The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital NGOs design and popularise tools to open up, and enable citizens to interact with, decision-makers. The successful operation of such platforms depends on the expertise and efficiency of the NGO, and the willingness of institutions to disclose usable information. It is this institutional interaction with civic technology that this paper seeks to explore. This paper examines the empirical interview...
Internet traffic from mobile devices surpassed traffic from traditional desktop PCs for the first time in 2014. Although users today access and experience digital services through multiple mobile and traditional devices simultaneously, little empirical research investigated the mechanisms driving this shift, or its implications for service innovation research and practice. Here, we report on a qualitative...
This paper investigates how senior managers interpret and react to the strategic threats and opportunities presented by digital technologies. Strategy studies focus on one type of actor or organizational context. Instead, we considered various firms, roles and expertise. We conducted 20 hours of in-depth, elite interviews with 15 senior managers from client firms, digital marketing agencies and strategy...
Governments worldwide engage in open government initiatives for making their data and related information available to the public. But the success of open government is contingent upon the public's willingness to use and exploit these data sets. Governments need to have a clear understanding of the factors impacting users' intentions to make use of their open government offerings. In this paper, we...
This study aims to explore students' interaction while being engaged in learning activities via their preferred online learning environment. It incorporates three objectives, 1) to identify students' needs, 2) to design online learning environments and 3) to evaluate students' interactions. It is also an exploratory study which utilizes the case study method where an actual study is carried out over...
Today, the interaction between patients and Interactive Health Portals (IHPs) is one of the hot topics of e-health domains. Online health care providers try to improve the quality of their online services to increase patients' attraction, trust and loyalty. Dimensions of e-service quality (eSQ) in Interactive Health Portals (IHPs) are usually deployed in a heterogonous network where both human and...
Social Network Site (SNS) are increasingly being used within family settings to support and extend the family relationships. From hundreds of SNS, Facebook is one of the most popular across a variety of demographic categories in Malaysia. Many extant researches on SNS adoption and use have focused on individual level and disregarding the family perspective. Apart from that, most of the studies are...
Defined as the dependency to a technology that results in its excessive and compulsive use, IT addiction is seen as increasingly prevalent in today's societies. Recent research has revealed that IT addictive behaviors are creating serious problems for individuals and organizations alike. In this paper, we report the results of a qualitative study that aimed at investigating smart phone addictive usage...
Grounded theory method is gaining importance as a method for theory building about a particular phenomenon. One of the most important benefits is the ability to derive theory from and within the context of data collected. In this research, the authors analyzed the data by using a grounded theory method, in which the cyber terrorism framework is drawn. This paper proposes a conceptual framework describing...
Documenting the context in which data are collected is an integral part of the scientific research lifecycle. In field-based research, contextual information provides a detailed description of scientific practices and thus enables data interpretation and reuse. For field data, losing contextual information often means losing the data altogether. Yet, documenting the context of distributed, collaborative,...
The popularity of Online Social Networks (OSN's) is still on the rise even though we have started to realize that connection comes with a cost. Interpersonal boundaries positively impact the way we interact with others, but they are often overlooked within online social networks which can lead to negative consequences. This research investigates ways to balance the benefits and tradeoffs of OSN's...
Partial adoption means that a perfect substitute fails to completely replace the older technologies in one's personal use even though it is judged the superior alternative. The assumption is that consumers choose to only use the superior alternative, yet, we often observe coexistence of old and new technologies. The contribution of this paper is to offer insights to the phenomenon of partial adoption:...
In this paper, we highlight an example of appropriation of technology. Based on our five interrelated studies, we revealed how a remote asynchronous photo sharing application has been appropriated by an expatriate community to support their local social interaction. In particular, while photologs appear to have been designed to facilitate remote sharing of photographs with friends and family far away,...
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which involves information sharing. However, the awareness about privacy concerns and security threats have caused to non-sharing behavior among the Internet Users. This situation have caused...
This article presents a study carried out on the user-centred design of mobile applications for on-line learning via in-depth interviews of students and ethnographic observations of their commuting context. The objective of the research is to understand the needs and requirements of students who undertake on-line learning and use their commuting time to study or do learning-related tasks. Via the...
The recent impressive diffusion of smartphones in the mobile industry offers new opportunities to mobile services vendors. One of the most influenced service categories are location-based services. In the present study we investigate the use of location-based services. Based on insights from behavioural decision making a theoretical framework is developed to analyse the individual decision to use...
Information search is an important part in most consumers' buying decisions. For Thailand whose main revenues rely partly on tourism industry, one of a top industries which is significantly affected by an emergence of the Internet. Understanding tourists' information search behavior could provide useful information for both government and tourism-related businesses to plan their marketing communication...
Understanding user needs and involving users are key success factors for service development. However, it is unclear how to apply old wisdoms from traditional product development settings in a social media context. This article analyses user involvement practices in a longitudinal case study of the virtual world and social networking service called Habbo. The focus is on how particular social media...
Many failures associated with software development in particular Web-based applications are due to poor awareness of risks involved and the weak management of these risks. Hence, effective risk management has become the essential factor in ensuring the success of the Web project management. We propose RIAP (Risk Identification Architecture Pattern) model to manage risks in Web projects. It has been...
Change impact analysis (CIA) approaches are mostly developed based on the understanding of both system development process and system architecture. It is thus reasonable to assume that if the development process or system architecture is fundamentally different, then CIA approaches must address these differences accordingly. This is particularly relevant in the context of Web systems, given that these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.