scispace - formally typeset
Search or ask a question

Showing papers in "Behaviour & Information Technology in 2017"


Journal ArticleDOI
TL;DR: The results show that PU and trust are important at both the initial and latter stages in the consumer acceptance of online health services and have implications for the dynamic nature of trust and PU as well as their roles in the long-term sustainability of e-services.
Abstract: E-services remain characterised by uncertainty despite their proliferation. Consumer trust beliefs are therefore considered an important determinant of e-service adoption. However, the research has not yet considered the potentially dynamic nature of these trust beliefs or how early-stage trust might influence later-stage adoption and use. To address this gap, this study draws on the theory of reasoned action and expectation–confirmation theory in a longitudinal study of trust in e-services. We examine how trust interacts with other consumer beliefs such as perceived usefulness PU and how these beliefs together influence consumer intentions and behaviours concerning e-services at both the initial and latter stages of use. The empirical context is online health information services. Data collection on a student population occurred during two time periods approximately five weeks apart. The results show that PU and trust are important at both the initial and latter stages in the consumer acceptance of online health services. Consumers’ actual usage experiences modify perceptions of usefulness and influence the confirmation of their initial expectations. These results have implications for our understanding of the dynamic nature of trust and PU as well as their roles in the long-term sustainability of e-services.

127 citations


Journal ArticleDOI
TL;DR: A managerial implication drawn from the findings is that LBS providers should develop more useful user interfaces or provide timely, personalised services to reduce perceived privacy risk and strengthen LBS continued usage intention.
Abstract: Numerous location-based services LBS studies have suggested that the risk of disclosing personal privacy hinders consumers from adopting LBS, whereas scant attention has focused on clarifying how to mitigate the perceived privacy risk of using LBS. This quantitative study focuses on the effects of consumer quality perceptions i.e. information quality, system quality, and service quality on their trust in LBS, which consequently affects perceived privacy risk and continued usage intention towards LBS. Research data were collected through a market survey website; 1399 valid questionnaires were collected. Structural equation modelling analysis was applied to the data. The results revealed that information quality, system quality, and service quality were positively related to perceived trust. Perceived trust also correlated negatively with perceived privacy risk, but positively with continued usage intention. A managerial implication drawn from the findings is that LBS providers should develop more useful user interfaces or provide timely, personalised services to reduce perceived privacy risk and strengthen LBS continued usage intention.

105 citations


Journal ArticleDOI
TL;DR: A causal and predictive statistical model for predicting instructor e-LMS acceptance is developed and it is shown that service quality is the most important predictor of e-learning acceptance followed by SYS-Q, PI, information quality, and TE.
Abstract: The success of e-learning management systems (e-LMSs) such as MOODLE depends on the usage of students as well as instructor acceptance in a virtual learning environment. E-Learning enables instructors to access educational resources to support traditional classroom teaching. This paper attempts to develop a model to understand and predict the effect of individual characteristics (technology experience [TE] and personal innovativeness [PI]) and e-LMS quality determinants (system quality [SYS-Q], information quality, and service quality) on the continuous use of e-LMS by instructors, which is critical to its success. A total of 219 instructors using MOODLE responded to the survey. The structural equation model (SEM) was employed to test the proposed research model. The SEM results showed that SYS-Q, PI, service quality, and TE have a statistically significant influence on continuous usage of e-LMS by instructors. Furthermore, all determinants of the research model were given as input to an NN model ...

102 citations


Journal ArticleDOI
TL;DR: Binary logistic regression analysis and structural equation modelling showed that undergraduate students who had smartphone addiction demonstrated greater odds of having high anxiety compared to those who were not addicted, andStudents who had high anxiety exhibited greater chances of having clinically significant problems in their family relations.
Abstract: Smartphones have become ubiquitous in people’s lives to an extent that necessitates the investigation of their negative impact. The scarcity of such investigations triggered our interest in examini...

