Electronic Journal of Information Systems in Developing Countries最新文献

筛选
英文 中文
Using Digital Integrated Community Case Management to Strengthen Protocol Adherence Over the Sick Child Recording Form for Under-Five Children Referrals From Community to Higher Level Facilities in Malawi: Affordance Perspective 利用数字综合社区病例管理加强马拉维五岁以下儿童从社区转介到更高级别设施的病童记录表的协议遵守:可提供性视角
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2025-02-02 DOI: 10.1002/isd2.70000
Florence Matewere, Jens Johan Kaasbøll
{"title":"Using Digital Integrated Community Case Management to Strengthen Protocol Adherence Over the Sick Child Recording Form for Under-Five Children Referrals From Community to Higher Level Facilities in Malawi: Affordance Perspective","authors":"Florence Matewere,&nbsp;Jens Johan Kaasbøll","doi":"10.1002/isd2.70000","DOIUrl":"https://doi.org/10.1002/isd2.70000","url":null,"abstract":"<div>\u0000 \u0000 <p>An effective referral system at the community level of healthcare for under-five children manages health needs by fostering relationships across all levels of healthcare, enabling patients to receive the best possible care and, in the process, saving lives. However, identifying those who need urgent referral mostly depends on community health workers (CHWs) commitment, which some studies have found inadequate due to nonadherence to the integrated Community Case Management (iCCM) Protocol, a protocol aimed at reducing child mortality and morbidity. Studies have shown that employing mobile Health (mHealth) may circumvent some of the limitations of paper-based iCCM protocol for patient referrals, which include assessment and treatment of under-five children. Despite the known benefits of mHealth in supporting CHWs, studies analyzing how the affordance of digital iCCM may strengthen protocol adherence over paper-based iCCM are lacking. Therefore, the purpose of this study is to analyze how the actualization of digital iCCM may strengthen protocol adherence over the SCRF, consequently, improving referrals from the community to the higher-level facilities for specialized treatment. The data captured from interviews, focus groups, informal chats, observation and document analysis were transcribed and analyzed using thematic analysis. We found that the Sick Child Recording Form faces challenges due to nonadherence to set guidelines, resulting in misclassification, incorrect drug prescriptions, and consequently, delays in referring patients with acute symptoms to health facilities for specialized treatment. As a contribution, this paper offers a new perspective on the technological affordances of digital iCCM that strengthen protocol adherence in patients' referrals from the community to the higher-level facilities that include assessment and treatment.</p>\u0000 </div>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 2","pages":""},"PeriodicalIF":1.1,"publicationDate":"2025-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Influence of Self-Efficacy, Trust, Perceived Costs and Healthcare-Environment on Compliance With the Data Protection and Privacy Act by Health Workers in Uganda 自我效能、信任、感知成本和医疗保健环境对乌干达卫生工作者遵守数据保护和隐私法的影响
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2025-02-02 DOI: 10.1002/isd2.70002
Barbara N. Kayondo, Michael Kyobe
{"title":"The Influence of Self-Efficacy, Trust, Perceived Costs and Healthcare-Environment on Compliance With the Data Protection and Privacy Act by Health Workers in Uganda","authors":"Barbara N. Kayondo,&nbsp;Michael Kyobe","doi":"10.1002/isd2.70002","DOIUrl":"https://doi.org/10.1002/isd2.70002","url":null,"abstract":"<p>Despite existing regulations, compliance with Uganda's Data Protection and Privacy Act (DPPA) remains challenging, as studies focus only on technical and organizational aspects, neglecting behavioral and contextual factors. Furthermore, the limited number of health workers, low awareness of the DPPA, high costs of compliance, and a lack of trust within hospitals exacerbate these challenges. This study investigates the influence of self-efficacy, trust, perceived costs, and the healthcare-environment on DPPA compliance among healthcare workers in Uganda. It also explores the moderating effects of gender and work experience on the relationship between self-efficacy and compliance. Using quantitative methods, data were collected from 309 healthcare workers across three hospitals through a self-administered questionnaire. Regression analysis revealed that perceived costs (<i>β</i> = 0.240, <i>p</i> &lt; 0.0001) were the strongest predictor of compliance, followed by trust (<i>β</i> = 0.193, <i>p</i> &lt; 0.0001), healthcare environment (<i>β</i> = 0.178, <i>p</i> &lt; 0.0001) and self-efficacy (<i>β</i> = 0.121, <i>p</i> = 0.022) was positively associated with compliance. Gender (<i>β</i> = 0.119, <i>p</i> = 0.024) significantly moderated the self-efficacy-compliance relationship, with women exhibiting higher adherence to protocols, while work experience did not exhibit a significant moderating effect. The findings suggest that healthcare institutions in Uganda should invest in gender-specific training programs to enhance self-efficacy, build organizational trust, and reduce perceived compliance costs. Establishing supportive healthcare environments with clear policies and dedicated privacy officers is critical for promoting DPPA compliance. This study is among the first quantitative and empirical study to assess self-efficacy, trust, costs of compliance and healthcare-environment on DPPA compliance in Ugandan health context using social cognitive theory, theory of planned behavior, rational choice theory and institutional theory, a multi-theoretical approach offering valuable insights for healthcare policy and management in resource-constrained settings.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 2","pages":""},"PeriodicalIF":1.1,"publicationDate":"2025-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/isd2.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Platforms Boundary Resource: A Third-Party Developers Strategy for Digital Start-Ups and Market Penetration in Nigeria 数字平台边界资源:尼日利亚数字初创企业和市场渗透的第三方开发者战略
