Tin Trung Nguyen , Van Thi Thanh Tran , Eldrin Hermoso , Minh Tu Tran Hoang
{"title":"Feeling good about letting go? Learned helplessness and privacy calculus in citizen acceptance of electronic identification apps","authors":"Tin Trung Nguyen , Van Thi Thanh Tran , Eldrin Hermoso , Minh Tu Tran Hoang","doi":"10.1016/j.ijinfomgt.2025.102928","DOIUrl":"10.1016/j.ijinfomgt.2025.102928","url":null,"abstract":"<div><div>Drawing on learned helplessness theory and privacy calculus theory, this research investigates how privacy helplessness influences citizens’ benefit-privacy trade-offs in using electronic identification (eID) apps. Using Vietnam as a research context, potential eID app users were surveyed to uncover how a sense of privacy helplessness influences their eID app usage decisions. Findings from the partial least squares structural equation modeling showed that individuals engage in benefit-privacy trade-offs when deciding to install the app, and that privacy helplessness moderated the relationships between hedonic value and perceived benefit, and between usage likelihood and anticipated well-being. These results indicate that citizens experiencing high privacy helplessness derive greater enjoyment from using eID apps and anticipate improvements in their subjective well-being. Fuzzy-set qualitative comparative analysis (fsQCA) further revealed that individuals are willing to use eID apps despite privacy concerns and limited perceived value, suggesting that privacy helplessness can supplant perceived benefit in the benefit-privacy equation. FsQCA also showed that a lack of perceived utilitarian value is a key deterrent to eID app usage. This research contributes to theory by elucidating the role of privacy helplessness in benefit-privacy trade-offs. Specifically, while prior work focuses on the negative outcomes of helplessness, our findings highlight its potential to shift citizens’ attention towards hedonic value and anticipated well-being. Furthermore, this study proposes a reconsideration of the theoretical focus, suggesting that technology adoption may signify resignation to protection measures instead of pure acceptance. The research concludes with practical recommendations for ethical strategies to promote eID app usage rather than capitalizing on privacy helplessness.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102928"},"PeriodicalIF":20.1,"publicationDate":"2025-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144139300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technological identity and basic psychological needs in the use of new technologies: A two-wave cross-national survey study","authors":"Moona Heiskari , Magdalena Celuch , Aki Koivula , Iina Savolainen , Atte Oksanen","doi":"10.1016/j.ijinfomgt.2025.102926","DOIUrl":"10.1016/j.ijinfomgt.2025.102926","url":null,"abstract":"<div><div>AI and smart technologies are increasingly embedded in almost all aspects of everyday life, and their usage might inevitably affect individuals’ self-concept and psychological and social well-being. Evidently, cross-national and longitudinal analyses of this phenomenon and its mediating factors are required. To this end, our study examined how in-group identification with new technology users influences individuals’ satisfaction of the basic psychological needs of autonomy, competence, and relatedness in the context of new technology use. We used longitudinal two-wave data collected from 18- to 75-year-old adult populations in Finland (<em>N</em> = 1541), France (<em>N</em> = 1561), Germany (<em>N</em> = 1529), Ireland (<em>N</em> = 1112), Italy (<em>N</em> = 1530), and Poland <em>(N</em> = 1533). Based on hybrid multilevel regression models, we found consistent evidence across these six European countries that individuals’ in-group identification with new technology users is positively associated with relatedness but negatively associated with autonomy and competence. Our results suggest that the level of social identification with other technology users is a meaningful social context that shapes the well-being outcomes of new technologies.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102926"},"PeriodicalIF":20.1,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144115635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corrigendum to “Situational awareness about data breaches and ransomware attacks: A multi-dimensional cyber threat impact framework and content analyses of practitioner-public discourses” [International Journal of Information Management 83 (2025) 102902]","authors":"Paras Bhatt , Rohit Valecha , H. Raghav Rao","doi":"10.1016/j.ijinfomgt.2025.102931","DOIUrl":"10.1016/j.ijinfomgt.2025.102931","url":null,"abstract":"","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102931"},"PeriodicalIF":20.1,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144614382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital transformation, emergence and complexity in supply networks","authors":"Hugo Michou, Jean-Loup Richet","doi":"10.1016/j.ijinfomgt.2025.102917","DOIUrl":"10.1016/j.ijinfomgt.2025.102917","url":null,"abstract":"<div><div>This longitudinal study was conducted to investigate the emergence of strategic misalignment within a large supply system during a digital transformation initiative at the world’s largest tourism company. We explored the interplay between emergent strategic misalignments, the inherent complexity of the supply network, and their impact on the success of digital transformation. Using the complex adaptive supply network (CASN) theoretical perspective, we analyzed the complexity within the network’s internal environment. Our two case studies revealed the intricate relationships among agents within a complex organization operating as a supply network. This research contributes to the CASN literature, particularly within the tourism industry, by conceptualizing the multiple facets of complexity in supply network and unveiling the emerging causes of strategic misalignment.