Search results for "Computer network"
showing 10 items of 1634 documents
Employee Information Security Practices: A Framework and Research Agenda
2020
Author's accepted manuscript Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This paper synthesizes insights from research on challenges related to employee information security practices and measures to address them. The challenges identified are associated to idiosyncratic aspects of communities and individuals within organizations (culture and personal characteristics) and to systemic aspects of organizations (procedural and structural arrangements). The measures identified aim to enhance systemic capabilities and to adapt security mechanisms to the idiosyncratic characteristics and are categorized as: (a) measures of training an…
Business models of FinTechs – Difference in similarity?
2021
Abstract The FinTech industry is gradually maturing and offers a wide range of financial services on the global stage. Still, the understanding of FinTech business models remains at its infancy with a shortage of cross-country comparisons. This paper aims to determine the differences in business model attributes of FinTechs in five rapidly emerging FinTech hotspots in Central and Eastern Europe (CEE). Survey results from Estonia, Latvia, Lithuania, Poland, and Russia, accompanied by cluster analysis, enable us to provide unique in-depth evidence on FinTech business models. Across the selected countries, we observe significant differences in the attributes of FinTech business models: key act…
Transaction management for m-commerce at a mobile terminal
2006
Although there has been a lot of discussion of "transactions" in mobile e-commerce (m-commerce), very little attention has been paid for distributed transactional properties of the computations facilitating m-commerce. In this paper, we first present a requirement analysis and then present a wireless terminal-based transaction manager (TM) architecture. This architecture is based on the assumption that there is an application that supports certain business transaction(s) and that it uses the TM to store transactional state information and retrieve it after a communication link, application, or terminal crash. We present the design of such a TM, including the application interface, modules a…
Activity of the Elderly in an Eight-Week Case Study
2015
This study explores the engagement of the elderly with a new health-enhancing mobile-optimised web-service: An eight-week case study was carried out. Participants of the study were elderly people: 45 females and 19 males with the average age of 72.3 (SD 5.2) years. Their baseline information and communication technology experiences were evaluated, the data of using each service component was saved to a server and the usability of the service was evaluated. The majority of the users remained active throughout the study. The most frequently used components in the study were memory puzzles and physical exercise. The usability of the components was correlated with the age of the participants. T…
Identifying the Ideal Types of Online Shoppers : A Qualitative Analysis of Online Shopping
2020
The tremendous increase in online shopping has created a growing demand to understand online shopping behavior. This study contributes to this understanding by identifying ideal types among online shoppers. An ideal type is an analytical construct used to ascertain similarities and deviations to concrete cases in an individual phenomenon. Theoretically, the study draws from different perspectives to create a multifaceted view of online shoppers. The purpose is not to categorize online shoppers under a specific category but rather to help understand different typically occurring online shopping behaviors. Through thematic analysis of the data from 31 participants, this study presents five id…
Individualism, collectivism and reward crowdfunding contribution intention and behavior
2021
Abstract The study examines the role of the individualism-collectivism (IDV) cultural dimension in reward crowdfunding contribution intentionality and behavior. An extended Theory of Planned Behavior framework is used for comparative analysis using survey data collected from users of national platforms from opposing cultures along the IDV dimension – China and Finland. Main findings suggest that: attitudes are positively associated with information sharing and financial contribution intentions in both cultures; collectivism enhances the effects of subjective norms on both intentions; behavior control is more strongly observed in individualistic cultures; and information sharing intentions a…
Brands as relationship builders in the virtual world: A bibliometric analysis
2020
Abstract Given the growing role of brands as relationship partners and relationship facilitators and the pre-eminence of the online environment for consumers, this article contributes to the understanding of virtual brand-centric relationships by presenting the first bibliometric mapping analysis of the academic research into the topic from its conception until 2018. Using keyword co-occurrence, it examines 585 records and identifies the most productive countries, journals, influential authors and papers, and research clusters. With 96% of the published records appearing between 2010 and 2018, this analysis revealed that the field is emergent. The research primarily originates from authors …
Mobile Application Diffusion and Success: An Interpretative Approach to Influential Factors
2018
The rapid evolution of mobile computing technology has been attributed to the increasing capitalizing by companies on this innovative business medium. The result of conformity between technology advancement and market demand increment for mobility has led to the development of different categories of mobile businesses in recent years. This research reviews the previous related literature to the subject and by deploying meta-synthesis as a systematic quantitative method; a generic model covering important factors contributing to mobile application diffusion is presented. The proposed comprehensive model consists of users' specifications, technical aspects and contextual factors in the first …
Categorizing networked services The role of intrinsic-, user network- and complement network attributes
2009
PurposeThis paper aims to investigate the properties and attributes of networked services and to propose a general categorization scheme for such services.Design/methodology/approachTwo separate studies were conducted to test the validity and applicability of the categorization scheme. First, industry experts categorized a set of pre‐selected mobile services based on the services' dominant source of value. Second, a large‐scale end‐user study of the same services was conducted for testing cross‐service differences between the proposed service categories in terms of what drives perceived customer value. It is argued that services can be categorized on the basis of whether their dominant sour…
Consumers in Information Technology Enabled Service Encounters: Perceptions and Tradeoffs in Multi-Channel Interactions
2015
This study examines information technology enabled, multi-channel service context from the end-user's perspective and, more specifically, from the perspective of a consumer, in particular the extent to which the multi-channel interaction experience results in consumer satisfaction and any tradeoffs that consumers make in the evaluation of the context of service. Empirical results from our online survey with mobile consumers indicate that the variables included in the model have a direct impact on consumer satisfaction when considered individually. There are, however, tradeoffs between variables (e.g., problem-handling and record accuracy; scalability and usability of service) when considere…