The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study investigates online users' privacy perceptions based on their geographical regions. We administered an online survey to assess three psychological aspects of privacy perceptions including perceptions of privacy boundary, personal disposition of trust, and behavioral preferences for information sharing. Our results reveal regional differences in users' privacy perceptions and identify three...
This study explores the effect of general disposition to trust on the perceived trustworthiness of an online vendor in high-and low-context cultures. A total sample of 616 responses from users of online bookstores was collected from China and Finland. The results show that the disposition to trust has a highly significant effect on the three dimensions of trustworthiness namely ability, integrity,...
Cyberloafing, defined as non-work-related Internet use during work hours, has brought about considerable loss of both employees' performance and organization's profits all over the world. Accordingly, more and more researchers have tried to explore the predictors of cyberloafing. While most researchers pay attention to some organization conditions or personal emotions, we suppose some personal characteristics...
Defined as the dependency to a technology that results in its excessive and compulsive use, IT addiction is seen as increasingly prevalent in today's societies. Recent research has revealed that IT addictive behaviors are creating serious problems for individuals and organizations alike. In this paper, we report the results of a qualitative study that aimed at investigating smart phone addictive usage...
One of the most unpredictable forms of terrorism acts are those committed by a single individual, a so-called "lone wolf terrorist". The most difficult part in detecting a lone wolf is that they can come in any size, shape, and ethnicity and represent any ideology. However, there are some characteristic similarities that many lone wolves share. In this paper we identify three different areas...
the purpose of this study was to probe how Appreciative Inquiry (AI) thinking training affects individual's performance in virtual environment. Sixty eight students of a university in Taiwan participated in the study. Thirty four of them received six hours of training courses. The remaining subjects serve as the control. All subjects were administrated the Emotion index before and after the AI thinking...
As an important indicator measuring enterprise management level, psychological ecology level of enterprise organization is an important basis for behavior prediction and management decision. Enterprise organization is made up of individual. The combination of individual psychological state decides the psychological ecology of enterprise organization. The work experience of individuals is mainly exhibited...
Partial adoption means that a perfect substitute fails to completely replace the older technologies in one's personal use even though it is judged the superior alternative. The assumption is that consumers choose to only use the superior alternative, yet, we often observe coexistence of old and new technologies. The contribution of this paper is to offer insights to the phenomenon of partial adoption:...
This thesis emphaticly analizes and studies undergraduates' information demand and information behavior through investigation. Based on the conclusion of this investigation, we try to understand the demand awareness, the information needs, information seeking patterns and evaluation items and purchase intention of undergraduates' for business information in China. At the end of the study, we also...
As a subset of e-commerce, m-commerce (mobile commerce) also faces problems of trust building. The limitation of mobile devices, such as screen size, privacy and safety problem, make it important to build trust effectively and efficiently. In e-commerce, culture can exert a significant impact on how trust is built through various web strategies. Similarly, trust-building strategies in m-commerce could...
Instant messaging (IM) is a communication media which integrates several media technologies. Comparing with other communication technologies, it can achieve more efficient interaction like traditional face-to-face communication. By studying the quantitative and qualitative IM researches in recent ten years, the author saw several limitations in previous studies, including study methods, content, theory,...
This study investigated the effect of reward interdependence on performance and decision making process in virtual teams. 30 teams participated in a simulated task based on Internet. The level of reward interdependence was manipulating the percentage of team performance and individual performance in the calculation method of salary. The results showed that the performance was highest in the group...
The commercial potential and rapid growth of Web 2.0 phenomenon have been accompanied by concerns regarding the collection, dissemination, and re-identification of personal information by Web site operators, marketers, and other users on the social networks. To address critical and acute concerns for information privacy, this study investigated users' privacy perceptions in the Web 2.0 context by...
The credibility of Website is a sort of psychological feeling, in other words, a sense of trust and its intensity towards the enterprise??s Website produced by the customers from individual or collective perspective. According to the Website??s structure and function modules, the credibility of enterprise??s Website can be divided into three parts, respectively, the credibility of Website structure,...
In this paper an attempt is made to describe the relationship between cyber crime and mental illness. It will create awareness among people about cyber crimes and criminality due to mental illness. Computers and the internet make many actions easier for us. They also make many unlawful activities easier for criminals such as the sharing of, copy right infringement, stock manipulation, child pornography...
Thanks to the attractions of the multimedia, namely interactivity and multimodality, it seems that web sites and CD-ROMs have the capacity to transmit heritage information to the public. But ultimately they miss real cognitive or educational purposes. Consequently, this article suggests enriching the conception of educational products, combining the potential of video games with the methods of representation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.