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102917"},"PeriodicalIF":20.1,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144089961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device and risk-avoidance behavior in the context of cybersecurity phishing attacks","authors":"Naama Ilany-Tzur , Lior Fink","doi":"10.1016/j.ijinfomgt.2025.102919","DOIUrl":"10.1016/j.ijinfomgt.2025.102919","url":null,"abstract":"<div><div>Phishing has been the most common type of cybercrime in recent years. The fact that successful phishing attempts require victims to collaborate with their attackers highlights the importance of identifying factors that influence users’ avoidance behavior. Drawing from evidence that mobile users process information differently than personal computer (PC) users, this research suggests that the device used may influence users’ risk-avoidance behavior, as manifested in their tendency to avoid clicking on potentially risky messages. Indeed, three studies suggest that mobile users are more risk-avoidant than PC users. Specifically, analyzing data from a cybersecurity company regarding ∼500,000 URL requests in a sample of household networks, we show that mobile devices are less likely than PCs to access unsafe URLs. Next, in two online controlled experiments in which device and URL risk levels were randomly assigned, we show that mobile users are less likely than PC users to click on a URL in a phishing-like message. Notably, this difference is observed for lower-risk URLs, whereas PC and mobile users display similar risk-avoidance tendencies in the presence of highly risky URLs. This work contributes to the mobile use literature, as well as to developing information systems theory regarding technology-threat avoidance, by showing that the device used is a contextual factor influencing users’ susceptibility to phishing attacks.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102919"},"PeriodicalIF":20.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulated responses in reality-enhancing technologies: Scale development and validation","authors":"Erol Pala , Sommer Kapitan , Patrick van Esch","doi":"10.1016/j.ijinfomgt.2025.102927","DOIUrl":"10.1016/j.ijinfomgt.2025.102927","url":null,"abstract":"<div><div>Reality-enhancing technologies influence consumer decisions, yet our understanding of how consumers respond to marketing content using such technologies is nascent. We develop a scale to measure consumers’ simulated responses in reality-enhancing technology experiences, resulting in the creation of a 12-item simulated responses scale with two dimensions, simulated satiation (6 items) and simulated immersion (6 items). The analyses revealed that simulated responses is a multidimensional construct, with each dimension considered an independent scale. Consequently, simulated satiation lowers evaluations of augmented reality tools and purchase intent, yet simulated immersion raises both responses. The results reveal how content variety and exposure duration interact with simulated satiation and simulated immersion to influence consumers’ evaluations and decisions. By employing the simulated responses scale, marketing practitioners can assess the effectiveness of their reality-enhancing technology strategies. The goal is to optimize content variety and exposure duration to achieve better outcomes prior to launching a marketing campaign.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102927"},"PeriodicalIF":20.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI sensation and engagement: Unpacking the sensory experience in human-AI interaction","authors":"Pantea Foroudi , Reza Marvi , Dongmei Zha","doi":"10.1016/j.ijinfomgt.2025.102918","DOIUrl":"10.1016/j.ijinfomgt.2025.102918","url":null,"abstract":"<div><div>Given the limited studies on AI sensation and its impact on consumer emotional response and engagement, we investigate its impact to drive engagement. Employing a mixed-methods approach, we began with a qualitative phase consisting of 68 interviews (18 healthcare employees, 37 users of Wearable Health Devices, 7 AI developers, and 6 academics). Grounded in the theories of constructed emotion and the uncanny valley, as well as insights from the qualitative phase, we developed a robust model investigating the role of AI sensation on costumer emotional responses and engagement. This was followed by a survey of 557 healthcare employees. Data analysis was conducted using SPSS for descriptive statistics and reliability assessments, and AMOS for confirmatory factor analysis to validate the robustness of our measurement models. our findings show that AI sensation can drive customer subjective feeling state and AI affects. We also found empirical evidence that both can mediate the relationship between AI sensation, customer subjective feeling state, AI affects and activation engagement. Our findings can offer valuable understanding for managers and AI developers, underscoring the important role of AI sensation for driving engagement.