Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch057
G. Rajini, M. Krithika
Online shopping has been really male - oriented as the product categories were limited to software, computers, music and computer accessories. As the product category expanded to clothing, food, home care and toys, women started to adopt online shopping. Nowadays there is a massive surge in online shopping particularly among metropolitan women, as they tend to purchase both necessary and discretionary products. According to the report by Associate Chamber of Trade and Industry of India (ASSOCHAM), over 80% of the online shopping is done by metropolitan women shoppers.The present study investigates the prominent perceived risks of employed women in online shopping through a consumer survey and by applying multiple discriminant analysis .The results of the empirical analysis demonstrated that perceived physical risk and product risk were found vital in discriminating the respondents as intermediate or experts in online shopping .Whereas perceived psychological risk, quality risk, Information Security Risk, Time Risk, Delivery Risk, Social Risk, Source Risk and financial risk perception during online purchase adoption contributes comparatively lesser for discrimination. The findings elucidate how marketers can formulate and implement risk-reducing strategies during online purchasing.
{"title":"Risk Factors Discriminating Online Metropolitan Women Shoppers","authors":"G. Rajini, M. Krithika","doi":"10.4018/978-1-5225-7909-0.ch057","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch057","url":null,"abstract":"Online shopping has been really male - oriented as the product categories were limited to software, computers, music and computer accessories. As the product category expanded to clothing, food, home care and toys, women started to adopt online shopping. Nowadays there is a massive surge in online shopping particularly among metropolitan women, as they tend to purchase both necessary and discretionary products. According to the report by Associate Chamber of Trade and Industry of India (ASSOCHAM), over 80% of the online shopping is done by metropolitan women shoppers.The present study investigates the prominent perceived risks of employed women in online shopping through a consumer survey and by applying multiple discriminant analysis .The results of the empirical analysis demonstrated that perceived physical risk and product risk were found vital in discriminating the respondents as intermediate or experts in online shopping .Whereas perceived psychological risk, quality risk, Information Security Risk, Time Risk, Delivery Risk, Social Risk, Source Risk and financial risk perception during online purchase adoption contributes comparatively lesser for discrimination. The findings elucidate how marketers can formulate and implement risk-reducing strategies during online purchasing.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-4053-3.CH012
Reyhan Topal
This chapter attempts to synthesize the mainstream theories of radicalization and the cyber-psychological and behavioral approaches with a view to identifying individuals' radicalization online. Based on the intersections of those two fields, this chapter first elaborates how radical groups use cyberspace with a specific concentration on the so-called cyber caliphate claimed by the Islamic State of Iraq and al-Sham (ISIS). Second, it revisits mainstream theories of radicalization and specifies the psychological and behavioral facets of the radicalization processes proposed by those theories. Following that, it integrates theories of radicalization with cyber-psychological and behavioral explanations of online radicalization to reveal how ISIS's use of cyberspace attracts individuals and facilitates online radicalization.
{"title":"A Cyber-Psychological and Behavioral Approach to Online Radicalization","authors":"Reyhan Topal","doi":"10.4018/978-1-5225-4053-3.CH012","DOIUrl":"https://doi.org/10.4018/978-1-5225-4053-3.CH012","url":null,"abstract":"This chapter attempts to synthesize the mainstream theories of radicalization and the cyber-psychological and behavioral approaches with a view to identifying individuals' radicalization online. Based on the intersections of those two fields, this chapter first elaborates how radical groups use cyberspace with a specific concentration on the so-called cyber caliphate claimed by the Islamic State of Iraq and al-Sham (ISIS). Second, it revisits mainstream theories of radicalization and specifies the psychological and behavioral facets of the radicalization processes proposed by those theories. Following that, it integrates theories of radicalization with cyber-psychological and behavioral explanations of online radicalization to reveal how ISIS's use of cyberspace attracts individuals and facilitates online radicalization.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch027
Cathrine Linnes, B. Metcalf, Milad Kalantari Shahijan
Apps have the solutions for many things and consumers have them right in their pocket. Just think about a holiday. From the booking of flight tickets, making a hotel reservation, sharing it with your friends, ordering a rental car, paying for apparel, and so on. You can use your smartphone for almost everything these days and most apps are connected with social media sites. Even though many users do not want to pay lots of money for apps, experts still forecast huge growth. There is a big different on how consumers used apps 5 years ago and how they use apps today. Today consumers are demanding apps that can fulfil many different needs and are much more individualized. This high and consuming demand forces the developers the use large amounts of data before they can be able to meet these needs.
