首页 > 最新文献

Information Technology & People最新文献

英文 中文
Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome 减少数据隐私泄露:相关前因后果的实证研究
Pub Date : 2024-04-08 DOI: 10.1108/itp-07-2022-0516
P. Ifinedo, Francine Vachon, Anteneh Ayanso
PurposeThis paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.Design/methodology/approachA cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.FindingsThe exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.Research limitations/implicationsThis study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.Practical implicationsThe results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.Originality/valueAntecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
设计/方法/途径采用横向调查的方式,了解参与者对相关外生和内生因素的看法,这些因素是根据前因-隐私关注-结果 (APCO) 模型和社会认知理论开发的。研究结果外部隐私培训和外部隐私自我评估工具等外生因素对本研究的内生因素,即个人隐私意识、为隐私问题分配的组织资源以及与隐私法相关的群体行为,产生了显著的积极影响。此外,数据隐私泄露的近端决定因素(因果结构)受到个人隐私意识、与隐私法律相关的群体行为以及与隐私问题相关的组织资源分配的负面影响。研究局限/启示本研究通过强调个人和环境因素对数据隐私泄露的影响,为正在萌芽的数据隐私泄露文献做出了贡献。外部隐私培训和隐私自我评估工具的作用显而易见。原创性/价值数据隐私泄露的前因一直未得到充分探索。本文是首批阐明特定外生和内生前因(包括个人和环境要求)对数据隐私泄露所起作用的文章之一。
{"title":"Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome","authors":"P. Ifinedo, Francine Vachon, Anteneh Ayanso","doi":"10.1108/itp-07-2022-0516","DOIUrl":"https://doi.org/10.1108/itp-07-2022-0516","url":null,"abstract":"PurposeThis paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.Design/methodology/approachA cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.FindingsThe exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.Research limitations/implicationsThis study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.Practical implicationsThe results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.Originality/valueAntecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framing and feelings on social media: the futures of work and intelligent machines 社交媒体上的框架与情感:工作与智能机器的未来
Pub Date : 2024-04-05 DOI: 10.1108/itp-01-2023-0049
Ayse Ocal, Kevin Crowston
PurposeResearch on artificial intelligence (AI) and its potential effects on the workplace is increasing. How AI and the futures of work are framed in traditional media has been examined in prior studies, but current research has not gone far enough in examining how AI is framed on social media. This paper aims to fill this gap by examining how people frame the futures of work and intelligent machines when they post on social media.Design/methodology/approachWe investigate public interpretations, assumptions and expectations, referring to framing expressed in social media conversations. We also coded the emotions and attitudes expressed in the text data. A corpus consisting of 998 unique Reddit post titles and their corresponding 16,611 comments was analyzed using computer-aided textual analysis comprising a BERTopic model and two BERT text classification models, one for emotion and the other for sentiment analysis, supported by human judgment.FindingsDifferent interpretations, assumptions and expectations were found in the conversations. Three subframes were analyzed in detail under the overarching frame of the New World of Work: (1) general impacts of intelligent machines on society, (2) undertaking of tasks (augmentation and substitution) and (3) loss of jobs. The general attitude observed in conversations was slightly positive, and the most common emotion category was curiosity.Originality/valueFindings from this research can uncover public needs and expectations regarding the future of work with intelligent machines. The findings may also help shape research directions about futures of work. Furthermore, firms, organizations or industries may employ framing methods to analyze customers’ or workers’ responses or even influence the responses. Another contribution of this work is the application of framing theory to interpreting how people conceptualize the future of work with intelligent machines.