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2025-01-29 DOI: 10.1002/isd2.70001
Emmanuel Okoro Ajah
{"title":"Digital Platforms Boundary Resource: A Third-Party Developers Strategy for Digital Start-Ups and Market Penetration in Nigeria","authors":"Emmanuel Okoro Ajah","doi":"10.1002/isd2.70001","DOIUrl":"https://doi.org/10.1002/isd2.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>Third-party application developers are increasingly using platform-based business models to enter new markets and create economic value. While prior research has mostly examined the design and architecture of digital platforms, less attention has been given to digital platform boundary resources as an entrepreneurship strategy. The boundary resources of a digital platform significantly impact third-party developers' motivation to engage in digital entrepreneurship. Consequently, scholars need to carefully investigate the affordances of the boundary resources that influence third-party developers to create complementary applications as products for entrepreneurial endeavors. To address this gap, the researcher formulated two research questions and conducted an inductive case study to explore the perspectives and views of third-party application developers in technology hubs within Nigeria's digital start-up ecosystem. Nigeria has a large youth population with a strong digital potential (i.e., tech-savvy) and is confronted with uncertainties, limited resources, and complexities. Furthermore, the study is grounded in the technological affordance theory, which guides the researcher's interpretation. The study's findings uncovered the digital platform's boundary resource affordances that play a strategic role in influencing third-party developers' participation in digital entrepreneurship.</p>\u0000 </div>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 2","pages":""},"PeriodicalIF":1.1,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Independent or Freelance Mobile Application Development in Ghana: Unraveling Opportunities and Challenges 加纳独立或自由移动应用开发:揭示机遇和挑战
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-12-12 DOI: 10.1002/isd2.12353
Eric Ansong, Nii Barnor Jonathan Barnor, Sheena Lovia Boateng
{"title":"Independent or Freelance Mobile Application Development in Ghana: Unraveling Opportunities and Challenges","authors":"Eric Ansong,&nbsp;Nii Barnor Jonathan Barnor,&nbsp;Sheena Lovia Boateng","doi":"10.1002/isd2.12353","DOIUrl":"https://doi.org/10.1002/isd2.12353","url":null,"abstract":"<div>\u0000 \u0000 <p>The purpose of this study was to unravel the opportunities and challenges encountered by independent or freelance mobile application (App) developers in Ghana. The study employed a qualitative approach by organizing a focus group discussion among eight freelance mobile application developers and engaging them individually when needed. The analysis was done by drawing themes from the tape-recorded interviews. After the data analysis, it was discovered that the mobile application space in Ghana is male-dominated. Factors influencing independent mobile application development are monetary and intrinsic rewards, increasing demand for smartphones, gamification through mobile App development contests, access to free online resources, and government initiatives leveraging mobile applications to enhance governance and fight corruption. Comparatively, the challenges unearthed are the unregulated mobile App industry, the unpredictable nature of advancements in application development languages, and the global competitiveness of the application development space. This study outlines the research implications and recommendations for stakeholders. The originality of this study stems from the fact that it is one of the first studies on mobile application development from the freelance developers' perspective, which emanates from a developing economy context.</p>\u0000 </div>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142868168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enterprise technical architecture for the implementation of the South African National Health Insurance 实施南非国民健康保险的企业技术架构
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-11-11 DOI: 10.1002/isd2.12352
Tiko Iyamu, Farirai Chitsa
