1
|
Wu M, Wu T, Pei Y. What Drives Health Information Exchange on Social Media? Social Media Affordances and Social Support Perspectives. HEALTH COMMUNICATION 2024:1-15. [PMID: 38477307 DOI: 10.1080/10410236.2024.2321408] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/14/2024]
Abstract
Despite the prevalence of health communication on social media, the mechanisms by which social media affect health information exchange have received less than adequate investigation. By integrating the lenses of affordance and social support, this study examines the effect of social media affordances on health information exchange, with a particular focus on the mediation effect of social support and the boundary condition of health consciousness. Results of an online survey indicated that the affordances of information accessibility and metavoicing are positively related to both general and experiential informational support. Moreover, the affordance of association is positively related to experiential informational support and emotional support. Additionally, three types of social support have positive effects on health information exchange, and health consciousness positively moderates the effect of experiential informational support on health information exchange. This study enriches existing literature by revealing the underlying mechanisms and boundary conditions of the relationship between social media affordances and health information exchange. Furthermore, it provides new insights for practitioners to promote health information exchange on social media.
Collapse
Affiliation(s)
- Manli Wu
- School of Journalism and Information Communication, Huazhong University of Science and Technology
- Philosophy and Social Sciences Laboratory of Big data and National Communication Strategy, Ministry of Education of the People's Republic of China
| | - Tailai Wu
- School of Medicine and Health Management, Huazhong University of Science and Technology
| | - Yiming Pei
- School of Journalism and Information Communication, Huazhong University of Science and Technology
| |
Collapse
|
2
|
Polanco-Levicán K, Salvo-Garrido S. Psychometric Properties of the Moral Disengagement through Technologies Questionnaire (MDTech-Q) in a Sample of Chilean University Students. Healthcare (Basel) 2023; 11:healthcare11081097. [PMID: 37107931 PMCID: PMC10137773 DOI: 10.3390/healthcare11081097] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/09/2023] [Revised: 02/16/2023] [Accepted: 03/08/2023] [Indexed: 04/29/2023] Open
Abstract
In the virtual environment, hostile and aggressive comments that could negatively affect university students who often use different digital platforms are frequently observed, more than other age groups who have little or no supervision. In this sense, moral disengagement (MD) has been linked to different negative behaviors that manifest in physical interactions and which currently take place on the Internet, creating the need for instruments that specifically address MD online. The aim of this study is to adapt and validate the Moral Disengagement through Technologies Questionnaire (MDTech-Q) with Chilean university students. The sample comprised 527 university students (43.14% men, 56.86% women), with an average age of 22.09 years (SD (Standard Deviation) = 3.59) enrolled in 12 universities. First, a linguistic adaptation of the scale took place, and the surveys were applied considering ethical principles. Then, two confirmatory factor analyses (CFA) were performed, which considered four correlated factors, and provided satisfactory indices, agreeing with the original theoretical proposal, and demonstrating suitable reliability by internal consistency. In relation to the analyses of invariance according to sex and social media use, the MDTech-Q is stable up to scalar invariance. This study provides evidence of the psychometric quality of the MDTech-Q for its use on Chilean university students.
Collapse
Affiliation(s)
- Karina Polanco-Levicán
- Programa de Doctorado en Ciencias Sociales, Universidad de La Frontera, Temuco 4780000, Chile
- Departamento de Psicología, Universidad Católica de Temuco, Temuco 4780000, Chile
| | - Sonia Salvo-Garrido
- Departamento de Matemática y Estadística, Universidad de La Frontera, Temuco 4780000, Chile
| |
Collapse
|
3
|
McCarthy S, O'Raghallaigh P, Li Y, Adam F. Control enactment in context: Understanding the interaction of controlee and controller perceptions in inter‐organisational project teams. INFORMATION SYSTEMS JOURNAL 2023. [DOI: 10.1111/isj.12434] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/19/2023]
Affiliation(s)
- Stephen McCarthy
- Department of Business Information Systems, Cork University Business School University College Cork Cork Ireland
| | - Paidi O'Raghallaigh
- Department of Business Information Systems, Cork University Business School University College Cork Cork Ireland
| | - Yuzhu Li
- Department of Decision and Information Sciences University of Massachusetts Dartmouth Dartmouth Massachusetts USA
| | - Frédéric Adam
- Department of Business Information Systems, Cork University Business School University College Cork Cork Ireland
- INFANT SFI Centre University College Cork Cork Ireland
| |
Collapse
|
4
|
Zou H(M, Qureshi I, Fang Y, Sun H, Lim KH, Ramsey E, McCole P. Investigating the nonlinear and conditional effects of trust—The new role of institutional contexts in online repurchase. INFORMATION SYSTEMS JOURNAL 2022. [DOI: 10.1111/isj.12410] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
Affiliation(s)
| | - Israr Qureshi
- Research School of Management Australian National University Canberra Australia
| | - Yulin Fang
- Faculty of Business and Economics The University of Hong Kong Pok Fu Lam Hong Kong
| | - Heshan Sun
- Price College of Business The University of Oklahoma Norman Oklahoma USA
| | - Kai H. Lim
- Department of Management and Marketing The Hong Kong Polytechnic University Kowloon Hong Kong
| | - Elaine Ramsey
- Department of Global Business & Enterprise Ulster University Londonderry UK
| | - Patrick McCole
- Queen's Management School Queen's University Belfast Belfast UK