目的有关人工智能(AI)及其对工作场所的潜在影响的研究日益增多。以前的研究已经探讨了传统媒体如何报道人工智能和工作的未来,但目前的研究在探讨社交媒体如何报道人工智能方面还不够深入。本文旨在通过研究人们在社交媒体上发布信息时是如何构思工作和智能机器的未来的,从而填补这一空白。设计/方法/途径我们参考社交媒体对话中表达的构思,调查公众的解释、假设和期望。我们还对文本数据中表达的情感和态度进行了编码。我们使用计算机辅助文本分析,包括一个 BERTopic 模型和两个 BERT 文本分类模型(一个用于情感分析,另一个用于情绪分析),并辅以人工判断,分析了由 998 个独特的 Reddit 帖子标题及其相应的 16,611 条评论组成的语料库。我们在 "工作新世界 "这一总体框架下详细分析了三个子框架:(1) 智能机器对社会的总体影响;(2) 任务的承担(增强和替代);(3) 工作岗位的丧失。在对话中观察到的普遍态度略显积极,最常见的情绪类别是好奇。研究结果还有助于确定未来工作的研究方向。此外,企业、组织或行业可以采用框架方法来分析客户或工人的反应,甚至影响他们的反应。这项工作的另一个贡献是应用框架理论来解释人们是如何构思未来智能机器工作的。
{"title":"Framing and feelings on social media: the futures of work and intelligent machines","authors":"Ayse Ocal, Kevin Crowston","doi":"10.1108/itp-01-2023-0049","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0049","url":null,"abstract":"PurposeResearch on artificial intelligence (AI) and its potential effects on the workplace is increasing. How AI and the futures of work are framed in traditional media has been examined in prior studies, but current research has not gone far enough in examining how AI is framed on social media. This paper aims to fill this gap by examining how people frame the futures of work and intelligent machines when they post on social media.Design/methodology/approachWe investigate public interpretations, assumptions and expectations, referring to framing expressed in social media conversations. We also coded the emotions and attitudes expressed in the text data. A corpus consisting of 998 unique Reddit post titles and their corresponding 16,611 comments was analyzed using computer-aided textual analysis comprising a BERTopic model and two BERT text classification models, one for emotion and the other for sentiment analysis, supported by human judgment.FindingsDifferent interpretations, assumptions and expectations were found in the conversations. Three subframes were analyzed in detail under the overarching frame of the New World of Work: (1) general impacts of intelligent machines on society, (2) undertaking of tasks (augmentation and substitution) and (3) loss of jobs. The general attitude observed in conversations was slightly positive, and the most common emotion category was curiosity.Originality/valueFindings from this research can uncover public needs and expectations regarding the future of work with intelligent machines. The findings may also help shape research directions about futures of work. Furthermore, firms, organizations or industries may employ framing methods to analyze customers’ or workers’ responses or even influence the responses. Another contribution of this work is the application of framing theory to interpreting how people conceptualize the future of work with intelligent machines.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140736571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach 调查信息技术项目的阻力:元综合法的概念模型
Pub Date : 2024-04-05 DOI: 10.1108/itp-10-2022-0809
Manoj Krishnan, Satish Krishnan
PurposeThe study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.Design/methodology/approachThe study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.FindingsThrough meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.Research limitations/implicationsThis study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.Practical implicationsMany ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.Originality/valueThere have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.
设计/方法/途径本研究对有关技术项目阻力的定性研究进行了元综合;它在具体案例的层面上分析了这些研究,对新出现的概念进行了比较和对比,并将这些概念 "翻译 "到其他研究中。研究结果通过元综合,本研究得出了一个新的信息技术项目阻力概念模型,举例说明了已识别的前因如何产生用户阻力,以及这一现象如何在组织内发展。研究局限/意义本研究丰富了过去个别研究的观察和结论,同时阐述了组织内技术阻力产生和发展机制的各个方面。实际意义许多雄心勃勃、耗资巨大的数字化转型工作都因用户抵制而未能成功。了解造成用户抵制的机制可以帮助企业更好地管理技术项目,从而缩小技术同化差距,保护相关投资的回报。然而,对促进因素和抑制因素的对称理解对于组织吸收有前途的技术并转变其业务模式至关重要。该模型使用了感知决策理论的新视角来解释前因如何触发感知威胁和抵制行为;它强调了个人内部抵制行为的发展及其向群体发展的细微差别。由此产生的模型在组织环境中具有更好的普适性。
{"title":"Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach","authors":"Manoj Krishnan, Satish Krishnan","doi":"10.1108/itp-10-2022-0809","DOIUrl":"https://doi.org/10.1108/itp-10-2022-0809","url":null,"abstract":"PurposeThe study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.Design/methodology/approachThe study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.FindingsThrough meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.Research limitations/implicationsThis study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.Practical implicationsMany ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.Originality/valueThere have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140737322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why would consumers risk taking purchase recommendations from voice assistants? 消费者为什么要冒险接受语音助手的购买建议?
