adoption in a project-based work environment and the need to prevent innovation-induced conflicts in teams. Similarly, the research participants examined are stakeholders within UK projected-based organisations.

The study urges organisations wishing to embrace big data innovation to evolve a multipronged approach for facilitating smooth implementation through prevention of conflicts among project frontlines. This study urges organisations to anticipate both subtle and overt frictions that can undermine relationships and team dynamics, effective task performance, derail processes and create unhealthy rivalry that undermines cooperation and collaboration in the team.

The study also addresses the uncertainty and disruption that big data technology presents to employees in teams and explore conflict prevention measure which can be used to mitigate such in project teams.

The study proposes a Structural Model for establishing conflict prevention strategies in project teams through a multidimensional framework that combines constructs like team power conflict, process, relationship and task conflicts; to encourage Big Data implementation.

]]>
Big data innovation and implementation in projects teams: towards a SEM approach to conflict prevention10.1108/ITP-06-2019-0286Information Technology & People2024-02-01© 2024 Emerald Publishing LimitedHakeem A. OwolabiAzeez A. OyedeleLukumon OyedeleHafiz AlakaOladimeji OlawaleOluseyi AjuLukman AkanbiSikiru GaniyuInformation Technology & Peopleahead-of-printahead-of-print2024-02-0110.1108/ITP-06-2019-0286https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2019-0286/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
Comparing security perceptions and relationship configurations of mobile device modders and non-moddershttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0416/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestIt is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context. This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders. Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust. To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.Comparing security perceptions and relationship configurations of mobile device modders and non-modders
Sigi Goode, Amir Riaz
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

]]>
Comparing security perceptions and relationship configurations of mobile device modders and non-modders10.1108/ITP-06-2022-0416Information Technology & People2023-09-28© 2023 Emerald Publishing LimitedSigi GoodeAmir RiazInformation Technology & Peopleahead-of-printahead-of-print2023-09-2810.1108/ITP-06-2022-0416https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0416/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Exploring the antecedents of “deep” eWOM providing behaviour in mobile shopping: a multi-country studyhttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0439/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe study aims to look at deep eWOM providing behaviour in m-commerce and attempts to explore its antecedents. Personalisation is proposed as an indirect antecedent of deep eWOM providing behaviour mediated by hedonic and utilitarian value perceptions and personal identification. Based on social-exchange theory, the conceptual model links the study antecedents to deep eWOM providing behaviour. The conceptual model was validated through a multi-country study. A large sample of m-commerce users in the UK (n = 505), India (n = 422) and Vietnam (n = 618) were contacted to collect the data. Data were analysed through structural equations modelling procedure with invariance analysis conducted to ensure that the results from the three samples could be compared. The authors also conducted post-hoc analysis to explore the mediation paths between variables. The study finds support to the conceptual model across the samples from the three countries. Personalisation is found to increase value perceptions – both utilitarian and hedonic – and personal identification which leads to “deep” eWOM providing behaviour across all the three countries. The serial mediation also provides comparable results across the three countries. The study contributes to the understanding of deep eWOM providing behaviour – a construct with high practical relevance which has however not been explored sufficiently in current literature. The study also contributes to the literature that analyses the consequences of personalisation in m-commerce.Exploring the antecedents of “deep” eWOM providing behaviour in mobile shopping: a multi-country study
Sunil Sahadev, Sean Chung, Mustafeed Zaman, Indria Handoko, Tan Vo-Thanh, Nguyen Phong Nguyen, Rajeev Kumra
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The study aims to look at deep eWOM providing behaviour in m-commerce and attempts to explore its antecedents. Personalisation is proposed as an indirect antecedent of deep eWOM providing behaviour mediated by hedonic and utilitarian value perceptions and personal identification.

Based on social-exchange theory, the conceptual model links the study antecedents to deep eWOM providing behaviour. The conceptual model was validated through a multi-country study. A large sample of m-commerce users in the UK (n = 505), India (n = 422) and Vietnam (n = 618) were contacted to collect the data. Data were analysed through structural equations modelling procedure with invariance analysis conducted to ensure that the results from the three samples could be compared. The authors also conducted post-hoc analysis to explore the mediation paths between variables.

The study finds support to the conceptual model across the samples from the three countries. Personalisation is found to increase value perceptions – both utilitarian and hedonic – and personal identification which leads to “deep” eWOM providing behaviour across all the three countries. The serial mediation also provides comparable results across the three countries.

The study contributes to the understanding of deep eWOM providing behaviour – a construct with high practical relevance which has however not been explored sufficiently in current literature. The study also contributes to the literature that analyses the consequences of personalisation in m-commerce.

]]>
Exploring the antecedents of “deep” eWOM providing behaviour in mobile shopping: a multi-country study10.1108/ITP-06-2022-0439Information Technology & People2023-10-18© 2023 Emerald Publishing LimitedSunil SahadevSean ChungMustafeed ZamanIndria HandokoTan Vo-ThanhNguyen Phong NguyenRajeev KumraInformation Technology & Peopleahead-of-printahead-of-print2023-10-1810.1108/ITP-06-2022-0439https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0439/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding proactive knowledge sharing and knowledge withholding in physician-driven online health communities – a professional role identity perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0443/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestWhile spontaneous and voluntary knowledge contribution in online communities promotes value co-creation, dysfunctional knowledge behaviors hamper the effectiveness and development of such communities. The study conceptualizes physicians' proactive knowledge sharing and knowledge withholding behaviors in physician-driven online health communities (OHCs) and integrates the theories of role identity as well as communal and exchange relationships to understand the root causes and motivations behind these two types of knowledge behaviors. The authors collected survey data from 166 users from one of the largest physician-driven OHCs in China and applied the covariance-based structural equation modeling approach to test the hypotheses. The findings suggest that (1) physicians' professional role identity had a positive indirect effect on proactive knowledge sharing behaviors through communal motivation, and work pressure weakened this indirect effect; and (2) professional role identity had a negative indirect impact on knowledge withholding behaviors through exchange motivation. This study extends proactive knowledge sharing and knowledge withholding behaviors from the organizational management domain to the online environment, exploring the underlying causes and motivations behind both behaviors in the unique context of physician-driven OHCs. The findings offer practical suggestions for the effective management of OHC platforms, as well as policy implications that respond to the workforce shortage of healthcare providers, a crisis that is unfolding globally.Understanding proactive knowledge sharing and knowledge withholding in physician-driven online health communities – a professional role identity perspective
Jiaoyang Li, Xixi Li, Cheng Zhang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

While spontaneous and voluntary knowledge contribution in online communities promotes value co-creation, dysfunctional knowledge behaviors hamper the effectiveness and development of such communities. The study conceptualizes physicians' proactive knowledge sharing and knowledge withholding behaviors in physician-driven online health communities (OHCs) and integrates the theories of role identity as well as communal and exchange relationships to understand the root causes and motivations behind these two types of knowledge behaviors.

The authors collected survey data from 166 users from one of the largest physician-driven OHCs in China and applied the covariance-based structural equation modeling approach to test the hypotheses.

The findings suggest that (1) physicians' professional role identity had a positive indirect effect on proactive knowledge sharing behaviors through communal motivation, and work pressure weakened this indirect effect; and (2) professional role identity had a negative indirect impact on knowledge withholding behaviors through exchange motivation.

This study extends proactive knowledge sharing and knowledge withholding behaviors from the organizational management domain to the online environment, exploring the underlying causes and motivations behind both behaviors in the unique context of physician-driven OHCs. The findings offer practical suggestions for the effective management of OHC platforms, as well as policy implications that respond to the workforce shortage of healthcare providers, a crisis that is unfolding globally.

]]>
Understanding proactive knowledge sharing and knowledge withholding in physician-driven online health communities – a professional role identity perspective10.1108/ITP-06-2022-0443Information Technology & People2023-07-07© 2023 Emerald Publishing LimitedJiaoyang LiXixi LiCheng ZhangInformation Technology & Peopleahead-of-printahead-of-print2023-07-0710.1108/ITP-06-2022-0443https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0443/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How users cognitively appraise and emotionally experience the metaverse: focusing on social virtual realityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0461/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDespite the increasing interest in the metaverse—immersive three-dimensional virtual worlds wherein personalized avatars interact with one another—little is known about how users cognitively appraise and emotionally experience it. To fill this gap, the present study explores the emotional, behavioral and social consequences of users' cognitive appraisals, while focusing on social virtual reality (VR) as a representative entry point to the metaverse. Drawing on cognitive appraisal theory against the backdrop of a framework for classifying emotions, this study develops and tests a theoretical model to account for users' continuance intention and its consequences in the social VR context based on two-wave panel survey data collected from 216 users of social VR platforms, including AltspaceVR, VRChat, Bigscreen and Rec Room. The results of the first survey showed that perceived opportunity was more strongly influenced by technological opportunity than social opportunity, whereas perceived threat was more strongly affected by social threat than technological threat. Integrating the data collected from the first survey with those of the second survey, we also found that users' continuance intention positively influenced both their behavioral engagement and social self-efficacy. By adopting a longitudinal approach, this study provides insights that may be valuable to researchers and practitioners who seek to use social VR for business purposes. This study also contributes to the metaverse literature by conceptualizing and operationalizing the opportunity and threat factors of social VR and identifying salient emotions that users experience in this context. Finally, this study has practical implications for addressing the social and technological features that may cause adverse user experiences in social VR.How users cognitively appraise and emotionally experience the metaverse: focusing on social virtual reality
Ayoung Suh
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Despite the increasing interest in the metaverse—immersive three-dimensional virtual worlds wherein personalized avatars interact with one another—little is known about how users cognitively appraise and emotionally experience it. To fill this gap, the present study explores the emotional, behavioral and social consequences of users' cognitive appraisals, while focusing on social virtual reality (VR) as a representative entry point to the metaverse.

Drawing on cognitive appraisal theory against the backdrop of a framework for classifying emotions, this study develops and tests a theoretical model to account for users' continuance intention and its consequences in the social VR context based on two-wave panel survey data collected from 216 users of social VR platforms, including AltspaceVR, VRChat, Bigscreen and Rec Room.

The results of the first survey showed that perceived opportunity was more strongly influenced by technological opportunity than social opportunity, whereas perceived threat was more strongly affected by social threat than technological threat. Integrating the data collected from the first survey with those of the second survey, we also found that users' continuance intention positively influenced both their behavioral engagement and social self-efficacy.

By adopting a longitudinal approach, this study provides insights that may be valuable to researchers and practitioners who seek to use social VR for business purposes. This study also contributes to the metaverse literature by conceptualizing and operationalizing the opportunity and threat factors of social VR and identifying salient emotions that users experience in this context. Finally, this study has practical implications for addressing the social and technological features that may cause adverse user experiences in social VR.

]]>
How users cognitively appraise and emotionally experience the metaverse: focusing on social virtual reality10.1108/ITP-06-2022-0461Information Technology & People2023-05-23© 2023 Emerald Publishing LimitedAyoung SuhInformation Technology & Peopleahead-of-printahead-of-print2023-05-2310.1108/ITP-06-2022-0461https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0461/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How to make users fall in love with a mobile application: A moderated-mediation analysis of perceived value and (brand) lovehttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0465/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe study aims to examine the indirect relationships via application (app) brand self-relevance emotions and self-relevance that underlie the relationships between perceived value of mobile apps and (brand) love with respect to mobile apps. The study further investigates the moderating role of user–app relationship duration in the formation process of brand love for mobile apps from a dynamic and long-term perspective. A multiple moderated-mediation model is developed and empirically tested with a sample of 396 users of popular Chinese mobile educational apps. The study reveals that utilitarian value exhibits positive indirect relationships with brand love for mobile apps through increased positive self-relevance emotions. All three types of perceived value of mobile apps (utilitarian, hedonic and social) affect app brand love positively via self-relevance. These three types of perceived value were found to be serially linked to brand love through self-relevance and self-relevance emotions. Furthermore, empirical evidence is found for the moderating effects of user–app relationship duration. By testing mechanisms simultaneously in an integrative model, this study investigates the reasons for app brand love that attract a user into a lasting relationship with an app and extends knowledge of the app brand love building process in inducing strong and positive brand–self connections. Our study also makes practical contributions by offering insights into delivering the most desired benefits to mobile app users according to different contextual conditions, in order to attract and retain users in a more cost-effective manner.How to make users fall in love with a mobile application: A moderated-mediation analysis of perceived value and (brand) love
Lili Zheng
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The study aims to examine the indirect relationships via application (app) brand self-relevance emotions and self-relevance that underlie the relationships between perceived value of mobile apps and (brand) love with respect to mobile apps. The study further investigates the moderating role of user–app relationship duration in the formation process of brand love for mobile apps from a dynamic and long-term perspective.

A multiple moderated-mediation model is developed and empirically tested with a sample of 396 users of popular Chinese mobile educational apps.

The study reveals that utilitarian value exhibits positive indirect relationships with brand love for mobile apps through increased positive self-relevance emotions. All three types of perceived value of mobile apps (utilitarian, hedonic and social) affect app brand love positively via self-relevance. These three types of perceived value were found to be serially linked to brand love through self-relevance and self-relevance emotions. Furthermore, empirical evidence is found for the moderating effects of user–app relationship duration.

By testing mechanisms simultaneously in an integrative model, this study investigates the reasons for app brand love that attract a user into a lasting relationship with an app and extends knowledge of the app brand love building process in inducing strong and positive brand–self connections. Our study also makes practical contributions by offering insights into delivering the most desired benefits to mobile app users according to different contextual conditions, in order to attract and retain users in a more cost-effective manner.

]]>
How to make users fall in love with a mobile application: A moderated-mediation analysis of perceived value and (brand) love10.1108/ITP-06-2022-0465Information Technology & People2023-04-21© 2023 Emerald Publishing LimitedLili ZhengInformation Technology & Peopleahead-of-printahead-of-print2023-04-2110.1108/ITP-06-2022-0465https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0465/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Adoption of ambient-assisted living: the relevance of practices, ecosystems and temporalityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0476/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestAmbient-assisted living (AAL) is one solution to the challenges of healthcare systems in an aging population. Using the “ecosystem adoption of practices over time” (EAPT) as a theoretical lens, this study explores and describes three elements of AAL adoption: (1) the AAL practices in which the technology is embedded (i.e. object of adoption), (2) the older adult's adoption ecosystem (i.e. subject of adoption) and (3) the change of adoption practices over time (i.e. temporality of adoption). Qualitative interviews with three actor groups in the ecosystem: clients, relatives and home nurses. The study identifies six categories of AAL practices. Clients, relatives and nurses interact and integrate their resources in carrying out these practices. Some of the practices have developed, or are expected to develop, over time. The study applies a novel theoretical perspective on how AAL technology is embedded in practices performed by different actors in the adoption ecosystem. This broadens the conceptualization of what is being adopted compared to traditional adoption research.Adoption of ambient-assisted living: the relevance of practices, ecosystems and temporality
Siv Elisabeth Rosendahl Skard, Herbjørn Nysveen, Per Egil Pedersen
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Ambient-assisted living (AAL) is one solution to the challenges of healthcare systems in an aging population. Using the “ecosystem adoption of practices over time” (EAPT) as a theoretical lens, this study explores and describes three elements of AAL adoption: (1) the AAL practices in which the technology is embedded (i.e. object of adoption), (2) the older adult's adoption ecosystem (i.e. subject of adoption) and (3) the change of adoption practices over time (i.e. temporality of adoption).

Qualitative interviews with three actor groups in the ecosystem: clients, relatives and home nurses.

The study identifies six categories of AAL practices. Clients, relatives and nurses interact and integrate their resources in carrying out these practices. Some of the practices have developed, or are expected to develop, over time.

The study applies a novel theoretical perspective on how AAL technology is embedded in practices performed by different actors in the adoption ecosystem. This broadens the conceptualization of what is being adopted compared to traditional adoption research.

]]>
Adoption of ambient-assisted living: the relevance of practices, ecosystems and temporality10.1108/ITP-06-2022-0476Information Technology & People2023-09-05© 2023 Emerald Publishing LimitedSiv Elisabeth Rosendahl SkardHerbjørn NysveenPer Egil PedersenInformation Technology & Peopleahead-of-printahead-of-print2023-09-0510.1108/ITP-06-2022-0476https://www.emerald.com/insight/content/doi/10.1108/ITP-06-2022-0476/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-designhttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2021-0539/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDesigning digital artifacts is not a linear, straightforward process. This is particularly true when applying a user-centered design approach, or co-design, with users who are unable to participate in the design process. Although the reduced participation of a particular user group may harm the end result, the literature on solving this issue is sparse. In this article, proxy design is outlined as a method for involving a user group as proxy users to speak on behalf of a group that is difficult to reach. The article investigates the following research question: How can roleplaying be embedded in co-design to engage users as proxies on behalf of those who are unable to represent themselves? The article presents a design ethnography spanning three years at a cancer rehabilitation clinic, where digital artifacts were designed to be used collaboratively by nurses and patients. The empirical data were analyzed using content analysis and consisted of 20 observation days at the clinic, six proxy design workshops, 21 telephone consultations between patients and nurses, and log data from the digital artifact. The article shows that simulated consultations, with nurses roleplaying as proxies for patients ignited and initiated the design process and enabled an efficient in-depth understanding of patients. Moreover, the article reveals how proxy design as a method further expanded the design. The study findings illustrate: (1) proxy design as a method for initiating design, (2) proxy design as an embedded element in co-design and (3) six design guidelines that should be considered when engaging in proxy design. The main contribution is the conceptualization of proxy design as a method that can ignite and initiate the co-design process when important users are unreachable, vulnerable or unable to represent themselves in the co-design process. More specifically, based on the empirical findings from a design ethnography that involved nurses as proxy users speaking on behalf of patients, the article shows that roleplaying in proxy design is a fitting way of initiating the design process, outlining proxy design as an embedded element of co-design.Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-design
Anna Sigridur Islind, Johan Lundin, Katerina Cerna, Tomas Lindroth, Linda Åkeflo, Gunnar Steineck
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Designing digital artifacts is not a linear, straightforward process. This is particularly true when applying a user-centered design approach, or co-design, with users who are unable to participate in the design process. Although the reduced participation of a particular user group may harm the end result, the literature on solving this issue is sparse. In this article, proxy design is outlined as a method for involving a user group as proxy users to speak on behalf of a group that is difficult to reach. The article investigates the following research question: How can roleplaying be embedded in co-design to engage users as proxies on behalf of those who are unable to represent themselves?

The article presents a design ethnography spanning three years at a cancer rehabilitation clinic, where digital artifacts were designed to be used collaboratively by nurses and patients. The empirical data were analyzed using content analysis and consisted of 20 observation days at the clinic, six proxy design workshops, 21 telephone consultations between patients and nurses, and log data from the digital artifact.

The article shows that simulated consultations, with nurses roleplaying as proxies for patients ignited and initiated the design process and enabled an efficient in-depth understanding of patients. Moreover, the article reveals how proxy design as a method further expanded the design. The study findings illustrate: (1) proxy design as a method for initiating design, (2) proxy design as an embedded element in co-design and (3) six design guidelines that should be considered when engaging in proxy design.