| |
Collapse
|
5
|
Hossain MA, Quaddus M, Warren M, Akter S, Pappas I. Are you a cyberbully on social media? Exploring the personality traits using a fuzzy-set configurational approach. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102537] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
6
|
Mikkola M, Ellonen N, Kaakinen M, Savolainen I, Sirola A, Zych I, Paek HJ, Oksanen A. Cyberharassment Victimization on Three Continents: An Integrative Approach. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022; 19:12138. [PMID: 36231436 PMCID: PMC9566085 DOI: 10.3390/ijerph191912138] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/27/2022] [Revised: 09/21/2022] [Accepted: 09/22/2022] [Indexed: 06/16/2023]
Abstract
This article introduces and applies an integrative model of cyberharassment victimization. The model combines routine activity theory (RAT), the general theory of crime (GTC), and the personal resources approach to analyze risk factors for victimization while acknowledging the protective role of a sense of mastery. Survey respondents were aged 15 to 25 years (N = 4816) from the U.S., Finland, Spain, and South Korea. Logistic regression models were used to analyze cyberharassment victimization. RAT-related factors were positively associated with cyberharassment victimization. Low self-control was positively associated with cyberharassment victimization in the U.S., Finland, and Spain but not in South Korea. The sense of mastery was negatively associated with cyberharassment victimization in the U.S., Finland, and South Korea but not in Spain. Protective factors against cyberharassment victimization should be utilized in future studies as adequate knowledge of protective factors could assist policymakers in generating preventative measures against cyberharassment. Our study demonstrates the benefits of integrating criminological theories and protective factors in studies using cross-national data to gain a better understanding of the dynamics of cyberharassment.
Collapse
Affiliation(s)
- Marko Mikkola
- Faculty of Social Sciences, Tampere University, 33100 Tampere, Finland
| | - Noora Ellonen
- Faculty of Social Sciences, Tampere University, 33100 Tampere, Finland
| | - Markus Kaakinen
- Institute of Criminology and Legal Policy, University of Helsinki, 00100 Helsinki, Finland
| | - Iina Savolainen
- Faculty of Social Sciences, Tampere University, 33100 Tampere, Finland
| | - Anu Sirola
- Department of Social Sciences and Philosophy, University of Jyväskylä, 40014 Jyväskylä, Finland
| | - Izabela Zych
- Department of Psychology, University of Córdoba, 14071 Cordoba, Spain
| | - Hye-Jin Paek
- Department of Advertising & Public Relations, Hanyang University, Ansan 15588, Korea
| | - Atte Oksanen
- Faculty of Social Sciences, Tampere University, 33100 Tampere, Finland
| |
Collapse
|
7
|
Adam M, Croitor E, Werner D, Benlian A, Wiener M. Input control and its signalling effects for complementors' intention to join digital platforms. INFORMATION SYSTEMS JOURNAL 2022. [DOI: 10.1111/isj.12408] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
Affiliation(s)
- Martin Adam
- Information Systems and E‐Services Technical University of Darmstadt Darmstadt Germany
| | - Evgheni Croitor
- Information Systems and E‐Services Technical University of Darmstadt Darmstadt Germany
| | - Dominick Werner
- Information Systems and E‐Services Technical University of Darmstadt Darmstadt Germany
| | - Alexander Benlian
- Information Systems and E‐Services Technical University of Darmstadt Darmstadt Germany
| | - Martin Wiener
- Chair of Business Information Systems, esp. Business Engineering TU Dresden Dresden Germany
| |
Collapse
|
8
|
Ye J(H, Jensen M. Effects of introducing an online community in a crowdsourcing contest platform. INFORMATION SYSTEMS JOURNAL 2022. [DOI: 10.1111/isj.12397] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Affiliation(s)
- Jonathan (Hua) Ye
- MIS Division, Price College of Business University of Oklahoma Norman Oklahoma USA
| | - Matthew Jensen
- MIS Division, Price College of Business University of Oklahoma Norman Oklahoma USA
| |
Collapse
|
9
|
Zheng B, Davison RM. Hybrid Social Media Use and Guanxi Types: How Do Employees Use Social Media in the Chinese Workplace? INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103643] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
10
|
Burns AJ, Roberts TL, Posey C, Lowry PB, Fuller B. Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. INFORMATION SYSTEMS RESEARCH 2022. [DOI: 10.1287/isre.2022.1133] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Abstract
Reports indicate that employees are willing to share sensitive information under certain circumstances, and one-third to half of security breaches are tied to insiders. These statistics reveal that organizational security efforts, which most often rely on deterrence-based sanctions to address the insider threats to information security, are insufficient. Thus, insiders’ computer abuse (ICA)—unauthorized and deliberate misuse of organizational information resources by organizational insiders—remains a significant issue for industry. We present a motive–control theory of ICA that distinguishes among instrumental and expressive motives and internal and external controls. Specifically, we show that organizational deterrents (e.g., sanctions) do not create motives for ICA, but weaken existing motives (e.g., financial benefits). Conversely, financial benefits and psychological contract violations create motives to perform ICA, and insiders’ self-control diminishes the influence of these motives. The implications for practice are threefold: (1) organizations should make efforts to reduce psychological contract breach for employees by increasing the congruence between expectations and reality to reduce expressive motives for ICA; (2) organizations should seek maintain personnel with adequate self-control to diminish the impact of harmful ICA motives should they arise; and (3) organizations should develop targeted sanctions for committing ICA to control the harmful influence of financial motives.