101 citations


Journal ArticleDOI
TL;DR: It is concluded that VR will influence reflective thinking and further indirectly improve perceived learning effectiveness and the relationship between VR and technology accessibility.
Abstract: The application of virtual reality VR in improving users’ learning outcomes, especially in perceived learning effectiveness, is a new area. VR provides visualisation and interaction within a virtual world that closely resembles a real world, bringing an immersive study experience. It also has two special features: representational fidelity and immediacy of control. However, only when the technology fits the tasks that users are performing will it be adopted. In addition, technology itself cannot improve learning outcomes; certain learning behaviours, such as reflective thinking, should be prompted first so that learning outcomes can be improved. The research hypotheses derived from this model have empirically been validated using the responses to a survey among 180 users. These responses have been examined through SmartPLS 2.0. Surprisingly, task–technology fit does not moderate the relationship between VR and technology quality and the relationship between VR and technology accessibility. From this study, we can conclude that VR will influence reflective thinking and further indirectly improve perceived learning effectiveness.

70 citations


Journal ArticleDOI
TL;DR: The results revealed that post-usage privacy protection and social influence beliefs drove user continuous intentions direct towards m-payment, and post- usage mobility belief had an indirect impact via user satisfaction.
Abstract: Mobile commerce has become the predominant form of electronic commerce in many countries. This study examines the impacts of mobility, privacy protection, and social influence on mobile payment m-payment continuance and the moderation effects of espoused cultural values. A research model rooted in expectation–confirmation theory was tested using 724 usable responses from smartphone m-payment users in China. The results revealed that post-usage privacy protection and social influence beliefs drove user continuous intentions direct towards m-payment, and post-usage mobility belief had an indirect impact via user satisfaction. The espoused cultural value uncertainty avoidance served as an antecedent of perceived social influence and mobility. The espoused cultural value power distance served as an antecedent of perceived privacy protection. Implications, limitations, and future research directions are also discussed.

66 citations


Journal ArticleDOI
TL;DR: A technology dependence model is proposed and empirically tested and all three dimensions of interactivity, namely, control, communication, and responsiveness, are revealed to be significant indicators of engagement.
Abstract: To better understand users’ technology utilisation behaviour, a construct named technology dependence is suggested; as well a technology dependence model is proposed and empirically tested. Based on the literature on marketing, information systems’ utilisation, and psychology, a comprehensive set of constructs and hypotheses are compiled with a methodology for testing them in this paper. A questionnaire was designed and data were collected from 255 users of smartphones in Korea, mainly consisting of students and academics. Structural equation modelling was then applied to analyse the data. The result indicated that engagement is the strongest indicator of technology dependence along with user satisfaction. User satisfaction is affected by engagement and responsiveness of the technology. And all three dimensions of interactivity, namely, control, communication, and responsiveness, are revealed to be significant indicators of engagement. Based on the findings, the model develops useful insights into the factors that influence technology dependence and provides new ideas in understanding technology utilisation.

61 citations


Journal ArticleDOI
TL;DR: It was found that hedonic motivation, perceived playfulness, and performance expectancy were strong determinants of students’ intention to use e-learning, while habit and facilitating conditions all positively affectedStudents’ use of e- learning via Facebook.
Abstract: Research on utilising social networks for teaching and learning is relatively scarce in the context of information systems. There is far more emphasis on studying the usage of social networks towards fulfilling individuals’ basic social needs. This study uses the unified theory of acceptance and use of technology (UTAUT2) to analyse students’ intention to use and use of e-learning via Facebook. It incorporates playfulness into the UTAUT2 model and categorises the determinants of intention to use e-learning via Facebook into three categories, namely, hedonic values, utilitarian values, and communication values. The data were collected in a two-stage survey from 170 undergraduate students, and the model was tested using structural equation modelling. We found that hedonic motivation, perceived playfulness, and performance expectancy were strong determinants of students’ intention to use e-learning, while habit and facilitating conditions all positively affected students’ use of e-learning via Facebo...

58 citations


Journal ArticleDOI
TL;DR: The purpose of this research is to elucidate how user intentions to purchase and to spread word-of-mouth (WOM) are influenced by characteristics present on social commerce platforms.
Abstract: Social commerce has been gaining momentum over the last few years as a novel form of e-commerce, creating substantial changes for both businesses and consumers. However, little is known about how c...