{"title":"The Future of Apps","authors":"Cathrine Linnes, B. Metcalf, Milad Kalantari Shahijan","doi":"10.4018/978-1-5225-7909-0.ch027","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch027","url":null,"abstract":"Apps have the solutions for many things and consumers have them right in their pocket. Just think about a holiday. From the booking of flight tickets, making a hotel reservation, sharing it with your friends, ordering a rental car, paying for apparel, and so on. You can use your smartphone for almost everything these days and most apps are connected with social media sites. Even though many users do not want to pay lots of money for apps, experts still forecast huge growth. There is a big different on how consumers used apps 5 years ago and how they use apps today. Today consumers are demanding apps that can fulfil many different needs and are much more individualized. This high and consuming demand forces the developers the use large amounts of data before they can be able to meet these needs.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123081564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-4666-8614-4.CH069
A. Agozzino
In recent years, social media tools such as Facebook, Twitter, YouTube, and blogs have rocked the higher education world. No longer is just being present on these mediums enough. Integration of social media tools into daily practices through monitoring, teaching, and collaboration allows those in higher education to build and maintain relationships with key publics. From devising social media goals and objectives to monitoring channels and evaluating efforts, social media can be integrated into the higher education arena. In this chapter, multiple dimensions of social media tools and the various ways those in higher education can integrate those tools into operation are exposed and elaborated upon. In an effort to provide readers with best practices, ideas are shared to present those in higher education with optimal ways to connect, build, and maintain relationships with others both internally and externally.
{"title":"Building and Maintaining Relationships Through Social Media","authors":"A. Agozzino","doi":"10.4018/978-1-4666-8614-4.CH069","DOIUrl":"https://doi.org/10.4018/978-1-4666-8614-4.CH069","url":null,"abstract":"In recent years, social media tools such as Facebook, Twitter, YouTube, and blogs have rocked the higher education world. No longer is just being present on these mediums enough. Integration of social media tools into daily practices through monitoring, teaching, and collaboration allows those in higher education to build and maintain relationships with key publics. From devising social media goals and objectives to monitoring channels and evaluating efforts, social media can be integrated into the higher education arena. In this chapter, multiple dimensions of social media tools and the various ways those in higher education can integrate those tools into operation are exposed and elaborated upon. In an effort to provide readers with best practices, ideas are shared to present those in higher education with optimal ways to connect, build, and maintain relationships with others both internally and externally.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-4763-1.CH002
Shalin Hai-Jew
Online human-to-human (and human-to-robot) hyper-personal relationships have evolved over the years, and their prevalence has broadened the available cyberattack surfaces. With the deployment of malicious socialbots on social media in the virtual and AI-informed embodied socialbots in the real, human interests in socializing have become more fraught and risky. Based on the research literature, abductive reasoning from in-world experiences, and analogical analysis to project into the Fourth Industrial Revolution, this work suggests the importance of greater awareness of the risks in interrelating in the virtual and the real and suggests that there are no safe distances.
