International Journal of Information Management
Papers 2824
1 page of 283 pages (2,824 results)
#1Spyridon Samonas (Panasonic)H-Index: 2
#2Gurpreet Dhillon (UNCG: University of North Carolina at Greensboro)H-Index: 27
Last.Ahlam AlmusharrafH-Index: 1
view all 3 authors...
Abstract Organizational stakeholders, such as employees and security managers, may understand security rules and policies differently. Extant literature suggests that stakeholder perceptions of security policies can contribute to the success or failure of policies. This paper draws on the Theory of Personal Constructs and the associated methodology, the Repertory Grid technique, to capture the convergence and divergence of stakeholder perceptions with regards to security policy. We collected dat...
#1Maranda McBrideH-Index: 9
#2Lemuria Carter (UNSW: University of New South Wales)H-Index: 1
Last.Brandis PhillipsH-Index: 5
view all 3 authors...
Abstract The proliferation of cell phones and the growing culture of constant connectivity has introduced a plethora of new challenges for mobile citizens. One of the major challenges transportation professionals desire to address involves the use of cell phones to text while driving, especially for less experienced drivers. In this study, the Theory of Planned Behavior (TPB) in conjunction with psycho-social factors is utilized to explore the intention to text while driving among young drivers....
#1Si Shi (SWUFE: Southwestern University of Finance and Economics)H-Index: 6
#2Yi Wang (SWUFE: Southwestern University of Finance and Economics)H-Index: 1
Last.Qian Zhang (SWUFE: Southwestern University of Finance and Economics)H-Index: 1
view all 4 authors...
Abstract Advances in information and communication technologies (ICT) have led to the revolution in retail industry through integrating multiple available channels to enhance seamless customer experience, promoting a shift from multichannel to omnichannel business. This phenomenon has gained increasing attention in both academia and industry due to growing challenges to serve customers effectively. This study adopted a mixed-method approach to firstly conceptualize omnichannel customer experienc...
1 CitationsSource
#1Abdus-Samad Temitope Olanrewaju (RMIT: RMIT University)H-Index: 2
#2Mohammad Alamgir Hossain (RMIT: RMIT University)H-Index: 4
Last.Paul Mercieca (RMIT: RMIT University)H-Index: 2
view all 4 authors...
Abstract The rise of social media has led to changes in how entrepreneurs carry out their day-to-day activities. Studies on social media and entrepreneurship are relatively new and fragmented in their focus, however there is increasing interest from academia and practitioners for further research and investigation within this area. This study systematically reviews research carried out in the domain of social media and entrepreneurship. A total of 160 papers, published between 2002 and 2018 were...
8 CitationsSource
#1Subhro Sarkar (Indian Institute of Management Rohtak)H-Index: 1
#2Sumedha Chauhan (Global University (GU))
Last.Arpita Khare (Indian Institute of Management Rohtak)H-Index: 14
view all 3 authors...
Abstract Awareness of antecedents and consequences of trust in m-commerce can enable m-commerce service providers to design suitable marketing strategies. Present study conducted a meta-analysis of 118 related empirical studies. The results indicate that antecedents namely perceived usefulness, perceived ease of use, system quality, information quality, service quality, user interface, perceived risk, perceived security, structural assurance, ubiquity, and disposition to trust, while consequence...
#1Matthew I. Bellgard (QUT: Queensland University of Technology)H-Index: 32
Abstract Devising fit-for-purpose research data management strategies within a university is challenging. This is because the five ‘Vs’ for generated research data; its Volume, Variety, Velocity, Veracity and its Value must be constantly considered. Invariably, a combination of data V’s for any given research endeavour determine how best to manage it appropriately addressing archiving, compliance, security, privacy, sharing, reuse and so forth. As such, institutions are faced with defining, shap...
#1Buddhi Pathak (University of Northampton)
#2Mona Ashok (University of Reading)H-Index: 3
Last.Yin Leng Tan (University of Reading)
view all 3 authors...
Abstract This exploratory study investigates value co-destruction in the Business-to-Business (B2B) context and examines the impact of actors’ opportunistic behaviour on value co-creation. The research undertakes an in-depth case study based approach. It uses data triangulation, where multiple sources of evidence (interviews, conference audio recordings and documents) are collected from the case organisation (a vendor) and its service ecosystem partners in the ICT sector. The partners included i...
#1Kenan Degirmenci (QUT: Queensland University of Technology)H-Index: 5
Abstract Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To tes...
#1Haider Maqsood (BU: Bahria University)H-Index: 1
#2Irfan Mehmood (Sejong University)H-Index: 1
Last.Khan Muhammad (Sejong University)H-Index: 22
view all 8 authors...
Abstract Stock exchange forecasting is an important aspect of business investment plans. The customers prefer to invest in stocks rather than traditional investments due to high profitability. The high profit is often linked with high risk due to the nonlinear nature of data and complex economic rules. The stock markets are often volatile and change abruptly due to the economic conditions, political situation and major events for the country. Therefore, to investigate the effect of some major ev...
1 CitationsSource
Abstract While the concept of wisdom, which refers to how people make right use of their knowledge through their practical actions, judgments, and ethical decisions, in general attracts researcher interest in a variety of disciplines, such as philosophy, psychology and management studies, little is known about how wisdom is conceptualized and then operationalized in the software development project team context. Based on the frameworks for philosophical, group and organizational wisdom, this pap...
Top fields of study
Information technology
Information management
Information system
Knowledge management