57 citations


Journal ArticleDOI
TL;DR: This study used automated and manual techniques to investigate design attributes including layout, navigation, links, multimedia, visual representation, colour, and text between Australian, Chinese, and Saudi Arabian cultures.
Abstract: Since websites are developed and maintained by different cultures, web page design may be influenced by the originating culture. This study examines the usage of design attributes between Australian, Chinese, and Saudi Arabian cultures. This study used automated and manual techniques to investigate design attributes including layout, navigation, links, multimedia, visual representation, colour, and text. Significant differences were found in each of the listed design attributes, suggesting that different interfaces may be needed for successful communication with different cultural groups. The results of this study confirm and extend prior research and anthropological models. The contribution of this study is the scale (460 websites in total) and breadth (seven design attributes) of the research. It also provides revised insights into culture and website design and the concept of cultural translation of web content.

51 citations


Journal ArticleDOI
TL;DR: The research findings unpack the impact mechanism of charismatic leadership on tacit knowledge sharing, and provide guidelines for the team leader to exhibit charismatic leadership traits in order to promote a psychological safety climate and facilitate an effective knowledge sharing of enterprise systems.
Abstract: Drawing upon charismatic leadership and intrinsic motivation theory, we developed a theoretical model to examine the impact mechanism of leader charisma on individuals’ tacit knowledge-sharing behaviour in the context of an Enterprise Systems learning team. We conducted a survey-based field study to examine the theoretical model and hypotheses. A total of 153 questionnaires were distributed to employees from more than 20 branches of the Beidahuang Group in China and 117 valid questionnaires were returned. Results from partial least squares analysis suggest that leader charisma has a strong influence on psychological safety climate, which in turn has a positive impact on individuals’ intrinsic motivation and their tacit knowledge-sharing behaviour. Our research findings unpack the impact mechanism of charismatic leadership on tacit knowledge sharing, and provide guidelines for the team leader to exhibit charismatic leadership traits in order to promote a psychological safety climate and facilitate an effective knowledge sharing of enterprise systems.

Journal ArticleDOI
TL;DR: The Self-Determination Theory provides the theoretical foundation for parametric hypothesis testing in future related studies and may offer an opportunity for a new paradigm shift from behavioural intention and continuance intention to actual use behaviour.
Abstract: Existence of cloud computing has led to the emergence of cloud-based virtual learning environments (VLEs). Unlike existing grid-based VLE studies which engaged extrinsic motivational drivers, e.g. TAM, UTAUT, etc., this study examined the effects of intrinsic motivational factors namely the Self-Determination Theory. The existing studies also focused on the perspective of intention to use or continuance intention among undergraduates. However, this study examined the actual use behaviour and instructional effectiveness of a cloud-based VLE among teachers. Channel Expansion Theory, VLE attributes and demographics are also incorporated in predicting use behaviour. The instrument has been rigorously developed and validated and 608 teachers were selected in two waves (T1 and T2) of survey using random sampling from 351 schools nationwide. multi-layer perceptron (MLP) using neural network was used to analyse the data. All predictors were found to be relevant in predicting use behaviour. The study may o...

Journal ArticleDOI
TL;DR: It was shown that with e-training adoption, facilities such as computers can be put in place, which can improve the outlook of the civil service, and the cost that is usually associated with traditional training can be reduced, increasing the opportunity to invest in other aspects of thecivil service which can help in adding to the overall performance.
Abstract: The objective of this paper is to highlight the role that perceived cost, computer self-efficacy and the technology acceptance model (TAM) constructs have in e-training adoption in the Nigerian civil service. With the use of the SmartPLS 2.0 M3 software, a framework that included perceived cost, computer self-efficacy and TAM constructs (perceived usefulness (PU) and perceived ease of use (PEOU)) was tested on 450 heads of departments. Scales on perceived cost, computer self-efficacy, PU and PEOU developed by previous studies were modified accordingly and used. This paper found perceived cost to have a significant effect on e-training adoption. Computer self-efficacy was statistically insignificant through PEOU. In addition, PEOU had an indirect effect through PU. Therefore, only PU of the TAM constructs indicated strong predictive strength in e-training adoption. This paper showed that with e-training adoption, facilities such as computers can be put in place, which can improve the outlook of the...