The main contribution is the conceptualization of proxy design as a method that can ignite and initiate the co-design process when important users are unreachable, vulnerable or unable to represent themselves in the co-design process. More specifically, based on the empirical findings from a design ethnography that involved nurses as proxy users speaking on behalf of patients, the article shows that roleplaying in proxy design is a fitting way of initiating the design process, outlining proxy design as an embedded element of co-design.

]]>
Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-design10.1108/ITP-07-2021-0539Information Technology & People2023-10-30© 2023 Emerald Publishing LimitedAnna Sigridur IslindJohan LundinKaterina CernaTomas LindrothLinda ÅkefloGunnar SteineckInformation Technology & Peopleahead-of-printahead-of-print2023-10-3010.1108/ITP-07-2021-0539https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2021-0539/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Explaining technology migration against the change in terms of use: an fsQCA approachhttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0498/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDuring the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions. Data were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA). The findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching. This study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications. The study identifies factors the technology service providers should consider to attract new users and retain existing users. This study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.Explaining technology migration against the change in terms of use: an fsQCA approach
Laila Dahabiyeh, Ali Farooq, Farhan Ahmad, Yousra Javed
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions.

Data were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA).

The findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching.

This study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications.

The study identifies factors the technology service providers should consider to attract new users and retain existing users.

This study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.

]]>
Explaining technology migration against the change in terms of use: an fsQCA approach10.1108/ITP-07-2022-0498Information Technology & People2023-03-24© 2023 Emerald Publishing LimitedLaila DahabiyehAli FarooqFarhan AhmadYousra JavedInformation Technology & Peopleahead-of-printahead-of-print2023-03-2410.1108/ITP-07-2022-0498https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0498/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Artificial intelligence (AI) for user experience (UX) design: a systematic literature review and future research agendahttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0519/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe aim of this article is to map the use of AI in the user experience (UX) design process. Disrupting the UX process by introducing novel digital tools such as artificial intelligence (AI) has the potential to improve efficiency and accuracy, while creating more innovative and creative solutions. Thus, understanding how AI can be leveraged for UX has important research and practical implications. This article builds on a systematic literature review approach and aims to understand how AI is used in UX design today, as well as uncover some prominent themes for future research. Through a process of selection and filtering, 46 research articles are analysed, with findings synthesized based on a user-centred design and development process. The authors’ analysis shows how AI is leveraged in the UX design process at different key areas. Namely, these include understanding the context of use, uncovering user requirements, aiding solution design, and evaluating design, and for assisting development of solutions. The authors also highlight the ways in which AI is changing the UX design process through illustrative examples. While there is increased interest in the use of AI in organizations, there is still limited work on how AI can be introduced into processes that depend heavily on human creativity and input. Thus, the authors show the ways in which AI can enhance such activities and assume tasks that have been typically performed by humans.Artificial intelligence (AI) for user experience (UX) design: a systematic literature review and future research agenda
Åsne Stige, Efpraxia D. Zamani, Patrick Mikalef, Yuzhen Zhu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The aim of this article is to map the use of AI in the user experience (UX) design process. Disrupting the UX process by introducing novel digital tools such as artificial intelligence (AI) has the potential to improve efficiency and accuracy, while creating more innovative and creative solutions. Thus, understanding how AI can be leveraged for UX has important research and practical implications.

This article builds on a systematic literature review approach and aims to understand how AI is used in UX design today, as well as uncover some prominent themes for future research. Through a process of selection and filtering, 46 research articles are analysed, with findings synthesized based on a user-centred design and development process.

The authors’ analysis shows how AI is leveraged in the UX design process at different key areas. Namely, these include understanding the context of use, uncovering user requirements, aiding solution design, and evaluating design, and for assisting development of solutions. The authors also highlight the ways in which AI is changing the UX design process through illustrative examples.

While there is increased interest in the use of AI in organizations, there is still limited work on how AI can be introduced into processes that depend heavily on human creativity and input. Thus, the authors show the ways in which AI can enhance such activities and assume tasks that have been typically performed by humans.

]]>
Artificial intelligence (AI) for user experience (UX) design: a systematic literature review and future research agenda10.1108/ITP-07-2022-0519Information Technology & People2023-08-29© 2023 Emerald Publishing LimitedÅsne StigeEfpraxia D. ZamaniPatrick MikalefYuzhen ZhuInformation Technology & Peopleahead-of-printahead-of-print2023-08-2910.1108/ITP-07-2022-0519https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0519/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
IT–business alignment and business model design: a moderated mediation model of organizational learning and data-driven culturehttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0533/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDrawing on the knowledge-based view, this study investigates how IT–business alignment influences business model design via organizational learning and examines the moderating role of data-driven culture in the relationship between IT–business alignment and business model design via organizational learning. Using multi-respondent survey data collected from 597 Chinese firms, mediation and moderated mediation analyses were used to examine this study's hypotheses. The mediation test results revealed organizational learning served as a mediator between IT–business alignment and two types of business model design (i.e. novelty- and efficiency-centered). In addition, data-driven culture strengthened the indirect effects of IT–business alignment on these two types of business model design via organizational learning. This study extends current understandings of the relationship between IT–business alignment and business model design by revealing the mediating role of organizational learning and investigating its indirect effects under various degrees of data-driven culture. As such, it contributes to the literature on the business model and IT–business alignment and provides insights for managers seeking to achieve the expected business model design.IT–business alignment and business model design: a moderated mediation model of organizational learning and data-driven culture
Yao Chen, Liangqing Zhang, Meng Chen, Hefu Liu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Drawing on the knowledge-based view, this study investigates how IT–business alignment influences business model design via organizational learning and examines the moderating role of data-driven culture in the relationship between IT–business alignment and business model design via organizational learning.

Using multi-respondent survey data collected from 597 Chinese firms, mediation and moderated mediation analyses were used to examine this study's hypotheses.

The mediation test results revealed organizational learning served as a mediator between IT–business alignment and two types of business model design (i.e. novelty- and efficiency-centered). In addition, data-driven culture strengthened the indirect effects of IT–business alignment on these two types of business model design via organizational learning.

This study extends current understandings of the relationship between IT–business alignment and business model design by revealing the mediating role of organizational learning and investigating its indirect effects under various degrees of data-driven culture. As such, it contributes to the literature on the business model and IT–business alignment and provides insights for managers seeking to achieve the expected business model design.

]]>
IT–business alignment and business model design: a moderated mediation model of organizational learning and data-driven culture10.1108/ITP-07-2022-0533Information Technology & People2024-02-28© 2023 Emerald Publishing LimitedYao ChenLiangqing ZhangMeng ChenHefu LiuInformation Technology & Peopleahead-of-printahead-of-print2024-02-2810.1108/ITP-07-2022-0533https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0533/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
ICTs mediated identity work of community health workers: a comparative case study from Africahttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0552/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of this paper is to understand how digital interventions are mediating the identity work of community health workers (CHWs) in the context of two African countries. This paper analyzes the everyday work of CHWs in two low- and middle-income country (LMIC) contexts (Uganda and Malawi) and seeks to understand changes in collective identity and the role of Information and Communication Technologies (ICTs) in mediating this “identity work”. As CHWs conduct their everyday tasks of care giving, data reporting and maintaining social interactions, they play two primary roles. One is the care giving role oriented towards the community, and two, is reporting and administrative work by virtue of them being affiliated with the Ministry of Health, either in formal or voluntary capacity. The ambivalence which they experience as they move back and forth between these two worlds of work is significantly now mediated through ICTs. The paper analyzes these dynamics and identifies three key sets of ambivalence in identity work: (1) role embracing-institutional distancing; (2) conformist-resistant and (3) dramaturgical-transformative. The paper makes unique contributions to information systems (IS) and ICT for development (ICT4D) studies in that it focuses on a nonprofessional group, which plays a fundamental role in providing care to underserved populations and also conducts data work which provides the foundation of the national health information system. This contrasts with dominant research in the field which focuses on professional groups, largely based in Western business organizations. The paper identifies identity related tensions that emerge with the mediation of digital technologies in the work world of CHWs. These include tensions of conformist-resistant; and (3) dramaturgical-transformative. These findings are relevant and unique to the field of IS and ICT4D studies in that it focuses on a nonprofessional group, which plays a fundamental role in providing care to underserved populations and also conducts data work which provides the foundation of the national health information system. While acknowledging identity construction and negotiation is a function of both work and social lives, in this paper we could only focus on the work lives. As digital interventions in the health sector of low and middle income countries is becoming increasingly widespread, often the focus is more on the supply side (the supply of the technology) rather than on the demand side (users experiences and aspirations). Identity becomes a lens to understand these demand side dynamics, which helps provides practical guidance on implementation approaches to ensure that the technology adds value to user work processes and there is a seamless and not a disruptive transition. CHWs are the most neglected cadre in the health system of low and middle income countries, even though they provide the cutting edge in care provision work to the most marginalized populations, living in rural and underserved areas. By focusing on how technologies can be more effectively implemented to support these care processes, the paper provides important social implications both for practice and research. Analysis of identity construction and negotiation of informal groups in the unorganized sector of low and middle income countries has not received adequate attention in IS research. The paper seeks to fill this important gap.ICTs mediated identity work of community health workers: a comparative case study from Africa
Sundeep Sahay, Esther N. Landen
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of this paper is to understand how digital interventions are mediating the identity work of community health workers (CHWs) in the context of two African countries.

This paper analyzes the everyday work of CHWs in two low- and middle-income country (LMIC) contexts (Uganda and Malawi) and seeks to understand changes in collective identity and the role of Information and Communication Technologies (ICTs) in mediating this “identity work”. As CHWs conduct their everyday tasks of care giving, data reporting and maintaining social interactions, they play two primary roles. One is the care giving role oriented towards the community, and two, is reporting and administrative work by virtue of them being affiliated with the Ministry of Health, either in formal or voluntary capacity. The ambivalence which they experience as they move back and forth between these two worlds of work is significantly now mediated through ICTs. The paper analyzes these dynamics and identifies three key sets of ambivalence in identity work: (1) role embracing-institutional distancing; (2) conformist-resistant and (3) dramaturgical-transformative. The paper makes unique contributions to information systems (IS) and ICT for development (ICT4D) studies in that it focuses on a nonprofessional group, which plays a fundamental role in providing care to underserved populations and also conducts data work which provides the foundation of the national health information system. This contrasts with dominant research in the field which focuses on professional groups, largely based in Western business organizations.

The paper identifies identity related tensions that emerge with the mediation of digital technologies in the work world of CHWs. These include tensions of conformist-resistant; and (3) dramaturgical-transformative. These findings are relevant and unique to the field of IS and ICT4D studies in that it focuses on a nonprofessional group, which plays a fundamental role in providing care to underserved populations and also conducts data work which provides the foundation of the national health information system.

While acknowledging identity construction and negotiation is a function of both work and social lives, in this paper we could only focus on the work lives.

As digital interventions in the health sector of low and middle income countries is becoming increasingly widespread, often the focus is more on the supply side (the supply of the technology) rather than on the demand side (users experiences and aspirations). Identity becomes a lens to understand these demand side dynamics, which helps provides practical guidance on implementation approaches to ensure that the technology adds value to user work processes and there is a seamless and not a disruptive transition.

CHWs are the most neglected cadre in the health system of low and middle income countries, even though they provide the cutting edge in care provision work to the most marginalized populations, living in rural and underserved areas. By focusing on how technologies can be more effectively implemented to support these care processes, the paper provides important social implications both for practice and research.

Analysis of identity construction and negotiation of informal groups in the unorganized sector of low and middle income countries has not received adequate attention in IS research. The paper seeks to fill this important gap.

]]>
ICTs mediated identity work of community health workers: a comparative case study from Africa10.1108/ITP-07-2022-0552Information Technology & People2024-03-01© 2023 Emerald Publishing LimitedSundeep SahayEsther N. LandenInformation Technology & Peopleahead-of-printahead-of-print2024-03-0110.1108/ITP-07-2022-0552https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0552/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Joint drivers of different shades of green IT/IS practices: a strategic cognition perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0562/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestPractitioners and academics are starting to recognize the benefits of green IT/IS practices. Despite these benefits, this study aims to know more regarding the factors that would drive organizations to use green IT/IS practices within their IT function and across the enterprise. To further understanding in this area, this study applies a strategic cognition framework of firm responsiveness and institutional theory to determine the extent to which an organization uses green IT/IS practices in response to stakeholder concerns. This study investigates the extent to which two organizational logics – expressive and instrumental – and three institutional pressures – coercive, mimetic and normative – jointly affect an organization's use of both green IT practices and green IS practices. This study tested the hypotheses with survey data collected from 306 organizations. Structural equation modeling was used for data analysis. Findings support four joint effects: (1) individualistic identity orientation and coercive pressure positively affect green IT practices; (2) collectivistic identity orientation and normative pressure positively influence green IS practices; (3) cost reduction orientation and mimetic pressure positively affect green IT practices; and (4) revenue expansion orientation and normative pressure positively influence green IS practices. This study contributes to the literature by providing evidence for joint drivers of green IT and green IS practices. Green IT and IS practices represent organizations' different levels of commitment to environmental sustainability and responsiveness to stakeholders (i.e. green IT/IS practices). Organizations of different expressive and instrumental orientations are attuned to institutional pressures to various degrees, which leads to different green IT/IS practices.Joint drivers of different shades of green IT/IS practices: a strategic cognition perspective
Adela Chen, Nicholas Roberts
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Practitioners and academics are starting to recognize the benefits of green IT/IS practices. Despite these benefits, this study aims to know more regarding the factors that would drive organizations to use green IT/IS practices within their IT function and across the enterprise. To further understanding in this area, this study applies a strategic cognition framework of firm responsiveness and institutional theory to determine the extent to which an organization uses green IT/IS practices in response to stakeholder concerns. This study investigates the extent to which two organizational logics – expressive and instrumental – and three institutional pressures – coercive, mimetic and normative – jointly affect an organization's use of both green IT practices and green IS practices.

This study tested the hypotheses with survey data collected from 306 organizations. Structural equation modeling was used for data analysis.

Findings support four joint effects: (1) individualistic identity orientation and coercive pressure positively affect green IT practices; (2) collectivistic identity orientation and normative pressure positively influence green IS practices; (3) cost reduction orientation and mimetic pressure positively affect green IT practices; and (4) revenue expansion orientation and normative pressure positively influence green IS practices.

This study contributes to the literature by providing evidence for joint drivers of green IT and green IS practices. Green IT and IS practices represent organizations' different levels of commitment to environmental sustainability and responsiveness to stakeholders (i.e. green IT/IS practices). Organizations of different expressive and instrumental orientations are attuned to institutional pressures to various degrees, which leads to different green IT/IS practices.

]]>
Joint drivers of different shades of green IT/IS practices: a strategic cognition perspective10.1108/ITP-07-2022-0562Information Technology & People2023-03-27© 2023 Emerald Publishing LimitedAdela ChenNicholas RobertsInformation Technology & Peopleahead-of-printahead-of-print2023-03-2710.1108/ITP-07-2022-0562https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0562/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Exploring active and passive interactions in social networking services: a psychological needs perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0563/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestPeople's socializing behavior in social networking services (SNS) presents dramatically different features, forming differentiated online social interaction patterns (DOSIP) in SNS. This study aims to explore the relationships between users' multidimensional psychological needs and multiple social interaction patterns in SNS. Based on Maslow's hierarchy of needs and use and gratifications (U&G) theory, the authors develop the research model to examine the effects of psychological needs on DOSIP. A survey is used to collect the data of SNS users' social interaction. The authors adopt structural equation modeling–neural network (SEM-NN) integrated method to examine the research model. Need to belong, need for self-esteem, need for social contact, need for emotional expression, need for cognition, and need for external-esteem have significant influences on both active and passive social interactions respectively. Based on the categorization of DOSIP into six types in terms of the level of activity and disclosure of social interaction, the authors construct an integrated research model of multidimensional psychological needs to multiple social interaction patterns, and validate the antecedents of DOSIP from the perspective of psychological needs.Exploring active and passive interactions in social networking services: a psychological needs perspective
Yongqing Yang, Jianyue Xu, Lesley Pek Wee Land, Shuiqing Yang, Thomas Chesney
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

People's socializing behavior in social networking services (SNS) presents dramatically different features, forming differentiated online social interaction patterns (DOSIP) in SNS. This study aims to explore the relationships between users' multidimensional psychological needs and multiple social interaction patterns in SNS.

Based on Maslow's hierarchy of needs and use and gratifications (U&G) theory, the authors develop the research model to examine the effects of psychological needs on DOSIP. A survey is used to collect the data of SNS users' social interaction. The authors adopt structural equation modeling–neural network (SEM-NN) integrated method to examine the research model.

Need to belong, need for self-esteem, need for social contact, need for emotional expression, need for cognition, and need for external-esteem have significant influences on both active and passive social interactions respectively.

Based on the categorization of DOSIP into six types in terms of the level of activity and disclosure of social interaction, the authors construct an integrated research model of multidimensional psychological needs to multiple social interaction patterns, and validate the antecedents of DOSIP from the perspective of psychological needs.

]]>
Exploring active and passive interactions in social networking services: a psychological needs perspective10.1108/ITP-07-2022-0563Information Technology & People2023-07-03© 2023 Emerald Publishing LimitedYongqing YangJianyue XuLesley Pek Wee LandShuiqing YangThomas ChesneyInformation Technology & Peopleahead-of-printahead-of-print2023-07-0310.1108/ITP-07-2022-0563https://www.emerald.com/insight/content/doi/10.1108/ITP-07-2022-0563/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Collaborative federated learning framework to minimize data transmission for AI-enabled video surveillancehttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2021-0598/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video surveillance in public spaces. This study examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Based on the requirements, this study proposes a CFL framework to gradually adapt AI models’ knowledge while reducing personal data transmission and retention. The framework uses three different federated learning strategies to rapidly learn from different new data sources while minimizing personal data transmission and retention to a central machine. The findings confirm that the proposed CFL framework can help minimize the use of personal data without compromising the AI model's performance. The gradual learning strategies help develop AI-enabled video surveillance that continuously adapts for long-term deployment in public spaces. This study makes two specific contributions to advance the development of AI-enabled video surveillance in public spaces. First, it examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Second, it proposes a CFL framework to minimize data transmission and retention for AI-enabled video surveillance. The study provides comprehensive experimental results to evaluate the effectiveness of the proposed framework in the context of facial expression recognition (FER) which involves large-scale datasets.Collaborative federated learning framework to minimize data transmission for AI-enabled video surveillance
Nehemia Sugianto, Dian Tjondronegoro, Golam Sorwar
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video surveillance in public spaces.

This study examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Based on the requirements, this study proposes a CFL framework to gradually adapt AI models’ knowledge while reducing personal data transmission and retention. The framework uses three different federated learning strategies to rapidly learn from different new data sources while minimizing personal data transmission and retention to a central machine.

The findings confirm that the proposed CFL framework can help minimize the use of personal data without compromising the AI model's performance. The gradual learning strategies help develop AI-enabled video surveillance that continuously adapts for long-term deployment in public spaces.

