Information Technology & People最新文献

筛选
英文 中文
Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome 减少数据隐私泄露:相关前因后果的实证研究
Information Technology & People Pub Date : 2024-04-08 DOI: 10.1108/itp-07-2022-0516
P. Ifinedo, Francine Vachon, Anteneh Ayanso
{"title":"Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome","authors":"P. Ifinedo, Francine Vachon, Anteneh Ayanso","doi":"10.1108/itp-07-2022-0516","DOIUrl":"https://doi.org/10.1108/itp-07-2022-0516","url":null,"abstract":"PurposeThis paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.Design/methodology/approachA cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.FindingsThe exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.Research limitations/implicationsThis study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.Practical implicationsThe results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.Originality/valueAntecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"44 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framing and feelings on social media: the futures of work and intelligent machines 社交媒体上的框架与情感:工作与智能机器的未来
Information Technology & People Pub Date : 2024-04-05 DOI: 10.1108/itp-01-2023-0049
Ayse Ocal, Kevin Crowston
{"title":"Framing and feelings on social media: the futures of work and intelligent machines","authors":"Ayse Ocal, Kevin Crowston","doi":"10.1108/itp-01-2023-0049","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0049","url":null,"abstract":"PurposeResearch on artificial intelligence (AI) and its potential effects on the workplace is increasing. How AI and the futures of work are framed in traditional media has been examined in prior studies, but current research has not gone far enough in examining how AI is framed on social media. This paper aims to fill this gap by examining how people frame the futures of work and intelligent machines when they post on social media.Design/methodology/approachWe investigate public interpretations, assumptions and expectations, referring to framing expressed in social media conversations. We also coded the emotions and attitudes expressed in the text data. A corpus consisting of 998 unique Reddit post titles and their corresponding 16,611 comments was analyzed using computer-aided textual analysis comprising a BERTopic model and two BERT text classification models, one for emotion and the other for sentiment analysis, supported by human judgment.FindingsDifferent interpretations, assumptions and expectations were found in the conversations. Three subframes were analyzed in detail under the overarching frame of the New World of Work: (1) general impacts of intelligent machines on society, (2) undertaking of tasks (augmentation and substitution) and (3) loss of jobs. The general attitude observed in conversations was slightly positive, and the most common emotion category was curiosity.Originality/valueFindings from this research can uncover public needs and expectations regarding the future of work with intelligent machines. The findings may also help shape research directions about futures of work. Furthermore, firms, organizations or industries may employ framing methods to analyze customers’ or workers’ responses or even influence the responses. Another contribution of this work is the application of framing theory to interpreting how people conceptualize the future of work with intelligent machines.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"33 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140736571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach 调查信息技术项目的阻力:元综合法的概念模型
Information Technology & People Pub Date : 2024-04-05 DOI: 10.1108/itp-10-2022-0809
Manoj Krishnan, Satish Krishnan
{"title":"Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach","authors":"Manoj Krishnan, Satish Krishnan","doi":"10.1108/itp-10-2022-0809","DOIUrl":"https://doi.org/10.1108/itp-10-2022-0809","url":null,"abstract":"PurposeThe study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.Design/methodology/approachThe study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.FindingsThrough meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.Research limitations/implicationsThis study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.Practical implicationsMany ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.Originality/valueThere have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"30 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140737322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why would consumers risk taking purchase recommendations from voice assistants? 消费者为什么要冒险接受语音助手的购买建议?
Information Technology & People Pub Date : 2024-04-02 DOI: 10.1108/itp-01-2023-0001
R. Bawack, Emilie Bonhoure, Sabrine Mallek
{"title":"Why would consumers risk taking purchase recommendations from voice assistants?","authors":"R. Bawack, Emilie Bonhoure, Sabrine Mallek","doi":"10.1108/itp-01-2023-0001","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0001","url":null,"abstract":"PurposeThis study aims to identify and explore different risk typologies associated with consumer acceptance of purchase recommendations from voice assistants (VAs).Design/methodology/approachDrawing on components of perceived risk, consumer trust theory, and consumption value theory, a research model was proposed and tested using structural equation modeling (SEM) with data from 482 voice shoppers.FindingsThe results reveal that, unlike risks associated with physical harm, privacy breaches, and security threats, a variety of other concerns—including financial, psychological, social, performance-related risks, time loss, and the overall perceived risks—significantly influence consumers' willingness to accept VAs purchase recommendations. The effect is mediated by trust in VA purchase recommendations and their perceived value. Different types of risk affect various consumption values, with functional value being the most influential. The model explains 58.6% of the variance in purchase recommendation acceptance and significantly elucidates the variance in all consumption values.Originality/valueThis study contributes crucial knowledge to understanding consumer decision-making processes as they increasingly leverage AI-powered voice-based dialogue platforms for online purchasing. It emphasizes recognizing diverse risk typologies associated with VA purchase recommendations and their impact on consumer purchase behavior. The findings offer insights for marketing managers seeking to navigate the challenges posed by consumers' perceived risks while leveraging VAs as an integral component of modern shopping environments.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"256 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI in software programming: understanding emotional responses to GitHub Copilot 软件编程中的人工智能:了解对 GitHub Copilot 的情绪反应
Information Technology & People Pub Date : 2024-04-02 DOI: 10.1108/itp-01-2023-0084
