Carlos Flavián, Sergio Ibáñez-Sánchez, Carlos Orús, Sergio Barta
{"title":"The dark side of the metaverse: The role of gamification in event virtualization","authors":"Carlos Flavián, Sergio Ibáñez-Sánchez, Carlos Orús, Sergio Barta","doi":"10.1016/j.ijinfomgt.2023.102726","DOIUrl":"10.1016/j.ijinfomgt.2023.102726","url":null,"abstract":"<div><p>The virtualization of cultural events in the metaverse creates opportunities to generate valuable and innovative experiences that replicate and extend in-person events; but the process faces associated challenges. In the absence of relevant empirical studies, the aim of this article is to analyze the positive and negative aspects of the user experience in a cultural event held in the metaverse. A mixed-methods approach is employed to test the proposed hypotheses. The results from three focus groups demonstrated the difficulty that users face in focusing their attention on the main elements of the metaverse, and the inability of this virtual sphere to convey the authenticity of a cultural event. Based on these findings, a metaverse-focused quantitative study was conducted to examine whether perceived gamification mitigate the negative effects of users failing to pay attention in their metaverse experiences. When users increased their attention levels, their ability to imagine the real experience and their perceptions of the authenticity of the cultural event increased, which produced positive behavioral intentions. This is one of the first studies to empirically analyze the tourist experience in the metaverse; managers and policymakers can benefit from the results to hold valuable virtual cultural events.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102726"},"PeriodicalIF":21.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S026840122300107X/pdfft?md5=03c144d039675a70d84d33a1b8435a42&pid=1-s2.0-S026840122300107X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rania B. Mostafa , Cristiana R. Lages , Ahmed Shaalan
{"title":"The dark side of virtual agents: Ohhh no!","authors":"Rania B. Mostafa , Cristiana R. Lages , Ahmed Shaalan","doi":"10.1016/j.ijinfomgt.2023.102721","DOIUrl":"10.1016/j.ijinfomgt.2023.102721","url":null,"abstract":"<div><p>Virtual agents (VAs) are increasingly used by firms to establish relationships with customers. While this form of artificial intelligence offers numerous advantages, adverse outcomes can arise when customers’ expectations of VAs are not met. This paper examines how the disconfirmation of both parasocial interactions with the VA and its anthropomorphic characteristics affects users’ dissatisfaction with the VA. Such dissatisfaction might then influence subsequent behavioural outcomes, specifically spreading negative word-of-mouth about the VA (NWOMVA) and avoiding future use of VAs. Data were gathered from VA users in Egypt and the UAE via an online questionnaire. The findings from the two studies confirm that all direct hypotheses were supported and that dissatisfaction with VAs mediates the relationships between both negative parasocial interaction disconfirmation (NPID) and negative VA anthropomorphism disconfirmation and the behavioural outcomes of NWOMVA and VA avoidance. Thus, this paper offers managers guidelines on the effective characteristics of VAs, namely anthropomorphism and parasocial interaction, which allow them to identify the pitfalls of VAs and take preventive or remedial actions.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102721"},"PeriodicalIF":21.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135516077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogesh K. Dwivedi , Laurie Hughes, Harshad K.D.H. Bhadeshia, Sophia Ananiadou , Anthony G. Cohn, Jacqueline M. Cole, Gareth J. Conduit, Maunendra Sankar Desarkar, Xinwei Wang
{"title":"Artificial intelligence (AI) futures: India-UK collaborations emerging from the 4th Royal Society Yusuf Hamied workshop","authors":"Yogesh K. Dwivedi , Laurie Hughes, Harshad K.D.H. Bhadeshia, Sophia Ananiadou , Anthony G. Cohn, Jacqueline M. Cole, Gareth J. Conduit, Maunendra Sankar Desarkar, Xinwei Wang","doi":"10.1016/j.ijinfomgt.2023.102725","DOIUrl":"10.1016/j.ijinfomgt.2023.102725","url":null,"abstract":"<div><p>“Artificial Intelligence” in all its forms has emerged as a transformative technology that is in the process of reshaping many aspects of industry and wider society at a global level. It has evolved from a concept to a technology that is driving innovation, transforming productivity and disrupting existing business models across numerous sectors. The industrial and societal impact of AI is profound and multifaceted, offering opportunities for growth, efficiency, and improved healthcare, but also raising ethical and societal challenges as the method is integrated into many aspects of human life and work. This editorial is developed by contributors of the 4th Royal Society Yusef Hamied Workshop ( in 2023 devoted to Artificial Intelligence), designed to enhance collaboration between Indian and the UK scientists and to explore future research opportunities. The insights shared at the workshop are shared here.