{"title":"I’m a believer! Believability of social media marketing","authors":"Rory Mulcahy , Aimee Riedel , Amanda Beatson , Byron Keating , Shane Mathews","doi":"10.1016/j.ijinfomgt.2023.102730","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102730","url":null,"abstract":"<div><p>Many firms use social media marketing and implement different message frames as a strategy to persuade consumers, enhance engagement, and to purchase their products. How firms frame social media content to be more believable, however, is not well understood. The main aim of this paper is to understand how social media content can be framed to enhance believability, and how this ultimately leads to improved social media outcomes. Drawing on Prospect Theory and Construal Level Theory and utilizing data from the field in the form of social media posts (n = 1756), and four experimental studies (n = 1141 total participants), and a critical incident study (n = 263 participants) the current research shows that self-gain frame combinations contribute to significantly higher levels of believability. Furthermore, believability was found to mediate the impact of social media message framing on purchase intentions and social media engagement. The practical implications of these findings and exciting new avenues for research are also discussed.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102730"},"PeriodicalIF":21.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138436017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creatability, achievability, and immersibility: New game design elements that increase online game usage","authors":"Ching-I Teng , Tzu-Ling Huang , Guan-Ling Huang , Chieh-Ni Wu , T.C.E. Cheng , Gen-Yih Liao","doi":"10.1016/j.ijinfomgt.2023.102732","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102732","url":null,"abstract":"<div><p>Online games are popular technology-enabled applications designed to satisfy a wide range of player needs. Self-determination theory (SDT) has been used in past online game studies to explain player satisfaction, but it is rarely used to examine game design as a trigger for player satisfaction, which reveals a research gap. This gap keeps game makers in the dark about the design of games that effectively satisfy players, throwing gamers’ ongoing game usage into doubt. Aiming to fill this gap, we proposed three new game design elements and examined their impacts on player satisfaction, continuance, and usage. We followed 546 participants who responded to our online survey and permitted us to collect their system-captured game usage data, generating two-wave and two-source data. We found that game achievability and game immersibility are game design elements that satisfy players. Competence satisfaction and autonomy satisfaction—but not relatedness satisfaction—are characteristics that secure players’ continuance and actual usage. Two replication studies were conducted to further verify these findings. Our study extends SDT backward to examine the game-contextualized triggers of satisfaction. These theorized triggers showcase game system design, theoretically clarifying the means of using SDT to design games, and providing practical insights to guide game makers in securing player continuance and actual usage.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102732"},"PeriodicalIF":21.0,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001135/pdfft?md5=cad0a140621182d28925daa034f3030f&pid=1-s2.0-S0268401223001135-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138435939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bitcoin double-spending risk and countermeasures at physical retail locations","authors":"","doi":"10.1016/j.ijinfomgt.2023.102727","DOIUrl":"10.1016/j.ijinfomgt.2023.102727","url":null,"abstract":"<div><p>This research examines vulnerabilities and potential attacks using Bitcoin<span><span> payment systems at physical retail locations. It also lays a theoretical and practical foundation for effective countermeasures that ensure the integrity of decentralized transactions and bolster the confidence of both merchants and customers. The study focuses on potential double-spend attacks, particularly in the context of instant payments made via non-custodial crypto wallets. It also evaluates alternatives for instant crypto payments that use alternative coins and second-layer blockchain solutions. Research has indicated that Eclipse, Sybil, Majority, Race, and Finney attacks carry a relatively low risk, especially when payment amounts are limited. The paper identifies Replace-By-Fee attacks as the most significant threat and presents a set of countermeasures. These findings are of great importance to </span>cryptocurrency<span> experts, payment tech researchers, retail enterprises, and stakeholders using non-custodial wallets while exploring decentralized blockchain aspects.</span></span></p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"79 ","pages":"Article 102727"},"PeriodicalIF":20.1,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139299163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Flavián, Sergio Ibáñez-Sánchez, Carlos Orús, Sergio Barta
{"title":"The dark side of the metaverse: The role of gamification in event virtualization","authors":"Carlos Flavián, Sergio Ibáñez-Sánchez, Carlos Orús, Sergio Barta","doi":"10.1016/j.ijinfomgt.2023.102726","DOIUrl":"10.1016/j.ijinfomgt.2023.102726","url":null,"abstract":"<div><p>The virtualization of cultural events in the metaverse creates opportunities to generate valuable and innovative experiences that replicate and extend in-person events; but the process faces associated challenges. In the absence of relevant empirical studies, the aim of this article is to analyze the positive and negative aspects of the user experience in a cultural event held in the metaverse. A mixed-methods approach is employed to test the proposed hypotheses. The results from three focus groups demonstrated the difficulty that users face in focusing their attention on the main elements of the metaverse, and the inability of this virtual sphere to convey the authenticity of a cultural event. Based on these findings, a metaverse-focused quantitative study was conducted to examine whether perceived gamification mitigate the negative effects of users failing to pay attention in their metaverse experiences. When users increased their attention levels, their ability to imagine the real experience and their perceptions of the authenticity of the cultural event increased, which produced positive behavioral intentions. This is one of the first studies to empirically analyze the tourist experience in the metaverse; managers and policymakers can benefit from the results to hold valuable virtual cultural events.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102726"},"PeriodicalIF":21.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S026840122300107X/pdfft?md5=03c144d039675a70d84d33a1b8435a42&pid=1-s2.0-S026840122300107X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rania B. Mostafa , Cristiana R. Lages , Ahmed Shaalan
