The technology acceptance model (TAM) has long-term implications for management studies. However, the evolution of the literature on technology acceptance ideas received very little attention in the bibliographic review. Few research reviews provided a systematic overview of the development and progress of the TAM literature based on the entire citation network, while many research reviews focused on re-examining the links between TAM components through meta-analysis. This study investigates: a) how TAM research has evolved and expanded over the last 30 years; b) the main areas in which the TAM model has been used; and c) key contributors to TAM research and their collaborations. This bibliometric analysis was carried out based on 8207 papers published in the Scopus database between 1990 and 2020 to assess the feasibility of the model and its applicability. The findings revealed that early TAM research was conducted both by Eastern and Western scholars and that it has since continued to evolve and be shared widely. Nonetheless, most TAM publications have focused on the same narrow domains of computer science, social science, business, management, and accounting and the trendiest topics were usefulness, trust, ease of use, e-learning, adoption, e-commerce, and social media.
{"title":"Technology Acceptance Model (TAM): A Bibliometric Analysis from Inception","authors":"Swati Gupta, A. F. Abbas, Rajeev Srivastava","doi":"10.18080/jtde.v10n3.598","DOIUrl":"https://doi.org/10.18080/jtde.v10n3.598","url":null,"abstract":"The technology acceptance model (TAM) has long-term implications for management studies. However, the evolution of the literature on technology acceptance ideas received very little attention in the bibliographic review. Few research reviews provided a systematic overview of the development and progress of the TAM literature based on the entire citation network, while many research reviews focused on re-examining the links between TAM components through meta-analysis. This study investigates: a) how TAM research has evolved and expanded over the last 30 years; b) the main areas in which the TAM model has been used; and c) key contributors to TAM research and their collaborations. This bibliometric analysis was carried out based on 8207 papers published in the Scopus database between 1990 and 2020 to assess the feasibility of the model and its applicability. The findings revealed that early TAM research was conducted both by Eastern and Western scholars and that it has since continued to evolve and be shared widely. Nonetheless, most TAM publications have focused on the same narrow domains of computer science, social science, business, management, and accounting and the trendiest topics were usefulness, trust, ease of use, e-learning, adoption, e-commerce, and social media.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80730975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tahani Bani-Yaseen, A. Tahat, K. Kastell, T. Edwan
With increasing Internet-of-Things (IoT) protocols and connectivity, a growing number of attacks are emerging in the associated networks. This work presents approaches using deep learning (DL) to detect attacks in an IoT environment, particularly in narrowband Internet-of-Things (NB-IoT). By virtue of its low cost, low complexity and limited energy, an NB-IoT device will not likely permit cutting-edge security mechanisms, leaving it vulnerable to, for example, denial-of-sleep (DoSl) attacks. For performance analysis, a NB-IoT network was simulated, using ns-3, to generate a novel dataset to represent an implementation of DoSl attacks. After preprocessing, the dataset was presented to a collection of machine learning (ML) models to evaluate their performance. The considered DL recurrent neural network (RNN) models have proven capable of reliably classifying traffic, with very high accuracy, into either a DoSl attack or a normal record. The performance of a long short-term memory (LSTM) classifier has provided accuracies up to 98.99%, with a detection time of 2.54 x 10-5 second/record, surpassing performance of a gated recurrent unit (GRU). RNN DL models have superior performance in terms of accuracy of detecting DoSl attacks in NB-IoT networks, when compared with other ML algorithms, including support vector machine, Gaussian naïve-Bayes, and logistic regression.