This study makes two specific contributions to advance the development of AI-enabled video surveillance in public spaces. First, it examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Second, it proposes a CFL framework to minimize data transmission and retention for AI-enabled video surveillance. The study provides comprehensive experimental results to evaluate the effectiveness of the proposed framework in the context of facial expression recognition (FER) which involves large-scale datasets.

]]>
Collaborative federated learning framework to minimize data transmission for AI-enabled video surveillance10.1108/ITP-08-2021-0598Information Technology & People2024-03-07© 2024 Emerald Publishing LimitedNehemia SugiantoDian TjondronegoroGolam SorwarInformation Technology & Peopleahead-of-printahead-of-print2024-03-0710.1108/ITP-08-2021-0598https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2021-0598/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
A multi-model approach for the extension of the use and gratification theory in video game streaminghttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2021-0628/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestVideo game streaming (VGS) is emerging as an extremely popular, highly interactive, inordinately subscribed and very dynamic form of digital media. Incorporated environmental elements, gratifications and user pre-existing attitudes in VGS, this paper presents the development of an extended model of uses and gratification theory (EUGT) for predicting users' behavior in novel technological context. The proposed model was empirically tested in VGS context due to its popularity, interactivity and relevance. Data collected from 308 VGS users and structural equation modeling (SEM) was employed to assess the hypotheses. Multi-model comparison technique was used to assess the explanatory power of EUGT. The findings confirmed three significant types elements in determining VGS viewers' engagement, including gratifications (e.g. involvement), environmental cues (e.g. medium appeal) and user predispositions (e.g. pre-existing attitudes). The results revealed that emerging technologies provide potential opportunities for new motives and gratifications, and highlighted the significant of pre-existing attitudes as a mediator in the gratification-uses link. This study is one of its kind in tackling the criticism on UGT of considering media users too rational or active. The study achieved this objective by considering environmental impacts on user behavior which is largely ignored in recent UGT studies. Also, by incorporating users pre-existing attitudes into UGT framework, this study conceptualized and empirically verified the higher explanatory power of EUGT through a novel multi-modal approach in VGS. Compared to other rival models, EUGS provides a more robust explanation of users' behavior. The findings contribute to the literature of UGT, VGS and users' engagement.A multi-model approach for the extension of the use and gratification theory in video game streaming
Xiao-Yu Xu, Syed Muhammad Usman Tayyab, Qingdan Jia, Albert H. Huang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Video game streaming (VGS) is emerging as an extremely popular, highly interactive, inordinately subscribed and very dynamic form of digital media. Incorporated environmental elements, gratifications and user pre-existing attitudes in VGS, this paper presents the development of an extended model of uses and gratification theory (EUGT) for predicting users' behavior in novel technological context.

The proposed model was empirically tested in VGS context due to its popularity, interactivity and relevance. Data collected from 308 VGS users and structural equation modeling (SEM) was employed to assess the hypotheses. Multi-model comparison technique was used to assess the explanatory power of EUGT.

The findings confirmed three significant types elements in determining VGS viewers' engagement, including gratifications (e.g. involvement), environmental cues (e.g. medium appeal) and user predispositions (e.g. pre-existing attitudes). The results revealed that emerging technologies provide potential opportunities for new motives and gratifications, and highlighted the significant of pre-existing attitudes as a mediator in the gratification-uses link.

This study is one of its kind in tackling the criticism on UGT of considering media users too rational or active. The study achieved this objective by considering environmental impacts on user behavior which is largely ignored in recent UGT studies. Also, by incorporating users pre-existing attitudes into UGT framework, this study conceptualized and empirically verified the higher explanatory power of EUGT through a novel multi-modal approach in VGS. Compared to other rival models, EUGS provides a more robust explanation of users' behavior. The findings contribute to the literature of UGT, VGS and users' engagement.

]]>
A multi-model approach for the extension of the use and gratification theory in video game streaming10.1108/ITP-08-2021-0628Information Technology & People2023-09-18© 2023 Emerald Publishing LimitedXiao-Yu XuSyed Muhammad Usman TayyabQingdan JiaAlbert H. HuangInformation Technology & Peopleahead-of-printahead-of-print2023-09-1810.1108/ITP-08-2021-0628https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2021-0628/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Tacit knowledge sharing in information systems development projects: social interdependence and regulatory focus perspectiveshttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0587/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of this study is to examine tacit knowledge sharing within information systems development (ISD) projects by exploring the combination of social interdependence theory and regulatory focus theory (RFT). A survey was conducted on 198 ISD professionals to investigate the effect of social interdependence on tacit knowledge sharing. The survey data were analyzed using partial least squares structural equation modeling (PLS-SEM), and the results were discussed. This study reveals that team members tend to share tacit knowledge in a way characterized by cooperative interdependence, and different patterns of social interdependence have an impact on tacit knowledge sharing. The RFT explains the disparities in attitude toward tacit knowledge sharing. Specifically, individuals with a prevention-focused orientation positively moderate the impact of competitive interdependence on tacit knowledge sharing, while those with a promotion-focused orientation have a negative moderating effect on the effect of competitive interdependence on tacit knowledge sharing. Moreover, promotion-focused individuals negatively moderate the effect of cooperative interdependence on tacit knowledge sharing. The study identifies important aspects of social interdependence in ISD projects that affect the management of tacit knowledge. Furthermore, the study shows that the influence of cooperative and competitive interdependence on tacit knowledge sharing is moderated by the regulatory focus of an individual, providing new insights into ISD knowledge management.Tacit knowledge sharing in information systems development projects: social interdependence and regulatory focus perspectives
Shin-Yuan Hung, Jacob Chia-An Tsai, Kuanchin Chen, Charlie Chen, Ting-Ting Yeh
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of this study is to examine tacit knowledge sharing within information systems development (ISD) projects by exploring the combination of social interdependence theory and regulatory focus theory (RFT).

A survey was conducted on 198 ISD professionals to investigate the effect of social interdependence on tacit knowledge sharing. The survey data were analyzed using partial least squares structural equation modeling (PLS-SEM), and the results were discussed.

This study reveals that team members tend to share tacit knowledge in a way characterized by cooperative interdependence, and different patterns of social interdependence have an impact on tacit knowledge sharing. The RFT explains the disparities in attitude toward tacit knowledge sharing. Specifically, individuals with a prevention-focused orientation positively moderate the impact of competitive interdependence on tacit knowledge sharing, while those with a promotion-focused orientation have a negative moderating effect on the effect of competitive interdependence on tacit knowledge sharing. Moreover, promotion-focused individuals negatively moderate the effect of cooperative interdependence on tacit knowledge sharing.

The study identifies important aspects of social interdependence in ISD projects that affect the management of tacit knowledge. Furthermore, the study shows that the influence of cooperative and competitive interdependence on tacit knowledge sharing is moderated by the regulatory focus of an individual, providing new insights into ISD knowledge management.

]]>
Tacit knowledge sharing in information systems development projects: social interdependence and regulatory focus perspectives10.1108/ITP-08-2022-0587Information Technology & People2023-05-18© 2023 Emerald Publishing LimitedShin-Yuan Hung Jacob Chia-An TsaiKuanchin ChenCharlie ChenTing-Ting YehInformation Technology & Peopleahead-of-printahead-of-print2023-05-1810.1108/ITP-08-2022-0587https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0587/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attackhttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0589/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestCyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks. For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack. The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack. Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attack
Derrick Boakye, David Sarpong, Dirk Meissner, George Ofosu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

]]>
How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attack10.1108/ITP-08-2022-0589Information Technology & People2023-05-26© 2023 Emerald Publishing LimitedDerrick BoakyeDavid SarpongDirk MeissnerGeorge OfosuInformation Technology & Peopleahead-of-printahead-of-print2023-05-2610.1108/ITP-08-2022-0589https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0589/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Does value co-creation matter? Assessing consumer responses in the sharing economyhttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0601/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe sharing economy has evolved as a result of the diffusion of information and communication technology and facilitates collaborative consumption and production otherwise known as value co-creation. The present research aims to explore the consumer responses to value co-creation in sharing economy such as satisfaction, brand preference and enduring buyer–platform relationships, amid consumer's CSR concerns. Drawing on the sharing economy and value co-creation literature and rooted in the stimulus-organism-response framework, an online panel data provider was employed to recruit 393 actual sharing economy consumers from the United States. Empirical analyses are performed using structural equation modeling through Amos, version.27. Findings confirm that value co-creation intentions contribute to consumers' satisfaction, brand preference and sustainable social relationships in the sharing economy. As expected, heightened concerns of corporate social responsibility (CSR) led to decreased consumer satisfaction with the sharing economy platform. The study contributes to the digital sharing economy literature by emphasizing the role of CSR perceptions for building long-term relationships (buyer–platform relationships) where value co-creation is crucial.Does value co-creation matter? Assessing consumer responses in the sharing economy
Waqar Nadeem, Jari Salo
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The sharing economy has evolved as a result of the diffusion of information and communication technology and facilitates collaborative consumption and production otherwise known as value co-creation. The present research aims to explore the consumer responses to value co-creation in sharing economy such as satisfaction, brand preference and enduring buyer–platform relationships, amid consumer's CSR concerns.

Drawing on the sharing economy and value co-creation literature and rooted in the stimulus-organism-response framework, an online panel data provider was employed to recruit 393 actual sharing economy consumers from the United States. Empirical analyses are performed using structural equation modeling through Amos, version.27.

Findings confirm that value co-creation intentions contribute to consumers' satisfaction, brand preference and sustainable social relationships in the sharing economy. As expected, heightened concerns of corporate social responsibility (CSR) led to decreased consumer satisfaction with the sharing economy platform.

The study contributes to the digital sharing economy literature by emphasizing the role of CSR perceptions for building long-term relationships (buyer–platform relationships) where value co-creation is crucial.

]]>
Does value co-creation matter? Assessing consumer responses in the sharing economy10.1108/ITP-08-2022-0601Information Technology & People2023-04-17© 2023 Emerald Publishing LimitedWaqar NadeemJari SaloInformation Technology & Peopleahead-of-printahead-of-print2023-04-1710.1108/ITP-08-2022-0601https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0601/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Social interaction and the successful exit of cultural and creative crowdfunding projects: evidence from the Modian platformhttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0616/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestSocial interaction in comment sections has become a key factor for backers' decision making in crowdfunding platforms. However, current research on the two-way social interaction in crowdfunding is insufficient, and there exist inconsistent conclusions. This study focuses on the social interaction between creators and backers and explores its influence on the successful exit of crowdfunding projects. The extended Cox model is used for the empirical analysis of 1,988 crowdfunding projects on the Modian (www.modian.com) platform, a crowdfunding platform for cultural and creative projects in China. The two-way social interaction is reflected in comment quantity and sentiment, as well as reply rate. Results reveal an inverted U-shaped relationship between comment quantity/sentiment and the successful exit of crowdfunding projects. This relationship is strengthened by high reply rate. This study focuses on comment quantity and sentiment. The inverted U-shaped results reconcile previous conclusions. Replies from creators are regarded as a separate factor, and their moderating role is explained. The study research proves the importance of social interaction in crowdfunding platforms and provides suggestions for backers, creators and platform managers.Social interaction and the successful exit of cultural and creative crowdfunding projects: evidence from the Modian platform
Lin Jia, Ying Zhang, Chen Lin
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Social interaction in comment sections has become a key factor for backers' decision making in crowdfunding platforms. However, current research on the two-way social interaction in crowdfunding is insufficient, and there exist inconsistent conclusions. This study focuses on the social interaction between creators and backers and explores its influence on the successful exit of crowdfunding projects.

The extended Cox model is used for the empirical analysis of 1,988 crowdfunding projects on the Modian (www.modian.com) platform, a crowdfunding platform for cultural and creative projects in China. The two-way social interaction is reflected in comment quantity and sentiment, as well as reply rate.

Results reveal an inverted U-shaped relationship between comment quantity/sentiment and the successful exit of crowdfunding projects. This relationship is strengthened by high reply rate.

This study focuses on comment quantity and sentiment. The inverted U-shaped results reconcile previous conclusions. Replies from creators are regarded as a separate factor, and their moderating role is explained. The study research proves the importance of social interaction in crowdfunding platforms and provides suggestions for backers, creators and platform managers.

]]>
Social interaction and the successful exit of cultural and creative crowdfunding projects: evidence from the Modian platform10.1108/ITP-08-2022-0616Information Technology & People2023-05-15© 2023 Emerald Publishing LimitedLin JiaYing ZhangChen LinInformation Technology & Peopleahead-of-printahead-of-print2023-05-1510.1108/ITP-08-2022-0616https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0616/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The effects of cognitive dissonance and self-efficacy on short video discontinuous usage intentionhttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0634/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe discontinuous usage behavior of short video social media presents an ongoing challenge to platform development. The purpose of this study is to investigate the antecedents of intentions to short media discontinuous usage. This study adopts a Cognition–Affection–Conation (CAC) framework to analyze short video social media discontinuous intention on the basis of cognitive dissonance theory (CDT) and self-efficacy theory. The empirical evaluation of the research model was conducted using SmartPLS 2.0 and was based on questionnaire data obtained from participants in China. The results show information overload and user addiction have a significant positive association with cognitive dissonance, which is, in turn, found to significantly impact discontinuous usage intention. Self-efficacy moderates the relationships between information overload, user addiction, cognitive dissonance and discontinuous usage. This study contributes to the understanding of the factors that influence short video discontinuous usage intention and it achieves this by engaging from a CDT perspective and by applying Self-Efficacy Theory. Theoretical implications for future short video platform research, as well as practical suggestions for short video platform operators and users, are also discussed.The effects of cognitive dissonance and self-efficacy on short video discontinuous usage intention
Ting Chen, Xia Li, Yaoqing Duan
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The discontinuous usage behavior of short video social media presents an ongoing challenge to platform development. The purpose of this study is to investigate the antecedents of intentions to short media discontinuous usage.

This study adopts a Cognition–Affection–Conation (CAC) framework to analyze short video social media discontinuous intention on the basis of cognitive dissonance theory (CDT) and self-efficacy theory. The empirical evaluation of the research model was conducted using SmartPLS 2.0 and was based on questionnaire data obtained from participants in China.

The results show information overload and user addiction have a significant positive association with cognitive dissonance, which is, in turn, found to significantly impact discontinuous usage intention. Self-efficacy moderates the relationships between information overload, user addiction, cognitive dissonance and discontinuous usage.

This study contributes to the understanding of the factors that influence short video discontinuous usage intention and it achieves this by engaging from a CDT perspective and by applying Self-Efficacy Theory. Theoretical implications for future short video platform research, as well as practical suggestions for short video platform operators and users, are also discussed.

]]>
The effects of cognitive dissonance and self-efficacy on short video discontinuous usage intention10.1108/ITP-08-2022-0634Information Technology & People2023-05-19© 2023 Emerald Publishing LimitedTing ChenXia LiYaoqing DuanInformation Technology & Peopleahead-of-printahead-of-print2023-05-1910.1108/ITP-08-2022-0634https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0634/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidencehttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0639/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestWhile the phenomenon of technostress has received significant attention from researchers in recent years, empirical findings concerning the consequences of specific forms of techno-stressors have remained scattered and contradictory. The authors aim to integrate the conclusions of previous studies to understand the effects of specific techno-stressors on strain and job performance. This study employs meta-analytic techniques to calibrate the findings of 67 studies investigating more than 63,100 employees. In general, not all techno-stressors have adverse effects. In particular, techno-uncertainty does not impact job performance. In addition, relative weight analyses reveal the relative importance of techno-complexity and techno-insecurity as predictors of both strain and job performance. Finally, this study finds that the effects of specific techno-stressors on job performance vary depending on research participants' gender, educational attainment and employment status. First, this study provides a more nuanced view of the effects of specific techno-stressors. Second, this research clarifies the relative importance of specific techno-stressors as predictors of strain and job performance. Finally, this study reveals the moderating effects of demographic variables on the relationships between specific techno-stressors and job performance.Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidence
Qin Yuan, Jun Kong, Chun Liu, Yushi Jiang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

While the phenomenon of technostress has received significant attention from researchers in recent years, empirical findings concerning the consequences of specific forms of techno-stressors have remained scattered and contradictory. The authors aim to integrate the conclusions of previous studies to understand the effects of specific techno-stressors on strain and job performance.

This study employs meta-analytic techniques to calibrate the findings of 67 studies investigating more than 63,100 employees.

In general, not all techno-stressors have adverse effects. In particular, techno-uncertainty does not impact job performance. In addition, relative weight analyses reveal the relative importance of techno-complexity and techno-insecurity as predictors of both strain and job performance. Finally, this study finds that the effects of specific techno-stressors on job performance vary depending on research participants' gender, educational attainment and employment status.

First, this study provides a more nuanced view of the effects of specific techno-stressors. Second, this research clarifies the relative importance of specific techno-stressors as predictors of strain and job performance. Finally, this study reveals the moderating effects of demographic variables on the relationships between specific techno-stressors and job performance.

]]>
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidence10.1108/ITP-08-2022-0639Information Technology & People2023-12-04© 2023 Emerald Publishing LimitedQin YuanJun KongChun LiuYushi JiangInformation Technology & Peopleahead-of-printahead-of-print2023-12-0410.1108/ITP-08-2022-0639https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0639/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Cross-country determinants of citizens' e-government reuse intention: empirical evidence from Kuwait and Polandhttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0651/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDespite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e. system quality, service quality, information quality, perceived value and user satisfaction); (2) the trust and risk models (i.e. citizen trust, overall risk, time risk, privacy risk and psychological risks); and (3) Hofstede's cultural model (i.e. uncertainty avoidance, masculinity, individualism and cross-cultural trust and risk). Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, this study conducted comprehensive, cross-cultural and comparative analyses of e-government reuse intention in a cross-country setting. The results show that trust is positively associated with citizens' intention to reuse e-government services, whereas risk is negatively associated with citizens' perceived value. This study also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study's findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings. This study developed a parsimonious model of quality, trust, risk, culture and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.Cross-country determinants of citizens' e-government reuse intention: empirical evidence from Kuwait and Poland
Kristijan Mirkovski, Kamel Rouibah, Paul Lowry, Joanna Paliszkiewicz, Marzena Ganc
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e. system quality, service quality, information quality, perceived value and user satisfaction); (2) the trust and risk models (i.e. citizen trust, overall risk, time risk, privacy risk and psychological risks); and (3) Hofstede's cultural model (i.e. uncertainty avoidance, masculinity, individualism and cross-cultural trust and risk).

Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, this study conducted comprehensive, cross-cultural and comparative analyses of e-government reuse intention in a cross-country setting.

The results show that trust is positively associated with citizens' intention to reuse e-government services, whereas risk is negatively associated with citizens' perceived value. This study also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study's findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings.

This study developed a parsimonious model of quality, trust, risk, culture and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.

