Pub Date : 2023-04-11DOI: 10.1108/itp-05-2022-0358
Xingchen Zhou, P. Rau, Zhuoni Jie
PurposeThis study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.Design/methodology/approachThis study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels.FindingsThis study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust.Originality/valueThis study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.
{"title":"Stickiness formation among mobile apps of different social levels: multigroup analysis using the cognitive–affective–conative framework","authors":"Xingchen Zhou, P. Rau, Zhuoni Jie","doi":"10.1108/itp-05-2022-0358","DOIUrl":"https://doi.org/10.1108/itp-05-2022-0358","url":null,"abstract":"PurposeThis study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.Design/methodology/approachThis study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels.FindingsThis study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust.Originality/valueThis study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122979937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1108/itp-05-2021-0404
Gongtao Zhang, M. Ravishankar
PurposeDigital technologies create myriad innovation opportunities and have inspired the establishment of many new start-ups in recent years. Despite the growing knowledge on digital entrepreneurship, few studies explore how start-ups exploit these opportunities to achieve entrepreneurial success. The purpose of this paper is to explore start-ups’ capabilities for successful delivery of digital artefacts in a cloud computing infrastructure.Design/methodology/approachEmpirical data were collected during a qualitative case study of an established start-up in the Chinese market by interviewing 41 interviewees. Informed by the notion of dynamic capabilities and using the Gioia methodology, the case firm's life cycle was analysed in detail.FindingsThe study identifies start-ups’ ordinary and dynamic capabilities for successful development and delivery of digital services. The findings provide insights into a portfolio of start-ups’ capabilities, namely adaptation, networking, reengineering and refinement.Originality/valueThe study suggests that start-ups’ capabilities and underlying entrepreneurial actions determine the degree to which adoption of digital technologies create and transfer value to customers. The study offers specific insights into how start-ups successfully develop and deliver digital artefacts in a cloud infrastructure based on entrepreneurs' prior expertise, vision and accumulated experience.
{"title":"The role of capabilities in digital service development and delivery: the case of start-up organisations","authors":"Gongtao Zhang, M. Ravishankar","doi":"10.1108/itp-05-2021-0404","DOIUrl":"https://doi.org/10.1108/itp-05-2021-0404","url":null,"abstract":"PurposeDigital technologies create myriad innovation opportunities and have inspired the establishment of many new start-ups in recent years. Despite the growing knowledge on digital entrepreneurship, few studies explore how start-ups exploit these opportunities to achieve entrepreneurial success. The purpose of this paper is to explore start-ups’ capabilities for successful delivery of digital artefacts in a cloud computing infrastructure.Design/methodology/approachEmpirical data were collected during a qualitative case study of an established start-up in the Chinese market by interviewing 41 interviewees. Informed by the notion of dynamic capabilities and using the Gioia methodology, the case firm's life cycle was analysed in detail.FindingsThe study identifies start-ups’ ordinary and dynamic capabilities for successful development and delivery of digital services. The findings provide insights into a portfolio of start-ups’ capabilities, namely adaptation, networking, reengineering and refinement.Originality/valueThe study suggests that start-ups’ capabilities and underlying entrepreneurial actions determine the degree to which adoption of digital technologies create and transfer value to customers. The study offers specific insights into how start-ups successfully develop and deliver digital artefacts in a cloud infrastructure based on entrepreneurs' prior expertise, vision and accumulated experience.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1108/itp-10-2021-0832
Shekhar Rathor, Weidong Xia, D. Batra
PurposeAgile principles have been widely used in software development team practice since the creation of the Agile Manifesto. Studies have examined variables related to agile principles without systematically considering the relationships among key team, agile methodology, and process variables underlying the agile principles and how these variables jointly influence the achievement of software development agility. In this study, the authors tested a team/methodology–process–agility model that links team variables (team autonomy and team competence) and methodological variable (iterative development) to process variables (communication and collaborative decision-making), which are in turn linked to software development agility (ability to sense, respond and learn).Design/methodology/approachSurvey data from one hundred and sixty software development professionals were analyzed using structural equation modeling methods.FindingsThe results support the team/methodology–process–agility model. Process variables (communication and collaborative decision-making) mediated the effects of team (autonomy and competence) and methodological (iterative development) variables on software development agility. In addition, team, methodology and process variables had different effects on the three dimensions of software development agility.Originality/valueThe results contribute to the literature on organizational IT management by establishing a team/methodology–process–agility model that can serve as a basis for developing a core theoretical foundation underlying agile principles and practices. The results also have practical implications for organizations in understanding and managing holistically the different roles that agile methodological, team and process factors play in achieving software development agility.