Pub Date : 2024-04-02 DOI: 10.1108/itp-01-2023-0001
R. Bawack, Emilie Bonhoure, Sabrine Mallek
PurposeThis study aims to identify and explore different risk typologies associated with consumer acceptance of purchase recommendations from voice assistants (VAs).Design/methodology/approachDrawing on components of perceived risk, consumer trust theory, and consumption value theory, a research model was proposed and tested using structural equation modeling (SEM) with data from 482 voice shoppers.FindingsThe results reveal that, unlike risks associated with physical harm, privacy breaches, and security threats, a variety of other concerns—including financial, psychological, social, performance-related risks, time loss, and the overall perceived risks—significantly influence consumers' willingness to accept VAs purchase recommendations. The effect is mediated by trust in VA purchase recommendations and their perceived value. Different types of risk affect various consumption values, with functional value being the most influential. The model explains 58.6% of the variance in purchase recommendation acceptance and significantly elucidates the variance in all consumption values.Originality/valueThis study contributes crucial knowledge to understanding consumer decision-making processes as they increasingly leverage AI-powered voice-based dialogue platforms for online purchasing. It emphasizes recognizing diverse risk typologies associated with VA purchase recommendations and their impact on consumer purchase behavior. The findings offer insights for marketing managers seeking to navigate the challenges posed by consumers' perceived risks while leveraging VAs as an integral component of modern shopping environments.
设计/方法/途径以感知风险、消费者信任理论和消费价值理论为基础,提出了一个研究模型,并使用结构方程建模(SEM)对 482 名语音购物者的数据进行了测试。研究结果研究结果表明,与身体伤害、隐私泄露和安全威胁等相关风险不同,其他各种担忧--包括财务、心理、社会、性能相关风险、时间损失和总体感知风险--会显著影响消费者接受虚拟运营商购买建议的意愿。消费者对增值服务购买建议的信任及其感知价值对这一影响具有中介作用。不同类型的风险会影响不同的消费价值,其中功能价值的影响最大。该模型解释了购买建议接受度中 58.6% 的变异,并显著阐明了所有消费价值的变异。原创性/价值随着消费者越来越多地利用人工智能语音对话平台进行在线购买,这项研究为理解消费者的决策过程贡献了重要的知识。研究强调了与虚拟现实购买建议相关的各种风险类型及其对消费者购买行为的影响。研究结果为营销管理者提供了见解,帮助他们在利用虚拟机构作为现代购物环境不可或缺的组成部分的同时,应对消费者感知风险带来的挑战。
{"title":"Why would consumers risk taking purchase recommendations from voice assistants?","authors":"R. Bawack, Emilie Bonhoure, Sabrine Mallek","doi":"10.1108/itp-01-2023-0001","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0001","url":null,"abstract":"PurposeThis study aims to identify and explore different risk typologies associated with consumer acceptance of purchase recommendations from voice assistants (VAs).Design/methodology/approachDrawing on components of perceived risk, consumer trust theory, and consumption value theory, a research model was proposed and tested using structural equation modeling (SEM) with data from 482 voice shoppers.FindingsThe results reveal that, unlike risks associated with physical harm, privacy breaches, and security threats, a variety of other concerns—including financial, psychological, social, performance-related risks, time loss, and the overall perceived risks—significantly influence consumers' willingness to accept VAs purchase recommendations. The effect is mediated by trust in VA purchase recommendations and their perceived value. Different types of risk affect various consumption values, with functional value being the most influential. The model explains 58.6% of the variance in purchase recommendation acceptance and significantly elucidates the variance in all consumption values.Originality/valueThis study contributes crucial knowledge to understanding consumer decision-making processes as they increasingly leverage AI-powered voice-based dialogue platforms for online purchasing. It emphasizes recognizing diverse risk typologies associated with VA purchase recommendations and their impact on consumer purchase behavior. The findings offer insights for marketing managers seeking to navigate the challenges posed by consumers' perceived risks while leveraging VAs as an integral component of modern shopping environments.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI in software programming: understanding emotional responses to GitHub Copilot 软件编程中的人工智能:了解对 GitHub Copilot 的情绪反应
Pub Date : 2024-04-02 DOI: 10.1108/itp-01-2023-0084
Farjam Eshraghian, Najmeh Hafezieh, F. Farivar, Sergio de Cesare
PurposeThe applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.Design/methodology/approachWe gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.FindingsWe found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.Practical implicationsOverall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.Originality/valueOur study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.
