Pub Date : 2021-05-05DOI: 10.1108/ITP-10-2020-0682
Samrat Gupta, Swanand J. Deodhar
PurposeCommunities representing groups of agents with similar interests or functions are one of the essential features of complex networks. Finding communities in real-world networks is critical for analyzing complex systems in various areas ranging from collaborative information to political systems. Given the different characteristics of networks and the capability of community detection in handling a plethora of societal problems, community detection methods represent an emerging area of research. Contributing to this field, the authors propose a new community detection algorithm based on the hybridization of node and link granulation.Design/methodology/approachThe proposed algorithm utilizes a rough set-theoretic concept called closure on networks. Initial sets are constructed by using neighborhood topology around the nodes as well as links and represented as two different categories of granules. Subsequently, the authors iteratively obtain the constrained closure of these sets. The authors use node mutuality and link mutuality as merging criteria for node and link granules, respectively, during the iterations. Finally, the constrained closure subsets of nodes and links are combined and refined using the Jaccard similarity coefficient and a local density function to obtain communities in a binary network.FindingsExtensive experiments conducted on twelve real-world networks followed by a comparison with state-of-the-art methods demonstrate the viability and effectiveness of the proposed algorithm.Research limitations/implicationsThe study also contributes to the ongoing effort related to the application of soft computing techniques to model complex systems. The extant literature has integrated a rough set-theoretic approach with a fuzzy granular model (Kundu and Pal, 2015) and spectral clustering (Huang and Xiao, 2012) for node-centric community detection in complex networks. In contributing to this stream of work, the proposed algorithm leverages the unexplored synergy between rough set theory, node granulation and link granulation in the context of complex networks. Combined with experiments of network datasets from various domains, the results indicate that the proposed algorithm can effectively reveal co-occurring disjoint, overlapping and nested communities without necessarily assigning each node to a community.Practical implicationsThis study carries important practical implications for complex adaptive systems in business and management sciences, in which entities are increasingly getting organized into communities (Jacucci et al., 2006). The proposed community detection method can be used for network-based fraud detection by enabling experts to understand the formation and development of fraudulent setups with an active exchange of information and resources between the firms (Van Vlasselaer et al., 2017). Products and services are getting connected and mapped in every walk of life due to the emergence of a variety of interconnected dev
具有相似兴趣或功能的智能体组成的群体是复杂网络的基本特征之一。在现实世界的网络中寻找社区对于分析从协作信息到政治系统等各个领域的复杂系统至关重要。鉴于网络的不同特征和社区检测处理大量社会问题的能力,社区检测方法是一个新兴的研究领域。为此,作者提出了一种基于节点和链路粒化杂交的社区检测算法。设计/方法/方法所提出的算法利用了一个称为网络闭包的粗糙集理论概念。初始集通过节点和链路周围的邻域拓扑构造,并表示为两种不同类别的颗粒。随后,作者迭代地得到了这些集合的约束闭包。在迭代过程中,作者分别使用节点互性和链路互性作为节点颗粒和链路颗粒的合并准则。最后,利用Jaccard相似系数和局部密度函数对节点和链路的约束闭包子集进行组合和细化,得到二元网络中的社团。在12个真实世界的网络上进行了大量的实验,然后与最先进的方法进行了比较,证明了所提出算法的可行性和有效性。研究的局限性/意义本研究也有助于将软计算技术应用于复杂系统建模方面的持续努力。现有文献将粗糙集理论方法与模糊颗粒模型(Kundu and Pal, 2015)和光谱聚类(Huang and Xiao, 2012)相结合,用于复杂网络中以节点为中心的社区检测。为了促进这一工作流,所提出的算法利用了复杂网络背景下粗糙集理论、节点粒化和链接粒化之间未被探索的协同作用。结合不同领域网络数据集的实验结果表明,该算法可以有效地揭示共同出现的不相交、重叠和嵌套社区,而不必将每个节点分配给一个社区。实际意义这项研究对商业和管理科学中的复杂适应系统具有重要的实际意义,在这些系统中,实体越来越多地组织成社区(Jacucci et al., 2006)。所提出的社区检测方法可用于基于网络的欺诈检测,使专家能够了解欺诈设置的形成和发展,并在公司之间积极交换信息和资源(Van Vlasselaer等人,2017)。由于各种互联设备、社交网络和软件应用程序的出现,产品和服务正在被连接和映射到生活的各个方面。所提出的算法可以扩展到客户轨迹模式的社区检测和设计在线产品和服务的推荐系统(Ghose等人,2019;Liu and Wang, 2017)。与先前的研究一致,所提出的算法可以帮助公司调查博客或社交媒体用户对其服务和产品的隐性社区特征,从而识别同行影响者并进行有针对性的营销(Chau和Xu, 2012;De Matos et al., 2014;张等人,2016)。该算法可用于理解每个组的行为以及该组的适当通信策略。例如,使用特定语言或关注特定帐户的组可能比其他组从特定内容中获益更多。因此,提出的算法可以帮助探索定义社区的因素,并应对许多现实生活中的挑战。原创性/价值这项工作基于一个理论论点,即网络中的社区不仅基于节点之间的兼容性,还基于链路之间的兼容性。在上述论点的基础上,作者提出了一种社区检测方法,该方法考虑了网络(节点和链接)中实体之间的关系,而不是主要基于节点之间关系的传统方法。