Journal ArticleDOI
TL;DR: By integrating collaboration and social media in teaching and course design, teachers can enhance student participation and link students’ learning to their future employment.
Abstract: Information and communication technology ICT tools are being increasingly used to facilitate teaching in educational institutions. This study examined the attitudes of students and instructors towards using ICT tools in management education. Immediately after conducting workshops that introduced 11 ICT tools used in classroom settings, questionnaires were administered to students and instructors from three public universities in Taiwan. Responses of 242 students and 46 instructors regarding 5 domains of ICT tools – feedback, classroom mobility, publishing, collaboration, and social media – were analysed to investigate their attitude towards the use of ICT. The results revealed that students perceived the ICT tools of collaboration and social media to be helpful in learning and in increasing their future employment; in addition, the teachers found these ICT tools to be useful. Therefore, by integrating collaboration and social media in teaching and course design, teachers can enhance student participation and link students’ learning to their future employment.

Journal ArticleDOI
TL;DR: The findings show that user interface quality, security culture and cybersecurity law positively affect security perception, and security perception was found to have a strong effect on trust.
Abstract: One of the main challenges associated with e-government adoption is lack of security. Thus, the aim of this research is to investigate the role of security in e-government adoption by integrating security, trust and privacy with the Unified Theory of Acceptance and Use of Technology 2 UTAUT2. In addition, this research will also investigate the factors that influence the end users’ perception of e-government security. Thus, the research starts with a qualitative study to investigate security antecedents, and this is followed by a quantitative study to validate the qualitative study and determine the role of security in e-government adoption. Data from 625 Saudi citizens were gathered and used in the model assessment. The findings show that user interface quality, security culture and cybersecurity law positively affect security perception. In addition, security perception was found to have a strong effect on trust. Trust is ranked as the third most critical factor affecting behaviour intention after performance expectance and habit. The results make a significant contribution to academic research and have practical implications regarding understanding the role of security in e-government adoption and the factors that affect end users’ perception in e-government security.

Journal ArticleDOI
TL;DR: It is argued that the results portray older people as active and creative makers of digital videos with current video capturing, editing, and sharing technologies and encourages us to re-consider how older people should be seen within human–computer interaction.
Abstract: While most of today’s children, young people, and adults are both consumers and producers of digital content, very little is known about older people as digital content creators. Drawing on a three-year ethnographic study, this paper reports on the digital video production and appropriation of approximately 200 older people aged 60–85. They generated 320 videos over the course of the study. We show their motivations for engaging in digital video production, discuss their planned video making, and highlight their creativity while editing videos. We show the different meanings they ascribed to digital videos in their social appropriation of these objects, the meaningful strategies they adopted to share videos, and the impact on their perceived wellbeing. Furthermore, we outline the solutions the participants developed to overcome or cope with interaction issues they faced over time. We argue that the results portray older people as active and creative makers of digital videos with current video capturing, editing, and sharing technologies. We contend that this portrayal both encourages us to re-consider how older people should be seen within human–computer interaction and helps to frame future research/design activities that bridge the grey digital divide.

Journal ArticleDOI
TL;DR: It is indicated that design-based learning (DBL) improves computational thinking (CT) in a sample of elementary school students and is more effective for improving CT than traditional methodologies are.
Abstract: The results of this study indicated that design-based learning DBL improves computational thinking CT in a sample of elementary school students. The experiment consisted of participants using the Scratch Program and Creative Computing Guidebook, both developed by the MIT Massachusetts Institute of Technology media laboratory, for a total of 15 hours. An experimental group and a control group were formed and consisted of fourth to sixth graders. DBL was applied to the experimental group, while a traditional, direct method of teaching was applied to the control group. The experiment was designed to examine several aspects of learning: self-efficacy, self-interest, and self-CT. Moreover, we compared changes in students’ perceptions of computers and analysed differences in students’ responses between the two groups according to each of the steps of DBL. Then, we verified the effects of DBL by examining the progress of each group and the differences between the two groups. At the end of the experiment, we found that both groups showed enhanced self-efficacy, self-interest, and self-CT. However, the experimental group had a greater number of significant positive changes than the control group did in all areas p < .01. In conclusion, the findings presented herein demonstrated that applying DBL is more effective for improving CT than traditional methodologies are.