目的 人工智能(AI)在专业和知识工作各个领域的应用日益增多。在用户如何将一项技术融入其工作实践中,情感发挥着重要作用。本研究借鉴了人工智能驱动的技术适应性、情感和未来工作等领域的研究成果,以调查知识工作者对在工作中采用人工智能的看法。首先,在对数据进行清理和过滤后,我们采用主题建模法分析了 10,301 名软件程序员发布的 16,130 条推文,以确定他们所表达的情绪。然后,我们对结果主题进行定性分析,以了解驱动这些情绪的刺激特征。最后,我们对推文样本进行了分析,以探究情绪反应是如何随着时间的推移而变化的。研究结果我们发现软件程序员的情绪分为六类:挑战、成就、失落、威慑、怀疑和冷漠。此外,我们还发现这些情绪受四种刺激特征的驱动:人工智能开发、人工智能功能、身份工作和人工智能参与。我们还研究了情绪随时间的变化。结果表明,一旦软件程序员将注意力转向人工智能程序员的能力和功能,并将其与身份工作联系起来,消极情绪就会转变为更积极的情绪。关于人工智能在高技能工作中的作用的讨论刚刚开始,知识工作者普遍对人工智能持矛盾态度,与此形成鲜明对比的是,我们发现随着时间的推移和与人工智能接触的增多,知识工作者表现出更多的积极情绪。此外,本研究还揭示了职业认同在导致对人工智能产生更多积极情绪方面所起的作用,因为知识工作者认为这种技术是扩展其身份的一种手段,而不是对其身份的一种威胁。
{"title":"AI in software programming: understanding emotional responses to GitHub Copilot","authors":"Farjam Eshraghian, Najmeh Hafezieh, F. Farivar, Sergio de Cesare","doi":"10.1108/itp-01-2023-0084","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0084","url":null,"abstract":"PurposeThe applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.Design/methodology/approachWe gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.FindingsWe found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.Practical implicationsOverall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.Originality/valueOur study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems 威胁和应对评估在激励使用个性化移动紧急预警系统中的作用
Pub Date : 2024-01-16 DOI: 10.1108/itp-04-2021-0297
Annette Mills, Nelly Todorova, Jing Zhang
PurposeDisasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.Design/methodology/approachDrawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.FindingsThe results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.Originality/valueThe study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.
目的灾害和其他紧急情况日益增多,数百万人受到地震、火灾和洪水等事件的影响。使用移动应急预警系统(MEAS)可以根据位置和其他个人资料提供有针对性的警报,从而提高人们的应对能力。本研究旨在了解影响人们分享个人信息意愿的因素,而分享个人信息是提供有关威胁和防护行动的特定信息所必需的。设计/方法/途径本研究借鉴保护动机理论(PMT),提出并测试了一个使用个性化 MEAS 的意愿模型,该模型包含了与个人对潜在威胁的评估(即感知到的脆弱性和严重性)和应对能力(即响应效能和自我效能)相关的关键因素,以及响应成本和隐私担忧等威慑因素。研究结果表明,使用 MEAS 的意愿如何受到人们对紧急威胁的评估以及对使用 MEAS 将如何帮助他们有效应对的认知的影响。恐惧和感知的严重性以及应对评估是使用 MEAS 的重要动机。原创性/价值这项研究填补了有关使用 MEAS 等警报系统的研究空白,因为这些系统需要共享个人信息和持续参与,例如实时披露个人位置。它证实了以前的研究中没有研究过的因素的重要性,如隐私问题,这些因素可能会阻碍人们使用该系统。本研究还扩展了 PMT 在应急管理方面的应用。
{"title":"The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems","authors":"Annette Mills, Nelly Todorova, Jing Zhang","doi":"10.1108/itp-04-2021-0297","DOIUrl":"https://doi.org/10.1108/itp-04-2021-0297","url":null,"abstract":"PurposeDisasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.Design/methodology/approachDrawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.FindingsThe results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.Originality/valueThe study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139527989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe 在线隐私扫盲与用户信息隐私赋权:欧洲 GDPR 案例
Pub Date : 2024-01-15 DOI: 10.1108/itp-05-2023-0467
Christine Prince, Nessrine Omrani, Francesco Schiavone
PurposeResearch on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.Design/methodology/approachAn empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.FindingsThe main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.Originality/valueWhile few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
目的有关在线用户隐私权的研究表明,隐私权素养与用户信息隐私权的关系缺乏实证证据。为了填补这一空白,本文研究了在线隐私素养的两个主要维度--即陈述性知识和程序性知识--对在线用户信息隐私权的影响。主要结果显示,用户的程序性知识与用户的隐私权正相关。用户的陈述性知识与用户的隐私授权之间的关系得到了部分支持。虽然对企业和组织在数据收集和进一步使用条件方面的做法的更多了解被发现与用户隐私权的提高有显著关联,但不可预测的是,结果显示对 GDPR 的了解与用户隐私权的提高呈负相关。实证研究结果还显示,更高的网络隐私素养与用户信息隐私授权的提高相关。原创性/价值虽然很少有先进的研究系统地测量自 GDPR 实施以来网站发生的变化,但个人如何感知、理解和应用 GDPR 的权利/保障及其加强用户信息隐私控制的可能性仍不清楚。因此,本文通过实证研究来理解由用户的陈述性知识和程序性知识所形成的在线用户隐私素养如何可能影响用户的信息隐私授权。研究从基于用户的角度出发,实证调查了 GDPR 在提高用户信息隐私权方面的有效性。研究结果强调了提高在线企业和服务的数据跟踪和处理决策的透明度对于加强用户对信息隐私的控制的重要性。研究结果还强调,亟需开展更多教育工作,提高用户对 GDPR 数据保护相关权利/保障的认识。实证研究结果还表明,更有可能采用自我保护方法来加强个人数据隐私的用户,更有可能认为自己对个人数据有更大的控制权。这一发现对从业人员和电子商务企业的广泛影响强调,有必要为用户提供适当的隐私保护工具,以确保交易更加保密。