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102918"},"PeriodicalIF":20.1,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143943716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When employees meet digital-intelligence transformation: Unveiling the role of employee intentions","authors":"Tung-Ju Wu , Ruo-Xi Zhang , Jia-Min Li","doi":"10.1016/j.ijinfomgt.2025.102912","DOIUrl":"10.1016/j.ijinfomgt.2025.102912","url":null,"abstract":"<div><div>Although the reaction of change recipients is crucial in the successful implementation of organizational change, research on digital-intelligence transformation (DIT) neglected employees’ intentions to support DIT. Integrating the theory of planned behavior and job demands-resources model, this study presents a model that explains employees’ intention to support DIT. Derived from a preliminary interview study, we identified critical determinants that shape employees’ attitude towards DIT. We conducted a two-time point study with employees from enterprises presently undergoing DIT to test hypotheses. We found that DIT-supportive behavior is indirectly influenced by DIT-related attitude, DIT-related subjective norm and role clarity under DIT via employees’ intentions to support DIT. Our research also explored the moderating role of DIT-related perceived behavioral control. We further discuss the theoretical and practical implications of this research.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102912"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Anning-Dorson, Faeeza Baba, Melissa Zulu, George Acheampong
{"title":"Data-driven dynamic capabilities in emerging markets: A grounded theory approach to digital transformation in african retail banking","authors":"Thomas Anning-Dorson, Faeeza Baba, Melissa Zulu, George Acheampong","doi":"10.1016/j.ijinfomgt.2025.102914","DOIUrl":"10.1016/j.ijinfomgt.2025.102914","url":null,"abstract":"<div><div>This study develops a process model of Data-Driven Dynamic Capabilities (DDDC) in African retail banking, addressing critical gaps in our understanding of how organizations develop and deploy data capabilities in data-rich, resource-constrained environments. Through a qualitative multiple case study of two major African banks, we uncover the specific practices through which banks develop capabilities despite resource constraints, deploy them to address contextual challenges, and generate competitive advantage. Our analysis reveals three interconnected processes: capability development practices (including data-driven culture cultivation, cross-functional integration, and adaptive infrastructure development); core capabilities that emerge through these practices (Data Integration and Synthesis, Real-time Insight Generation, and Agile Marketing Execution); and capability deployment practices (such as contextually adaptive customer engagement and regulatory navigation) that translate capabilities into competitive outcomes. The process model explains how contextual factors—including regulatory complexity, varying digital infrastructure, and skills constraints—shape both capability development and deployment practices. Theoretically, our study extends dynamic capabilities theory by reconceptualizing capability development as an ongoing process enacted through specific organizational practices rather than as a linear sequence of activities. It contributes to the literature on big data analytics by revealing how capabilities emerge through the interplay of organizational practices and contextual factors, challenging traditional assumptions about resource requirements for advanced analytics capabilities. By focusing on practices rather than just capabilities, our process model shows how organizations in resource-constrained environments develop innovative approaches to overcome limitations in specialized analytics talent and infrastructure. This research provides a roadmap for digital transformation in emerging markets, emphasizing the development of contextually appropriate practices rather than simply importing approaches from resource-rich environments. It sets the stage for future research on organizational adaptation in data-rich, resource-constrained environments, exploring the intersection of data analytics, dynamic capabilities, and contextual innovation.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102914"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mohammed Abubakar , Ömer Turunç , Mohammad Soliman , Alexandre Sukhov
{"title":"Exploring the role of information systems-induced depletion, boreout syndrome, social media use on quiet quitting among digital cohorts","authors":"A. Mohammed Abubakar , Ömer Turunç , Mohammad Soliman , Alexandre Sukhov","doi":"10.1016/j.ijinfomgt.2025.102911","DOIUrl":"10.1016/j.ijinfomgt.2025.102911","url":null,"abstract":"<div><div>This research explores the socio-technical factors behind employees’ quiet quitting by investigating how social factors (boreout syndrome and digital cohorts) and technical factors (IS-induced depletion and social media usage) interact to encourage this behavior. A two-wave design across two independent studies was used with an expanded analytical approach. Study 1 used a symmetric variable-based analysis to identify IS-induced depletion, boreout, low social media usage, and digital immigrant status as key predictors of quiet quitting. In Study 2, boreout, social media usage, and digital immigrant status emerged as significant predictors. An asymmetric case-based analysis further demonstrated that quiet quitting results from combinations of conditions: in Study 1, IS-induced depletion and boreout were prevalent among digital immigrants with low social media usage. Similarly, in Study 2, IS-induced depletion and boreout occurred among digital natives or individuals with low social media usage. Contrary to the assumption that digital natives are more prone to quiet quitting, the findings indicate that digital immigrants are, in fact, more susceptible to this behavior when exposed to these stressors.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102911"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}