{"title":"Understanding digitally enabled complex networks: a plural granulation based hybrid community detection approach","authors":"Samrat Gupta, Swanand J. Deodhar","doi":"10.1108/ITP-10-2020-0682","DOIUrl":"https://doi.org/10.1108/ITP-10-2020-0682","url":null,"abstract":"PurposeCommunities representing groups of agents with similar interests or functions are one of the essential features of complex networks. Finding communities in real-world networks is critical for analyzing complex systems in various areas ranging from collaborative information to political systems. Given the different characteristics of networks and the capability of community detection in handling a plethora of societal problems, community detection methods represent an emerging area of research. Contributing to this field, the authors propose a new community detection algorithm based on the hybridization of node and link granulation.Design/methodology/approachThe proposed algorithm utilizes a rough set-theoretic concept called closure on networks. Initial sets are constructed by using neighborhood topology around the nodes as well as links and represented as two different categories of granules. Subsequently, the authors iteratively obtain the constrained closure of these sets. The authors use node mutuality and link mutuality as merging criteria for node and link granules, respectively, during the iterations. Finally, the constrained closure subsets of nodes and links are combined and refined using the Jaccard similarity coefficient and a local density function to obtain communities in a binary network.FindingsExtensive experiments conducted on twelve real-world networks followed by a comparison with state-of-the-art methods demonstrate the viability and effectiveness of the proposed algorithm.Research limitations/implicationsThe study also contributes to the ongoing effort related to the application of soft computing techniques to model complex systems. The extant literature has integrated a rough set-theoretic approach with a fuzzy granular model (Kundu and Pal, 2015) and spectral clustering (Huang and Xiao, 2012) for node-centric community detection in complex networks. In contributing to this stream of work, the proposed algorithm leverages the unexplored synergy between rough set theory, node granulation and link granulation in the context of complex networks. Combined with experiments of network datasets from various domains, the results indicate that the proposed algorithm can effectively reveal co-occurring disjoint, overlapping and nested communities without necessarily assigning each node to a community.Practical implicationsThis study carries important practical implications for complex adaptive systems in business and management sciences, in which entities are increasingly getting organized into communities (Jacucci et al., 2006). The proposed community detection method can be used for network-based fraud detection by enabling experts to understand the formation and development of fraudulent setups with an active exchange of information and resources between the firms (Van Vlasselaer et al., 2017). Products and services are getting connected and mapped in every walk of life due to the emergence of a variety of interconnected dev","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"16 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82113851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-29DOI: 10.1108/ITP-09-2020-0633
E. Zamani, Anastasia Griva, Konstantina Spanaki, Paidi O'Raghallaigh, David Sammon
PurposeThe study aims to provide insights in the sensemaking process and the use of business analytics (BA) for project selection and prioritisation in start-up settings. A major focus is on the various ways start-ups can understand their data through the analytical process of sensemaking.Design/methodology/approachThis is a comparative case study of two start-ups that use BA in their projects. The authors follow an interpretive approach and draw from the constructivist grounded theory method (GTM) for the purpose of data analysis, whereby the theory of sensemaking functions as the sensitising device that supports the interpretation of the data.FindingsThe key findings lie within the scope of project selection and prioritisation, where the sensemaking process is implicitly influenced by each start-up's strategy and business model. BA helps start-ups notice changes within their internal and external environment and focus their attention on the more critical questions along the lines of their processes, operations and business model. However, BA alone cannot support decision-making around less structured problems such as project selection and prioritisation, where intuitive judgement and personal opinion are still heavily used.Originality/valueThis study extends the research on BA applied in organisations as tools for business development. Specifically, the authors draw on the literature of BA tools in support of project management from multiple perspectives. The perspectives include but are not limited to project assessment and prioritisation. The authors view the decision-making process and the path from insight to value, as a sensemaking process, where data become part of the sensemaking roadmap and BA helps start-ups navigate the decision-making process.