{"title":"Achieving software development agility: different roles of team, methodological and process factors","authors":"Shekhar Rathor, Weidong Xia, D. Batra","doi":"10.1108/itp-10-2021-0832","DOIUrl":"https://doi.org/10.1108/itp-10-2021-0832","url":null,"abstract":"PurposeAgile principles have been widely used in software development team practice since the creation of the Agile Manifesto. Studies have examined variables related to agile principles without systematically considering the relationships among key team, agile methodology, and process variables underlying the agile principles and how these variables jointly influence the achievement of software development agility. In this study, the authors tested a team/methodology–process–agility model that links team variables (team autonomy and team competence) and methodological variable (iterative development) to process variables (communication and collaborative decision-making), which are in turn linked to software development agility (ability to sense, respond and learn).Design/methodology/approachSurvey data from one hundred and sixty software development professionals were analyzed using structural equation modeling methods.FindingsThe results support the team/methodology–process–agility model. Process variables (communication and collaborative decision-making) mediated the effects of team (autonomy and competence) and methodological (iterative development) variables on software development agility. In addition, team, methodology and process variables had different effects on the three dimensions of software development agility.Originality/valueThe results contribute to the literature on organizational IT management by establishing a team/methodology–process–agility model that can serve as a basis for developing a core theoretical foundation underlying agile principles and practices. The results also have practical implications for organizations in understanding and managing holistically the different roles that agile methodological, team and process factors play in achieving software development agility.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-07DOI: 10.1108/itp-05-2022-0353
Arindam Bhattacharjee, Anita Sarkar
PurposeCyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.Design/methodology/approachUsing a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.FindingsBased on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.Originality/valueThis work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.
{"title":"Abusive supervision and cyberloafing: an investigation based on Stressor-Emotion-CWB theory","authors":"Arindam Bhattacharjee, Anita Sarkar","doi":"10.1108/itp-05-2022-0353","DOIUrl":"https://doi.org/10.1108/itp-05-2022-0353","url":null,"abstract":"PurposeCyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.Design/methodology/approachUsing a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.FindingsBased on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.Originality/valueThis work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-30DOI: 10.1108/itp-07-2022-0515
Areej Alyami, David Sammon, K. Neville, Carolanne Mahony
PurposeThis study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.Design/methodology/approachThis exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.FindingsIn this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.Originality/valueThis research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.
{"title":"The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model","authors":"Areej Alyami, David Sammon, K. Neville, Carolanne Mahony","doi":"10.1108/itp-07-2022-0515","DOIUrl":"https://doi.org/10.1108/itp-07-2022-0515","url":null,"abstract":"PurposeThis study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.Design/methodology/approachThis exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.FindingsIn this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.Originality/valueThis research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-27DOI: 10.1108/itp-07-2022-0562
Adela J. Chen, Nichola Roberts
PurposePractitioners and academics are starting to recognize the benefits of green IT/IS practices. Despite these benefits, this study aims to know more regarding the factors that would drive organizations to use green IT/IS practices within their IT function and across the enterprise. To further understanding in this area, this study applies a strategic cognition framework of firm responsiveness and institutional theory to determine the extent to which an organization uses green IT/IS practices in response to stakeholder concerns. This study investigates the extent to which two organizational logics – expressive and instrumental – and three institutional pressures – coercive, mimetic and normative – jointly affect an organization's use of both green IT practices and green IS practices.Design/methodology/approachThis study tested the hypotheses with survey data collected from 306 organizations. Structural equation modeling was used for data analysis.FindingsFindings support four joint effects: (1) individualistic identity orientation and coercive pressure positively affect green IT practices; (2) collectivistic identity orientation and normative pressure positively influence green IS practices; (3) cost reduction orientation and mimetic pressure positively affect green IT practices; and (4) revenue expansion orientation and normative pressure positively influence green IS practices.Originality/valueThis study contributes to the literature by providing evidence for joint drivers of green IT and green IS practices. Green IT and IS practices represent organizations' different levels of commitment to environmental sustainability and responsiveness to stakeholders (i.e. green IT/IS practices). Organizations of different expressive and instrumental orientations are attuned to institutional pressures to various degrees, which leads to different green IT/IS practices.