{"title":"Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe","authors":"Christine Prince, Nessrine Omrani, Francesco Schiavone","doi":"10.1108/itp-05-2023-0467","DOIUrl":"https://doi.org/10.1108/itp-05-2023-0467","url":null,"abstract":"PurposeResearch on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.Design/methodology/approachAn empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.FindingsThe main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.Originality/valueWhile few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139530008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
She’s worth IT: challenges for female CIOs in ensuring IT security compliance 她值得拥有 IT:女性首席信息官在确保 IT 安全合规方面面临的挑战
Pub Date : 2024-01-10 DOI: 10.1108/itp-05-2023-0524
Gaurav Bansal, Zhuoli Axelton
PurposeIT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.Design/methodology/approachA controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.FindingsThe findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.Research limitations/implicationsThis study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).Practical implicationsThis study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.Social implicationsThis study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.Originality/valueThis study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect
目的 IT 安全合规性对组织的成功至关重要,而这种合规性在很大程度上取决于 IT 领导力。考虑到工作场所普遍存在无意识的性别偏见和刻板印象,以及 IT 领域女性领导力的增长,作者研究了员工性别形式的刻板印象信念的内化如何影响领导力特征与 IT 安全合规意愿之间的关系。研究结果研究结果表明,首席信息官和员工的性别在信息技术领导特征--感知到的专业知识和领导风格--如何影响员工遵守首席信息官安全建议的意愿和反应方面起着重要作用。这些研究结果还提供了仅基于性别刻板印象理论的重要理论意义:首先,男性和女性员工在形成遵从意向时如何通过依赖感知到的四维首席信息官信息技术专业知识来表现出对女性首席信息官领导的偏见,这可以见证玻璃天花板效应。其次,本研究与性别角色内化相关的发现表明,男性和女性对性别不一致的角色存在偏见,其中女性员工对交易型男性首席信息官的抵触情绪最小,而男性员工则不太愿意服从交易型女性首席信息官,这也印证了 Hentschel 等人(2019)与性别国际化相关的发现。它还强调了教育男性和女性了解性别角色定型观念的社会影响的重要性,这种影响超出了组织环境的范围。这项研究表明,需要继续努力消除由性别定型观念产生的偏见,促进社会包容。社会影响本研究表明,需要做更多的工作来消除性别刻板印象偏见和促进社会包容,从而对未来的 IT 领导者和员工如何通过内化来塑造自己的身份产生积极影响。此外,本研究还阐明了性别角色如何通过性别刻板印象和内化作用塑造员工对不同领导风格的反应。
{"title":"She’s worth IT: challenges for female CIOs in ensuring IT security compliance","authors":"Gaurav Bansal, Zhuoli Axelton","doi":"10.1108/itp-05-2023-0524","DOIUrl":"https://doi.org/10.1108/itp-05-2023-0524","url":null,"abstract":"PurposeIT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.Design/methodology/approachA controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.FindingsThe findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.Research limitations/implicationsThis study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).Practical implicationsThis study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.Social implicationsThis study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.Originality/valueThis study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict 社交媒体作为行为去极化器:俄罗斯-乌克兰冲突的证据
Pub Date : 2024-01-09 DOI: 10.1108/itp-12-2022-0972
J. Yadav, Kuldeep Singh, Nirpendra P. Rana, Denis Dennehy
Purpose Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.Design/methodology/approach This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.Findings The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.Research limitations/implications For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.Originality/value While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.