{"title":"Making sense of business analytics in project selection and prioritisation: insights from the start-up trenches","authors":"E. Zamani, Anastasia Griva, Konstantina Spanaki, Paidi O'Raghallaigh, David Sammon","doi":"10.1108/ITP-09-2020-0633","DOIUrl":"https://doi.org/10.1108/ITP-09-2020-0633","url":null,"abstract":"PurposeThe study aims to provide insights in the sensemaking process and the use of business analytics (BA) for project selection and prioritisation in start-up settings. A major focus is on the various ways start-ups can understand their data through the analytical process of sensemaking.Design/methodology/approachThis is a comparative case study of two start-ups that use BA in their projects. The authors follow an interpretive approach and draw from the constructivist grounded theory method (GTM) for the purpose of data analysis, whereby the theory of sensemaking functions as the sensitising device that supports the interpretation of the data.FindingsThe key findings lie within the scope of project selection and prioritisation, where the sensemaking process is implicitly influenced by each start-up's strategy and business model. BA helps start-ups notice changes within their internal and external environment and focus their attention on the more critical questions along the lines of their processes, operations and business model. However, BA alone cannot support decision-making around less structured problems such as project selection and prioritisation, where intuitive judgement and personal opinion are still heavily used.Originality/valueThis study extends the research on BA applied in organisations as tools for business development. Specifically, the authors draw on the literature of BA tools in support of project management from multiple perspectives. The perspectives include but are not limited to project assessment and prioritisation. The authors view the decision-making process and the path from insight to value, as a sensemaking process, where data become part of the sensemaking roadmap and BA helps start-ups navigate the decision-making process.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"29 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80017381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-23DOI: 10.1108/ITP-08-2020-0603
Sheshadri Chatterjee, N. Rana, Yogesh K. Dwivedi
PurposeThe purpose of this article is to identify how the organisations are able to improve their business value through acquisition of business analytics capabilities and by improving their performance.Design/methodology/approachWith the help of literature survey, along with standard resource-based view framework, a conceptual model has been developed. These have been statistically tested by collecting the data using the survey questionnaire from 306 selected respondents from various service sector- and product-based organisations in India. To analyse the data we have used partial least square–based structural equation modelling.FindingsThe study highlights that by the help of data acquisition and tool acquisition as two vital components the acquisition of business analytics capabilities could improve the business value of the organisation by strengthening its organisational performance. The findings of this research also indicated that acquisition of business analytics capabilities has a significant influence on an organisation's business process performance and business decision, which in turn significantly influences organisational performance. And organisational performance eventually positively influences its business value. The model was found to provide an explanative power of 71%.Research limitations/implicationsThe proposed research model can provide effective recommendations to the management of the organisations to realise the importance of acquisition of effective business analytics capabilities to eventually improve the business value of the organisation.Originality/valueNo specific studies, as yet, have analysed the effects of acquisition of business analytics capabilities for improving organisational performance mediated through business process performance and business decision. Therefore, this research has explored the distinctive effort to empirically validate this understanding.