{"title":"Joint drivers of different shades of green IT/IS practices: a strategic cognition perspective","authors":"Adela J. Chen, Nichola Roberts","doi":"10.1108/itp-07-2022-0562","DOIUrl":"https://doi.org/10.1108/itp-07-2022-0562","url":null,"abstract":"PurposePractitioners and academics are starting to recognize the benefits of green IT/IS practices. Despite these benefits, this study aims to know more regarding the factors that would drive organizations to use green IT/IS practices within their IT function and across the enterprise. To further understanding in this area, this study applies a strategic cognition framework of firm responsiveness and institutional theory to determine the extent to which an organization uses green IT/IS practices in response to stakeholder concerns. This study investigates the extent to which two organizational logics – expressive and instrumental – and three institutional pressures – coercive, mimetic and normative – jointly affect an organization's use of both green IT practices and green IS practices.Design/methodology/approachThis study tested the hypotheses with survey data collected from 306 organizations. Structural equation modeling was used for data analysis.FindingsFindings support four joint effects: (1) individualistic identity orientation and coercive pressure positively affect green IT practices; (2) collectivistic identity orientation and normative pressure positively influence green IS practices; (3) cost reduction orientation and mimetic pressure positively affect green IT practices; and (4) revenue expansion orientation and normative pressure positively influence green IS practices.Originality/valueThis study contributes to the literature by providing evidence for joint drivers of green IT and green IS practices. Green IT and IS practices represent organizations' different levels of commitment to environmental sustainability and responsiveness to stakeholders (i.e. green IT/IS practices). Organizations of different expressive and instrumental orientations are attuned to institutional pressures to various degrees, which leads to different green IT/IS practices.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-24DOI: 10.1108/itp-07-2022-0498
Laila Dahabiyeh, Ali Farooq, Farhan Ahmad, Yousra Javed
PurposeDuring the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions.Design/methodology/approachData were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA).FindingsThe findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching.Research limitations/implicationsThis study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications.Practical implicationsThe study identifies factors the technology service providers should consider to attract new users and retain existing users.Originality/valueThis study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.
{"title":"Explaining technology migration against the change in terms of use: an fsQCA approach","authors":"Laila Dahabiyeh, Ali Farooq, Farhan Ahmad, Yousra Javed","doi":"10.1108/itp-07-2022-0498","DOIUrl":"https://doi.org/10.1108/itp-07-2022-0498","url":null,"abstract":"PurposeDuring the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions.Design/methodology/approachData were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA).FindingsThe findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching.Research limitations/implicationsThis study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications.Practical implicationsThe study identifies factors the technology service providers should consider to attract new users and retain existing users.Originality/valueThis study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PurposeGiven the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in developing compulsive social media use behavior. The authors also identify and hypothesize channels such as contingent self-esteem (CSE), social interaction anxiety (SIA) and fear of negative evaluation (FNE), which may explain how PDM affects compulsive social media use.Design/methodology/approachThe research model was empirically tested with a survey of 367 Chinese university students using structural equation modeling by drawing on the escape and self-presentation lenses.FindingsThe findings indicate that PDM contributes to compulsive social media use behavior both directly and indirectly through CSE. Furthermore, the impact of CSE on compulsive social media use is mediated by the FNE, whereas SIA fails to mediate this effect.Practical implicationsThe results can advance the authors’ knowledge of the role and process by which depressive mood impacts compulsive social media use. These findings may add insights into psychological treatment and help in, for example, developing counseling programs or coping strategies for depressed people to protect them from using social media excessively.Originality/valueThis research identifies the pathway mechanism between PDM and compulsive use of social media. It also increases the understanding of how CSE and social interaction deficiencies contribute to compulsive social media usage (CSMU).
{"title":"Depressive mood and compulsive social media usage: the mediating roles of contingent self-esteem and social interaction fears","authors":"Fayaz Ali, Muhammd Zubair Tauni, Muḥammad Ashfaq, Q. Zhang, Tanveer Ahsan","doi":"10.1108/itp-01-2021-0057","DOIUrl":"https://doi.org/10.1108/itp-01-2021-0057","url":null,"abstract":"PurposeGiven the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in developing compulsive social media use behavior. The authors also identify and hypothesize channels such as contingent self-esteem (CSE), social interaction anxiety (SIA) and fear of negative evaluation (FNE), which may explain how PDM affects compulsive social media use.Design/methodology/approachThe research model was empirically tested with a survey of 367 Chinese university students using structural equation modeling by drawing on the escape and self-presentation lenses.FindingsThe findings indicate that PDM contributes to compulsive social media use behavior both directly and indirectly through CSE. Furthermore, the impact of CSE on compulsive social media use is mediated by the FNE, whereas SIA fails to mediate this effect.Practical implicationsThe results can advance the authors’ knowledge of the role and process by which depressive mood impacts compulsive social media use. These findings may add insights into psychological treatment and help in, for example, developing counseling programs or coping strategies for depressed people to protect them from using social media excessively.Originality/valueThis research identifies the pathway mechanism between PDM and compulsive use of social media. It also increases the understanding of how CSE and social interaction deficiencies contribute to compulsive social media usage (CSMU).","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1108/itp-10-2021-0817
T. Lyu, Yuli Guo, Hao-sin Chen
PurposeBased on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.Design/methodology/approachThe data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).FindingsThe study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.Originality/valueThis study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.