Collapse
Affiliation(s)
- A. J. Burns
- Stephenson Department of Entrepreneurship and Information Systems, E. J. Ourso College of Business, Louisiana State University, Baton Rouge, Louisiana 70803
| | - Tom L. Roberts
- Soules College of Business, The University of Texas at Tyler, Tyler, Texas 75799
| | - Clay Posey
- Information Systems Department, Marriott School of Business, Brigham Young University, Provo, Utah 84602
| | - Paul Benjamin Lowry
- Business Information Technology, Pamplin College of Business, Virginia Tech, Blacksburg, Virginia 24061
| | - Bryan Fuller
- Department of Management, Louisiana Tech University, Ruston, Louisiana 71272
| |
Collapse
|
11
|
Chen Q, Turel O, Yuan Y. Conflicting social influences regarding controversial information systems: the case of online dating. INFORMATION TECHNOLOGY & PEOPLE 2022. [DOI: 10.1108/itp-11-2020-0782] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeControversial information systems (IS) represent a unique context in which certain members of a user's social circle may endorse the use of a system while others object to it. The purpose of this paper is to explore the simultaneous and often conflicting roles of such positive and negative social influences through social learning and ambivalence theories in shaping user adoption intention of a representative case of controversial IS, namely online dating services (ODS).Design/methodology/approachThe model was tested with two empirical studies using structural equation modeling techniques. The data of these studies were collected from 451 (Study 1) and 510 (Study 2) single individuals (i.e. not in a relationship).Findings(1) Positive social influence has a stronger impact on perceived benefits and adoption intention, while negative social influence exerts a greater impact on perceived risks; (2) positive and negative social influences affect adoption intention toward ODS differently, through benefit and risk assessments; and (3) ambivalence significantly negatively moderates the effects of social influences on adoption.Originality/valueThis study enriches and extends the IS use, ambivalence theory, prospect theory, and social learning theory research streams. Furthermore, this study suggests that it is necessary to focus on not only the oft-considered positive but also negative social influences in IS research.
Collapse
|
12
|
Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102402] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
13
|
Klotz S, Kratzer S, Westner M, Strahringer S. Literary Sketches in Information Systems Research: Conceptualization and Guidance for Using Vignettes as a Narrative Form. INFORMATION SYSTEMS MANAGEMENT 2021. [DOI: 10.1080/10580530.2021.1996661] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Affiliation(s)
- Stefan Klotz
- Chair of Business Informatics Especially Information Systems in Trade and Industry, Faculty of Business and Economics, TU Dresden, Dresden, Germany
| | - Simon Kratzer
- Chair of Business Informatics Especially Information Systems in Trade and Industry, Faculty of Business and Economics, TU Dresden, Dresden, Germany
| | - Markus Westner
- Faculty of Computer Science and Mathematics, OTH Regensburg, Regensburg, Germany
| | - Susanne Strahringer
- Chair of Business Informatics Especially Information Systems in Trade and Industry, Faculty of Business and Economics, TU Dresden, Dresden, Germany
| |
Collapse
|
14
|
Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging. INFORMATION TECHNOLOGY & PEOPLE 2021. [DOI: 10.1108/itp-09-2020-0624] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
Abstract
PurposeWidespread concerns about excessive use of mobile instant messaging (MIM) have inspired research in different disciplines. However, the focus thus far tends to be on diagnostics and cognitive predictors. There is little understanding from the socio-technical perspective to capture the drivers of excessive use of MIM. To address this research gap, the authors aim to enrich existing literature by adopting a social structure and social learning model (SSSLM) to understand the excessive use of MIM. The authors argue that excessive MIM use is developed and reinforced in highly interactive online communication, through a social learning process.Design/methodology/approachThe authors conduct a cross-sectional online survey to validate our proposed research model on excessive use of mobile instant messaging (MIM). 368 valid responses are obtained from active MIM users in China.FindingsThe results suggest that highly interactive MIM creates a technology-based social structure that facilitates the social learning process of excessive technology use. The influence of perceived interactivity of MIM on excessive MIM use is mediated by a series of contextualized social learning factors. Furthermore, the influences of perceived interactivity on social learning factors are moderated by MIM use experience.Originality/valueThe authors contribute to literature in related fields by highlighting the crucial role of social learning in facilitating excessive technology use. The authors contribute to the social structure and social learning model by contextualizing it into the context of excessive MIM use. Design guidelines are provided with a purpose to inhibit excessive use of MIM.