{"title":"How does business analytics contribute to organisational performance and business value? A resource-based view","authors":"Sheshadri Chatterjee, N. Rana, Yogesh K. Dwivedi","doi":"10.1108/ITP-08-2020-0603","DOIUrl":"https://doi.org/10.1108/ITP-08-2020-0603","url":null,"abstract":"PurposeThe purpose of this article is to identify how the organisations are able to improve their business value through acquisition of business analytics capabilities and by improving their performance.Design/methodology/approachWith the help of literature survey, along with standard resource-based view framework, a conceptual model has been developed. These have been statistically tested by collecting the data using the survey questionnaire from 306 selected respondents from various service sector- and product-based organisations in India. To analyse the data we have used partial least square–based structural equation modelling.FindingsThe study highlights that by the help of data acquisition and tool acquisition as two vital components the acquisition of business analytics capabilities could improve the business value of the organisation by strengthening its organisational performance. The findings of this research also indicated that acquisition of business analytics capabilities has a significant influence on an organisation's business process performance and business decision, which in turn significantly influences organisational performance. And organisational performance eventually positively influences its business value. The model was found to provide an explanative power of 71%.Research limitations/implicationsThe proposed research model can provide effective recommendations to the management of the organisations to realise the importance of acquisition of effective business analytics capabilities to eventually improve the business value of the organisation.Originality/valueNo specific studies, as yet, have analysed the effects of acquisition of business analytics capabilities for improving organisational performance mediated through business process performance and business decision. Therefore, this research has explored the distinctive effort to empirically validate this understanding.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"22 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86413267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-15DOI: 10.1108/ITP-09-2020-0639
F. Niederman
PurposeThe purpose of this essay is to illustrate how project management “pull” and AI or analytics technology “push” are likely to result in incremental and disruptive evolution of project management capabilities and practices.Design/methodology/approachThis paper is written as a critical essay reflecting the experience and reflections of the author with many ideas drawn from and extending selected items from project management, artificial intelligence (AI) and analytics literatures.FindingsNeither AI nor sophisticated analytics is likely to elicit hands on attention from project managers, other than those producing AI or analytics-based artifacts or using these tools to create their products and services. However, through the conduit of packaged software support for project management, new tools and approaches can be expected to more effectively support current activities, to streamline or eliminate activities that can be automated, to extend current capabilities with the availability of increased data, computing capacity and mathematically based algorithms and to suggest ways to reconceive how projects are done and whether they are needed.Research limitations/implicationsThis essay includes projections of possible, some likely and some unlikely, events and states that have not yet occurred. Although the hope and purpose are to alert readers to the possibilities of what may occur as logical extensions of current states, it is improbable that all such projections will come to pass at all or in the way described. Nonetheless, consideration of the future ranging from current trends, the interplay among intersecting trends and scenarios of future states can sharpen awareness of the effects of current choices regarding actions, decisions and plans improving the probability that the authors can move toward desired rather than undesired future states.Practical implicationsProject managers not involved personally with creating AI or analytics products can avoid mastering detailed skill sets in AI and analytics, but should scan for new software features and affordances that they can use enable new levels of productivity, net benefit creation and ability to sleep well at night.Originality/valueThis essay brings together AI, analytics and project management to imagine and anticipate possible directions for the evolution of the project management domain.