]]>
Cross-country determinants of citizens' e-government reuse intention: empirical evidence from Kuwait and Poland10.1108/ITP-08-2022-0651Information Technology & People2023-06-27© 2023 Emerald Publishing LimitedKristijan MirkovskiKamel RouibahPaul LowryJoanna PaliszkiewiczMarzena GancInformation Technology & Peopleahead-of-printahead-of-print2023-06-2710.1108/ITP-08-2022-0651https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2022-0651/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Ownership leads to conflicts: the double-edged impact of psychological ownership on communication satisfaction in virtual communitieshttps://www.emerald.com/insight/content/doi/10.1108/ITP-08-2023-0768/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestPsychological ownership has been a topic of intense debate for several decades, especially in the digital era. In addition, as part of the digital public domain, virtual communities shape our digital lives. Unfortunately, few studies have examined the communication process in virtual communities from the perspective of psychological ownership. Moreover, information and organization are key aspects of virtual communities. This research aimed to explore the impact of psychological ownership on communication satisfaction from these two perspectives. I collected 471 responses using a questionnaire. In terms of empirical methods, I developed a structural equation model (SEM) to examine the relationship between psychological ownership and communication satisfaction as well as the mechanism underlying this relationship – namely, information behavior. Specifically, I first examined the relationship between psychological ownership and information behavior. I then developed a comprehensive framework for the double-edged impact of psychological ownership in virtual communities on communication satisfaction. I found that psychological ownership has a double-edged effect on communication satisfaction based on two types of information behavior in virtual communities. Specifically, organization-based psychological ownership (OPO) positively influences communication satisfaction through information exchange. In contrast, information-based psychological ownership (IPO) negatively impacts communication satisfaction through information-hiding. The findings of this research demonstrate that psychological ownership has a double-edged effect on communication satisfaction. First, the findings of this study reveal the downsides of psychological ownership, which are not consistent with its beneficial role. Second, the negative effect of psychological ownership with regard to communication in virtual communities also helps explain communication failure in virtual communities. Finally, despite the downsides of psychological ownership in the context of a virtual community revealed by this study, this factor has an overall beneficial effect.Ownership leads to conflicts: the double-edged impact of psychological ownership on communication satisfaction in virtual communities
Lingzhi Brian Fang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Psychological ownership has been a topic of intense debate for several decades, especially in the digital era. In addition, as part of the digital public domain, virtual communities shape our digital lives. Unfortunately, few studies have examined the communication process in virtual communities from the perspective of psychological ownership. Moreover, information and organization are key aspects of virtual communities. This research aimed to explore the impact of psychological ownership on communication satisfaction from these two perspectives.

I collected 471 responses using a questionnaire. In terms of empirical methods, I developed a structural equation model (SEM) to examine the relationship between psychological ownership and communication satisfaction as well as the mechanism underlying this relationship – namely, information behavior. Specifically, I first examined the relationship between psychological ownership and information behavior. I then developed a comprehensive framework for the double-edged impact of psychological ownership in virtual communities on communication satisfaction.

I found that psychological ownership has a double-edged effect on communication satisfaction based on two types of information behavior in virtual communities. Specifically, organization-based psychological ownership (OPO) positively influences communication satisfaction through information exchange. In contrast, information-based psychological ownership (IPO) negatively impacts communication satisfaction through information-hiding.

The findings of this research demonstrate that psychological ownership has a double-edged effect on communication satisfaction. First, the findings of this study reveal the downsides of psychological ownership, which are not consistent with its beneficial role. Second, the negative effect of psychological ownership with regard to communication in virtual communities also helps explain communication failure in virtual communities. Finally, despite the downsides of psychological ownership in the context of a virtual community revealed by this study, this factor has an overall beneficial effect.

]]>
Ownership leads to conflicts: the double-edged impact of psychological ownership on communication satisfaction in virtual communities10.1108/ITP-08-2023-0768Information Technology & People2024-03-14© 2024 Emerald Publishing LimitedLingzhi Brian FangInformation Technology & Peopleahead-of-printahead-of-print2024-03-1410.1108/ITP-08-2023-0768https://www.emerald.com/insight/content/doi/10.1108/ITP-08-2023-0768/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
Instant messaging, interruptions, stress and work performancehttps://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0656/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe authors investigate the relationship between instant messenger (IM) use and work performance, mediated by interruptions and two key indicators of the stress associated with technology use: overload and complexity. The authors validate this research model using partial least squares structural equation modelling (PLS-SEM) with data collected through a survey of 416 working professionals. The data reveal that while IM use contributes minimally to work interruptions and to a greater extent to technological complexity, these two constructs fully mediate the direct influence of IM use at work on technology overload, and meanwhile significantly and directly contribute to work performance. This research provides theoretical insights into the deployment of IM and its actual impacts in the workplace. To improve the generalisation of the findings, the authors call for more IM-related research in other countries, with more native theories and various methodologies in this domain. The level of stress generated through IM use is moderate, considering IM is not a significant contributor to work interruptions. Thus, despite the potential negative effects of IM communication, the positive effects of using IM at work prevail. As a result, the technology can be promoted as long as employees, their managers and the organisation as a whole are well prepared. Employees can transfer skills and behaviour from the personal setting to their work environment and thus may find an intrinsic motivation to make better use of the IM technology at work. The authors argue that this research model is novel for its perspective on evaluating the actual impacts of IM use at work instead of the reasons of using it. The authors conceptualise the process to explain how IM contributes to interruptions and other technostress indicators in the working context, and the impact on performance. Contrary to some prior research, the authors find that overall IM applications do not have a negative impact on work performance, and instead may enhance it.Instant messaging, interruptions, stress and work performance
Luminita Hurbean, Louie H.M. Wong, Carol XJ Ou, Robert M. Davison, Octavian Dospinescu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The authors investigate the relationship between instant messenger (IM) use and work performance, mediated by interruptions and two key indicators of the stress associated with technology use: overload and complexity.

The authors validate this research model using partial least squares structural equation modelling (PLS-SEM) with data collected through a survey of 416 working professionals.

The data reveal that while IM use contributes minimally to work interruptions and to a greater extent to technological complexity, these two constructs fully mediate the direct influence of IM use at work on technology overload, and meanwhile significantly and directly contribute to work performance.

This research provides theoretical insights into the deployment of IM and its actual impacts in the workplace. To improve the generalisation of the findings, the authors call for more IM-related research in other countries, with more native theories and various methodologies in this domain.

The level of stress generated through IM use is moderate, considering IM is not a significant contributor to work interruptions. Thus, despite the potential negative effects of IM communication, the positive effects of using IM at work prevail. As a result, the technology can be promoted as long as employees, their managers and the organisation as a whole are well prepared. Employees can transfer skills and behaviour from the personal setting to their work environment and thus may find an intrinsic motivation to make better use of the IM technology at work.

The authors argue that this research model is novel for its perspective on evaluating the actual impacts of IM use at work instead of the reasons of using it. The authors conceptualise the process to explain how IM contributes to interruptions and other technostress indicators in the working context, and the impact on performance. Contrary to some prior research, the authors find that overall IM applications do not have a negative impact on work performance, and instead may enhance it.

]]>
Instant messaging, interruptions, stress and work performance10.1108/ITP-09-2022-0656Information Technology & People2023-09-22© 2023 Emerald Publishing LimitedLuminita HurbeanLouie H.M. WongCarol XJ OuRobert M. DavisonOctavian DospinescuInformation Technology & Peopleahead-of-printahead-of-print2023-09-2210.1108/ITP-09-2022-0656https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0656/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Working in a bubble: techno-isolation as an emerging techno-stressor in teleworkershttps://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0657/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of this study is to investigate existing and emerging technology-driven stressors using the transactional model of stress and coping (TMSC). In-depth semi-structured interviews with 36 professionals were performed to obtain qualitative data to explore emerging techno-stressors. The findings were validated a year into the pandemic with human resource (HR) professionals. The authors identify a previously unreported techno-stressor, Techno-Isolation (TIS), which arises from a heavy dependence on information communication technologies for professional social interactions. Additionally, several considerations of interaction characteristics are identified that, based on the platform used, affect the experience of TIS, further expanding the TMSC with the addition of medium-interaction compatibility. The authors present a testable model and discuss implications. This study identifies three new information communication technology (ICT)-based antecedents leading to a new techno-stressor, as well as the importance of medium-interaction compatibility in the experiences of stressors as strains. The authors discuss how these elements fit with and extend the existing stress literature.Working in a bubble: techno-isolation as an emerging techno-stressor in teleworkers
Agata Mirowska, Tuba Bakici
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of this study is to investigate existing and emerging technology-driven stressors using the transactional model of stress and coping (TMSC).

In-depth semi-structured interviews with 36 professionals were performed to obtain qualitative data to explore emerging techno-stressors. The findings were validated a year into the pandemic with human resource (HR) professionals.

The authors identify a previously unreported techno-stressor, Techno-Isolation (TIS), which arises from a heavy dependence on information communication technologies for professional social interactions. Additionally, several considerations of interaction characteristics are identified that, based on the platform used, affect the experience of TIS, further expanding the TMSC with the addition of medium-interaction compatibility. The authors present a testable model and discuss implications.

This study identifies three new information communication technology (ICT)-based antecedents leading to a new techno-stressor, as well as the importance of medium-interaction compatibility in the experiences of stressors as strains. The authors discuss how these elements fit with and extend the existing stress literature.

]]>
Working in a bubble: techno-isolation as an emerging techno-stressor in teleworkers10.1108/ITP-09-2022-0657Information Technology & People2023-05-09© 2023 Emerald Publishing LimitedAgata MirowskaTuba BakiciInformation Technology & Peopleahead-of-printahead-of-print2023-05-0910.1108/ITP-09-2022-0657https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0657/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
A double-edged sword: social media use and creativityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0682/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe use of social media is an integral part of modern life, yet the impact of social media on creativity is a paradox. Drawing on the conservation of resources theory, the authors propose that social media, as an ecological condition, both nurture and deplete resources. Accordingly, the authors investigated two inconsistent mechanisms: creative self-efficacy and ego depletion. Study 1 established the within-person effects of social media use on creativity by tracking 64 college students for five working days. Using a sample of 493 employee–leader-matched dyads in a national bank, Study 2 tested the entire model. Study 3 is a follow-up experiment based on a sample of 160 participants. The results consistently showed that: (1) social media use had a positive impact on creativity in general; (2) social media use increased ego depletion and creative self-efficacy, which were two inconsistent mediators; (3) hedonic use of social media reduced the negative impact of cognitive use of social media on ego depletion. This research sheds new light on the paradox between social media use and creativity and highlights the benefits of the balanced use of social media features. This research has implications for creative stimulation and job design in digital contexts.A double-edged sword: social media use and creativity
Guangxi Zhang, Sunfan Mao
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The use of social media is an integral part of modern life, yet the impact of social media on creativity is a paradox. Drawing on the conservation of resources theory, the authors propose that social media, as an ecological condition, both nurture and deplete resources. Accordingly, the authors investigated two inconsistent mechanisms: creative self-efficacy and ego depletion.

Study 1 established the within-person effects of social media use on creativity by tracking 64 college students for five working days. Using a sample of 493 employee–leader-matched dyads in a national bank, Study 2 tested the entire model. Study 3 is a follow-up experiment based on a sample of 160 participants.

The results consistently showed that: (1) social media use had a positive impact on creativity in general; (2) social media use increased ego depletion and creative self-efficacy, which were two inconsistent mediators; (3) hedonic use of social media reduced the negative impact of cognitive use of social media on ego depletion.

This research sheds new light on the paradox between social media use and creativity and highlights the benefits of the balanced use of social media features. This research has implications for creative stimulation and job design in digital contexts.

]]>
A double-edged sword: social media use and creativity10.1108/ITP-09-2022-0682Information Technology & People2023-11-27© 2023 Emerald Publishing LimitedGuangxi ZhangSunfan MaoInformation Technology & Peopleahead-of-printahead-of-print2023-11-2710.1108/ITP-09-2022-0682https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0682/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Social influence processes within MMORPG guilds: a mixed-methods approach of nomological network analysishttps://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0726/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestFocusing on the social influence processes in the context of massively multiplayer online role-playing games (MMORPGs), this study aims to investigate the nomological network of social influence factors, a topic seldom explicitly articulated in the literature in this unique context. This study adopts a mixed-methods approach to develop and test a context-specific model of social influence processes in MMORPGs. First, the authors conducted qualitative interviews with MMORPG players to identify the drivers shaping players' perceptions of social influences. Second, the authors formulated and tested a research model with quantitative data collected from 450 respondents of an online survey. Through the qualitative study, the authors identify leader enthusiasm, social support and social presence as the critical drivers of social influence factors. The result of the quantitative study validates the influences of the critical drivers and demonstrates the impact of social influences on MMORPG players' we-intention to continue playing games. This research extends the social influence theory by identifying contextualized drivers that shape MMORPG players' perception of social influences determining their we-intention to continue playing games. MMORPG service providers can draw on these drivers to leverage social influences to increase players' we-intention of continuance.Social influence processes within MMORPG guilds: a mixed-methods approach of nomological network analysis
Kai Wang, Chi-Feng Tai, Han-fen Hu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Focusing on the social influence processes in the context of massively multiplayer online role-playing games (MMORPGs), this study aims to investigate the nomological network of social influence factors, a topic seldom explicitly articulated in the literature in this unique context.

This study adopts a mixed-methods approach to develop and test a context-specific model of social influence processes in MMORPGs. First, the authors conducted qualitative interviews with MMORPG players to identify the drivers shaping players' perceptions of social influences. Second, the authors formulated and tested a research model with quantitative data collected from 450 respondents of an online survey.

Through the qualitative study, the authors identify leader enthusiasm, social support and social presence as the critical drivers of social influence factors. The result of the quantitative study validates the influences of the critical drivers and demonstrates the impact of social influences on MMORPG players' we-intention to continue playing games.

This research extends the social influence theory by identifying contextualized drivers that shape MMORPG players' perception of social influences determining their we-intention to continue playing games. MMORPG service providers can draw on these drivers to leverage social influences to increase players' we-intention of continuance.

]]>
Social influence processes within MMORPG guilds: a mixed-methods approach of nomological network analysis10.1108/ITP-09-2022-0726Information Technology & People2023-12-18© 2023 Emerald Publishing LimitedKai WangChi-Feng TaiHan-fen HuInformation Technology & Peopleahead-of-printahead-of-print2023-12-1810.1108/ITP-09-2022-0726https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0726/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Recalibrating the scope of financial inclusion through financial technologies in the digital age: the role of digital literacy as a moderator in rural Ugandahttps://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0732/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile money and digital financial inclusion among the unbanked poor women, youth and persons with disabilities (PWDs) in rural Uganda. Covariance-based structural equation modeling was used to construct the interaction effect using data collected from the unbanked poor women, youth and PWDs located in the four regions in Uganda as prescribed by Hair et al. (2022). The findings from this study are threefold: first; the results revealed a positive interaction effect of digital literacy between FinTechs of biometrics and mobile money and digital financial inclusion. Second; the results also confirmed that biometrics identification positively promotes digital financial inclusion. Lastly; the results showed that mobile money positively promotes digital financial inclusion. A combination of FinTechs of biometrics and mobile money together with digital literacy explain 29% variation in digital financial inclusion among the unbanked poor women, youth and PWDs in rural Uganda. The data for this study were collected mainly from the unbanked poor women, youth and PWDs. Further studies may look at data from other sections of the vulnerable population in under developed financial markets. Additionally, the data for this study were collected only from Uganda as a developing country. Thus, more data may be obtained from other developing countries to draw conclusive and generalized empirical evidence. Besides, the current study used cross sectional design to collect the data. Therefore, future studies may adopt longitudinal research design to investigate the impact of FinTechs on digital financial inclusion in the presence of digital literacy across different time range. The governments in developing countries like Uganda should support women, youth, PWDs and other equally vulnerable groups, especially in the rural communities to understand and use FinTechs. This can be achieved through digital literacy that can help them to embrace digital financial services and competently navigate and perform digital transactions over digital platforms like mobile money without making errors. Besides, governments in developing countries like Uganda can use this finding to advocate for the design of appropriate digital infrastructures to reach remote areas and ensure “last mile connectivity for digital financial services' users.” The use of off-line solutions can complement the absence or loss of on-line network connectivity for biometrics and mobile money to close the huge digital divide gap in rural areas. This can scale-up access to and use of financial services by the unbanked rural population. This paper sheds more light on the importance of digital literacy in the ever complex and dynamic global FinTech ecosystem in the presence of rampant cyber risks. To the best of the authors' knowledge, limited studies currently exist that integrate digital literacy as a moderator in the relationship between FinTechs and digital financial inclusion, especially among vulnerable groups in under-developed digital financial markets in developing countries. This is the novelty of the paper with data obtained from the unbanked poor women, youth and PWDs in rural Uganda.Recalibrating the scope of financial inclusion through financial technologies in the digital age: the role of digital literacy as a moderator in rural Uganda
George Okello Candiya Bongomin, Charles Akol Malinga, Alain Manzi Amani, Rebecca Balinda
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile money and digital financial inclusion among the unbanked poor women, youth and persons with disabilities (PWDs) in rural Uganda.

Covariance-based structural equation modeling was used to construct the interaction effect using data collected from the unbanked poor women, youth and PWDs located in the four regions in Uganda as prescribed by Hair et al. (2022).

The findings from this study are threefold: first; the results revealed a positive interaction effect of digital literacy between FinTechs of biometrics and mobile money and digital financial inclusion. Second; the results also confirmed that biometrics identification positively promotes digital financial inclusion. Lastly; the results showed that mobile money positively promotes digital financial inclusion. A combination of FinTechs of biometrics and mobile money together with digital literacy explain 29% variation in digital financial inclusion among the unbanked poor women, youth and PWDs in rural Uganda.

The data for this study were collected mainly from the unbanked poor women, youth and PWDs. Further studies may look at data from other sections of the vulnerable population in under developed financial markets. Additionally, the data for this study were collected only from Uganda as a developing country. Thus, more data may be obtained from other developing countries to draw conclusive and generalized empirical evidence. Besides, the current study used cross sectional design to collect the data. Therefore, future studies may adopt longitudinal research design to investigate the impact of FinTechs on digital financial inclusion in the presence of digital literacy across different time range.

The governments in developing countries like Uganda should support women, youth, PWDs and other equally vulnerable groups, especially in the rural communities to understand and use FinTechs. This can be achieved through digital literacy that can help them to embrace digital financial services and competently navigate and perform digital transactions over digital platforms like mobile money without making errors. Besides, governments in developing countries like Uganda can use this finding to advocate for the design of appropriate digital infrastructures to reach remote areas and ensure “last mile connectivity for digital financial services' users.” The use of off-line solutions can complement the absence or loss of on-line network connectivity for biometrics and mobile money to close the huge digital divide gap in rural areas. This can scale-up access to and use of financial services by the unbanked rural population.

This paper sheds more light on the importance of digital literacy in the ever complex and dynamic global FinTech ecosystem in the presence of rampant cyber risks. To the best of the authors' knowledge, limited studies currently exist that integrate digital literacy as a moderator in the relationship between FinTechs and digital financial inclusion, especially among vulnerable groups in under-developed digital financial markets in developing countries. This is the novelty of the paper with data obtained from the unbanked poor women, youth and PWDs in rural Uganda.