Journal ArticleDOI
TL;DR: In this article, the mediating effects of job satisfaction on the relationship between workplace ostracism and innovative behaviour and the moderating effect of social networking services for work-related purposes were investigated.
Abstract: Research has found workplace ostracism to negatively impact workplace attitudes and behaviours such as job satisfaction, organisational citizenship behaviour, and job performance. However, research investigating beyond the direct effects of workplace ostracism and findings about boundary conditions for mitigating the negative effects of workplace ostracism are limited in organisational studies. In this regard, this study explored the mediating effects of job satisfaction on the relationship between workplace ostracism and innovative behaviour and the moderating effects of social networking services for work-related purposes for the relationship between workplace ostracism and job satisfaction. The two-wave study consisted of 237 full-time employees in large organisations in South Korea. The hierarchical regression analyses resulted in job satisfaction to mediate the relationship between workplace ostracism and innovative behaviour and social network service to significantly moderate the relationsh...

Journal ArticleDOI
TL;DR: The paper proposes guidelines that are expected to be applicable in several considerable applications of wearable technologies, for example, social networks, healthcare, and banking, as well as hardware and software challenges for the purpose of development and adoption.
Abstract: The current century has brought an unimaginable growth in information and communications technology (ICT) and needs of enormous computing. The advancements in computer hardware and software particu...

Journal ArticleDOI
TL;DR: The results revealed that the collaborative online peer learning process in higher education encourages critical reflection and self-assessment and contributes to the understanding of the value of learner satisfaction in online collaborative learning environments through the experiences of learners.
Abstract: Transformation of learning and teaching in higher education now offers greater educational equality through enhanced access and collaboration within the framework of lifelong learning in the digital age. This study aims to evaluate online peer learning and assessment in the collaborative learning process in higher education practices. The study also investigates the impact of online peer learning on the development of skills within collaborative learning through the use of volunteered responses from learners concerning their experiences with and perceptions of online learning. Therefore, a quantitative approach is applied through the administration of a survey with 32 items that is distributed to 715 participants. According to the objective of the study, a set of inferential statistical analyses are performed. The theoretical framework of this study is the CHAT cultural historical activity theory which reconstructs the knowledge of learners through the application of the Adobe Connect program to demonstrate how learners can be collaborative and social with their peers in an online context. The results revealed that the collaborative online peer learning process in higher education encourages critical reflection and self-assessment. The study contributes to the understanding of the value of learner satisfaction in online collaborative learning environments through the experiences of learners.

Journal ArticleDOI
TL;DR: It is revealed that in addition to differences in information security behaviour, the following security-related perceptions all differ significantly between home computer and mobile device use: perceived severity, security self-efficacy, response efficacy, response cost, descriptive norm, psychological ownership and intention to perform security behaviours.
Abstract: Home users are particularly vulnerable to information security threats as they must make decisions about how to protect themselves, often with little knowledge of the technology. Furthermore, information for home users tends to focus on the traditional PC and may downplay threats faced on mobile devices, transforming well-known and old risks into new challenges for information security. To address the need for more behavioural information security research that focusses on mobile devices, this paper reports on the first large-scale study comparing security perceptions and behaviours on home computer and mobile devices. Data from 629 users revealed that in addition to differences in information security behaviour, the following security-related perceptions all differ significantly between home computer and mobile device use: perceived severity, security self-efficacy, response efficacy, response cost, descriptive norm, psychological ownership and intention to perform security behaviours. In each case, the direction of the difference was such that mobile devices were more likely to be at risk than a home computer. The practical implications of these differences are discussed.