{"title":"Project management: openings for disruption from AI and advanced analytics","authors":"F. Niederman","doi":"10.1108/ITP-09-2020-0639","DOIUrl":"https://doi.org/10.1108/ITP-09-2020-0639","url":null,"abstract":"PurposeThe purpose of this essay is to illustrate how project management “pull” and AI or analytics technology “push” are likely to result in incremental and disruptive evolution of project management capabilities and practices.Design/methodology/approachThis paper is written as a critical essay reflecting the experience and reflections of the author with many ideas drawn from and extending selected items from project management, artificial intelligence (AI) and analytics literatures.FindingsNeither AI nor sophisticated analytics is likely to elicit hands on attention from project managers, other than those producing AI or analytics-based artifacts or using these tools to create their products and services. However, through the conduit of packaged software support for project management, new tools and approaches can be expected to more effectively support current activities, to streamline or eliminate activities that can be automated, to extend current capabilities with the availability of increased data, computing capacity and mathematically based algorithms and to suggest ways to reconceive how projects are done and whether they are needed.Research limitations/implicationsThis essay includes projections of possible, some likely and some unlikely, events and states that have not yet occurred. Although the hope and purpose are to alert readers to the possibilities of what may occur as logical extensions of current states, it is improbable that all such projections will come to pass at all or in the way described. Nonetheless, consideration of the future ranging from current trends, the interplay among intersecting trends and scenarios of future states can sharpen awareness of the effects of current choices regarding actions, decisions and plans improving the probability that the authors can move toward desired rather than undesired future states.Practical implicationsProject managers not involved personally with creating AI or analytics products can avoid mastering detailed skill sets in AI and analytics, but should scan for new software features and affordances that they can use enable new levels of productivity, net benefit creation and ability to sleep well at night.Originality/valueThis essay brings together AI, analytics and project management to imagine and anticipate possible directions for the evolution of the project management domain.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"2 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88339630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1108/ITP-05-2020-0290
Xiaoxiao Shi, Wei Pan, Wei Pan, Wei Shan
PurposeCrowdsourcing communities enable companies to post challenges that are completed by solvers (workers); their success depends on engagement, requiring both creativity and effort. This study explores solver engagement in online crowdsourcing communities, advancing the theory of trait engagement by investigating the mediating roles of: (a) task-related self-efficacy in linking conscientiousness, neuroticism and extraversion, with solver engagement, and (b) task complexity in influencing the mediation.Design/methodology/approach215 valid responses were obtained from solvers engaged in the popular Chinese crowdsourcing community, Epwk.com, using an online questionnaire. PLS was then used to analyze the data.FindingsResults show that self-efficacy mediates the relationships for conscientiousness, neuroticism and extraversion, with solver engagement. Moderated mediation analysis revealed that self-efficacy mediates the relationships for: (a) conscientiousness and extraversion, for only solvers with high task complexity; and (b) neuroticism, for only solvers with low task complexity.Originality/valueThe authors’ findings underscore the importance of accounting for solvers' situational contexts when examining the relationships between personality, self-efficacy and solver engagement in online crowdsourcing communities.
{"title":"Understanding the effects of personality traits on solver engagement in crowdsourcing communities: a moderated mediation investigation","authors":"Xiaoxiao Shi, Wei Pan, Wei Pan, Wei Shan","doi":"10.1108/ITP-05-2020-0290","DOIUrl":"https://doi.org/10.1108/ITP-05-2020-0290","url":null,"abstract":"PurposeCrowdsourcing communities enable companies to post challenges that are completed by solvers (workers); their success depends on engagement, requiring both creativity and effort. This study explores solver engagement in online crowdsourcing communities, advancing the theory of trait engagement by investigating the mediating roles of: (a) task-related self-efficacy in linking conscientiousness, neuroticism and extraversion, with solver engagement, and (b) task complexity in influencing the mediation.Design/methodology/approach215 valid responses were obtained from solvers engaged in the popular Chinese crowdsourcing community, Epwk.com, using an online questionnaire. PLS was then used to analyze the data.FindingsResults show that self-efficacy mediates the relationships for conscientiousness, neuroticism and extraversion, with solver engagement. Moderated mediation analysis revealed that self-efficacy mediates the relationships for: (a) conscientiousness and extraversion, for only solvers with high task complexity; and (b) neuroticism, for only solvers with low task complexity.Originality/valueThe authors’ findings underscore the importance of accounting for solvers' situational contexts when examining the relationships between personality, self-efficacy and solver engagement in online crowdsourcing communities.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"15 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88815442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-25DOI: 10.1108/ITP-05-2020-0316
Pouyan Esmaeilzadeh, Spurthy Dharanikota, Tala Mirzaei