]]>
Recalibrating the scope of financial inclusion through financial technologies in the digital age: the role of digital literacy as a moderator in rural Uganda10.1108/ITP-09-2022-0732Information Technology & People2024-03-20© 2023 Emerald Publishing LimitedGeorge Okello Candiya BongominCharles Akol MalingaAlain Manzi AmaniRebecca BalindaInformation Technology & Peopleahead-of-printahead-of-print2024-03-2010.1108/ITP-09-2022-0732https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2022-0732/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood modelhttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2021-0764/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study investigates how artificial intelligence (AI) chatbots persuade customers to accept their recommendations in the online shopping context. Drawing on the elaboration likelihood model, this study establishes a research model to reveal the antecedents and internal mechanisms of customers' adoption of AI chatbot recommendations. The authors tested the model with survey data from 530 AI chatbot users. The results show that in the AI chatbot recommendation adoption process, central and peripheral cues significantly affected a customer's intention to adopt an AI chatbot's recommendation, and a customer's cognitive and emotional trust in the AI chatbot mediated the relationships. Moreover, a customer's mind perception of the AI chatbot, including perceived agency and perceived experience, moderated the central and peripheral paths, respectively. This study has theoretical and practical implications for AI chatbot designers and provides management insights for practitioners to enhance a customer's intention to adopt an AI chatbot's recommendation. The study investigates customers' adoption of AI chatbots' recommendation.The authors develop research model based on ELM theory to reveal central and peripheral cues and paths.The central and peripheral cues are generalized according to cooperative principle theory.Central cues include recommendation reliability and accuracy, and peripheral cues include human-like empathy and recommendation choice.Central and peripheral cues affect customers' adoption to recommendation through trust in AI.Customers' mind perception positively moderates the central and peripheral paths.Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood model
Qian Chen, Changqin Yin, Yeming Gong
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study investigates how artificial intelligence (AI) chatbots persuade customers to accept their recommendations in the online shopping context.

Drawing on the elaboration likelihood model, this study establishes a research model to reveal the antecedents and internal mechanisms of customers' adoption of AI chatbot recommendations. The authors tested the model with survey data from 530 AI chatbot users.

The results show that in the AI chatbot recommendation adoption process, central and peripheral cues significantly affected a customer's intention to adopt an AI chatbot's recommendation, and a customer's cognitive and emotional trust in the AI chatbot mediated the relationships. Moreover, a customer's mind perception of the AI chatbot, including perceived agency and perceived experience, moderated the central and peripheral paths, respectively.

This study has theoretical and practical implications for AI chatbot designers and provides management insights for practitioners to enhance a customer's intention to adopt an AI chatbot's recommendation.

  1. The study investigates customers' adoption of AI chatbots' recommendation.

  2. The authors develop research model based on ELM theory to reveal central and peripheral cues and paths.

  3. The central and peripheral cues are generalized according to cooperative principle theory.

  4. Central cues include recommendation reliability and accuracy, and peripheral cues include human-like empathy and recommendation choice.

  5. Central and peripheral cues affect customers' adoption to recommendation through trust in AI.

  6. Customers' mind perception positively moderates the central and peripheral paths.

]]>
Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood model10.1108/ITP-10-2021-0764Information Technology & People2023-12-08© 2023 Emerald Publishing LimitedQian ChenChangqin YinYeming GongInformation Technology & Peopleahead-of-printahead-of-print2023-12-0810.1108/ITP-10-2021-0764https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2021-0764/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicismhttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2021-0817/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestBased on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism. The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM). The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS. This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism
Tu Lyu, Yulin Guo, Hao Chen
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

]]>
Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism10.1108/ITP-10-2021-0817Information Technology & People2023-03-17© 2023 Emerald Publishing LimitedTu LyuYulin GuoHao ChenInformation Technology & Peopleahead-of-printahead-of-print2023-03-1710.1108/ITP-10-2021-0817https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2021-0817/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Can augmented reality (AR) applications enhance students’ experiences? Gratifications, engagement and learning styleshttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2021-0823/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe use of augmented reality (AR) and experiential learning go hand in hand. Although AR learning opportunities have been well discussed, there is limited empirical research on the use of AR within higher education settings. Drawing from the uses and gratifications theory (U&GT), this study aims to explore the use of AR for learning satisfaction and student engagement, while also examining differences in learning styles. This study used experiments with higher education students in the UK to explore the use of AR as part of the learning experience. Data from 173 students who experienced AR as part of their learning experience were analysed using partial least square analysis. The authors found that hedonic, utilitarian, sensual and modality gratifications influence AR learning satisfaction and student engagement. Furthermore, the authors found differences between active and passive learners with regards to utilitarian (information seeking, personalisation) and sensual gratifications (immersion, presence) and effects on learning satisfaction. This study developed and validated a U&GT framework incorporating different learning styles rooted in Kolb’s learning cycle. Findings provide important implications for the use of commercial AR applications as part of the learning experience within higher education settings.Can augmented reality (AR) applications enhance students’ experiences? Gratifications, engagement and learning styles
M. Claudia tom Dieck, Eleanor Cranmer, Alexandre Prim, David Bamford
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The use of augmented reality (AR) and experiential learning go hand in hand. Although AR learning opportunities have been well discussed, there is limited empirical research on the use of AR within higher education settings. Drawing from the uses and gratifications theory (U&GT), this study aims to explore the use of AR for learning satisfaction and student engagement, while also examining differences in learning styles.

This study used experiments with higher education students in the UK to explore the use of AR as part of the learning experience. Data from 173 students who experienced AR as part of their learning experience were analysed using partial least square analysis.

The authors found that hedonic, utilitarian, sensual and modality gratifications influence AR learning satisfaction and student engagement. Furthermore, the authors found differences between active and passive learners with regards to utilitarian (information seeking, personalisation) and sensual gratifications (immersion, presence) and effects on learning satisfaction.

This study developed and validated a U&GT framework incorporating different learning styles rooted in Kolb’s learning cycle. Findings provide important implications for the use of commercial AR applications as part of the learning experience within higher education settings.

]]>
Can augmented reality (AR) applications enhance students’ experiences? Gratifications, engagement and learning styles10.1108/ITP-10-2021-0823Information Technology & People2023-04-18© 2023 Emerald Publishing LimitedM. Claudia tom DieckEleanor CranmerAlexandre PrimDavid BamfordInformation Technology & Peopleahead-of-printahead-of-print2023-04-1810.1108/ITP-10-2021-0823https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2021-0823/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How do we elicit more user feedback in the social Q&A community? A consideration of the expertise-required questionhttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0751/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe current study aims to investigate the factors that impact the feedback received on answers to questions in social Q&A communities and whether the expertise-required question influences the role of these factors on the feedback. To understand the antecedents and consequences that influence the feedback received on answers to online community questions, the elaboration likelihood model (ELM) is applied in this study. The authors use web data crawling methods and a combination of quantitative analyses. The data for this study came from Zhihu; in total, 353,775 responses were obtained to 1,531 questions, ranging from 49 to 23,681 responses per question. Each answer received 0 to 113,892 likes and 0 to 6,250 comments. The answers' cognitive and emotional components and the answerer's influence positively affect user feedback behavior. In addition, the expertise-required question moderates the effects of the answer's cognitive component and emotional component on the user feedback, moderating the effects of the answerer's influence on the user approval feedback. This study builds upon a limited yet growing body of literature on a theme of great relevance to scholars, practitioners and social media users concerning the effects of the connotation of answers (i.e. their cognitive and emotional components) and the answerer's influence on user feedback (i.e. approval and collaborative feedback) in social Q&A communities. The authors further consider the moderating role of the domain expertise required by the question (expertise-required question). The ELM model is applied to explore the relationships between questions, answers and feedback. The findings of this study add a new perspective to the research on user feedback and have implications for the management of social Q&A communities.How do we elicit more user feedback in the social Q&A community? A consideration of the expertise-required question
Mi Zhou, Bo Meng, Weiguo Fan
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The current study aims to investigate the factors that impact the feedback received on answers to questions in social Q&A communities and whether the expertise-required question influences the role of these factors on the feedback.

To understand the antecedents and consequences that influence the feedback received on answers to online community questions, the elaboration likelihood model (ELM) is applied in this study. The authors use web data crawling methods and a combination of quantitative analyses. The data for this study came from Zhihu; in total, 353,775 responses were obtained to 1,531 questions, ranging from 49 to 23,681 responses per question. Each answer received 0 to 113,892 likes and 0 to 6,250 comments.

The answers' cognitive and emotional components and the answerer's influence positively affect user feedback behavior. In addition, the expertise-required question moderates the effects of the answer's cognitive component and emotional component on the user feedback, moderating the effects of the answerer's influence on the user approval feedback.

This study builds upon a limited yet growing body of literature on a theme of great relevance to scholars, practitioners and social media users concerning the effects of the connotation of answers (i.e. their cognitive and emotional components) and the answerer's influence on user feedback (i.e. approval and collaborative feedback) in social Q&A communities. The authors further consider the moderating role of the domain expertise required by the question (expertise-required question). The ELM model is applied to explore the relationships between questions, answers and feedback. The findings of this study add a new perspective to the research on user feedback and have implications for the management of social Q&A communities.

]]>
How do we elicit more user feedback in the social Q&A community? A consideration of the expertise-required question10.1108/ITP-10-2022-0751Information Technology & People2023-05-22© 2023 Emerald Publishing LimitedMi ZhouBo MengWeiguo FanInformation Technology & Peopleahead-of-printahead-of-print2023-05-2210.1108/ITP-10-2022-0751https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0751/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Chinese older adults' social media use: a study of WeChat from a social practice perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0787/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestResearch into older adults' use of social media remains limited. Driven by increasing digitalisation in China, the authors focus on Chinese older adults (aged 60–75)’ use of WeChat. This study used a qualitative interpretive approach and interviewed Chinese older adults to uncover their social practices of WeChat use in everyday life. By using social practice theory (SPT), the paper unfolds Chinese older adults' social practices of WeChat use in everyday life and reveals how they adopt and resist the drastic changes in Chinese society. The study contributes to new understandings of SPT from technology use by emphasising the dynamic characteristics of its three elements. The authors synthesise both adoptions and resistance in SPT and highlight the importance of understanding three elements interdependently within specific contexts, which are conditioned by structure and agency.Chinese older adults' social media use: a study of WeChat from a social practice perspective
Brad McKenna, Wenjie Cai, Hyunsun Yoon
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Research into older adults' use of social media remains limited. Driven by increasing digitalisation in China, the authors focus on Chinese older adults (aged 60–75)’ use of WeChat.

This study used a qualitative interpretive approach and interviewed Chinese older adults to uncover their social practices of WeChat use in everyday life.

By using social practice theory (SPT), the paper unfolds Chinese older adults' social practices of WeChat use in everyday life and reveals how they adopt and resist the drastic changes in Chinese society.

The study contributes to new understandings of SPT from technology use by emphasising the dynamic characteristics of its three elements. The authors synthesise both adoptions and resistance in SPT and highlight the importance of understanding three elements interdependently within specific contexts, which are conditioned by structure and agency.

]]>
Chinese older adults' social media use: a study of WeChat from a social practice perspective10.1108/ITP-10-2022-0787Information Technology & People2023-10-10© 2023 Emerald Publishing LimitedBrad McKennaWenjie CaiHyunsun YoonInformation Technology & Peopleahead-of-printahead-of-print2023-10-1010.1108/ITP-10-2022-0787https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0787/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
A framework for consumers' assessments of location-based advertising (LBA) and selective exposure to privacy-related online informationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0790/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of the current research is to present an explanatory framework for how people selectively attend to privacy-related news information about LBA depending on the extent to which they know about LBA already as well as their appraisals of privacy threats and efficacy. The proposed model was tested using structural equation modeling based on a total of 522 useable responses obtained from an online survey. The results revealed two different approaches to information exposure: (1) people choose to seek out privacy-related news articles when their persuasion knowledge and perceived threat level are high, whereas (2) they tend to avoid such information when perceived threats accompany fear as well as psychological discomfort, or when they believe that they are knowledgeable about LBA practices and highly capable of protecting their privacy. With the development of real-time location-tracking technologies, the practice of LBA is becoming increasingly popular. As such, however, concerns about data collection and privacy are also on the rise, garnering a great deal of media attention. Despite the importance and constant stream of news reports on the subject, a comprehensive understanding of consumers' privacy assessments and information consumption remains underexamined. By incorporating the persuasion knowledge model and extended parallel process model, the current research presents an explanatory framework for consumers' privacy perceptions and information choice.A framework for consumers' assessments of location-based advertising (LBA) and selective exposure to privacy-related online information
Sann Ryu
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of the current research is to present an explanatory framework for how people selectively attend to privacy-related news information about LBA depending on the extent to which they know about LBA already as well as their appraisals of privacy threats and efficacy.

The proposed model was tested using structural equation modeling based on a total of 522 useable responses obtained from an online survey.

The results revealed two different approaches to information exposure: (1) people choose to seek out privacy-related news articles when their persuasion knowledge and perceived threat level are high, whereas (2) they tend to avoid such information when perceived threats accompany fear as well as psychological discomfort, or when they believe that they are knowledgeable about LBA practices and highly capable of protecting their privacy.

With the development of real-time location-tracking technologies, the practice of LBA is becoming increasingly popular. As such, however, concerns about data collection and privacy are also on the rise, garnering a great deal of media attention. Despite the importance and constant stream of news reports on the subject, a comprehensive understanding of consumers' privacy assessments and information consumption remains underexamined. By incorporating the persuasion knowledge model and extended parallel process model, the current research presents an explanatory framework for consumers' privacy perceptions and information choice.

]]>
A framework for consumers' assessments of location-based advertising (LBA) and selective exposure to privacy-related online information10.1108/ITP-10-2022-0790Information Technology & People2023-12-05© 2023 Emerald Publishing LimitedSann RyuInformation Technology & Peopleahead-of-printahead-of-print2023-12-0510.1108/ITP-10-2022-0790https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0790/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibilityhttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0791/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestAccording to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors. This research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM). The findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility. This study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility
Abdul Hameed Pitafi
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

According to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors.

This research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM).

The findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility.

This study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.

]]>
Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility10.1108/ITP-10-2022-0791Information Technology & People2024-01-04© 2023 Emerald Publishing LimitedAbdul Hameed PitafiInformation Technology & Peopleahead-of-printahead-of-print2024-01-0410.1108/ITP-10-2022-0791https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0791/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Follow and spread the word: the effects of avatars and message framing in promoting fact checking posts on social mediahttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0793/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestFact-checking is a process of seeking and displaying facts to confirm or counter uncertain information, which reduces the spread of fake news. However, little is known about how to promote fact-checking posts to online users on social media. Through uncertainty reduction theory and message framing, this first study examines the effect of fact-checking posts on social media with an avatar on online users' trust, attitudes, and behavioral intentions. The authors further investigate the congruency effects between promotional message framing (gain/loss/neutral) and facial expressions of the avatar (happy/angry/neutral) on online users' trust, attitudes, and behavioral intentions in the second study. The authors conducted two studies and statistically analyzed 120 samples (study 1) and 519 samples (study 2) from Facebook users. Results showed that including the neutral facial expression avatar in fact-checking posts leads to online users' greater trust and more positive attitudes. Furthermore, the congruency effects between loss message framing and the angry facial expression of the avatar can effectively promote online users' trust and attitudes as well as stronger intentions to follow and share. This study offers theoretical implications for fact-checking studies, and practical implications for online fact-checkers to apply these findings to design effective fact-checking posts and spread the veracity of information on social media.Follow and spread the word: the effects of avatars and message framing in promoting fact checking posts on social media
Jian-Ren Hou, Sarawut Kankham
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Fact-checking is a process of seeking and displaying facts to confirm or counter uncertain information, which reduces the spread of fake news. However, little is known about how to promote fact-checking posts to online users on social media. Through uncertainty reduction theory and message framing, this first study examines the effect of fact-checking posts on social media with an avatar on online users' trust, attitudes, and behavioral intentions. The authors further investigate the congruency effects between promotional message framing (gain/loss/neutral) and facial expressions of the avatar (happy/angry/neutral) on online users' trust, attitudes, and behavioral intentions in the second study.

The authors conducted two studies and statistically analyzed 120 samples (study 1) and 519 samples (study 2) from Facebook users.

Results showed that including the neutral facial expression avatar in fact-checking posts leads to online users' greater trust and more positive attitudes. Furthermore, the congruency effects between loss message framing and the angry facial expression of the avatar can effectively promote online users' trust and attitudes as well as stronger intentions to follow and share.

This study offers theoretical implications for fact-checking studies, and practical implications for online fact-checkers to apply these findings to design effective fact-checking posts and spread the veracity of information on social media.

]]>
Follow and spread the word: the effects of avatars and message framing in promoting fact checking posts on social media10.1108/ITP-10-2022-0793Information Technology & People2023-06-13© 2023 Emerald Publishing LimitedJian-Ren HouSarawut KankhamInformation Technology & Peopleahead-of-printahead-of-print2023-06-1310.1108/ITP-10-2022-0793https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0793/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Transitions in daily search tactics: during the cross-app interaction search processhttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0814/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestCross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily search tactics during the cross-app interaction search process. In total, 204 young participants' impressive cross-app search experiences in real daily situations were collected. The search tactics and tactic transition sequences in their search process were obtained by open coding. Statistical analysis and sequence analysis were used to analyze the frequently applied tactics, the frequency and probability of tactic transitions and the tactic transition sequences representing characteristics of tactic transitions occurring at the beginning, middle and ending phases.  Creating the search statement (Creat), evaluating search results (EvalR), evaluating an individual item (EvalI) and keeping a record (Rec) were the most frequently applied tactics. The frequency and probability of transitions differed significantly between different tactic types. “Creat? EvalR? EvalI? Rec” is the typical path; Initiate the search in various ways and modifying the search statement were highlighted at the beginning phase; iteratively creating the search statement is highlighted in the middle phase; Moreover, utilization and feedback of information are highlighted at the ending phase.  The present study shed new light on tactic transitions in the cross-app interactive environment to explore information search behaviour. The findings of this work provide targeted suggestions for optimizing APP query, browsing and monitoring systems.Transitions in daily search tactics: during the cross-app interaction search process
Jing Chen, Hongli Chen, Yingyun Li
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily search tactics during the cross-app interaction search process.

In total, 204 young participants' impressive cross-app search experiences in real daily situations were collected. The search tactics and tactic transition sequences in their search process were obtained by open coding. Statistical analysis and sequence analysis were used to analyze the frequently applied tactics, the frequency and probability of tactic transitions and the tactic transition sequences representing characteristics of tactic transitions occurring at the beginning, middle and ending phases. 

Creating the search statement (Creat), evaluating search results (EvalR), evaluating an individual item (EvalI) and keeping a record (Rec) were the most frequently applied tactics. The frequency and probability of transitions differed significantly between different tactic types. “Creat? EvalR? EvalI? Rec” is the typical path; Initiate the search in various ways and modifying the search statement were highlighted at the beginning phase; iteratively creating the search statement is highlighted in the middle phase; Moreover, utilization and feedback of information are highlighted at the ending phase. 