目的 社交媒体在俄罗斯-乌克兰冲突的两极化观点中发挥了关键作用。在许多情况下,人们都对网络互动中的极化效应进行了广泛研究。本研究通过文本分析和预测建模分析了 6662 条与制裁俄罗斯相关的推文传播。研究结果 研究结果显示,网民的推文行为因来自多个社交媒体来源的信息而去极化。研究局限性/影响 对于政策制定者、冲突调解者和观察者以及一般社会成员而言,需要:(1)在整个危机期间进行持续一致的沟通;(2)沟通信息的透明度;(3)公众意识到来自多方的两极化和相互冲突的信息,这些信息可能会对冲突危机的说法产生偏见。原创性/价值 虽然以往的研究从不同角度对俄乌冲突进行了研究,但这是第一项研究如何在冲突期间利用社交媒体来减少态度两极分化。
{"title":"Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict","authors":"J. Yadav, Kuldeep Singh, Nirpendra P. Rana, Denis Dennehy","doi":"10.1108/itp-12-2022-0972","DOIUrl":"https://doi.org/10.1108/itp-12-2022-0972","url":null,"abstract":"Purpose Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.Design/methodology/approach This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.Findings The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.Research limitations/implications For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.Originality/value While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility 企业社交媒体是员工敏捷性的促进因素:工作压力和企业社交媒体可见度的影响
Pub Date : 2024-01-04 DOI: 10.1108/itp-10-2022-0791
Abdul Hameed Pitafi
PurposeAccording to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors.Design/methodology/approachThis research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM).FindingsThe findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility.Originality/valueThis study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.
目的根据大量分析,员工敏捷性受团队合作、协调和组织环境的影响。然而,人们较少考虑工作压力因素(挑战、阻碍)对员工敏捷性的影响。针对这一研究空白,本研究揭示了出于社交和工作目的使用企业社交媒体(ESM)如何通过工作压力源影响员工敏捷性。设计/方法/途径本研究还利用从中国员工处获得的原始数据,探讨了企业社交媒体的可见性如何增强工作压力源与员工敏捷性之间的相互作用。使用 AMOS 24.10 工具分析了总共 377 个条目。研究结果研究结果表明,ESM 的使用(社交和工作)对挑战性和阻碍性工作压力源产生了负面影响。结果还表明,挑战性压力源对员工的敏捷性有显著影响,而阻碍性压力源则与之负相关。此外,结果还表明,ESM 可见度的提高加强了挑战性压力源与员工敏捷性之间的联系。然而,ESM 可见度并没有对阻碍性压力源与员工敏捷性之间的联系产生显著的调节作用。本研究还探讨了 ESM 可见性如何改善工作压力源与员工敏捷性之间的相互作用。研究结果为社交媒体和员工敏捷性研究的发展做出了贡献,并为管理者提供了几点指导。
{"title":"Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility","authors":"Abdul Hameed Pitafi","doi":"10.1108/itp-10-2022-0791","DOIUrl":"https://doi.org/10.1108/itp-10-2022-0791","url":null,"abstract":"PurposeAccording to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors.Design/methodology/approachThis research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM).FindingsThe findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility.Originality/valueThis study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139386140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Technology & People
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1