{"title":"Safe Distances","authors":"Shalin Hai-Jew","doi":"10.4018/978-1-5225-4763-1.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-4763-1.CH002","url":null,"abstract":"Online human-to-human (and human-to-robot) hyper-personal relationships have evolved over the years, and their prevalence has broadened the available cyberattack surfaces. With the deployment of malicious socialbots on social media in the virtual and AI-informed embodied socialbots in the real, human interests in socializing have become more fraught and risky. Based on the research literature, abductive reasoning from in-world experiences, and analogical analysis to project into the Fourth Industrial Revolution, this work suggests the importance of greater awareness of the risks in interrelating in the virtual and the real and suggests that there are no safe distances.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124415872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch062
Michelle F. Wright
This chapter describes a study with the objective to examine cyber aggression involvement among emerging adults across technologies and relationships. Another purpose was to investigate the bidirectional associations between emerging adults' cyber aggression involvement and adjustment difficulties over four years. Participants were 1,483 emerging adults (Mage = 24.67; 60% female) from Southeastern universities in the United States. Emerging adults completed questionnaires on their cyber aggression involvement and adjustment difficulties. The most frequently utilized digital technologies and tool to harm others were text messages. Ex-friends were frequently involved in cyber aggression. Cyber aggression involvement predicted all adjustment difficulties across four years and all adjustment difficulties predicted cyber aggression involvement, suggesting bidirectional relationships among these variables. There were magnitude differences such that the bidirectional relationships were stronger when predicting all adjustment difficulties from cyber aggression and cyber victimization.
{"title":"Cyber Aggression and Victimization Among Emerging Adults","authors":"Michelle F. Wright","doi":"10.4018/978-1-5225-7909-0.ch062","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch062","url":null,"abstract":"This chapter describes a study with the objective to examine cyber aggression involvement among emerging adults across technologies and relationships. Another purpose was to investigate the bidirectional associations between emerging adults' cyber aggression involvement and adjustment difficulties over four years. Participants were 1,483 emerging adults (Mage = 24.67; 60% female) from Southeastern universities in the United States. Emerging adults completed questionnaires on their cyber aggression involvement and adjustment difficulties. The most frequently utilized digital technologies and tool to harm others were text messages. Ex-friends were frequently involved in cyber aggression. Cyber aggression involvement predicted all adjustment difficulties across four years and all adjustment difficulties predicted cyber aggression involvement, suggesting bidirectional relationships among these variables. There were magnitude differences such that the bidirectional relationships were stronger when predicting all adjustment difficulties from cyber aggression and cyber victimization.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch034
Luca Argenton, F. Pallavicini, Gabriele Barone, Andrea Zini, Giacomo Garcea, A. Zanacchi, F. Mantovani
Serious Games (SGs) have been able to shape new opportunities for human training and empowerment, imparting knowledge or skills in an engaging and motivating way to a new generation of learners. Further, they can be used to improve the quality of both individual and collective experience. In particular, SGs can nurture positive emotions promote engagement, as well as enhance social integration and connectedness. An in-depth analysis of each of these aspects will be presented in the chapter, with the support of concrete examples and case-analysis. Eventually, a game design practice will be discussed. Knowledge and awareness of hedonic, eudaimonic and social principles improve user-centered design models can be both fundamental to enhance learning effectiveness and retention and to improve players' well-being, contributing to the development of sustainable communities of practices.
{"title":"Hacking Well-Being","authors":"Luca Argenton, F. Pallavicini, Gabriele Barone, Andrea Zini, Giacomo Garcea, A. Zanacchi, F. Mantovani","doi":"10.4018/978-1-5225-7909-0.ch034","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch034","url":null,"abstract":"Serious Games (SGs) have been able to shape new opportunities for human training and empowerment, imparting knowledge or skills in an engaging and motivating way to a new generation of learners. Further, they can be used to improve the quality of both individual and collective experience. In particular, SGs can nurture positive emotions promote engagement, as well as enhance social integration and connectedness. An in-depth analysis of each of these aspects will be presented in the chapter, with the support of concrete examples and case-analysis. Eventually, a game design practice will be discussed. Knowledge and awareness of hedonic, eudaimonic and social principles improve user-centered design models can be both fundamental to enhance learning effectiveness and retention and to improve players' well-being, contributing to the development of sustainable communities of practices.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-4666-5174-6.CH011
Amy Diepenbrock, Wanda Gibson
This chapter addresses the gap in the literature regarding employer recruitment of college students, and more specifically, the use of social media in the recruitment and hiring processes by both students and employers. Background information on traditional recruiting strategies is briefly discussed as well as how employers are using social media. Additionally, how millennial college students typically communicate and how they should be using social media in the job search process are addressed. This chapter also includes data from a survey, administered by the authors, of U.S.-based employers who recruit college students with anecdotal information about how they utilize, or do not utilize, social media in their recruiting and hiring practices.