Farjam Eshraghian, Najmeh Hafezieh, F. Farivar, Sergio de Cesare
{"title":"AI in software programming: understanding emotional responses to GitHub Copilot","authors":"Farjam Eshraghian, Najmeh Hafezieh, F. Farivar, Sergio de Cesare","doi":"10.1108/itp-01-2023-0084","DOIUrl":"https://doi.org/10.1108/itp-01-2023-0084","url":null,"abstract":"PurposeThe applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.Design/methodology/approachWe gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.FindingsWe found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.Practical implicationsOverall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.Originality/valueOur study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"42 29","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems 威胁和应对评估在激励使用个性化移动紧急预警系统中的作用
Information Technology & People Pub Date : 2024-01-16 DOI: 10.1108/itp-04-2021-0297
Annette Mills, Nelly Todorova, Jing Zhang
{"title":"The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems","authors":"Annette Mills, Nelly Todorova, Jing Zhang","doi":"10.1108/itp-04-2021-0297","DOIUrl":"https://doi.org/10.1108/itp-04-2021-0297","url":null,"abstract":"PurposeDisasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.Design/methodology/approachDrawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.FindingsThe results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.Originality/valueThe study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"47 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139527989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe 在线隐私扫盲与用户信息隐私赋权:欧洲 GDPR 案例
Information Technology & People Pub Date : 2024-01-15 DOI: 10.1108/itp-05-2023-0467
Christine Prince, Nessrine Omrani, Francesco Schiavone
{"title":"Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe","authors":"Christine Prince, Nessrine Omrani, Francesco Schiavone","doi":"10.1108/itp-05-2023-0467","DOIUrl":"https://doi.org/10.1108/itp-05-2023-0467","url":null,"abstract":"PurposeResearch on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.Design/methodology/approachAn empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.FindingsThe main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.Originality/valueWhile few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"32 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139530008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
She’s worth IT: challenges for female CIOs in ensuring IT security compliance 她值得拥有 IT:女性首席信息官在确保 IT 安全合规方面面临的挑战
Information Technology & People Pub Date : 2024-01-10 DOI: 10.1108/itp-05-2023-0524
Gaurav Bansal, Zhuoli Axelton
{"title":"She’s worth IT: challenges for female CIOs in ensuring IT security compliance","authors":"Gaurav Bansal, Zhuoli Axelton","doi":"10.1108/itp-05-2023-0524","DOIUrl":"https://doi.org/10.1108/itp-05-2023-0524","url":null,"abstract":"PurposeIT security compliance is critical to the organization’s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee’s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.Design/methodology/approachA controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male/female), Information Technology (IT) expertise (low/high) and leadership style (transactional/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.FindingsThe findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics – perceived expertise and leadership style – influence the employees' intentions and reactance to comply with CIO security recommendations.Research limitations/implicationsThis study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel et al. (2019).Practical implicationsThis study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.Social implicationsThis study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.Originality/valueThis study redefines the concept of “sticky floors” to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"36 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict 社交媒体作为行为去极化器:俄罗斯-乌克兰冲突的证据
Information Technology & People Pub Date : 2024-01-09 DOI: 10.1108/itp-12-2022-0972
J. Yadav, Kuldeep Singh, Nirpendra P. Rana, Denis Dennehy
{"title":"Social media as a behavior depolarizer: evidence from Russia–Ukraine conflict","authors":"J. Yadav, Kuldeep Singh, Nirpendra P. Rana, Denis Dennehy","doi":"10.1108/itp-12-2022-0972","DOIUrl":"https://doi.org/10.1108/itp-12-2022-0972","url":null,"abstract":"Purpose Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.Design/methodology/approach This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.Findings The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.Research limitations/implications For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.Originality/value While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility 企业社交媒体是员工敏捷性的促进因素:工作压力和企业社交媒体可见度的影响
Information Technology & People Pub Date : 2024-01-04 DOI: 10.1108/itp-10-2022-0791
Abdul Hameed Pitafi
{"title":"Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility","authors":"Abdul Hameed Pitafi","doi":"10.1108/itp-10-2022-0791","DOIUrl":"https://doi.org/10.1108/itp-10-2022-0791","url":null,"abstract":"PurposeAccording to extensive analysis, employee agility is influenced by teamwork, coordination and the organizational environment. However, less consideration has been given to the role of work stressors (challenge, hindrance) in influencing employee agility. To address this research gap, this study sheds light on how the use of enterprise social media (ESM) for social and work purposes influences employee agility through work stressors.Design/methodology/approachThis research also explores how ESM visibility enhances the interaction between work stressors and employee agility by using primary data obtained from Chinese workers. A total of 377 entries were analyzed using AMOS 24.10 tools. All the hypotheses were tested using structural equation modeling (SEM).FindingsThe findings revealed that ESM use (social and work) negatively impacts challenge and hindrance work stressors. The results also reflect that challenge stressors have a significant impact on employee agility, whereas hindrance stressors are negatively related to it. Furthermore, the outcome also indicated that increased ESM visibility reinforces the connection between challenge stressors and employee agility. However, ESM visibility did not indicate a significant moderating impact on the link between hindrance stressors and employee agility.Originality/valueThis study describes how ESM usage effects agility of stressed employees. This research also explores how ESM visibility improves the interaction between work stressors and employee agility. The study results contribute to growing research on social media and employee agility and suggest several points of guidance for managers.","PeriodicalId":168000,"journal":{"name":"Information Technology & People","volume":"53 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139386140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信