PurposePatient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients access, modify and share their medical information with multiple healthcare organizations. Although existing studies examine patient engagement, more research is required to investigate patients' attitudes and willingness to play an active role in patient-centered information exchange. The study's main objective is to develop a model based on the belief-attitude-intention paradigm to empirically examine the effects of patients' attitudes toward engagement in care on their willingness to participate in patient-centric HIE.Design/methodology/approachThe authors conducted an online survey study to identify the antecedents and consequences of patients' attitudes toward engagement in care. To empirically test the research model, the authors collected data from a national sample (n = 357) of individuals in the United States. The data were analyzed using structural equation modeling (SEM).FindingsThe proposed model categorizes the antecedents to patients' attitudes toward engagement in patient-related and healthcare system factors. The results show that patient-related factors (perceived health literacy and perceived coping ability) and health system factors (perceived experience with the healthcare organization and perceived patient-provider interaction) significantly shape patient attitude toward care management engagement. The results indicate that patients' attitudes toward engaging in their healthcare significantly contribute to their willingness to participate in medical information sharing through patient-centric HIE initiatives. Moreover, the authors’ findings also demonstrate that the link between patient engagement and willingness to participate in HIE is stronger for individuals who perceive lower levels of privacy and security concerns.Originality/valueThe authors validate the proposed model explaining patients' perceptions about their characteristics and the healthcare system significantly influence their attitude toward engaging in their care. This study also suggests that patients' favorable attitude toward engagement can bring patient-centric HIE efforts onto a path to success. The authors’ research attempts to shed light on the importance of patients' roles in adopting patient-centric HIE initiatives. Theoretical and practical contributions of this study are noticeable since they could result in a deeper understanding of the concept of patient engagement and how it may affect healthcare services in an evolving digital world. The authors’ findings can help healthcare organizations provide public citizen-centric services by introducing user-oriented approaches in healthcare delivery systems.
{"title":"The role of patient engagement in patient-centric health information exchange (HIE) initiatives: an empirical study in the United States","authors":"Pouyan Esmaeilzadeh, Spurthy Dharanikota, Tala Mirzaei","doi":"10.1108/ITP-05-2020-0316","DOIUrl":"https://doi.org/10.1108/ITP-05-2020-0316","url":null,"abstract":"PurposePatient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients access, modify and share their medical information with multiple healthcare organizations. Although existing studies examine patient engagement, more research is required to investigate patients' attitudes and willingness to play an active role in patient-centered information exchange. The study's main objective is to develop a model based on the belief-attitude-intention paradigm to empirically examine the effects of patients' attitudes toward engagement in care on their willingness to participate in patient-centric HIE.Design/methodology/approachThe authors conducted an online survey study to identify the antecedents and consequences of patients' attitudes toward engagement in care. To empirically test the research model, the authors collected data from a national sample (n = 357) of individuals in the United States. The data were analyzed using structural equation modeling (SEM).FindingsThe proposed model categorizes the antecedents to patients' attitudes toward engagement in patient-related and healthcare system factors. The results show that patient-related factors (perceived health literacy and perceived coping ability) and health system factors (perceived experience with the healthcare organization and perceived patient-provider interaction) significantly shape patient attitude toward care management engagement. The results indicate that patients' attitudes toward engaging in their healthcare significantly contribute to their willingness to participate in medical information sharing through patient-centric HIE initiatives. Moreover, the authors’ findings also demonstrate that the link between patient engagement and willingness to participate in HIE is stronger for individuals who perceive lower levels of privacy and security concerns.Originality/valueThe authors validate the proposed model explaining patients' perceptions about their characteristics and the healthcare system significantly influence their attitude toward engaging in their care. This study also suggests that patients' favorable attitude toward engagement can bring patient-centric HIE efforts onto a path to success. The authors’ research attempts to shed light on the importance of patients' roles in adopting patient-centric HIE initiatives. Theoretical and practical contributions of this study are noticeable since they could result in a deeper understanding of the concept of patient engagement and how it may affect healthcare services in an evolving digital world. The authors’ findings can help healthcare organizations provide public citizen-centric services by introducing user-oriented approaches in healthcare delivery systems.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"48 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78577146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-22DOI: 10.1108/ITP-07-2019-0323
Dezhi Wu, Jingjun Xu, Sue Abdinnour
PurposeThe paper aims to investigate how a tablet's design features, namely, its navigation design and visual appearance, influence users' enjoyment, concentration and control, when using tablets for problem-solving, and thereafter how their core flow experiences impact their perceived performance and efficiency with problem-solving.Design/methodology/approachThis study uses a field survey approach to engage 87 participants in a decision sciences class to use eTextbooks and a few other associated educational apps including CourseSmart app for e-notes and highlighting, sketchbook app and a calculator app in tablets to resolve class problems at a large US university.FindingsThis study finds that the tablet's interface design features (navigation and visual appearance) make users engrossed in their problem-solving processes with perceived enjoyment, concentration and control. This, in turn, impacts their perceived performance and efficiency. Moreover, visual appearance plays the most significant role in arousing users' affective emotions (i.e. enjoyment), while interface navigation is crucial to engage users' deep concentration (i.e. cognition) and control for problem-solving.Practical implicationsModern tablets are being used widely in various sectors. More in-depth user flow experience design associated with tablet use for problem-solving contexts should be further advocated in order to provide more engaging and meaningful flow experiences to users.Originality/valueThis study shows that the design of the tablet interface can engage users in problem-solving processes in both affective and cognitive ways. It provides valuable insights on tablet interface design for problem-solving.