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"76 ","pages":"Article 102725"},"PeriodicalIF":21.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135515909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for cyber-risk insurance against ransomware: A mixed-method approach","authors":"Arunabha Mukhopadhyay, Swati Jain","doi":"10.1016/j.ijinfomgt.2023.102724","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102724","url":null,"abstract":"<div><p>Hackers follow a standard cyber kill chain process and install ransomware payloads using phishing emails on firms belonging to critical industry, resulting in huge losses in revenue, reputation, and customer churn. This study uses a mixed-method explanatory approach to mitigate ransomware attacks. We present the quantitative Ransomware Risk Management Model (R2M2) based on protection motivation theory (PMT). The Ransomware Risk Assessment module based on the threat appraisal component of PMT and the National Institute of Standards and Technology (NIST) guidelines can help the chief information security officer (CISO) to assess the risk using predictive analytics techniques. The Ransomware Risk Quantification module uses collective risk modeling to compute the severity of a ransomware attack on an organization. The Ransomware Risk Mitigation module helps the CISO to minimize the probability and impact of a ransomware attack on their organization by (i) investing in perimeter security technologies and training to ensure prepare, deter, detect, restrain, recover, and review mitigation strategies, (ii) adopting the National Institue of Standards and Technology (NIST) Cybersecurity Framework to ensure business resilience, and (iii) mitigating the residual risk by investing in cyber-risk insurance. We validated the proposed method using a qualitative study by interviewing participants form firms affected by ransomware, managed security service providers, security consultants, and cyber-risk insurers.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102724"},"PeriodicalIF":21.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001056/pdfft?md5=3d251a9afa04505d27c683328e832cbf&pid=1-s2.0-S0268401223001056-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92164288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandru Capatina , Nina Jane Patel , Kiril Mitrov , Dragos Sebastian Cristea , Adrian Micu , Angela-Eliza Micu
{"title":"Elevating students’ lives through immersive learning experiences in a safe metaverse","authors":"Alexandru Capatina , Nina Jane Patel , Kiril Mitrov , Dragos Sebastian Cristea , Adrian Micu , Angela-Eliza Micu","doi":"10.1016/j.ijinfomgt.2023.102723","DOIUrl":"10.1016/j.ijinfomgt.2023.102723","url":null,"abstract":"<div><p>Metaverse platforms devoted to educational purposes are becoming increasingly popular among educators worldwide due to the benefits they offer in elevating students’ lives. This study explores how immersive platform features, blockchain features, a safe learning environment and new learning models contribute to the educational outcomes. Emerging literature on educational Metaverse platforms has been used to develop a genuine conceptual model. The model was tested using data collected from 100 educators located in different countries from worldwide. The data were analyzed using partial least squares structural equation modeling (PLS-SEM), Random Forest and other different feature importance methods, fuzzy-set qualitative comparative analysis (fsQCA), thematic content analysis and Latent Dirichlet Allocation (LDA). The application of PLS-SEM outlines that immersive platform features and safe learning environments positively affects educational outcomes. Random Forest and feature importance methods investigate the predictive power of items included in the model, fsQCA reveals the combinations of these factors that lead to high educational outcomes, while the qualitative insights reveal the key themes emerged from educators’ perspectives on the use of Metaverse platforms. This study contributes to Metaverse literature, which is relatively understudied in the educational sector.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102723"},"PeriodicalIF":21.