随着物联网(IoT)协议和连接性的增加,越来越多的攻击出现在相关网络中。这项工作提出了使用深度学习(DL)来检测物联网环境中的攻击的方法,特别是在窄带物联网(NB-IoT)中。由于其低成本,低复杂性和有限的能源,NB-IoT设备不太可能支持尖端的安全机制,使其容易受到拒绝睡眠(DoSl)攻击等攻击。为了进行性能分析,我们使用ns-3模拟了一个NB-IoT网络,生成了一个新的数据集来表示ddos攻击的实现。预处理后,将数据集呈现给机器学习(ML)模型集合以评估其性能。所考虑的DL递归神经网络(RNN)模型已被证明能够以非常高的准确率可靠地将流量分类为ddos攻击或正常记录。长短期记忆(LSTM)分类器的准确率高达98.99%,检测时间为2.54 x 10-5秒/条记录,超过了门控循环单元(GRU)的性能。与其他ML算法(包括支持向量机、高斯naïve-Bayes和逻辑回归)相比,RNN深度学习模型在检测NB-IoT网络中ddos攻击的准确性方面具有优越的性能。
{"title":"Denial-of-Sleep Attack Detection in NB-IoT Using Deep Learning","authors":"Tahani Bani-Yaseen, A. Tahat, K. Kastell, T. Edwan","doi":"10.18080/jtde.v10n3.532","DOIUrl":"https://doi.org/10.18080/jtde.v10n3.532","url":null,"abstract":"With increasing Internet-of-Things (IoT) protocols and connectivity, a growing number of attacks are emerging in the associated networks. This work presents approaches using deep learning (DL) to detect attacks in an IoT environment, particularly in narrowband Internet-of-Things (NB-IoT). By virtue of its low cost, low complexity and limited energy, an NB-IoT device will not likely permit cutting-edge security mechanisms, leaving it vulnerable to, for example, denial-of-sleep (DoSl) attacks. For performance analysis, a NB-IoT network was simulated, using ns-3, to generate a novel dataset to represent an implementation of DoSl attacks. After preprocessing, the dataset was presented to a collection of machine learning (ML) models to evaluate their performance. The considered DL recurrent neural network (RNN) models have proven capable of reliably classifying traffic, with very high accuracy, into either a DoSl attack or a normal record. The performance of a long short-term memory (LSTM) classifier has provided accuracies up to 98.99%, with a detection time of 2.54 x 10-5 second/record, surpassing performance of a gated recurrent unit (GRU). RNN DL models have superior performance in terms of accuracy of detecting DoSl attacks in NB-IoT networks, when compared with other ML algorithms, including support vector machine, Gaussian naïve-Bayes, and logistic regression. ","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81571314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fifth generation (5G) mobile network technologies include ultra-Reliable Low Latency Communications (uRLLC) capability. To fully exploit uRLLC, distributed Multi- access Edge Computing (MEC) is being developed and introduced at the network edge with an architecture that supports applications and services. Some of the MEC applications will benefit from uRLLC, including virtual reality, augmented reality, education, health, online gaming, automatic manufacturing and Vehicle-to-everything. However, unique challenges and opportunities exist for 5G cellular networks and MEC due to a range of factors, including end-user device mobility and the implementation of the network Control Plane (CP) and User Plane (UP). In this regard, there is a need to optimize protocols and network architecture. This paper investigates latency and related network elements in the next generation mobile cellular network. We also analyze the 5G network latency in the CP and UP. Finally, the paper identifies protocol optimization considerations for MEC integration with 5G to achieve low end-to-end latency.
{"title":"Latency Analysis for Mobile Cellular Network uRLLC Services","authors":"Bin Liang, M. Gregory, Shuo Li","doi":"10.18080/jtde.v10n3.447","DOIUrl":"https://doi.org/10.18080/jtde.v10n3.447","url":null,"abstract":"The fifth generation (5G) mobile network technologies include ultra-Reliable Low Latency Communications (uRLLC) capability. To fully exploit uRLLC, distributed Multi- access Edge Computing (MEC) is being developed and introduced at the network edge with an architecture that supports applications and services. Some of the MEC applications will benefit from uRLLC, including virtual reality, augmented reality, education, health, online gaming, automatic manufacturing and Vehicle-to-everything. However, unique challenges and opportunities exist for 5G cellular networks and MEC due to a range of factors, including end-user device mobility and the implementation of the network Control Plane (CP) and User Plane (UP). In this regard, there is a need to optimize protocols and network architecture. This paper investigates latency and related network elements in the next generation mobile cellular network. We also analyze the 5G network latency in the CP and UP. Finally, the paper identifies protocol optimization considerations for MEC integration with 5G to achieve low end-to-end latency.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84713416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the new era ushered in by Covid-19, priority has been given to peoples’ wellbeing. Wellbeing in virtual communities was analysed from several perspectives, such as healthcare, technology, and social science: hence, the importance of a literature review that clarifies how studying health, happiness, comfort and quality of life of virtual communities’ members could guide firms to conceive their digital communication and marketing strategies. This work presents a literature review of papers spanning from 2010 to 2021, and which study digital marketing strategies driven by wellbeing in virtual communities. Results indicate a growing research interest after the pandemic regarding both positive and negative wellbeing dimensions, especially as drivers for digital segmentation, targeting and positioning strategies. Moreover, results highlight the remarkable increase of papers focusing on the tourism industry, game related strategies, and marketing analytics as relevant tools that support digital communication and influence strategies towards virtual communities. Finally, this literature review provides researchers with guidance for future studies in terms of relevant methodologies and areas of research not yet explored.