The present study shed new light on tactic transitions in the cross-app interactive environment to explore information search behaviour. The findings of this work provide targeted suggestions for optimizing APP query, browsing and monitoring systems.

]]>
Transitions in daily search tactics: during the cross-app interaction search process10.1108/ITP-10-2022-0814Information Technology & People2023-05-09© 2023 Emerald Publishing LimitedJing ChenHongli ChenYingyun LiInformation Technology & Peopleahead-of-printahead-of-print2023-05-0910.1108/ITP-10-2022-0814https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0814/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach–avoidance behavior for potential users and continuation usage for actual usershttps://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0821/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestWith the rise of cryptocurrency and its influence on the financial industry, this paper aims to explore cryptocurrency affordances that lead to approach–avoidance behavioral intentions for non-users (potential) and the intention to continue use for users (actual), drawing upon affordance theory and chasm theory. The authors collected data from 480 potential and actual users in Germany and used maximum likelihood structural equation modeling (ML-SEM) to analyze it. In particular, the data consisted of 301 cryptocurrency users in Germany\ the authors used ML-SEM to test the post-adoption model. Additionally, logistic regression was utilized to determine the dominant actual usage method (store of value or medium of exchange) for various cryptocurrency coins. According to the study's results, the perceived value benefits have a positive impact on the behavioral intention of potential users to adopt cryptocurrency, and they influence the intention of actual users to continue using it. However, both perceived volatility and financial risk tolerance are the most crucial factors hindering cryptocurrency adoption, whether in the pre-adoption or the post-adoption stage. This is the first study to reveal cryptocurrency affordances and examine their effect on behavioral intentions toward cryptocurrency adoption based on the differences between non-users (potential) and users (actual). Furthermore, the authors explore how cryptocurrency holders perceive and invest in different coins (e.g. NFTs), which sheds light on factors such as financial risk tolerance that affect their decision making.Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach–avoidance behavior for potential users and continuation usage for actual users
Milad Armani Dehghani, Dionysios Karavidas, Alexandra Rese, Fulya Acikgoz
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

With the rise of cryptocurrency and its influence on the financial industry, this paper aims to explore cryptocurrency affordances that lead to approach–avoidance behavioral intentions for non-users (potential) and the intention to continue use for users (actual), drawing upon affordance theory and chasm theory.

The authors collected data from 480 potential and actual users in Germany and used maximum likelihood structural equation modeling (ML-SEM) to analyze it. In particular, the data consisted of 301 cryptocurrency users in Germany\ the authors used ML-SEM to test the post-adoption model. Additionally, logistic regression was utilized to determine the dominant actual usage method (store of value or medium of exchange) for various cryptocurrency coins.

According to the study's results, the perceived value benefits have a positive impact on the behavioral intention of potential users to adopt cryptocurrency, and they influence the intention of actual users to continue using it. However, both perceived volatility and financial risk tolerance are the most crucial factors hindering cryptocurrency adoption, whether in the pre-adoption or the post-adoption stage.

This is the first study to reveal cryptocurrency affordances and examine their effect on behavioral intentions toward cryptocurrency adoption based on the differences between non-users (potential) and users (actual). Furthermore, the authors explore how cryptocurrency holders perceive and invest in different coins (e.g. NFTs), which sheds light on factors such as financial risk tolerance that affect their decision making.

]]>
Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach–avoidance behavior for potential users and continuation usage for actual users10.1108/ITP-10-2022-0821Information Technology & People2023-10-31© 2023 Emerald Publishing LimitedMilad Armani DehghaniDionysios KaravidasAlexandra ReseFulya AcikgozInformation Technology & Peopleahead-of-printahead-of-print2023-10-3110.1108/ITP-10-2022-0821https://www.emerald.com/insight/content/doi/10.1108/ITP-10-2022-0821/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Consumer avoidance toward message stream advertising on mobile social media: a stimulus-organism-response perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2020-0761/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestMessage stream advertising (MSA) has become an increasingly popular option for advertising on mobile social media. However, MSA is often avoided by consumers, and this avoidance deserves more research attention. The purpose of this study is therefore to identify the underlying mechanism and key variables that affect consumer avoidance of MSA in the context of mobile social media. A face-to-face survey was administered to current mobile users of WeChat (N = 438). Structural equation modeling was conducted to test the relationships in the research model. Results revealed that mobile consumers employ mechanical avoidance methods (i.e. zipping, muting and zapping) against MSA. The findings also demonstrated that advertising intrusiveness (stimulus) is directly linked to negative emotions, perceived entertainment and sense of control (organism), which, in turn, relate to MSA avoidance (response). The study contributes to the MSA avoidance literature by using the stimulus-organism-response model to deepen the understanding of consumers' MSA avoidance on mobile social media, and it suggests important managerial implications for advertising practitioners and platform operators.Consumer avoidance toward message stream advertising on mobile social media: a stimulus-organism-response perspective
Xiaodong Li, Zibing Liu, Yuan Chen, Ai Ren
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Message stream advertising (MSA) has become an increasingly popular option for advertising on mobile social media. However, MSA is often avoided by consumers, and this avoidance deserves more research attention. The purpose of this study is therefore to identify the underlying mechanism and key variables that affect consumer avoidance of MSA in the context of mobile social media.

A face-to-face survey was administered to current mobile users of WeChat (N = 438). Structural equation modeling was conducted to test the relationships in the research model.

Results revealed that mobile consumers employ mechanical avoidance methods (i.e. zipping, muting and zapping) against MSA. The findings also demonstrated that advertising intrusiveness (stimulus) is directly linked to negative emotions, perceived entertainment and sense of control (organism), which, in turn, relate to MSA avoidance (response).

The study contributes to the MSA avoidance literature by using the stimulus-organism-response model to deepen the understanding of consumers' MSA avoidance on mobile social media, and it suggests important managerial implications for advertising practitioners and platform operators.

]]>
Consumer avoidance toward message stream advertising on mobile social media: a stimulus-organism-response perspective10.1108/ITP-11-2020-0761Information Technology & People2023-08-31© 2023 Emerald Publishing LimitedXiaodong LiZibing LiuYuan ChenAi RenInformation Technology & Peopleahead-of-printahead-of-print2023-08-3110.1108/ITP-11-2020-0761https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2020-0761/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Credibility of Youtube product reviews and customers' product return intention: a product fit uncertainty perspectivehttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2021-0838/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis research aims to examine the factors that influence customers' product return intentions and proposes that YouTube product reviews can mitigate customers' desire to return a product. The proposed theoretical research model and hypothesized relationship were investigated using a quantitative process. This study used 302 data from Indonesian young adult respondents to examine the structural model, which was analyzed using the SmartPLS 3.2 software package. The results show that YouTube product reviews, product fit uncertainty and customer satisfaction are the key determinants of customers' product return intention. Furthermore, the results show that the credibility of YouTube product reviews has a major impact on customers' familiarity with a product, satisfaction and the likelihood of returning goods to sellers. In the e-commerce industry, increasing the use of YouTube product reviews will help businesses eliminate unnecessary product returns. Sellers are also encouraged to collaborate with YouTube producers to review specific products, which can benefit companies by raising brand awareness and gaining customer feedback. Furthermore, YouTube online product reviews can help consumers avoid having an unpleasant shopping experience that causes emotional reactions and lowers satisfaction. Most research has not considered antecedents in observing the product return phenomenon; this study observes a prerequisite of consumer product returns (i.e. information asymmetry and product familiarity) and investigates the relationships between YouTube product reviews, customer satisfaction and product return intention.Credibility of Youtube product reviews and customers' product return intention: a product fit uncertainty perspective
Aditya Nugroho, Wei-Tsong Wang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This research aims to examine the factors that influence customers' product return intentions and proposes that YouTube product reviews can mitigate customers' desire to return a product.

The proposed theoretical research model and hypothesized relationship were investigated using a quantitative process. This study used 302 data from Indonesian young adult respondents to examine the structural model, which was analyzed using the SmartPLS 3.2 software package.

The results show that YouTube product reviews, product fit uncertainty and customer satisfaction are the key determinants of customers' product return intention. Furthermore, the results show that the credibility of YouTube product reviews has a major impact on customers' familiarity with a product, satisfaction and the likelihood of returning goods to sellers.

In the e-commerce industry, increasing the use of YouTube product reviews will help businesses eliminate unnecessary product returns. Sellers are also encouraged to collaborate with YouTube producers to review specific products, which can benefit companies by raising brand awareness and gaining customer feedback. Furthermore, YouTube online product reviews can help consumers avoid having an unpleasant shopping experience that causes emotional reactions and lowers satisfaction.

Most research has not considered antecedents in observing the product return phenomenon; this study observes a prerequisite of consumer product returns (i.e. information asymmetry and product familiarity) and investigates the relationships between YouTube product reviews, customer satisfaction and product return intention.

]]>
Credibility of Youtube product reviews and customers' product return intention: a product fit uncertainty perspective10.1108/ITP-11-2021-0838Information Technology & People2023-05-18© 2023 Emerald Publishing LimitedAditya NugrohoWei-Tsong WangInformation Technology & Peopleahead-of-printahead-of-print2023-05-1810.1108/ITP-11-2021-0838https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2021-0838/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
A qualitative study of penetration testers and what they can tell us about information security in organisationshttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2021-0864/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts. The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis. The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation. This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.A qualitative study of penetration testers and what they can tell us about information security in organisations
Stefano De Paoli, Jason Johnstone
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

]]>
A qualitative study of penetration testers and what they can tell us about information security in organisations10.1108/ITP-11-2021-0864Information Technology & People2023-10-10© 2023 Emerald Publishing LimitedStefano De PaoliJason JohnstoneInformation Technology & Peopleahead-of-printahead-of-print2023-10-1010.1108/ITP-11-2021-0864https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2021-0864/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How sales promotion influences consumers’ physical exercise and purchase behaviors: evidence from mobile exercise app datahttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2021-0902/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestFirms can benefit from designing sales promotion based on the analysis of consumers' physical exercise and purchase data. This study aims to study mobile exercise app data to explore how purchasing a promoted or nonpromoted product affects exercisers’ subsequent exercise and purchase behaviors. Drawing from the theoretical framework of overjustification effect, this study empirically examines the effects of the purchase of promoted – monetary and nonmonetary – or nonpromoted products on relationships (1) between past and subsequent exercise behaviors and (2) between past exercise and subsequent purchase behaviors. Novel data of one million exercise activities and purchase transactions created by 7,517 mobile exercise app users were collected. The results reveal that monetary and nonmonetary promotions have a negative effect on overall consumers’ amount of physical exercise but increase heavy exercisers’ exercise amount. In addition, nonmonetary (monetary) promotion has a positive (negative) effect on consumers’ purchase expenditure but has no moderating effect on the exercise–expenditure relationship. This study provides a theoretical framework explaining how to mitigate the dark side of sales promotions while targeting right exercise consumer segments with the right promotion campaigns.How sales promotion influences consumers’ physical exercise and purchase behaviors: evidence from mobile exercise app data
Seongsoo Jang, Hwang Kim, Vithala R. Rao
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Firms can benefit from designing sales promotion based on the analysis of consumers' physical exercise and purchase data. This study aims to study mobile exercise app data to explore how purchasing a promoted or nonpromoted product affects exercisers’ subsequent exercise and purchase behaviors.

Drawing from the theoretical framework of overjustification effect, this study empirically examines the effects of the purchase of promoted – monetary and nonmonetary – or nonpromoted products on relationships (1) between past and subsequent exercise behaviors and (2) between past exercise and subsequent purchase behaviors. Novel data of one million exercise activities and purchase transactions created by 7,517 mobile exercise app users were collected.

The results reveal that monetary and nonmonetary promotions have a negative effect on overall consumers’ amount of physical exercise but increase heavy exercisers’ exercise amount. In addition, nonmonetary (monetary) promotion has a positive (negative) effect on consumers’ purchase expenditure but has no moderating effect on the exercise–expenditure relationship.

This study provides a theoretical framework explaining how to mitigate the dark side of sales promotions while targeting right exercise consumer segments with the right promotion campaigns.

]]>
How sales promotion influences consumers’ physical exercise and purchase behaviors: evidence from mobile exercise app data10.1108/ITP-11-2021-0902Information Technology & People2023-06-09© 2023 Emerald Publishing LimitedSeongsoo JangHwang KimVithala R. RaoInformation Technology & Peopleahead-of-printahead-of-print2023-06-0910.1108/ITP-11-2021-0902https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2021-0902/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Factors influencing attitude and intention to use autonomous vehicles in Vietnam: findings from PLS-SEM and ANFIShttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0825/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study aims to explore and ranks the factors that might determine attitudes and intentions toward using autonomous vehicles (AVs). The “technology acceptance model” (TAM) was extended by assessing the moderating influences of personal-related factors. Data were collected from 378 Vietnamese and analysed using a combination of “partial least squares” and the “adaptive neuro-fuzzy inference system” (ANFIS) technique. The findings demonstrated the power of TAM in explaining the attitude and intention to use AVs. ANFIS enables ranking the importance of determinants and predicting the outcomes. Perceived ease of use and attitude were the most crucial drivers of attitude and intention to use AVs, respectively. Personal innovativeness negatively moderates the influence of perceived ease of use on attitude. Data privacy concerns moderate positively the impact of perceived usefulness on attitude. The moderating effect of price sensitivity was not supported. These findings provide insights for policymakers and automobile companies' managers, designers and marketers on driving factors in making decisions to adopt AVs. The study extends the AVs literature by illustrating the importance of personal-related factors, ranking the determinants of attitude and intention, illustrating the inter-relationships among AVs adoption factors and predicting individuals' attitudes and behaviours towards using AVs.Factors influencing attitude and intention to use autonomous vehicles in Vietnam: findings from PLS-SEM and ANFIS
Mohammad Iranmanesh, Morteza Ghobakhloo, Behzad Foroughi, Mehrbakhsh Nilashi, Elaheh Yadegaridehkordi
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study aims to explore and ranks the factors that might determine attitudes and intentions toward using autonomous vehicles (AVs).

The “technology acceptance model” (TAM) was extended by assessing the moderating influences of personal-related factors. Data were collected from 378 Vietnamese and analysed using a combination of “partial least squares” and the “adaptive neuro-fuzzy inference system” (ANFIS) technique.

The findings demonstrated the power of TAM in explaining the attitude and intention to use AVs. ANFIS enables ranking the importance of determinants and predicting the outcomes. Perceived ease of use and attitude were the most crucial drivers of attitude and intention to use AVs, respectively. Personal innovativeness negatively moderates the influence of perceived ease of use on attitude. Data privacy concerns moderate positively the impact of perceived usefulness on attitude. The moderating effect of price sensitivity was not supported.

These findings provide insights for policymakers and automobile companies' managers, designers and marketers on driving factors in making decisions to adopt AVs.

The study extends the AVs literature by illustrating the importance of personal-related factors, ranking the determinants of attitude and intention, illustrating the inter-relationships among AVs adoption factors and predicting individuals' attitudes and behaviours towards using AVs.

]]>
Factors influencing attitude and intention to use autonomous vehicles in Vietnam: findings from PLS-SEM and ANFIS10.1108/ITP-11-2022-0825Information Technology & People2023-08-24© 2023 Emerald Publishing LimitedMohammad IranmaneshMorteza GhobakhlooBehzad ForoughiMehrbakhsh NilashiElaheh YadegaridehkordiInformation Technology & Peopleahead-of-printahead-of-print2023-08-2410.1108/ITP-11-2022-0825https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0825/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
An institutional perspective on application programming interface development and integrationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0826/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDigital platforms increase their function and scope by leveraging boundary resources and complementary add-on products from third-party developers to interact with external entities and producers. Application Programming Interfaces (APIs) are essential boundary resources developers use to connect applications, systems and platforms. This notwithstanding, previous API studies tend to focus more on the technical dimensions, with little on the social and cultural contexts underpinning API innovations. This study relies on the new (neo) institutional theory (focusing on regulative, normative and cultural-cognitive pillars) as an analytical lens to understand the institutional forces that affect API integration among digital firms. The study adopts a qualitative case study methodology and relies on phone calls and a semi-structured in-depth interview approach of a Ghanaian digital music platform to uncover the institutional forces affecting API integration. The findings reveal that regulative institutions such as excessive tax regimes mostly constrained API development and integration initiatives. However, other regulative institutions like the government digitalization agenda enabled API integration. Normative institutions, such as the growing use of e-payment options, enabled API integration in digital music platforms. Cultural-cognitive institutions like employee ego constrained the API integration process in music digital platforms. This study primarily contributes to deepening understanding of the relevant literature by exploring the institutional forces that affect API integration among digital firms in a developing economy. The study also uncovered a new form of an institution known as motivational institution as an enabler for API development and integration in digital music platforms.An institutional perspective on application programming interface development and integration
Joshua Ofoeda, Richard Boateng, John Effah
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Digital platforms increase their function and scope by leveraging boundary resources and complementary add-on products from third-party developers to interact with external entities and producers. Application Programming Interfaces (APIs) are essential boundary resources developers use to connect applications, systems and platforms. This notwithstanding, previous API studies tend to focus more on the technical dimensions, with little on the social and cultural contexts underpinning API innovations. This study relies on the new (neo) institutional theory (focusing on regulative, normative and cultural-cognitive pillars) as an analytical lens to understand the institutional forces that affect API integration among digital firms.

The study adopts a qualitative case study methodology and relies on phone calls and a semi-structured in-depth interview approach of a Ghanaian digital music platform to uncover the institutional forces affecting API integration.

The findings reveal that regulative institutions such as excessive tax regimes mostly constrained API development and integration initiatives. However, other regulative institutions like the government digitalization agenda enabled API integration. Normative institutions, such as the growing use of e-payment options, enabled API integration in digital music platforms. Cultural-cognitive institutions like employee ego constrained the API integration process in music digital platforms.

This study primarily contributes to deepening understanding of the relevant literature by exploring the institutional forces that affect API integration among digital firms in a developing economy. The study also uncovered a new form of an institution known as motivational institution as an enabler for API development and integration in digital music platforms.

]]>
An institutional perspective on application programming interface development and integration10.1108/ITP-11-2022-0826Information Technology & People2023-12-19© 2023 Emerald Publishing LimitedJoshua OfoedaRichard BoatengJohn EffahInformation Technology & Peopleahead-of-printahead-of-print2023-12-1910.1108/ITP-11-2022-0826https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0826/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Trust but verify: the effect of religiosity and social conformity on verification of content shared via social mediahttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0827/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis study aims to understand the patterns of content-sharing behaviour on major social media platforms by young adult users with reference to how these sharing patterns are influenced by two main sociocultural factors in their lives, religiosity and social conformity. Online surveys including both the ATSCI test for social conformity as well as the Hoge test for religiosity were filled out by 590 participants. In-depth interviews with six participants representative of the same population were conducted to deepen analysis of key variables explored in the surveys. The design of the interviews was semi-structured, whereby the focus was to achieve a general overview of participants' intentions and habits regarding sharing information via social media. The findings show a significant positive impact of religiosity and social conformity on users' sharing intention which, in turn, affects their inclination towards verifying the content they share. The authors' findings emphasise how users bear the onus of correcting the online information space. It paves the way for future research by recognising the value of independent corroboration amongst users. This study lends key support to the growing body of research on social media use in societies in which shared religious and cultural values tend to clearly impact everyday social interaction.Trust but verify: the effect of religiosity and social conformity on verification of content shared via social media
Ashraf Khalil, Salam Abdallah, Rafiq Hijazi, Kundan Sheikh
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This study aims to understand the patterns of content-sharing behaviour on major social media platforms by young adult users with reference to how these sharing patterns are influenced by two main sociocultural factors in their lives, religiosity and social conformity.