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceived creepiness in response to smart home assistants: A multi-method study","authors":"Stefan Raff , Stefan Rose , Tin Huynh","doi":"10.1016/j.ijinfomgt.2023.102720","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102720","url":null,"abstract":"<div><p>Smart home assistants (SHAs) have gained a foothold in many households. Although SHAs have many beneficial capabilities, they also have characteristics that are colloquially described as creepy – a fact that may deter potential users from adopting and utilizing them. Previous research has examined SHAs neither from the perspective of resistance nor the perspective of creepiness. The present research addresses this gap and adopts a multi-method research design with four sequential studies. Study 1 serves as a pre-study and provides initial exploratory insights into the concept of creepiness in the context of SHAs. Study 2 focuses on developing a measurement instrument to assess perceived creepiness. Study 3 uses an online experiment to test the nomological validity of the construct of creepiness in a larger conceptual model. Study 4 further elucidates the underlying behavioral dynamics using focus group analysis. The findings contribute to the literature on the dark side of smart technology by analyzing the triggers and mechanisms underlying perceived creepiness as a novel inhibitor to SHAs. In addition, this study provides actionable design recommendations that allow practitioners to mitigate end users’ potential perceptions of creepiness associated with SHAs and similar smart technologies.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102720"},"PeriodicalIF":21.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001019/pdfft?md5=ae75b1a3b32315f52820d0c3ff923348&pid=1-s2.0-S0268401223001019-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92255339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alex Taylor , Margurite Hook , Jamie Carlson , Siggi Gudergan , Tomas Falk
{"title":"Appetite for distraction? A systematic literature review on customer smartphone distraction","authors":"Alex Taylor , Margurite Hook , Jamie Carlson , Siggi Gudergan , Tomas Falk","doi":"10.1016/j.ijinfomgt.2023.102722","DOIUrl":"10.1016/j.ijinfomgt.2023.102722","url":null,"abstract":"<div><p>In today’s society, the ubiquitous presence of personal smartphones has led to the phenomenon of, what we call, <em>customer smartphone distraction</em> (CSD). This paper introduces the concept of CSD, which occurs when an internet-connected smartphone competes for a customer’s attention during a consumption goal-oriented task or behavior. Based on a three-stage research process involving a systematic literature review and an expert opinion survey with a multi-disciplinary lens to better understand this phenomenon, we develop a conceptual framework underpinned by Cognitive – Affective Personality System (CAPS) Theory that incorporates the antecedents, contingency variables, and consequences of CSD. Our findings suggest that CSD is a complex phenomenon influenced by both environmental stimuli, such as audio and visual notifications, and internal psychological states, such as boredom and anxiety, which are interdependent factors that contribute to CSD. Interestingly, the absence of environmental stimuli alone may not reduce CSD. To deal with this issue, customers need to take responsibility for their consumption behavior, while businesses, society and policy makers can assist customers through better education and design of mobile device experiences. Overall, we highlight the need for a deeper understanding of CSD and its impact on customer behavior and well-being, and outline implications to assist researchers, practitioners, policy makers and society broadly to deal with CSD.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102722"},"PeriodicalIF":21.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001032/pdfft?md5=43a5bd4dcde9a0b44e50a213bdfbdbf2&pid=1-s2.0-S0268401223001032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135221307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organic transformation of ERP documentation practices: Moving from archival records to dialogue-based, agile throwaway documents","authors":"Makoto Nakayama , Eli Hustad , Norma Sutcliffe , Merri Beckfield","doi":"10.1016/j.ijinfomgt.2023.102717","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102717","url":null,"abstract":"<div><p>Implementing enterprise resource planning (ERP) systems remains challenging and requires organizational changes. Given the scale and complexity of ERP projects, documentation plays a crucial role in coordinating operational details. However, the emergence of the agile approach raises the question of how adequate lightweight documentation is in agile ERP implementation. Unfortunately, both academia and industry often overlook the natural evolution of documentation practices. This study examines current documentation practices through interviews with 23 field experts