{"title":"The dark side of virtual agents: Ohhh no!","authors":"Rania B. Mostafa , Cristiana R. Lages , Ahmed Shaalan","doi":"10.1016/j.ijinfomgt.2023.102721","DOIUrl":"10.1016/j.ijinfomgt.2023.102721","url":null,"abstract":"<div><p>Virtual agents (VAs) are increasingly used by firms to establish relationships with customers. While this form of artificial intelligence offers numerous advantages, adverse outcomes can arise when customers’ expectations of VAs are not met. This paper examines how the disconfirmation of both parasocial interactions with the VA and its anthropomorphic characteristics affects users’ dissatisfaction with the VA. Such dissatisfaction might then influence subsequent behavioural outcomes, specifically spreading negative word-of-mouth about the VA (NWOMVA) and avoiding future use of VAs. Data were gathered from VA users in Egypt and the UAE via an online questionnaire. The findings from the two studies confirm that all direct hypotheses were supported and that dissatisfaction with VAs mediates the relationships between both negative parasocial interaction disconfirmation (NPID) and negative VA anthropomorphism disconfirmation and the behavioural outcomes of NWOMVA and VA avoidance. Thus, this paper offers managers guidelines on the effective characteristics of VAs, namely anthropomorphism and parasocial interaction, which allow them to identify the pitfalls of VAs and take preventive or remedial actions.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102721"},"PeriodicalIF":21.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135516077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogesh K. Dwivedi , Laurie Hughes, Harshad K.D.H. Bhadeshia, Sophia Ananiadou , Anthony G. Cohn, Jacqueline M. Cole, Gareth J. Conduit, Maunendra Sankar Desarkar, Xinwei Wang
{"title":"Artificial intelligence (AI) futures: India-UK collaborations emerging from the 4th Royal Society Yusuf Hamied workshop","authors":"Yogesh K. Dwivedi , Laurie Hughes, Harshad K.D.H. Bhadeshia, Sophia Ananiadou , Anthony G. Cohn, Jacqueline M. Cole, Gareth J. Conduit, Maunendra Sankar Desarkar, Xinwei Wang","doi":"10.1016/j.ijinfomgt.2023.102725","DOIUrl":"10.1016/j.ijinfomgt.2023.102725","url":null,"abstract":"<div><p>“Artificial Intelligence” in all its forms has emerged as a transformative technology that is in the process of reshaping many aspects of industry and wider society at a global level. It has evolved from a concept to a technology that is driving innovation, transforming productivity and disrupting existing business models across numerous sectors. The industrial and societal impact of AI is profound and multifaceted, offering opportunities for growth, efficiency, and improved healthcare, but also raising ethical and societal challenges as the method is integrated into many aspects of human life and work. This editorial is developed by contributors of the 4th Royal Society Yusef Hamied Workshop ( in 2023 devoted to Artificial Intelligence), designed to enhance collaboration between Indian and the UK scientists and to explore future research opportunities. The insights shared at the workshop are shared here.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"76 ","pages":"Article 102725"},"PeriodicalIF":21.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135515909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for cyber-risk insurance against ransomware: A mixed-method approach","authors":"Arunabha Mukhopadhyay, Swati Jain","doi":"10.1016/j.ijinfomgt.2023.102724","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102724","url":null,"abstract":"<div><p>Hackers follow a standard cyber kill chain process and install ransomware payloads using phishing emails on firms belonging to critical industry, resulting in huge losses in revenue, reputation, and customer churn. This study uses a mixed-method explanatory approach to mitigate ransomware attacks. We present the quantitative Ransomware Risk Management Model (R2M2) based on protection motivation theory (PMT). The Ransomware Risk Assessment module based on the threat appraisal component of PMT and the National Institute of Standards and Technology (NIST) guidelines can help the chief information security officer (CISO) to assess the risk using predictive analytics techniques. The Ransomware Risk Quantification module uses collective risk modeling to compute the severity of a ransomware attack on an organization. The Ransomware Risk Mitigation module helps the CISO to minimize the probability and impact of a ransomware attack on their organization by (i) investing in perimeter security technologies and training to ensure prepare, deter, detect, restrain, recover, and review mitigation strategies, (ii) adopting the National Institue of Standards and Technology (NIST) Cybersecurity Framework to ensure business resilience, and (iii) mitigating the residual risk by investing in cyber-risk insurance. We validated the proposed method using a qualitative study by interviewing participants form firms affected by ransomware, managed security service providers, security consultants, and cyber-risk insurers.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102724"},"PeriodicalIF":21.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001056/pdfft?md5=3d251a9afa04505d27c683328e832cbf&pid=1-s2.0-S0268401223001056-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92164288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandru Capatina , Nina Jane Patel , Kiril Mitrov , Dragos Sebastian Cristea , Adrian Micu , Angela-Eliza Micu