{"title":"Digital Marketing Strategies Driven by Wellbeing in Virtual Communities","authors":"Zeineb Ayachi, Rim Jallouli","doi":"10.18080/jtde.v10n3.612","DOIUrl":"https://doi.org/10.18080/jtde.v10n3.612","url":null,"abstract":"In the new era ushered in by Covid-19, priority has been given to peoples’ wellbeing. Wellbeing in virtual communities was analysed from several perspectives, such as healthcare, technology, and social science: hence, the importance of a literature review that clarifies how studying health, happiness, comfort and quality of life of virtual communities’ members could guide firms to conceive their digital communication and marketing strategies. This work presents a literature review of papers spanning from 2010 to 2021, and which study digital marketing strategies driven by wellbeing in virtual communities. Results indicate a growing research interest after the pandemic regarding both positive and negative wellbeing dimensions, especially as drivers for digital segmentation, targeting and positioning strategies. Moreover, results highlight the remarkable increase of papers focusing on the tourism industry, game related strategies, and marketing analytics as relevant tools that support digital communication and influence strategies towards virtual communities. Finally, this literature review provides researchers with guidance for future studies in terms of relevant methodologies and areas of research not yet explored. ","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82817757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Australian Competition and Consumer Commission (ACCC) received an application for merger approval from Telstra Corporation Limited and TPG Telecom Limited related to three interrelated agreements that would put in place a Multi-Operator Core Network (MOCN) arrangement. The three agreements include a MOCN Service Agreement, a Spectrum Authorisation Agreement, and a Mobile Site Transition Agreement. This paper considers the proposed arrangements, identifies that the ACCC’s failure to declare domestic mobile roaming in 2018 was, in some large part, responsible for the market environment that fostered the current proposal, and that the proposed arrangements are not a satisfactory mechanism to fundamentally improve the delivery of reasonably priced, open and competitive, reliable, and high-quality mobile telecommunications in regional and remote areas.
{"title":"Regional Mobile Telecommunications Access, Competition and Public Benefits","authors":"M. Gregory","doi":"10.18080/jtde.v10n2.595","DOIUrl":"https://doi.org/10.18080/jtde.v10n2.595","url":null,"abstract":"The Australian Competition and Consumer Commission (ACCC) received an application for merger approval from Telstra Corporation Limited and TPG Telecom Limited related to three interrelated agreements that would put in place a Multi-Operator Core Network (MOCN) arrangement. The three agreements include a MOCN Service Agreement, a Spectrum Authorisation Agreement, and a Mobile Site Transition Agreement. This paper considers the proposed arrangements, identifies that the ACCC’s failure to declare domestic mobile roaming in 2018 was, in some large part, responsible for the market environment that fostered the current proposal, and that the proposed arrangements are not a satisfactory mechanism to fundamentally improve the delivery of reasonably priced, open and competitive, reliable, and high-quality mobile telecommunications in regional and remote areas.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78214067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This editorial introduces the June issue, which includes a main Special Issue section on Digital Technologies and Innovation, as well as papers from the general submissions. It includes a list of future Special Issues that have been announced.
{"title":"Editorial: Special Issues","authors":"L. Campbell","doi":"10.18080/jtde.v10n2.596","DOIUrl":"https://doi.org/10.18080/jtde.v10n2.596","url":null,"abstract":"This editorial introduces the June issue, which includes a main Special Issue section on Digital Technologies and Innovation, as well as papers from the general submissions. It includes a list of future Special Issues that have been announced.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"45 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72401907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
John Nils Almgren AM (20 June 1930 to 24 December 2021) was renowned in the Australian telecommunications industry for his success, together with his wife Yvonne, in building a major Australian manufacturing company, J. N. Almgren Pty Ltd, starting from scratch in 1960. JNA began as a custom-designer of small electromechanical subsystems for the PMG and State electricity utilities, but later developed successful electronic products for public and private data networks for large corporations. The company was floated on the ASX in 1992 as JNA Telecommunications Ltd. It operated internationally until bought by the US company Lucent Technologies in 1998. John and Yvonne became significant philanthropists, often declining any publicity for their generous donations.