{"title":"An enterprise technical architecture for the implementation of the South African National Health Insurance","authors":"Tiko Iyamu,&nbsp;Farirai Chitsa","doi":"10.1002/isd2.12352","DOIUrl":"https://doi.org/10.1002/isd2.12352","url":null,"abstract":"<p>The South African National Health Insurance (NHI) faces challenges due to a lack of an enterprise technical architecture (ETA) solution, for the implementation. This study aims to propose an ETA, to enable and support the implementation of the South African ETA. The qualitative method was employed in the data collection. Actor-network theory (ANT) was applied as a lens to examine the data. The findings reveal several critical influencing factors, including readiness assessment, geographical locations of stakeholders; diversity of healthcare facilities; flexibility of technology solutions; and synchronization of processes and patients' data. The study highlights the need to provide governance for the technologies that influence the implementation of NHI. Based on the influencing factors, a framework was developed. The framework is intended to provide architectural governance (principles, standards, and policies), to efficiently and effectively, facilitate, support, and enable the implementation of the South African NHI.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 2","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143114280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors influencing digital outsourcing companies to adopt digital work: An investigation using Q-methodology 影响数字外包公司采用数字化工作的因素:基于q -方法论的调查
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-10-23 DOI: 10.1002/isd2.12351
Ntombiyokusa Nyoni, Stella Bvuma, Carl Marnewick
{"title":"Factors influencing digital outsourcing companies to adopt digital work: An investigation using Q-methodology","authors":"Ntombiyokusa Nyoni,&nbsp;Stella Bvuma,&nbsp;Carl Marnewick","doi":"10.1002/isd2.12351","DOIUrl":"https://doi.org/10.1002/isd2.12351","url":null,"abstract":"<p>This study investigated the perspectives of digital outsourcing companies to determine what motivates them to adopt digital work. The perspectives assist in formulating strategies for encouraging companies to outsource to digital workers. Therefore, the objective of this study was to (1) determine the perspectives of digital outsourcing companies regarding the adoption of digital work and (2) explore how digital work can contribute to Sustainable Development Goal 8. The study makes three contributions: methodological, practical, and theoretical. The methodological contribution is through Q-methodology, which identifies patterns of perspectives and motivations of digital outsourcing companies. Four perspectives were identified through this methodology, two social perspectives (productivity-oriented and digital worker-oriented perspectives) and two emerging perspectives (platform-oriented and flexible perspectives). The perspectives show that it is essential that digital workers are well equipped in terms of work ethics, technical skills, and other skills to ensure that these are aligned with the needs of digital outsourcing companies. Second, the study contributes to practical methods to motivate companies to outsource to digital workers. Lastly, the study provides new insights into the perspective of digital outsourcing companies, a topic that has received little attention, especially in the context of developing countries.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/isd2.12351","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adapting cybersecurity maturity models for resource-constrained settings: A case study of Peru 适应网络安全成熟度模型的资源约束设置:秘鲁的案例研究
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-10-22 DOI: 10.1002/isd2.12350
GangSeok Lee, SuHyun Kim, ImYoung Lee, Suzana Brown, Yuri Aldoradin Carbajal
{"title":"Adapting cybersecurity maturity models for resource-constrained settings: A case study of Peru","authors":"GangSeok Lee,&nbsp;SuHyun Kim,&nbsp;ImYoung Lee,&nbsp;Suzana Brown,&nbsp;Yuri Aldoradin Carbajal","doi":"10.1002/isd2.12350","DOIUrl":"https://doi.org/10.1002/isd2.12350","url":null,"abstract":"<p>Developing countries are rapidly embracing digitalization, but this exposes them to heightened cybersecurity risks. They often look to standard established cybersecurity models from developed countries to build their national defenses. However, significant developmental, political, social, and economic differences can render these models unsuitable for developing countries. This study addresses this gap by proposing a new framework that would be more useful in a developing country context. We first examine existing cybersecurity maturity models (CMMs) and metrics. Through a case study of Peru's national computer security incident response team (CSIRT), we assess the applicability of the security incident management maturity model (SIM3) and the security operation center CMM (SOC-CMM) frameworks. By applying these frameworks to the Peruvian context, we identify limitations in standard maturity models for developing countries. In response, we propose a novel framework that allows developing countries like Peru to leverage existing models by tailoring them to their specific environment. This tailored approach can be a powerful tool for developing countries to improve and build their cybersecurity on a national level.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/isd2.12350","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of audit on IT governance: A study of the financial services sector in Ghana 审计对IT治理的影响:加纳金融服务部门的研究
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-10-08 DOI: 10.1002/isd2.12349
Alexander Asmah, Michael Kyobe