{"title":"Elevating students’ lives through immersive learning experiences in a safe metaverse","authors":"Alexandru Capatina , Nina Jane Patel , Kiril Mitrov , Dragos Sebastian Cristea , Adrian Micu , Angela-Eliza Micu","doi":"10.1016/j.ijinfomgt.2023.102723","DOIUrl":"10.1016/j.ijinfomgt.2023.102723","url":null,"abstract":"<div><p>Metaverse platforms devoted to educational purposes are becoming increasingly popular among educators worldwide due to the benefits they offer in elevating students’ lives. This study explores how immersive platform features, blockchain features, a safe learning environment and new learning models contribute to the educational outcomes. Emerging literature on educational Metaverse platforms has been used to develop a genuine conceptual model. The model was tested using data collected from 100 educators located in different countries from worldwide. The data were analyzed using partial least squares structural equation modeling (PLS-SEM), Random Forest and other different feature importance methods, fuzzy-set qualitative comparative analysis (fsQCA), thematic content analysis and Latent Dirichlet Allocation (LDA). The application of PLS-SEM outlines that immersive platform features and safe learning environments positively affects educational outcomes. Random Forest and feature importance methods investigate the predictive power of items included in the model, fsQCA reveals the combinations of these factors that lead to high educational outcomes, while the qualitative insights reveal the key themes emerged from educators’ perspectives on the use of Metaverse platforms. This study contributes to Metaverse literature, which is relatively understudied in the educational sector.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102723"},"PeriodicalIF":21.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceived creepiness in response to smart home assistants: A multi-method study","authors":"Stefan Raff , Stefan Rose , Tin Huynh","doi":"10.1016/j.ijinfomgt.2023.102720","DOIUrl":"https://doi.org/10.1016/j.ijinfomgt.2023.102720","url":null,"abstract":"<div><p>Smart home assistants (SHAs) have gained a foothold in many households. Although SHAs have many beneficial capabilities, they also have characteristics that are colloquially described as creepy – a fact that may deter potential users from adopting and utilizing them. Previous research has examined SHAs neither from the perspective of resistance nor the perspective of creepiness. The present research addresses this gap and adopts a multi-method research design with four sequential studies. Study 1 serves as a pre-study and provides initial exploratory insights into the concept of creepiness in the context of SHAs. Study 2 focuses on developing a measurement instrument to assess perceived creepiness. Study 3 uses an online experiment to test the nomological validity of the construct of creepiness in a larger conceptual model. Study 4 further elucidates the underlying behavioral dynamics using focus group analysis. The findings contribute to the literature on the dark side of smart technology by analyzing the triggers and mechanisms underlying perceived creepiness as a novel inhibitor to SHAs. In addition, this study provides actionable design recommendations that allow practitioners to mitigate end users’ potential perceptions of creepiness associated with SHAs and similar smart technologies.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"74 ","pages":"Article 102720"},"PeriodicalIF":21.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001019/pdfft?md5=ae75b1a3b32315f52820d0c3ff923348&pid=1-s2.0-S0268401223001019-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92255339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alex Taylor , Margurite Hook , Jamie Carlson , Siggi Gudergan , Tomas Falk
{"title":"Appetite for distraction? A systematic literature review on customer smartphone distraction","authors":"Alex Taylor , Margurite Hook , Jamie Carlson , Siggi Gudergan , Tomas Falk","doi":"10.1016/j.ijinfomgt.2023.102722","DOIUrl":"10.1016/j.ijinfomgt.2023.102722","url":null,"abstract":"<div><p>In today’s society, the ubiquitous presence of personal smartphones has led to the phenomenon of, what we call, <em>customer smartphone distraction</em> (CSD). This paper introduces the concept of CSD, which occurs when an internet-connected smartphone competes for a customer’s attention during a consumption goal-oriented task or behavior. Based on a three-stage research process involving a systematic literature review and an expert opinion survey with a multi-disciplinary lens to better understand this phenomenon, we develop a conceptual framework underpinned by Cognitive – Affective Personality System (CAPS) Theory that incorporates the antecedents, contingency variables, and consequences of CSD. Our findings suggest that CSD is a complex phenomenon influenced by both environmental stimuli, such as audio and visual notifications, and internal psychological states, such as boredom and anxiety, which are interdependent factors that contribute to CSD. Interestingly, the absence of environmental stimuli alone may not reduce CSD. To deal with this issue, customers need to take responsibility for their consumption behavior, while businesses, society and policy makers can assist customers through better education and design of mobile device experiences. Overall, we highlight the need for a deeper understanding of CSD and its impact on customer behavior and well-being, and outline implications to assist researchers, practitioners, policy makers and society broadly to deal with CSD.</p></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"75 ","pages":"Article 102722"},"PeriodicalIF":21.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0268401223001032/pdfft?md5=43a5bd4dcde9a0b44e50a213bdfbdbf2&pid=1-s2.0-S0268401223001032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135221307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}