Journal ArticleDOI
TL;DR: An interaction effect between the type of website and the primary source of information is found, however, participants’ selection was mainly influenced by the ranking, and reasons for this discrepancy are discussed.
Abstract: Search engines play a key role for Internet users when searching for information The vast majority of users are heavily influenced by the given ranking on the search engine results page (SERP) In this study, N = 222 university students were tasked to inform themselves about the working conditions in South Asia on the basis of given SERPs Besides the ranking on the SERP, two credibility cues – the type of the website (news site, corporate website, research institute, and private blog) and the primary source of information mentioned in the search result (scientific study vs corporate spokesperson) – were varied Two research objectives were examined: the influence of the ranking and the credibility cues on the evaluation of search results; and the effect of both ranking and credibility cues on the selection Credibility cues had a strong influence on the perception of the search results’ credibility Students rated the credibility higher if search results linked to reputable websites or mentione

Journal ArticleDOI
TL;DR: The results show that technology factors, channel factors and value-for-money factors partially influence consumers’ post-adoption behaviour towards Internet banking.
Abstract: This study sets out to investigate the factors that influence Australian consumers’ post-adoption behaviour towards Internet banking. By integrating the research streams of technology adoption, diffusion of innovations and continuance theory of information systems, technology factors, channel factors, social factors and value-for-money factors were hypothesised to exert an impact on consumers’ post-adoption behaviour towards Internet banking. Data were gathered from 372 Internet banking users through a cross-sectional mall intercept survey. The data were analysed using Partial Least Squares path modelling. The results show that technology factors, channel factors and value-for-money factors partially influence consumers’ post-adoption behaviour towards Internet banking. Social factors were found to be non-significant. The practical implications for retail bank managers in formulating effective service delivery channel management strategies were outlined. The practical, theoretical and methodologic...

Journal ArticleDOI
TL;DR: The results reveal that the firm’s reaction, offline activities, interaction support, seeking reputation and perceived enjoyment are the significant antecedents of social capital.
Abstract: Firm-hosted online communities are user-centred, and their efficacy depends on the users’ sustained participation. This study investigated the impact of social capital on users’ continued usage intention. Specifically, since very little work has been done to explore the antecedents of social capital, we tested the role of operator-related and individual-related factors in cultivating social capital by proposing an integrated research model to fill this gap. Furthermore, to gain deeper insights into continuance intention, we postulate that active degree moderates the relationship between social capital and users’ continued usage intention. Our model is empirically examined using survey data collected from 373 members of a well-known firm-hosted online community in China. The results reveal that the firm’s reaction, offline activities, interaction support, seeking reputation and perceived enjoyment are the significant antecedents of social capital. Additionally, social tie and shared vision exert a stronger effect on continued usage intention for active users, whereas identification has a higher influence on continued usage intention for inactive users. Finally, this study discusses the theoretical and practical implications of these findings and provides possible directions for future research.

Journal ArticleDOI
TL;DR: It was found that interpersonal factors and LMS atmospherics have significant effects on the flow experience, and that PIS moderates the relationship between flow experience and the use of LMS.
Abstract: Information technology has moved the focus of students and instructors from blackboards to online learning platforms. In the emerging e-learning revolution, the success of quality education depends on the right use of information and communication technology, including the creation of participants’ flow experience while using learning systems, which are rightly considered a backbone of contemporary education. There is a gap in the e-learning literature, reflecting a lack of understanding of students’ flow experience while using online interactive systems. This paper presents a study investigating the key factors (interpersonal factors and atmospheric cues) affecting flow experience and highlights its massive role in the use of any learning management system (LMS). Moreover, the study examines the moderating role of perceived institutional support (PIS) on student adoption of LMS. Using a survey, data were collected from university students in Pakistan and the data were analysed through structural ...

Journal ArticleDOI
TL;DR: It is suggested that certain personality traits (extroversion, agreeableness, and conscientiousness), as well as perceived social support from friends, are significantly related to the disclosure of positive emotions on FB.
Abstract: This paper focuses on the roles of personality and social support in affecting the extent of emotional disclosure in social media SM and compares them to those in face-to-face encounters. Specifically, we consider the effects of the Big Five personality traits and perceptions of social support from friends, significant others, and family on the extent of sharing positive and negative emotions on Facebook FB vs. real life RL. The data are collected via an online survey of a broad demographic range of FB users. Our findings suggest that certain personality traits extroversion, agreeableness, and conscientiousness, as well as perceived social support from friends, are significantly related to the disclosure of positive emotions on FB. We also report and discuss the differences between drivers of emotional disclosure in SM and RL, as well as offer suggestions for future research.