John Nils Almgren AM(1930年6月20日至2021年12月24日)在澳大利亚电信行业因其成功而闻名,与他的妻子Yvonne一起,在1960年从零开始建立了一家主要的澳大利亚制造公司,J. N. Almgren Pty Ltd。JNA最初是为PMG和国家电力公司定制设计小型机电子系统,但后来为大型公司的公共和私人数据网络开发了成功的电子产品。该公司于1992年以JNA Telecommunications Ltd.的名义在澳大利亚证券交易所上市。在1998年被美国朗讯科技(Lucent Technologies)收购之前,该公司一直从事国际业务。约翰和伊冯娜成为了重要的慈善家,他们经常拒绝公开自己的慷慨捐赠。
{"title":"John Nils Almgren (1930–2021)","authors":"Peter Gerrand","doi":"10.18080/jtde.v10n2.587","DOIUrl":"https://doi.org/10.18080/jtde.v10n2.587","url":null,"abstract":"John Nils Almgren AM (20 June 1930 to 24 December 2021) was renowned in the Australian telecommunications industry for his success, together with his wife Yvonne, in building a major Australian manufacturing company, J. N. Almgren Pty Ltd, starting from scratch in 1960. JNA began as a custom-designer of small electromechanical subsystems for the PMG and State electricity utilities, but later developed successful electronic products for public and private data networks for large corporations. The company was floated on the ASX in 1992 as JNA Telecommunications Ltd. It operated internationally until bought by the US company Lucent Technologies in 1998. John and Yvonne became significant philanthropists, often declining any publicity for their generous donations.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82392704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sheharyar, Alamgir Naushad, Imran Khan, Muhammad Abid Hussain, Faizullah Khan Kakar
Radio frequency spectrum is a scarce resource, hence its effective and efficient utilization for contemporary and future technologies is of paramount importance. This paper mainly focuses on analysing conventional models for spectrum management, such as command and control and market-based models, and their inefficacy to serve the upcoming technological demands globally. Generally outlined observations concerning spectrum mismanagement include lesser availability of unassigned spectrum and under-utilization of spectrum allocated to passive users. Due to the considerable urge for flexible spectrum assignment framework models and policies, new spectrum assignment approaches, such as Dynamic Spectrum Access, are investigated. Moreover, models such as Licensed Shared Access (LSA), which evolved from Europe, and Citizen Bands Radio Service (CBRS) from North America are also evaluated in this paper as potential choices for future spectrum management in Pakistan. In the aforesaid models, spectrum is shared among multiple users as per time, place and dimensions, keeping in view the security and priority of incumbent and licensed users. In addition, the efficiency of spectrum utilization and economic advantages of these models have also been analysed. Lastly, LSA and CBRS are studied comparatively, and spectrum management suggestions are made for effective implementation in Pakistan.