Collapse
|
15
|
Cho S, Lee K(K, Cheong A, No WG, Vasarhelyi MA. Chain of Values: Examining the Economic Impacts of Blockchain on the Value-Added Tax System. J MANAGE INFORM SYST 2021. [DOI: 10.1080/07421222.2021.1912912] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
Affiliation(s)
- Soohyun Cho
- Department of Accounting and Information Systems, Rutgers Business School, Rutgers, The State University of New Jersey, Newark, NJ, USA
| | - Kyungha (Kari) Lee
- Department of Accounting and Information Systems, Rutgers Business School, Rutgers, The State University of New Jersey, Newark, NJ, USA
| | - Arion Cheong
- Department of Accounting, College of Business and Economics, California State University Fullerton, Fullerton, CA, USA
| | - Won Gyun No
- Department of Accounting and Information Systems, Rutgers Business School, Rutgers, The State University of New Jersey, Newark, NJ, USA
| | - Miklos A. Vasarhelyi
- Department of Accounting and Information Systems, Rutgers Business School, Rutgers, The State University of New Jersey, Newark, NJ, USA
| |
Collapse
|
16
|
Jaeger L, Eckhardt A. Eyes wide open: The role of situational information security awareness for security‐related behaviour. INFORMATION SYSTEMS JOURNAL 2020. [DOI: 10.1111/isj.12317] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/21/2022]
Affiliation(s)
- Lennart Jaeger
- Lecturer in Information Security, Governance and Leadership, Department of Business Information Systems University of Queensland Brisbane Queensland Australia
| | - Andreas Eckhardt
- Professor of Information Systems, Faculty of Business and Management University of Innsbruck Innsbruck Austria
| |
Collapse
|
17
|
Qahri-Saremi H, Turel O. Ambivalence and Coping Responses in Post-Adoptive Information Systems Use. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790193] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Affiliation(s)
- Hamed Qahri-Saremi
- College of Computing and Digital Media, DePaul University, Chicago, IL, USA
| | - Ofir Turel
- Mihaylo College of Business and Economics, California State University, Fullerton, CA, USA
| |
Collapse
|
18
|
Wu D. Withholding effort in sharing knowledge in online space: differential effects of task characteristics. JOURNAL OF KNOWLEDGE MANAGEMENT 2020. [DOI: 10.1108/jkm-04-2020-0310] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
Knowledge withholding is an important but under-studied topic, which refers to the phenomenon that individuals give less than full effort to contributing knowledge. This study aims to investigate the differential effects of task characteristics on individuals’ knowledge withholding behavior in online space, this study develops and empirically verifies a theoretical model that covers the five core task characteristics in job characteristics model (autonomy, identity, feedback, skill variety and significance), knowledge sharing self-inefficacy and withholding effort in sharing knowledge.
Design/methodology/approach
Using an online survey method, this study collected empirical data from 351 general internet users from 30 provincial administrative units in China. The data were analyzed using the structural equation modeling technique of partial least squares.
Findings
The analysis results indicate that autonomy negatively affects, while identity, skill variety and significance positively affect users’ knowledge withholding behavior in online space through the mediation of knowledge sharing self-inefficacy, and that three task characteristics (autonomy, identity and feedback) strengthen the relationship between knowledge sharing self-inefficacy and knowledge withholding.
Practical implications
This study provides valuable insights for reducing knowledge withholding behavior in online space. Operationally, different levels of task characteristics such as autonomy, identity and feedback can be set to prevent users from perceiving themselves as inefficacious, and to weaken the behavioral expression of knowledge sharing self-inefficacy.
Originality/value
This study provides a comprehensive understanding of the differential effects of task characteristics on knowledge withholding in online space, and improves the cognition of the boundaries of withholding effort in sharing knowledge in online space.
Collapse
|