GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Emerald  (3)
Material
Publisher
  • Emerald  (3)
Person/Organisation
Language
Years
  • 1
    Online Resource
    Online Resource
    Emerald ; 2021
    In:  Industrial Management & Data Systems Vol. 121, No. 7 ( 2021-07-05), p. 1642-1663
    In: Industrial Management & Data Systems, Emerald, Vol. 121, No. 7 ( 2021-07-05), p. 1642-1663
    Abstract: The rapid development of the Internet in China has profoundly affected the country's charities, which many people support through online donations (e.g. providing financial help) and charity information forwarding (a new behavior of participating in online charities via social media). However, the development of online charities has been accompanied by many problems, such as donation fraud and fake charity information, which adversely affect social kindness. The purpose of this paper is to understand people's online donation and forwarding behaviors and to explore the mechanisms of such behaviors from the perspectives of cognitive-based trust and emotional-based empathic concern. Design/methodology/approach This study developed a research model based on the elaboration likelihood model (ELM) and stimulus–organism–response (SOR) model. The researchers obtained 287 valid samples via a scenario-based experimental survey and conducted partial least squares structural equation modeling (PLS-SEM) to test the model. Findings The results indicated that (1) online donation intention is motivated by rational-based trust and emotional-based empathic concern; (2) online charity information forwarding is triggered only when trust is built, and there is no significant correlation between empathic concern and forwarding intention; and (3) content quality, initiator credibility, and platform reputation are three critical paths to promote trust; in addition, an individual's empathic concern can be motivated by the emotional appeal. Originality/value This study highlights the different mechanisms of donation and forwarding behaviors and provided theoretical measures for motiving trust and empathic concern in the online context to promote people's participation in online charity.
    Type of Medium: Online Resource
    ISSN: 0263-5577
    Language: English
    Publisher: Emerald
    Publication Date: 2021
    detail.hit.zdb_id: 2002327-3
    SSG: 3,2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Emerald ; 2019
    In:  Information Technology & People Vol. 32, No. 4 ( 2019-08-05), p. 973-992
    In: Information Technology & People, Emerald, Vol. 32, No. 4 ( 2019-08-05), p. 973-992
    Abstract: The purpose of this paper is to develop a model that integrates moral disengagement (MD) and organizational ethical climate (OEC) to understand information security policy (ISP) violation behavior in the workplace. This study extends prior work by identifying the moderating mechanisms of the ethical culture of OECs in the relationship between employees’ MD and ISP violation behavior intention. Design/methodology/approach By using scenario-based survey data from 433 employees in Chinese enterprises and by applying PLS-based structural equation modeling, the authors test a series of hypotheses. Findings Our empirical results highlight that the concept of MD has a significant effect on employees’ intention to violate ISPs. The authors also find that the OEC has a moderating role in the relationship between MD and ISP violation intention: the moderating role of law-and-rule-oriented OEC is significantly negative, but instrumentalism-oriented OEC positively moderates this relationship. Originality/value This study contributes to the literature on information security behavior by integrating two ethical theory frameworks MD and OECs into one theoretical model, and it calls attention to how ethical factors at the individual cognition level and organizational climate level work together to influence personal information security behavior. This study provides a new perspective of OEC from which to understand policy violation caused by moral self-regulation failure, and empirically explores its moderating role.
    Type of Medium: Online Resource
    ISSN: 0959-3845
    Language: English
    Publisher: Emerald
    Publication Date: 2019
    detail.hit.zdb_id: 1120182-4
    detail.hit.zdb_id: 2014262-6
    SSG: 24,1
    SSG: 3,2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Emerald ; 2017
    In:  Information & Computer Security Vol. 25, No. 3 ( 2017-07-10), p. 330-344
    In: Information & Computer Security, Emerald, Vol. 25, No. 3 ( 2017-07-10), p. 330-344
    Abstract: Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software. Design/methodology/approach A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model. Findings Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool. Practical implications This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior. Originality/value This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
    Type of Medium: Online Resource
    ISSN: 2056-4961
    Language: English
    Publisher: Emerald
    Publication Date: 2017
    detail.hit.zdb_id: 2810936-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...