Online surveys including both the ATSCI test for social conformity as well as the Hoge test for religiosity were filled out by 590 participants. In-depth interviews with six participants representative of the same population were conducted to deepen analysis of key variables explored in the surveys. The design of the interviews was semi-structured, whereby the focus was to achieve a general overview of participants' intentions and habits regarding sharing information via social media.

The findings show a significant positive impact of religiosity and social conformity on users' sharing intention which, in turn, affects their inclination towards verifying the content they share.

The authors' findings emphasise how users bear the onus of correcting the online information space. It paves the way for future research by recognising the value of independent corroboration amongst users.

This study lends key support to the growing body of research on social media use in societies in which shared religious and cultural values tend to clearly impact everyday social interaction.

]]>
Trust but verify: the effect of religiosity and social conformity on verification of content shared via social media10.1108/ITP-11-2022-0827Information Technology & People2023-09-13© 2023 Emerald Publishing LimitedAshraf KhalilSalam AbdallahRafiq HijaziKundan SheikhInformation Technology & Peopleahead-of-printahead-of-print2023-09-1310.1108/ITP-11-2022-0827https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0827/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The influence of online host–guest interaction on listing popularity in peer-to-peer accommodation: the role of listing price and reputationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0832/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestTo promote the success of peer-to-peer accommodation, this study examines the effects of online host–guest interaction as well as the interaction's boundary conditions of listing price and reputation on listing popularity. Using 330,686 data collected from Airbnb in the United States of America, the authors provide empirical evidence to answer whether social-oriented self-presentation and response rate influence listing popularity from the perspective of social exchange theory (SET). In addition, the authors investigate how these two kinds of online host–guest interactions work with listing price and reputation to influence listing popularity. The results reveal the positive association between online host–guest interaction and listing popularity. Notably, the authors find that listing price strengthens but listing reputation weakens the positive effects of online host–guest interactions on listing popularity in peer-to-peer accommodation. This study is the first attempt to adopt SET to explain the importance of online host–guest interactions in influencing listing popularity as well as examine the moderating role of listing price and reputation on the above relationship.The influence of online host–guest interaction on listing popularity in peer-to-peer accommodation: the role of listing price and reputation
Fuzhen Liu, Kee-hung Lai, Chaocheng He
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

To promote the success of peer-to-peer accommodation, this study examines the effects of online host–guest interaction as well as the interaction's boundary conditions of listing price and reputation on listing popularity.

Using 330,686 data collected from Airbnb in the United States of America, the authors provide empirical evidence to answer whether social-oriented self-presentation and response rate influence listing popularity from the perspective of social exchange theory (SET). In addition, the authors investigate how these two kinds of online host–guest interactions work with listing price and reputation to influence listing popularity.

The results reveal the positive association between online host–guest interaction and listing popularity. Notably, the authors find that listing price strengthens but listing reputation weakens the positive effects of online host–guest interactions on listing popularity in peer-to-peer accommodation.

This study is the first attempt to adopt SET to explain the importance of online host–guest interactions in influencing listing popularity as well as examine the moderating role of listing price and reputation on the above relationship.

]]>
The influence of online host–guest interaction on listing popularity in peer-to-peer accommodation: the role of listing price and reputation10.1108/ITP-11-2022-0832Information Technology & People2023-08-25© 2023 Emerald Publishing LimitedFuzhen LiuKee-hung LaiChaocheng HeInformation Technology & Peopleahead-of-printahead-of-print2023-08-2510.1108/ITP-11-2022-0832https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0832/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Investigating engagement and burnout of gig-workers in the age of algorithms: an empirical study in digital labor platformshttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0873/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestDigital labor platforms (DLPs) are transforming the nature of the work for an increasing number of workers, especially through extensively employing automated algorithms for performing managerial functions. In this novel working setting – characterized by algorithmic governance, and automatic matching, rewarding and punishing mechanisms – gig-workers play an essential role in providing on-demand services for final customers. Since gig-workers’ continued participation is crucial for sustainable service delivery in platform contexts, this study aims to identify and examine the antecedents of their working outcomes, including burnout and engagement. We suggested a theoretical framework, grounded in the job demands-resources heuristic model to investigate how the interplay of job demands and resources, resulting from working in DLPs, explains gig-workers’ engagement and burnout. We further empirically tested the proposed model to understand how DLPs' working conditions, in particular their algorithmic management, impact gig-working outcomes. Our findings indicate that job resources – algorithmic compensation, work autonomy and information sharing– have significant positive effects on gig-workers’ engagement. Furthermore, our results demonstrate that job insecurity, unsupportive algorithmic interaction (UAI) and algorithmic injustice significantly contribute to gig-workers’ burnout. Notably, we found that job resources substantially, but differently, moderate the relationship between job demands and gig-workers’ burnout. This study contributes a theoretically accurate and empirically grounded understanding of two clusters of conditions – job demands and resources– as a result of algorithmic management practice in DLPs. We developed nuanced insights into how such conditions are evaluated by gig-workers and shape their engagement or burnout in DLP emerging work settings. We further uncovered that in gig-working context, resources do not similarly buffer against the negative effects of job demands.Investigating engagement and burnout of gig-workers in the age of algorithms: an empirical study in digital labor platforms
Nastaran Hajiheydari, Mohammad Soltani Delgosha
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Digital labor platforms (DLPs) are transforming the nature of the work for an increasing number of workers, especially through extensively employing automated algorithms for performing managerial functions. In this novel working setting – characterized by algorithmic governance, and automatic matching, rewarding and punishing mechanisms – gig-workers play an essential role in providing on-demand services for final customers. Since gig-workers’ continued participation is crucial for sustainable service delivery in platform contexts, this study aims to identify and examine the antecedents of their working outcomes, including burnout and engagement.

We suggested a theoretical framework, grounded in the job demands-resources heuristic model to investigate how the interplay of job demands and resources, resulting from working in DLPs, explains gig-workers’ engagement and burnout. We further empirically tested the proposed model to understand how DLPs' working conditions, in particular their algorithmic management, impact gig-working outcomes.

Our findings indicate that job resources – algorithmic compensation, work autonomy and information sharing– have significant positive effects on gig-workers’ engagement. Furthermore, our results demonstrate that job insecurity, unsupportive algorithmic interaction (UAI) and algorithmic injustice significantly contribute to gig-workers’ burnout. Notably, we found that job resources substantially, but differently, moderate the relationship between job demands and gig-workers’ burnout.

This study contributes a theoretically accurate and empirically grounded understanding of two clusters of conditions – job demands and resources– as a result of algorithmic management practice in DLPs. We developed nuanced insights into how such conditions are evaluated by gig-workers and shape their engagement or burnout in DLP emerging work settings. We further uncovered that in gig-working context, resources do not similarly buffer against the negative effects of job demands.

]]>
Investigating engagement and burnout of gig-workers in the age of algorithms: an empirical study in digital labor platforms10.1108/ITP-11-2022-0873Information Technology & People2024-02-28© 2024 Emerald Publishing LimitedNastaran HajiheydariMohammad Soltani DelgoshaInformation Technology & Peopleahead-of-printahead-of-print2024-02-2810.1108/ITP-11-2022-0873https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0873/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
Towards the formation of we-intention to continue playing mobile multiplayer games: importance of gamification design elements and social play habit roleshttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0904/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of this study is to explore the relationship of gamification design elements on social play habit and we-intention to continue playing in a mobile multiplayer game context. The study further intends to reveal the mediating role of social play habit in the relationship between gamification design elements and we-intention to continue playing. The proposed model was empirically evaluated using survey data collected from 292 PUBG users based in Malaysia. PLS-SEM analysis was used to assess the model since it includes formative and reflective constructs. The results indicated that gamification design elements significantly affect social play habit in a positive direction. In the simultaneous condition, social play habit also significantly affects the we-intention to continue playing the mobile multiplayer game. However, these three elements of gamification design did not significantly affect the formation of we-intention to continue playing in the context of mobile multiplayer games. Notably, social play habit was found to fully mediate the relationships between immersive-related interaction, achievement-related interaction, social-related interaction and we-intention to continue playing. This study highlights the importance of social play habits as a factor linking the relationship between gamification design elements and we-intention to continue playing. In addition, this study also provides significant insights for the game creators to emphasise the gamification design elements so that the sustainability of the game can be secured from the perspective of retaining the current users through the social play habit element. The study is noteworthy because it is the first attempt to use gamification design elements to explain how social play habit affect the formation of we-intention to continue playing in the setting of a mobile multiplayer game environment. In addition, the findings may add to the body of knowledge in the field of gamification theory.Towards the formation of we-intention to continue playing mobile multiplayer games: importance of gamification design elements and social play habit roles
Mohd Hanafi Azman Ong, Nur Syafikah Ibrahim
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of this study is to explore the relationship of gamification design elements on social play habit and we-intention to continue playing in a mobile multiplayer game context. The study further intends to reveal the mediating role of social play habit in the relationship between gamification design elements and we-intention to continue playing.

The proposed model was empirically evaluated using survey data collected from 292 PUBG users based in Malaysia. PLS-SEM analysis was used to assess the model since it includes formative and reflective constructs.

The results indicated that gamification design elements significantly affect social play habit in a positive direction. In the simultaneous condition, social play habit also significantly affects the we-intention to continue playing the mobile multiplayer game. However, these three elements of gamification design did not significantly affect the formation of we-intention to continue playing in the context of mobile multiplayer games. Notably, social play habit was found to fully mediate the relationships between immersive-related interaction, achievement-related interaction, social-related interaction and we-intention to continue playing.

This study highlights the importance of social play habits as a factor linking the relationship between gamification design elements and we-intention to continue playing. In addition, this study also provides significant insights for the game creators to emphasise the gamification design elements so that the sustainability of the game can be secured from the perspective of retaining the current users through the social play habit element.

The study is noteworthy because it is the first attempt to use gamification design elements to explain how social play habit affect the formation of we-intention to continue playing in the setting of a mobile multiplayer game environment. In addition, the findings may add to the body of knowledge in the field of gamification theory.

]]>
Towards the formation of we-intention to continue playing mobile multiplayer games: importance of gamification design elements and social play habit roles10.1108/ITP-11-2022-0904Information Technology & People2024-01-12© 2023 Emerald Publishing LimitedMohd Hanafi Azman OngNur Syafikah IbrahimInformation Technology & Peopleahead-of-printahead-of-print2024-01-1210.1108/ITP-11-2022-0904https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0904/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Principles for analyzing, designing and evaluating the situated use of intelligent machineshttps://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0905/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe lack of conceptual approaches for organizing and expressing capabilities, usage and impact of intelligent machines (IMs) in work settings is an obstacle to moving beyond isolated case examples, domain-specific studies, 2 × 2 frameworks and expert opinion in discussions of IMs and work. This paper's purpose is to illuminate many issues that often are not addressed directly in research, practice or punditry related to IMs. It pursues that purpose by presenting an integrated approach for identifying and organizing important aspects of analysis and evaluation related to IMs in work settings.  This paper integrates previously published ideas related to work systems (WSs), smart devices and systems, facets of work, roles and responsibilities of information systems, interactions between people and machines and a range of criteria for evaluating system performance. Eight principles outline a straightforward and flexible approach for analyzing and evaluating IMs and the WSs that use them. Those principles are based on the above ideas. This paper provides a novel approach for identifying design choices for situated use of IMs. The breadth, depth and integration of this approach address a gap in existing literature, which rarely aspires to this paper’s thoroughness in combining ideas that support the description, analysis, design and evaluation of situated uses of IMs.Principles for analyzing, designing and evaluating the situated use of intelligent machines
Steven Alter
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The lack of conceptual approaches for organizing and expressing capabilities, usage and impact of intelligent machines (IMs) in work settings is an obstacle to moving beyond isolated case examples, domain-specific studies, 2 × 2 frameworks and expert opinion in discussions of IMs and work. This paper's purpose is to illuminate many issues that often are not addressed directly in research, practice or punditry related to IMs. It pursues that purpose by presenting an integrated approach for identifying and organizing important aspects of analysis and evaluation related to IMs in work settings. 

This paper integrates previously published ideas related to work systems (WSs), smart devices and systems, facets of work, roles and responsibilities of information systems, interactions between people and machines and a range of criteria for evaluating system performance.

Eight principles outline a straightforward and flexible approach for analyzing and evaluating IMs and the WSs that use them. Those principles are based on the above ideas.

This paper provides a novel approach for identifying design choices for situated use of IMs. The breadth, depth and integration of this approach address a gap in existing literature, which rarely aspires to this paper’s thoroughness in combining ideas that support the description, analysis, design and evaluation of situated uses of IMs.

]]>
Principles for analyzing, designing and evaluating the situated use of intelligent machines10.1108/ITP-11-2022-0905Information Technology & People2024-02-19© 2024 Emerald Publishing LimitedSteven AlterInformation Technology & Peopleahead-of-printahead-of-print2024-02-1910.1108/ITP-11-2022-0905https://www.emerald.com/insight/content/doi/10.1108/ITP-11-2022-0905/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
Managerial approaches and sociotechnical implications of the adoption of consumer-facing in-store technology in organizational processes: the case of fashion retailhttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2021-0978/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestFashion retailers have increasingly adopted consumer-facing in-store technology (CFIT) to enhance the customer experience/service provision. This paper aims to explore managerial experiences and sociotechnical implications of introducing these technologies into organizational working processes. This study draws on interpretive analysis of semi-structured interviews with 74 senior fashion retail industry practitioners, technology providers and consultants to understand managerial perspectives on technological innovation issues. Endogenous and exogenous factors act as drivers or barriers to CFIT adoption and are influenced by strategic and tactical motives. Key issues that retail managers encounter include challenges in aligning technology implementation with retailer brand image to manage risk and reputation, with additional complexity arising from different internal and/or external actors involved, as well as required levels of change in organizational structure. This study contributes an empirically derived framework identifying reasons for – and the drivers/barriers influencing – fashion retailers' CFIT adoption, classifying three broad approaches to CFIT adoption: embedded, transformative and opportunistic.Managerial approaches and sociotechnical implications of the adoption of consumer-facing in-store technology in organizational processes: the case of fashion retail
Francesca Bonetti, Patsy Perry, Gary Warnaby
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Fashion retailers have increasingly adopted consumer-facing in-store technology (CFIT) to enhance the customer experience/service provision. This paper aims to explore managerial experiences and sociotechnical implications of introducing these technologies into organizational working processes.

This study draws on interpretive analysis of semi-structured interviews with 74 senior fashion retail industry practitioners, technology providers and consultants to understand managerial perspectives on technological innovation issues.

Endogenous and exogenous factors act as drivers or barriers to CFIT adoption and are influenced by strategic and tactical motives. Key issues that retail managers encounter include challenges in aligning technology implementation with retailer brand image to manage risk and reputation, with additional complexity arising from different internal and/or external actors involved, as well as required levels of change in organizational structure.

This study contributes an empirically derived framework identifying reasons for – and the drivers/barriers influencing – fashion retailers' CFIT adoption, classifying three broad approaches to CFIT adoption: embedded, transformative and opportunistic.

]]>
Managerial approaches and sociotechnical implications of the adoption of consumer-facing in-store technology in organizational processes: the case of fashion retail10.1108/ITP-12-2021-0978Information Technology & People2023-09-12© 2023 Emerald Publishing LimitedFrancesca BonettiPatsy PerryGary WarnabyInformation Technology & Peopleahead-of-printahead-of-print2023-09-1210.1108/ITP-12-2021-0978https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2021-0978/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
The failure of online endorsement systems in investment communities: evidence from Yahoo! Financehttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2021-0993/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestIn prior literature, online endorsement system allowing the users to “like” or “dislike” shared information is found very useful in information filtering and trust elicitation in most social networks. This paper shows that such systems could fail in the context of investment communities due to several psychological biases. This study develops a series of regression analyses to model the “like”/“dislike” voting process and whether or not such endorsement distinguishes between valuable information and noise. Trading simulations are also used to validate the practical implications of the findings. The main findings of this research are twofold: (1) in the context of investment communities, online endorsement system fails to signify value-relevant information and (2) bullish information and “wisdom over the past event” information receive more “likes” and fewer “dislikes” on average, but they underperform in stock market price discovery. This study demonstrates that biased endorsement may lead to the failure of the online endorsement system as information gatekeeper in investment communities. Two underlying mechanisms are proposed and tested. This study opens up new research opportunities to investigate the causes of biased endorsement in online environment and motivates the development of alternative information filtering systems.The failure of online endorsement systems in investment communities: evidence from Yahoo! Finance
Peng Xie, Hongwei Du, Jiming Wu, Ting Chen
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

In prior literature, online endorsement system allowing the users to “like” or “dislike” shared information is found very useful in information filtering and trust elicitation in most social networks. This paper shows that such systems could fail in the context of investment communities due to several psychological biases.

This study develops a series of regression analyses to model the “like”/“dislike” voting process and whether or not such endorsement distinguishes between valuable information and noise. Trading simulations are also used to validate the practical implications of the findings.

The main findings of this research are twofold: (1) in the context of investment communities, online endorsement system fails to signify value-relevant information and (2) bullish information and “wisdom over the past event” information receive more “likes” and fewer “dislikes” on average, but they underperform in stock market price discovery.

This study demonstrates that biased endorsement may lead to the failure of the online endorsement system as information gatekeeper in investment communities. Two underlying mechanisms are proposed and tested. This study opens up new research opportunities to investigate the causes of biased endorsement in online environment and motivates the development of alternative information filtering systems.

]]>
The failure of online endorsement systems in investment communities: evidence from Yahoo! Finance10.1108/ITP-12-2021-0993Information Technology & People2023-08-01© 2023 Emerald Publishing LimitedPeng XieHongwei DuJiming WuTing ChenInformation Technology & Peopleahead-of-printahead-of-print2023-08-0110.1108/ITP-12-2021-0993https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2021-0993/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Transactive memory systems in superteams: the effect of an intelligent assistant in virtual teamshttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0918/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestResearchers explore the impact of an intelligent assistant in virtual teams by applying the theoretical lens of a transactive memory system (TMS) to understand the relationships between trust in a specific technology, knowledge sharing and knowledge application. An online survey was administered to a Qualtrics-curated panel of individual, US-based virtual team members utilizing an intelligent assistant with team collaboration software. Partial least squares structural equation modeling (PLS-SEM) was utilized to examine the hypothesized relationships of interest. Results suggest that knowledge application is strongly influenced by trust in a specific technology and knowledge sharing. Additionally, a transactive memory system positively increases trust in the intelligent assistant, and similarly, trust in the intelligent assistant has a significant positive relationship with knowledge sharing. The research model contributes to our understanding of the impact of an intelligent assistant in virtual teams. Although the transactive memory system construct has been explored in various contexts and models, few have explored the impact of an intelligent assistant and trust in a specific technology.Transactive memory systems in superteams: the effect of an intelligent assistant in virtual teams
Denise J. McWilliams, Adriane B. Randolph
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Researchers explore the impact of an intelligent assistant in virtual teams by applying the theoretical lens of a transactive memory system (TMS) to understand the relationships between trust in a specific technology, knowledge sharing and knowledge application.