{"title":"Tablets for problem-solving through a flow theory: the impact of navigation and visual appearance on perceived performance and efficiency","authors":"Dezhi Wu, Jingjun Xu, Sue Abdinnour","doi":"10.1108/ITP-07-2019-0323","DOIUrl":"https://doi.org/10.1108/ITP-07-2019-0323","url":null,"abstract":"PurposeThe paper aims to investigate how a tablet's design features, namely, its navigation design and visual appearance, influence users' enjoyment, concentration and control, when using tablets for problem-solving, and thereafter how their core flow experiences impact their perceived performance and efficiency with problem-solving.Design/methodology/approachThis study uses a field survey approach to engage 87 participants in a decision sciences class to use eTextbooks and a few other associated educational apps including CourseSmart app for e-notes and highlighting, sketchbook app and a calculator app in tablets to resolve class problems at a large US university.FindingsThis study finds that the tablet's interface design features (navigation and visual appearance) make users engrossed in their problem-solving processes with perceived enjoyment, concentration and control. This, in turn, impacts their perceived performance and efficiency. Moreover, visual appearance plays the most significant role in arousing users' affective emotions (i.e. enjoyment), while interface navigation is crucial to engage users' deep concentration (i.e. cognition) and control for problem-solving.Practical implicationsModern tablets are being used widely in various sectors. More in-depth user flow experience design associated with tablet use for problem-solving contexts should be further advocated in order to provide more engaging and meaningful flow experiences to users.Originality/valueThis study shows that the design of the tablet interface can engage users in problem-solving processes in both affective and cognitive ways. It provides valuable insights on tablet interface design for problem-solving.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"54 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83115319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-15DOI: 10.1108/ITP-06-2019-0304
Frank G. Goethals, Jennifer L. Ziegelmayer
PurposeThe advent of extreme automation from new technologies such as artificial intelligence portends a massive increase in unemployment. The psychological impact of this threat on the workforce is critically important. This paper aims to examine the functioning of individuals' anxiety buffers in response to this threat.Design/methodology/approachA two-stage mixed-methods design is used. In stage 1, qualitative data are gathered through semi-structured interviews. In stage 2, quantitative data are collected through two experiments to assess the psychological impact of exposure to the threat.FindingsExposure to the threat of extreme automation reduces self-esteem, faith in the worldview and attachment security. When self-esteem and attachment security are under attack, they are ineffective as anxiety buffers, and anxiety levels increase. Additionally, there is a distal effect such that during a period of distraction, the threatened anxiety buffers are reinforced and return to their normal levels.Research limitations/implicationsThis study is limited to a homogenous culture in which work is highly salient. Future research should include other cultures, other methods of exposure and further examine the distal effects.Originality/valueThe study examines the previously underexplored issue of individuals' psychological response to the impending changes in the workforce because of technological advancements.