to address this oversight. The findings indicate a shift in documentation practices from retrospective approaches to dialogue-based, agile throwaway documents, including audiovisual recordings and informal emails. Project managers who extensively engage with throwaway documents demonstrate higher situational awareness and greater effectiveness in managing ERP projects than those who do not. The findings show an organic transformation of ERP documentation practices. We redefine documentation to include unstructured, relevant information across different media, emphasizing searchability. Additionally, the study offers two vignettes for diverse organizational contexts to illustrate the best practices of agile ERP projects.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102717"},"PeriodicalIF":21.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223000981/pdfft?md5=df21a4b307e1f882ed90e87851e39883&pid=1-s2.0-S0268401223000981-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92162230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How do technology-driven stressors influence workarounds? Moderating roles of support structures and trait resilience","authors":"Xiaofan Tang , Shaobo Wei , Xiayu Chen","doi":"10.1016/j.ijinfomgt.2023.102718","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102718","url":null,"abstract":"<div><p>Despite recognizing the prominent effects of enterprise system (ES) use on organizations and individuals, employees frequently resort to workarounds that run counter to the intention of ES implementation. Building upon the job demands-resources (JD-R) model, we expand the challenge-hindrance stressor framework to encompass technology-driven stressors (TDS) as distinct job demands influencing employees’ workarounds. Additionally, we regard support structures as job resources and trait resilience as personal resources and then examine how the interplay between resources and demands affects workarounds. Our research is underpinned by a comprehensive two-study design. Specifically, Study 1 entailed a longitudinal survey with data gathered from 326 users within a Chinese company. The results show that technology-driven challenge stressors decrease workarounds, whereas technology-driven hindrance stressors increase it. Moreover, job and personal resources play different roles in mitigating the impact of specific TDS on workarounds. In addition, Study 2 utilized qualitative interviews to validate and supplement the findings from the Study 1. This research contributes to both theoretical and practical implications in ES research by extending the JD-R model to explore the influence of various job demands and resources on workarounds.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102718"},"PeriodicalIF":21.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223000993/pdfft?md5=31364da747ef75bee8e34eef051c9485&pid=1-s2.0-S0268401223000993-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136800008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Javad Pool , Saeed Akhlaghpour , Farhad Fatehi , Andrew Burton-Jones
{"title":"A systematic analysis of failures in protecting personal health data: A scoping review","authors":"Javad Pool , Saeed Akhlaghpour , Farhad Fatehi , Andrew Burton-Jones","doi":"10.1016/j.ijinfomgt.2023.102719","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102719","url":null,"abstract":"<div><p>Personal health data breaches pose significant challenges to healthcare providers and clients. This study systematically analyzes 5470 records and reviews 120 articles on this theoretically and practically important topic. It summarizes the existing literature and develops an integrative model with eleven propositions explaining the multifaceted nature of health data breaches, their facilitators, and their impacts. We report on the gaps in the current literature and discuss six promising avenues of future research, including specific suggestions for multi-level analysis, use of novel methods, contributions to information systems theory, stakeholder analysis, under-explored themes, and boundary-breaching opportunities. Beyond these findings, our study offers implications for key stakeholders in healthcare settings. This study equips practitioners and researchers with a valuable model for evidence-based data breach risk management and offers guidance for future investigations, enhancing our collective understanding of personal health data breaches within healthcare.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102719"},"PeriodicalIF":21.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001007/pdfft?md5=4eb6e4f33df55d1200f5f09a064e5081&pid=1-s2.0-S0268401223001007-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92164287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}