An online survey was administered to a Qualtrics-curated panel of individual, US-based virtual team members utilizing an intelligent assistant with team collaboration software. Partial least squares structural equation modeling (PLS-SEM) was utilized to examine the hypothesized relationships of interest.

Results suggest that knowledge application is strongly influenced by trust in a specific technology and knowledge sharing. Additionally, a transactive memory system positively increases trust in the intelligent assistant, and similarly, trust in the intelligent assistant has a significant positive relationship with knowledge sharing.

The research model contributes to our understanding of the impact of an intelligent assistant in virtual teams. Although the transactive memory system construct has been explored in various contexts and models, few have explored the impact of an intelligent assistant and trust in a specific technology.

]]>
Transactive memory systems in superteams: the effect of an intelligent assistant in virtual teams10.1108/ITP-12-2022-0918Information Technology & People2024-02-13© 2024 Emerald Publishing LimitedDenise J. McWilliamsAdriane B. RandolphInformation Technology & Peopleahead-of-printahead-of-print2024-02-1310.1108/ITP-12-2022-0918https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0918/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2024 Emerald Publishing Limited
Role of social media news consumption in cultivating opinion polarizationhttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0942/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis paper aims to investigate the mechanisms through which social media news consumption across different platforms leads to opinion polarization in society. To this end, the authors draw from cultivation theory to examine whether social media news consumption imparts a mainstreaming or resonance effect. Media consumption imparts a mainstreaming effect if frequent users, regardless of their social identity, develop homogenous attitudes about issues, whereas resonance is at play if there is a differing cultivation effect on various social groups depending on their relatability of life experiences. The authors conduct the study in the developing context of India, using a population survey dataset from 2019. Regression-based mediation and moderation analyses were carried out to test the hypotheses. The findings reveal that resonance is the most prominent mechanism through which social media news consumption cultivates opinion polarization, contrary to the mainstreaming effect imparted by television. Further, WhatsApp use was found to strengthen the polarizing effect of overall social media news consumption, while YouTube use weakened the cultivation of polarization. The paper unearths how social media news consumption influences the opinion polarization of various social groups differently. The authors also find the differential effect of specific platform use. These findings have the potential to inform policymakers and developers about how to mitigate the detrimental effects of platform-based political persuasion. This study offers significant contributions. First, the authors explain social media-induced polarization using the novel theoretical lens of cultivation. Second, the authors find that social media and television news consumption differ in their polarizing effects. Third, the authors find that while WhatsApp use amplifies the polarizing effect of social media news consumption, YouTube use weakens it.Role of social media news consumption in cultivating opinion polarization
Labeeba Kothur, Vidushi Pandey
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This paper aims to investigate the mechanisms through which social media news consumption across different platforms leads to opinion polarization in society. To this end, the authors draw from cultivation theory to examine whether social media news consumption imparts a mainstreaming or resonance effect. Media consumption imparts a mainstreaming effect if frequent users, regardless of their social identity, develop homogenous attitudes about issues, whereas resonance is at play if there is a differing cultivation effect on various social groups depending on their relatability of life experiences.

The authors conduct the study in the developing context of India, using a population survey dataset from 2019. Regression-based mediation and moderation analyses were carried out to test the hypotheses.

The findings reveal that resonance is the most prominent mechanism through which social media news consumption cultivates opinion polarization, contrary to the mainstreaming effect imparted by television. Further, WhatsApp use was found to strengthen the polarizing effect of overall social media news consumption, while YouTube use weakened the cultivation of polarization.

The paper unearths how social media news consumption influences the opinion polarization of various social groups differently. The authors also find the differential effect of specific platform use. These findings have the potential to inform policymakers and developers about how to mitigate the detrimental effects of platform-based political persuasion.

This study offers significant contributions. First, the authors explain social media-induced polarization using the novel theoretical lens of cultivation. Second, the authors find that social media and television news consumption differ in their polarizing effects. Third, the authors find that while WhatsApp use amplifies the polarizing effect of social media news consumption, YouTube use weakens it.

]]>
Role of social media news consumption in cultivating opinion polarization10.1108/ITP-12-2022-0942Information Technology & People2023-12-06© 2023 Emerald Publishing LimitedLabeeba KothurVidushi PandeyInformation Technology & Peopleahead-of-printahead-of-print2023-12-0610.1108/ITP-12-2022-0942https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0942/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Knowledge management as an asset for operational processes in marginal healthcare centershttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0944/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThis research paper aims to explore the added value of knowledge management (KM) and its antecedents for innovation and organizational performance (OP) in marginal healthcare organizations. Using insights from the resource-based view and knowledge-based theory of the firm, the model explains the effects of technology capabilities (TC) and organizational culture (OC) on the KM process, process innovation (PIN), administrative innovation (AIN) and OP. The authors used partial least squares structural equation modeling (PLS-SEM) and fuzzy-set qualitative comparative analysis (fsQCA) to analyze data collected from 168 healthcare practitioners in Cameroon using a survey. The authors reveal that TC and OC positively impact some KM components. Knowledge sharing (KS), knowledge acquisition (KA) and responsiveness to knowledge (RK) influence PIN, while only PIN and KA influence OP. FsQCA provided several configurations that lead to high OP within healthcare centers. As a result, the results are adaptable to any healthcare center that wishes to set up one or more KM processes. Given that the results will help the health workforce make concerted decisions about medical care, the authors contribute significantly to the definition and optimization of KM in healthcare by implementing various processes and policies to ensure the continued existence of high-quality and outstanding healthcare systems. The KM propositions will enable healthcare centers to: (1) improve the quality of patient care through collegiality in medical practice; (2) optimize processes in the patient care chain; and (3) leverage knowledge gained though knowledge sharing among the medical team. The propositions open up avenues for future research in addition to providing practical implications for healthcare center practitioners. This study sheds new empirical light on the relationships between KM antecedents and processes, innovation and OP in healthcare centers. This research is one of the few to examine the relationship between TC, OC, KM processes, innovation and OP in developing countries. This paper aims to fill this gap and inform future research concerning KM in the healthcare sector. Further, this study goes beyond testing the PLS-SEM approach's hypotheses by applying fsQCA to provide practical and comprehensive knowledge on how to increase the efficiency of a healthcare center through KM.Knowledge management as an asset for operational processes in marginal healthcare centers
Jean Robert Kala Kamdjoug, Serge-Lopez Wamba-Taguimdje, Martin Tchoukoua
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

This research paper aims to explore the added value of knowledge management (KM) and its antecedents for innovation and organizational performance (OP) in marginal healthcare organizations.

Using insights from the resource-based view and knowledge-based theory of the firm, the model explains the effects of technology capabilities (TC) and organizational culture (OC) on the KM process, process innovation (PIN), administrative innovation (AIN) and OP. The authors used partial least squares structural equation modeling (PLS-SEM) and fuzzy-set qualitative comparative analysis (fsQCA) to analyze data collected from 168 healthcare practitioners in Cameroon using a survey.

The authors reveal that TC and OC positively impact some KM components. Knowledge sharing (KS), knowledge acquisition (KA) and responsiveness to knowledge (RK) influence PIN, while only PIN and KA influence OP. FsQCA provided several configurations that lead to high OP within healthcare centers. As a result, the results are adaptable to any healthcare center that wishes to set up one or more KM processes.

Given that the results will help the health workforce make concerted decisions about medical care, the authors contribute significantly to the definition and optimization of KM in healthcare by implementing various processes and policies to ensure the continued existence of high-quality and outstanding healthcare systems. The KM propositions will enable healthcare centers to: (1) improve the quality of patient care through collegiality in medical practice; (2) optimize processes in the patient care chain; and (3) leverage knowledge gained though knowledge sharing among the medical team. The propositions open up avenues for future research in addition to providing practical implications for healthcare center practitioners.

This study sheds new empirical light on the relationships between KM antecedents and processes, innovation and OP in healthcare centers. This research is one of the few to examine the relationship between TC, OC, KM processes, innovation and OP in developing countries. This paper aims to fill this gap and inform future research concerning KM in the healthcare sector. Further, this study goes beyond testing the PLS-SEM approach's hypotheses by applying fsQCA to provide practical and comprehensive knowledge on how to increase the efficiency of a healthcare center through KM.

]]>
Knowledge management as an asset for operational processes in marginal healthcare centers10.1108/ITP-12-2022-0944Information Technology & People2023-10-05© 2023 Emerald Publishing LimitedJean Robert Kala KamdjougSerge-Lopez Wamba-TaguimdjeMartin TchoukouaInformation Technology & Peopleahead-of-printahead-of-print2023-10-0510.1108/ITP-12-2022-0944https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0944/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Do industrial robots matter for corporate environmental governance? Evidence from Chinese firmshttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0963/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe connection between digital manufacturing technologies (Industry 4.0) and the environment has sparked discussions on firms' disclosure of negative information on pollutant emissions and the pursuit of positive environmental outcomes. However, very few studies explore how it relates to a firm's robot usage and its mechanism. The purpose of this paper is to investigate the impacts of robot penetration on firms' environmental governance in China. The ordered probit model (and probit model) are employed and empirically tested with a sample of 1,579 Chinese listed firms from 2010 to 2019. The study reveals a negative relationship between robot usage and the disclosure of negative indicators and a U-shaped relationship between robot usage and positive environmental outcomes. Among the sample, nonstate-owned enterprises (SOEs) display unsatisfactory performance, while heavily polluting industries disclose more information on pollutant emissions. The robot–environmental governance nexus is conditional on firm size, capital intensity and local economic development. The study proposes a fresh view of corporate environmental governance to assess the environmental implications of robot adoption. It also contributes to identifying the curvilinear, moderating and heterogenous effects in the robot–environment nexus. The results provide rich policy implications for the development of industrial intelligence and corporate environmental governance in the circular economy (CE) context.Do industrial robots matter for corporate environmental governance? Evidence from Chinese firms
Fushu Luan, Wenhua Qi, Wentao Zhang, Victor Chang
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The connection between digital manufacturing technologies (Industry 4.0) and the environment has sparked discussions on firms' disclosure of negative information on pollutant emissions and the pursuit of positive environmental outcomes. However, very few studies explore how it relates to a firm's robot usage and its mechanism. The purpose of this paper is to investigate the impacts of robot penetration on firms' environmental governance in China.

The ordered probit model (and probit model) are employed and empirically tested with a sample of 1,579 Chinese listed firms from 2010 to 2019.

The study reveals a negative relationship between robot usage and the disclosure of negative indicators and a U-shaped relationship between robot usage and positive environmental outcomes. Among the sample, nonstate-owned enterprises (SOEs) display unsatisfactory performance, while heavily polluting industries disclose more information on pollutant emissions. The robot–environmental governance nexus is conditional on firm size, capital intensity and local economic development.

The study proposes a fresh view of corporate environmental governance to assess the environmental implications of robot adoption. It also contributes to identifying the curvilinear, moderating and heterogenous effects in the robot–environment nexus. The results provide rich policy implications for the development of industrial intelligence and corporate environmental governance in the circular economy (CE) context.

]]>
Do industrial robots matter for corporate environmental governance? Evidence from Chinese firms10.1108/ITP-12-2022-0963Information Technology & People2024-01-02© 2023 Emerald Publishing LimitedFushu LuanWenhua QiWentao ZhangVictor ChangInformation Technology & Peopleahead-of-printahead-of-print2024-01-0210.1108/ITP-12-2022-0963https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0963/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Improving ethical usage of corporate data in higher education: Enhanced Enterprise Data Ethics Frameworkhttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0971/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe purpose of this study is to address the generalised lack of guidance on ethical treatment of corporate (e.g. non-research) data in higher education institutions, by focusing on the case of the University of Queensland (Brisbane, Australia). No actionable framework is currently available in the country to govern the ethical usage of corporate data. As such, this research takes a stakeholder-centred approach to data ethics; the lived experience of the stakeholders involved coupled with a theory-based ethical framework allowed the authors build to build a framework to guide ethical data practice. Adopting a revised canonical action research approach focused on intervention on the context, the authors conducted a review of the literature on ethical usage of data in higher education institutions; administered one survey to university students (n = 168); and facilitated three workshops with professional staff (two) and students (one). Collected data highlighted how, among other themes, the role and ethical importance of transparency was the dominant claim among all stakeholder groups. Findings helped the authors develop an Enhanced Enterprise Data Ethics Framework (EEDEF) emphasising transparency and stakeholder-centricity. Legislation is the driver to regulate the use of corporate data in higher education; however, this can be problematic because legislation is retrospective, lacks normativity and offers scarce directions for cases that do not exactly follow within the legislative mandate. In light of these regulatory limitations, the authors’ EEDEF offers operators guidance on how to ethically manage corporate data in the higher education environment. This study fills gaps in praxis and theory; that is the lack of literature and guiding ethical frameworks to inform data practice in higher education. This research fosters a more ethical data management by virtue of genuine and authentic engagement with stakeholders and emphasises the importance of strategic decision-making and maturity of data culture in the higher education sector.Improving ethical usage of corporate data in higher education: Enhanced Enterprise Data Ethics Framework
Trinity McNicol, Bailey Carthouser, Ivano Bongiovanni, Sasenka Abeysooriya
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The purpose of this study is to address the generalised lack of guidance on ethical treatment of corporate (e.g. non-research) data in higher education institutions, by focusing on the case of the University of Queensland (Brisbane, Australia). No actionable framework is currently available in the country to govern the ethical usage of corporate data. As such, this research takes a stakeholder-centred approach to data ethics; the lived experience of the stakeholders involved coupled with a theory-based ethical framework allowed the authors build to build a framework to guide ethical data practice.

Adopting a revised canonical action research approach focused on intervention on the context, the authors conducted a review of the literature on ethical usage of data in higher education institutions; administered one survey to university students (n = 168); and facilitated three workshops with professional staff (two) and students (one).

Collected data highlighted how, among other themes, the role and ethical importance of transparency was the dominant claim among all stakeholder groups. Findings helped the authors develop an Enhanced Enterprise Data Ethics Framework (EEDEF) emphasising transparency and stakeholder-centricity.

Legislation is the driver to regulate the use of corporate data in higher education; however, this can be problematic because legislation is retrospective, lacks normativity and offers scarce directions for cases that do not exactly follow within the legislative mandate. In light of these regulatory limitations, the authors’ EEDEF offers operators guidance on how to ethically manage corporate data in the higher education environment.

This study fills gaps in praxis and theory; that is the lack of literature and guiding ethical frameworks to inform data practice in higher education. This research fosters a more ethical data management by virtue of genuine and authentic engagement with stakeholders and emphasises the importance of strategic decision-making and maturity of data culture in the higher education sector.

]]>
Improving ethical usage of corporate data in higher education: Enhanced Enterprise Data Ethics Framework10.1108/ITP-12-2022-0971Information Technology & People2023-08-29© 2023 Emerald Publishing LimitedTrinity McNicolBailey CarthouserIvano BongiovanniSasenka AbeysooriyaInformation Technology & Peopleahead-of-printahead-of-print2023-08-2910.1108/ITP-12-2022-0971https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0971/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
Social media as a behavior depolarizer: evidence from Russia–Ukraine conflicthttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0972/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestSocial media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors. This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling. The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude. For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis. While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict
Jitendra Yadav, Kuldeep Singh, Nripendra P. Rana, Denis Dennehy
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.

This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.

The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.

For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.

While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.

]]>
Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict10.1108/ITP-12-2022-0972Information Technology & People2024-01-09© 2023 Emerald Publishing LimitedJitendra YadavKuldeep SinghNripendra P. RanaDenis DennehyInformation Technology & Peopleahead-of-printahead-of-print2024-01-0910.1108/ITP-12-2022-0972https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0972/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited
How do enterprise social media affordances affect knowledge sharing within project teams: the social cognitive theory viewhttps://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0990/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatestThe use of enterprise social media (ESM) can promote knowledge sharing within project teams. However, the potential mechanism of ESM affordances influencing knowledge sharing has not been fully studied. This paper aims to develop a theoretical model to explore how individual psychological cognition and environmental factors affect ESM affordances. An empirical research using ESM applications was conducted in China, and 214 valid responses were collected for data analysis. Partial least squares structural equation modeling method was performed to test the theoretical model and hypotheses. The results suggest the following implications: (1) the visibility, persistence, editability and association of ESM affordances all have a positive effect on the effectiveness of knowledge sharing in project teams. (2) The psychological safety and psychological empowerment of team members have a significant positive influence on ESM affordances. (3) The project task complexity positively moderates the positive effects which the visibility and association have on the effectiveness of knowledge sharing, and negatively moderates the positive relationship between the editability and knowledge sharing. Based on the social cognitive theory, this paper highlights the roles of psychological cognitive factors and project task context in the effect of ESM affordances having on knowledge sharing within project teams. Moreover, it provides valuable suggestions for project managers in project and knowledge management.How do enterprise social media affordances affect knowledge sharing within project teams: the social cognitive theory view
Xu Ren, Xiangmei Sun
Information Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-

The use of enterprise social media (ESM) can promote knowledge sharing within project teams. However, the potential mechanism of ESM affordances influencing knowledge sharing has not been fully studied. This paper aims to develop a theoretical model to explore how individual psychological cognition and environmental factors affect ESM affordances.

An empirical research using ESM applications was conducted in China, and 214 valid responses were collected for data analysis. Partial least squares structural equation modeling method was performed to test the theoretical model and hypotheses.

The results suggest the following implications: (1) the visibility, persistence, editability and association of ESM affordances all have a positive effect on the effectiveness of knowledge sharing in project teams. (2) The psychological safety and psychological empowerment of team members have a significant positive influence on ESM affordances. (3) The project task complexity positively moderates the positive effects which the visibility and association have on the effectiveness of knowledge sharing, and negatively moderates the positive relationship between the editability and knowledge sharing.

Based on the social cognitive theory, this paper highlights the roles of psychological cognitive factors and project task context in the effect of ESM affordances having on knowledge sharing within project teams. Moreover, it provides valuable suggestions for project managers in project and knowledge management.

]]>
How do enterprise social media affordances affect knowledge sharing within project teams: the social cognitive theory view10.1108/ITP-12-2022-0990Information Technology & People2023-09-13© 2023 Emerald Publishing LimitedXu RenXiangmei SunInformation Technology & Peopleahead-of-printahead-of-print2023-09-1310.1108/ITP-12-2022-0990https://www.emerald.com/insight/content/doi/10.1108/ITP-12-2022-0990/full/html?utm_source=rss&utm_medium=feed&utm_campaign=rss_journalLatest© 2023 Emerald Publishing Limited