{"title":"The Use of Social Media in College Recruiting and the Student Job Search","authors":"Amy Diepenbrock, Wanda Gibson","doi":"10.4018/978-1-4666-5174-6.CH011","DOIUrl":"https://doi.org/10.4018/978-1-4666-5174-6.CH011","url":null,"abstract":"This chapter addresses the gap in the literature regarding employer recruitment of college students, and more specifically, the use of social media in the recruitment and hiring processes by both students and employers. Background information on traditional recruiting strategies is briefly discussed as well as how employers are using social media. Additionally, how millennial college students typically communicate and how they should be using social media in the job search process are addressed. This chapter also includes data from a survey, administered by the authors, of U.S.-based employers who recruit college students with anecdotal information about how they utilize, or do not utilize, social media in their recruiting and hiring practices.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122168228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-0522-8.CH005
G. Gardner
Smartphones bring major changes to the way people gather information and interact. While smartphone use unleashes productivity it also has worrying implications. This study focused on the most important aspects of user experiences of smartphones in an Army work environment. Theory U and systems theory guided the research. This phenomenological study was based on interviews with soldiers of a variety of ages, ranks, and duty positions. While the findings are consistent with other research, it is clear that smartphone use ties to a number of complex leadership challenges. Paradoxical aspects of smartphone use are apparent as it also fosters stress and anxiety. More concerning, such use jeopardizes the development of the traditional military culture of the unit. Current Army policies do not address the concerns expressed by respondents. The results of the study are a call to action for Army leaders and offer a compelling case for transformative change.
{"title":"The Lived Experience of Smartphone Use in a Unit of the United States Army","authors":"G. Gardner","doi":"10.4018/978-1-5225-0522-8.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-0522-8.CH005","url":null,"abstract":"Smartphones bring major changes to the way people gather information and interact. While smartphone use unleashes productivity it also has worrying implications. This study focused on the most important aspects of user experiences of smartphones in an Army work environment. Theory U and systems theory guided the research. This phenomenological study was based on interviews with soldiers of a variety of ages, ranks, and duty positions. While the findings are consistent with other research, it is clear that smartphone use ties to a number of complex leadership challenges. Paradoxical aspects of smartphone use are apparent as it also fosters stress and anxiety. More concerning, such use jeopardizes the development of the traditional military culture of the unit. Current Army policies do not address the concerns expressed by respondents. The results of the study are a call to action for Army leaders and offer a compelling case for transformative change.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"292 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch045
Lei Chen, Min Lu, Yanbin Tu
This case study aims to investigate buyers' post-purchase behavior on feedback ratings. From the data collected from eBay, the statistical analysis shows that the average time length that buyers post their feedback after auctions completion is 15.5 days. New sellers and experienced sellers have different chances to receive feedback. New sellers are more likely to receive negative feedback over positive feedback. The distribution of the feedback types (negative, neutral and positive) does not match that of their associated monetary volumes. This case study also demonstrates that inexperienced eBay buyers are more likely to post negative feedback ratings than experienced ones. New and used products attract different ratings in the three feedback types. With word cloud and word frequency analysis, the authors identify common issues associated with each of the three types of feedback. The paper also discusses the managerial implications and recommendations based on these findings.
{"title":"After Auction's Complete","authors":"Lei Chen, Min Lu, Yanbin Tu","doi":"10.4018/978-1-5225-7909-0.ch045","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch045","url":null,"abstract":"This case study aims to investigate buyers' post-purchase behavior on feedback ratings. From the data collected from eBay, the statistical analysis shows that the average time length that buyers post their feedback after auctions completion is 15.5 days. New sellers and experienced sellers have different chances to receive feedback. New sellers are more likely to receive negative feedback over positive feedback. The distribution of the feedback types (negative, neutral and positive) does not match that of their associated monetary volumes. This case study also demonstrates that inexperienced eBay buyers are more likely to post negative feedback ratings than experienced ones. New and used products attract different ratings in the three feedback types. With word cloud and word frequency analysis, the authors identify common issues associated with each of the three types of feedback. The paper also discusses the managerial implications and recommendations based on these findings.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115386610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}