{"title":"The impact of audit on IT governance: A study of the financial services sector in Ghana","authors":"Alexander Asmah,&nbsp;Michael Kyobe","doi":"10.1002/isd2.12349","DOIUrl":"https://doi.org/10.1002/isd2.12349","url":null,"abstract":"<p>In recent years, IT governance has been a subject of discussion among academics and practitioners. The concern has been on the need to implement governance mechanisms and ensure the right balance of these mechanisms. However, the audit of IT governance mechanisms has received very little attention. This paper aims to analyse the overall impact of IT governance audits on the maturity and coherence of governance mechanisms. Guided by the configurational theory, the researchers argue that when governance mechanisms operate coherently and are regularly audited, there will be improvement in IT governance and the performance of financial institutions. In this study, seven financial services companies in Ghana were reviewed, and their IT governance maturity was assessed after seven months of auditing with a COBIT 5-driven IT audit framework. Two surveys were conducted, one before and one after the auditing. The findings of the study confirm the claim that regular auditing improves IT governance maturity and coherence. Several governance mechanisms within the case organizations improved to one higher level of maturity on the Capability Maturity Model. This improvement was after seven months of auditing. Regular auditing also improved IT roles and responsibilities, empowered IT personnel and improved the IT budgetary control and architecture of the entities. This study has implications for practice. It emphasizes the importance of independent regular IT auditing and the need to ensure coherence among IT governance mechanisms if effective IT governance is to be achieved in financial institutions.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/isd2.12349","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143113189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Essential health services tracker to enhance routine data use for sector-wide decision-making 基本保健服务跟踪器,为全部门决策加强日常数据使用
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-08-27 DOI: 10.1002/isd2.12348
Bigten Kikoba, Masoud Mahundi
{"title":"Essential health services tracker to enhance routine data use for sector-wide decision-making","authors":"Bigten Kikoba,&nbsp;Masoud Mahundi","doi":"10.1002/isd2.12348","DOIUrl":"10.1002/isd2.12348","url":null,"abstract":"<p>Healthcare actors have designated a set of services as essential health services (EHSs), essential for achieving universal health coverage. Therefore, monitoring the provision of EHS is indispensable to gauge how countries progress toward achieving universal health coverage. However, there are no mechanisms for sector-wide monitoring of these services. While EHSs cover the entire health sector, monitoring is left to individual subunits and health programs, which often confine themselves to specific diseases and health interventions. This makes it difficult to monitor interferences to the provision of these services. Such interferences include epidemics and pandemics such as COVID-19, Marburg, Ebola, and seasonal incidences of cholera. This study, therefore, proposes an EHS tracker, a data visualization tool, to enhance routine data use for monitoring and tracking EHSs regularly. The paper details a collaborative process for developing the tracker, culminating in the creation of the tool itself. The paper contributes to the ongoing initiatives to strengthen data use practices using innovative solutions in the efforts to institutionalize data use practices and data-driven decision-making for improved healthcare service delivery.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding social capital in community-driven ride sharing: Lessons from a developing country 理解社区驱动的拼车中的社会资本:来自发展中国家的经验教训
IF 1.1
Electronic Journal of Information Systems in Developing Countries Pub Date : 2024-08-15 DOI: 10.1002/isd2.12347
Mijalche Santa, Anita Ciunova Shuleska, Nikolina Palamidovska Sterjadovska
{"title":"Understanding social capital in community-driven ride sharing: Lessons from a developing country","authors":"Mijalche Santa,&nbsp;Anita Ciunova Shuleska,&nbsp;Nikolina Palamidovska Sterjadovska","doi":"10.1002/isd2.12347","DOIUrl":"https://doi.org/10.1002/isd2.12347","url":null,"abstract":"<p>This paper aims to analyze the dynamics of social capital within community-based P2P ridesharing practices through the relational (trust), cognitive (shared meaning and identity), and structural (network of social ties) dimensions of social capital. 21 users of Facebook P2P ridesharing participated in three focus groups. Using reflexive thematic analysis, we identified the key themes around social capital dimensions and the main factors that impact social capital dynamics (social broker, social debriefing, and time pressure). The impact of the social broker on social capital dynamics in ridesharing activities via Facebook can be explained by creating new bridging capital through linking different online and offline networks (inter-network bridging) and by strengthening bonding capital through linking ridesharing group members (intra-network bridging). Negative social debriefing weakens bonding capital and creates new bridging capital, whereas positive social debriefing strengthens bonding capital. Under high time pressure, travelers engage in activities that foster bridging capital development, whereas, under low time pressure, they rely on their bonding capital, avoiding engaging in bridging capital. We provided a comprehensive understanding of the factors influencing social capital dynamics that further influence P2P ridesharing practices, thus improving the current theory on social capital dynamics.</p>","PeriodicalId":46610,"journal":{"name":"Electronic Journal of Information Systems in Developing Countries","volume":"91 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信