{"title":"Anxiety buffers and the threat of extreme automation: a terror management theory perspective","authors":"Frank G. Goethals, Jennifer L. Ziegelmayer","doi":"10.1108/ITP-06-2019-0304","DOIUrl":"https://doi.org/10.1108/ITP-06-2019-0304","url":null,"abstract":"PurposeThe advent of extreme automation from new technologies such as artificial intelligence portends a massive increase in unemployment. The psychological impact of this threat on the workforce is critically important. This paper aims to examine the functioning of individuals' anxiety buffers in response to this threat.Design/methodology/approachA two-stage mixed-methods design is used. In stage 1, qualitative data are gathered through semi-structured interviews. In stage 2, quantitative data are collected through two experiments to assess the psychological impact of exposure to the threat.FindingsExposure to the threat of extreme automation reduces self-esteem, faith in the worldview and attachment security. When self-esteem and attachment security are under attack, they are ineffective as anxiety buffers, and anxiety levels increase. Additionally, there is a distal effect such that during a period of distraction, the threatened anxiety buffers are reinforced and return to their normal levels.Research limitations/implicationsThis study is limited to a homogenous culture in which work is highly salient. Future research should include other cultures, other methods of exposure and further examine the distal effects.Originality/valueThe study examines the previously underexplored issue of individuals' psychological response to the impending changes in the workforce because of technological advancements.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"43 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86690125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-28DOI: 10.1108/itp-09-2020-0610
Forough Nasirpouri Shadbad, D. Biros
PurposeThis study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant interaction with IT influences the likelihood of security incidents. Although past research studied the concept of security-related technostress, the effect of IT use itself on employees’ extra-role activities such as security-related behaviors is unanswered. Thus, this paper aims to provide an understanding of the negative impact of technostress on employee information security policy (ISP) compliance.Design/methodology/approachDrawing on technostress literature, this research develops a research model that investigates the effect of technostress on employee intention to violate ISPs. It also extends the dimensionality of technostress construct by adding a new dimension called “techno-unreliability” that shows promising results. The authors use online survey data from a sample of 356 employees who have technology-based professions. We apply the structural equation modeling technique to evaluate the proposed research model.FindingsFindings showed that IT use imposes high-level perceptions of a set of technostress creators, which makes users rationalize their ISP violations and engage in non-compliant behaviors. Further analysis of each dimension of technostress showed that techno-complexity, techno-invasion and techno-insecurity account for higher ISP non-compliant behaviors.Originality/valueThis study provides a new understanding of technostress to the context of information security and emphasizes on its negative impact on employee ISP compliance behaviors.
{"title":"Technostress and its influence on employee information security policy compliance","authors":"Forough Nasirpouri Shadbad, D. Biros","doi":"10.1108/itp-09-2020-0610","DOIUrl":"https://doi.org/10.1108/itp-09-2020-0610","url":null,"abstract":"PurposeThis study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant interaction with IT influences the likelihood of security incidents. Although past research studied the concept of security-related technostress, the effect of IT use itself on employees’ extra-role activities such as security-related behaviors is unanswered. Thus, this paper aims to provide an understanding of the negative impact of technostress on employee information security policy (ISP) compliance.Design/methodology/approachDrawing on technostress literature, this research develops a research model that investigates the effect of technostress on employee intention to violate ISPs. It also extends the dimensionality of technostress construct by adding a new dimension called “techno-unreliability” that shows promising results. The authors use online survey data from a sample of 356 employees who have technology-based professions. We apply the structural equation modeling technique to evaluate the proposed research model.FindingsFindings showed that IT use imposes high-level perceptions of a set of technostress creators, which makes users rationalize their ISP violations and engage in non-compliant behaviors. Further analysis of each dimension of technostress showed that techno-complexity, techno-invasion and techno-insecurity account for higher ISP non-compliant behaviors.Originality/valueThis study provides a new understanding of technostress to the context of information security and emphasizes on its negative impact on employee ISP compliance behaviors.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"20 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87424368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-31DOI: 10.1108/ITP-06-2019-0297
E. Arakpogun, Z. Elsahn, R. Kummitha
{"title":"Bridging the digital divide in Africa via universal service funds: An institutional perspective","authors":"E. Arakpogun, Z. Elsahn, R. Kummitha","doi":"10.1108/ITP-06-2019-0297","DOIUrl":"https://doi.org/10.1108/ITP-06-2019-0297","url":null,"abstract":"","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"5 1","pages":""},"PeriodicalIF":4.4,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75801404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}