Journal ArticleDOI
TL;DR: The findings indicate that CAEs value professional certifications and the use of data analytics in the IF, and that they are dedicating a considerable amount of the IAF budget in support of data Analytics.
Abstract: The objective of our study is to understand the use of data analytics within the internal audit function IAF and to investigate the types of tools internal auditors use, given the large amounts of data available to them for analytic purposes. We interview the Chief Audit Executive CAE in six for-profit and six not-for-profit organizations across several industries, including manufacturing, government services, energy, banking, and higher education. Our intent was to gather descriptive information with respect to the IAF, as well as quantifiable responses to specific questions about the role of data analytics in each CAE’s IAF. Our findings indicate that CAEs value professional certifications and the use of data analytics in the IAF. CAEs report that they employ data analytics at different times and for different purposes and that they are dedicating a considerable amount of the IAF budget in support of data analytics. Our findings should be of interest to CAEs as they consider various possible tools and training to support data analytics within their organisations and to academics who wish to include data analytics courses or topics in the accounting and information systems curricula to prepare students for the workplace.

Journal ArticleDOI
TL;DR: Findings that show that ABMS self-efficacy and online-service use influence information processing, but use different ELM routes are shown, which are likely to have implications for trust in the ABMS.
Abstract: Many firms are developing application-based mobile services ABMS as a complementary channel to their online service. Although perceptions of the ABMS determine trust in the ABMS, trust transfer from the online channel plays a role in the formation of ABMS trust. Applying the elaboration likelihood model ELM to the study, two objectives were pursued: 1 to investigate the role different influence processes play in the formation of ABMS trust and 2 to assess whether the effects of these influences vary across users, and if so, how. Data collected from 344 users of the online services of a price-comparison service also offering an ABMS were analysed. Based on the ELM, central and peripheral routes of information processing were identified in the formation of ABMS trust. The central routes of information processing that play a role are the influence of online-service trust and ABMS perceived usefulness on ABMS trust, while the influence of ABMS perceived ease-of-use on ABMS trust emerged as a peripheral cue. Furthermore, online-service trust is also a peripheral cue for ABMS perceived ease-of-use. Other theoretical contributions offered by this study are findings that show that ABMS self-efficacy and online-service use influence information processing, but use different ELM routes.

Journal ArticleDOI
TL;DR: Main conclusions regarding the pedagogical context reflect the importance of peer assessment on teaching performance, as well as the complexity of role-plays as intellectual challenges to enhance pre-service teachers’ skills.
Abstract: This paper explores data retrieved from Educational Immersive Virtual Worlds to describe pre-service teachers’ skills and perceptions about the simulation tasks. This project had 10 participants who were immersed for 3 years in the Technology and Pedagogical Models in Immersive Worlds island, a multi-user virtual environment in Second Life and Open Simulator. In this project, we evaluated how three-dimensional virtual environments can facilitate the achievement of teaching and learning processes. Based on quantitative and qualitative methodologies, two data collection instruments were applied. Through observation grids and personal log books, professional performance of the 18 pedagogical challenges implemented was collected. The statistical analysis shows that the students improved their technology skills and educational aspects about good practices in classes, regardless of the type of platform used. The analysis through Constant Comparing Method reported a positive assessment of the use of virtual environments, especially about the use of teaching strategies. Main conclusions regarding the pedagogical context reflect the importance of peer assessment on teaching performance, as well as the complexity of role-plays as intellectual challenges to enhance pre-service teachers’ skills. The main difficulties identified during the development of the activities were technical in nature, reporting hardware and connectivity issues.

Journal ArticleDOI
TL;DR: It is demonstrated that a static mathematical mapping is not the best method to compare ratings coming from scales with different features, and suggested when it is possible to use linear functions instead.
Abstract: Many websites allow users to rate items and share their ratings with others, for social or personalisation purposes. In recommender systems in particular, personalised suggestions are generated by ...