{"title":"Study on Fixed and Dynamic Spectrum Access Models for Cellular Networks","authors":"M. Sheharyar, Alamgir Naushad, Imran Khan, Muhammad Abid Hussain, Faizullah Khan Kakar","doi":"10.18080/jtde.v10n2.395","DOIUrl":"https://doi.org/10.18080/jtde.v10n2.395","url":null,"abstract":"Radio frequency spectrum is a scarce resource, hence its effective and efficient utilization for contemporary and future technologies is of paramount importance. This paper mainly focuses on analysing conventional models for spectrum management, such as command and control and market-based models, and their inefficacy to serve the upcoming technological demands globally. Generally outlined observations concerning spectrum mismanagement include lesser availability of unassigned spectrum and under-utilization of spectrum allocated to passive users. Due to the considerable urge for flexible spectrum assignment framework models and policies, new spectrum assignment approaches, such as Dynamic Spectrum Access, are investigated. Moreover, models such as Licensed Shared Access (LSA), which evolved from Europe, and Citizen Bands Radio Service (CBRS) from North America are also evaluated in this paper as potential choices for future spectrum management in Pakistan. In the aforesaid models, spectrum is shared among multiple users as per time, place and dimensions, keeping in view the security and priority of incumbent and licensed users. In addition, the efficiency of spectrum utilization and economic advantages of these models have also been analysed. Lastly, LSA and CBRS are studied comparatively, and spectrum management suggestions are made for effective implementation in Pakistan.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"233 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79564750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, through the replication of a pre-COVID-19 research project, we seek to test and compare first-year Australian university students’ study and private uses of technology; compare the desires and capacities of different cohorts (Law and Justice vs Engineering) for technology use; and identify any impacts arising from COVID-19 to their learning experiences. Quantitative and qualitative data, collected by an online questionnaire, identified that, while some participants had more experience with different technologies, there were limited differences between the cohorts’ willingness to use, and their use of, technology for study purposes. Concerns expressed by participants related to where, when, and for what purpose technology was used. Participants all had access to a smart phone, and almost all used a laptop for study purposes. The results suggest the combination of online or pre-recorded lectures and synchronous (either face-to-face or online) tutorials was the most favoured option. While participants were comfortable with the use of technology in teaching and learning, they were wary about using such tools for private communications; however, Zoom and Microsoft Teams, appeared to be in common use. The results confirm the need for a broader and more in-depth understanding of students’ technology uses, needs, and desires.
{"title":"University Students’ Engagement with Devices and Technology","authors":"L. Cradduck, M. Gregory, L. Campbell","doi":"10.18080/jtde.v10n2.594","DOIUrl":"https://doi.org/10.18080/jtde.v10n2.594","url":null,"abstract":"In this paper, through the replication of a pre-COVID-19 research project, we seek to test and compare first-year Australian university students’ study and private uses of technology; compare the desires and capacities of different cohorts (Law and Justice vs Engineering) for technology use; and identify any impacts arising from COVID-19 to their learning experiences. Quantitative and qualitative data, collected by an online questionnaire, identified that, while some participants had more experience with different technologies, there were limited differences between the cohorts’ willingness to use, and their use of, technology for study purposes. Concerns expressed by participants related to where, when, and for what purpose technology was used. Participants all had access to a smart phone, and almost all used a laptop for study purposes. The results suggest the combination of online or pre-recorded lectures and synchronous (either face-to-face or online) tutorials was the most favoured option. While participants were comfortable with the use of technology in teaching and learning, they were wary about using such tools for private communications; however, Zoom and Microsoft Teams, appeared to be in common use. The results confirm the need for a broader and more in-depth understanding of students’ technology uses, needs, and desires.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80054714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Smaoui, Fatma Choura, Mohamed Wassim Abassi, Hela Zouaoui
In a context of overabundance of information on social media, the challenge for an organization is to stand out and to create a link with its target. A Facebook page is a means for a company to federate the users around communities and to drive their engagement. The objective of this research is to test the effect of the use of humour in Facebook posts on perception, attitude and intention of engagement of social media users. An experimental study was conducted on a sample of fans of a Facebook page where we manipulated absence/presence of humour, and humour types. Results show a positive effect of perceived humour on attitude toward the publication, which influences the Facebook user’s intention to engage. Need for humour does not moderate the effect of humour on the attitude and the results do not reveal any difference between the types of humour tested.
{"title":"Does Humour Enhance Facebook Users’ Responses?","authors":"F. Smaoui, Fatma Choura, Mohamed Wassim Abassi, Hela Zouaoui","doi":"10.18080/jtde.v10n2.509","DOIUrl":"https://doi.org/10.18080/jtde.v10n2.509","url":null,"abstract":"In a context of overabundance of information on social media, the challenge for an organization is to stand out and to create a link with its target. A Facebook page is a means for a company to federate the users around communities and to drive their engagement. The objective of this research is to test the effect of the use of humour in Facebook posts on perception, attitude and intention of engagement of social media users. An experimental study was conducted on a sample of fans of a Facebook page where we manipulated absence/presence of humour, and humour types. Results show a positive effect of perceived humour on attitude toward the publication, which influences the Facebook user’s intention to engage. Need for humour does not moderate the effect of humour on the attitude and the results do not reveal any difference between the types of humour tested.","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74047100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}