{"title":"Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism","authors":"T. Lyu, Yuli Guo, Hao-sin Chen","doi":"10.1108/itp-10-2021-0817","DOIUrl":"https://doi.org/10.1108/itp-10-2021-0817","url":null,"abstract":"PurposeBased on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.Design/methodology/approachThe data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).FindingsThe study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.Originality/valueThis study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117304800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1108/itp-01-2022-0035
Baohua Yu, Y. Leung
PurposeThis study was conducted to achieve the following objectives: (1) determine the differences and reasons for using outgroup OSNs by gender, age and student groups (Mainland and Hong Kong [HK] students); (2) uncover the impact of online social networks (OSNs) on the development of Mainland–HK friendships and (3) determine the roles of different OSNs (social networking sites [SNSs] and instant messaging platforms [IMPs]) in the development of intercultural friendships in the real world.Design/methodology/approachTo explore how OSNs facilitate (or inhibit) intercultural interactions, 198 students completed a questionnaire and 24 students participated in follow-up semi-structured interviews examining the role of OSNs in intercultural friendship development.FindingsResults revealed that demographic and motivational preferences for using outgroup-OSNs differed among students. Both IMPs and SNSs helped students maintain friendships using little effort, whereas it tended to strengthen their existing social networks, rather than helping to start new friendships. IMPs helped develop a sense of “presence awareness”, strengthening pre-existing friendships and solidifying offline connections. SNSs also assisted students in exploring their shared interests while revealing their values and cultural differences.Research limitations/implicationsThe authors’ findings offered empirical evidence on social exchange theory and anxiety-uncertainty management theory regarding the perceived benefit of OSNs on students' friendship development.Practical implicationsThe study sheds light on the differences between Mainland Chinese and HK students, including participants' perceptions of different friendship stages.Originality/valueThis study is interested in the roles of different SNSs and IMPs in intercultural friendship development, especially their strengths and weaknesses as perceived by students. Also, the authors are curious about how students select and use IMPs and SNSs differently according to their individual preferences and needs. To the authors’ knowledge, the dynamic link between online communication and intercultural friendship development has not been thoroughly examined in the field of intercultural communication.
{"title":"Establishing ties or strengthening friendships? Students' use of online social networks in intercultural friendship development","authors":"Baohua Yu, Y. Leung","doi":"10.1108/itp-01-2022-0035","DOIUrl":"https://doi.org/10.1108/itp-01-2022-0035","url":null,"abstract":"PurposeThis study was conducted to achieve the following objectives: (1) determine the differences and reasons for using outgroup OSNs by gender, age and student groups (Mainland and Hong Kong [HK] students); (2) uncover the impact of online social networks (OSNs) on the development of Mainland–HK friendships and (3) determine the roles of different OSNs (social networking sites [SNSs] and instant messaging platforms [IMPs]) in the development of intercultural friendships in the real world.Design/methodology/approachTo explore how OSNs facilitate (or inhibit) intercultural interactions, 198 students completed a questionnaire and 24 students participated in follow-up semi-structured interviews examining the role of OSNs in intercultural friendship development.FindingsResults revealed that demographic and motivational preferences for using outgroup-OSNs differed among students. Both IMPs and SNSs helped students maintain friendships using little effort, whereas it tended to strengthen their existing social networks, rather than helping to start new friendships. IMPs helped develop a sense of “presence awareness”, strengthening pre-existing friendships and solidifying offline connections. SNSs also assisted students in exploring their shared interests while revealing their values and cultural differences.Research limitations/implicationsThe authors’ findings offered empirical evidence on social exchange theory and anxiety-uncertainty management theory regarding the perceived benefit of OSNs on students' friendship development.Practical implicationsThe study sheds light on the differences between Mainland Chinese and HK students, including participants' perceptions of different friendship stages.Originality/valueThis study is interested in the roles of different SNSs and IMPs in intercultural friendship development, especially their strengths and weaknesses as perceived by students. Also, the authors are curious about how students select and use IMPs and SNSs differently according to their individual preferences and needs. To the authors’ knowledge, the dynamic link between online communication and intercultural friendship development has not been thoroughly examined in the field of intercultural communication.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}