3,486 research outputs found
The Role of Espoused National Cultural Values in Cross-National Cultural IS Studies
Hofstede’s work on national culture has been extensively used in cross-national studies in the information systems discipline. In particular, many cross-national cultural researchers have used Hofstede’s cultural index. This study argues that espoused national cultural values should be measured when the unit of analysis of the cross-national cultural study is the individual. This study reviews cross-national studies published in eight IS journals and examines both cross-national studies and cross-national cultural studies. After that, this work provides rationales of why espoused national cultural values should be measured. Finally, we conclude that espoused national culture is more appropriate for individual behavior research
Mobile Commerce Adoption in China and the United States: A Cross-Cultural Study
Mobile communication technologies have penetrated
consumer markets throughout the world. Mobile
commerce is likely to make a strong influence on
business activities, consumer behavior, as well as
national and global markets. Thus the identification of
factors that influence mobile commerce adoption has
significant value. In a global context, this study
identified nine factors affecting mobile commerce
adoption based on published research in MIS. These
factors were investigated in China and the United
States, and a comparative examination was
conducted. A survey was conducted on 190
individual mobile commerce users in China and USA.
Results show that there are several significant
differences among the antecedents and their impacts
on consumer intention to use mobile commerce in the
two cultural settings. The study provides a number of
practical insights and informs vendors seeking to
enter the Chinese and the US marketplace with
specific information on user perspectives
Border Patrol, social media, and transnational messaging
Since the U.S. Border Patrol was established in 1924, agents have been an integral part of the community and have worked to educate the public on the Border Patrol mission and how they can support it. Outreach campaigns began with such programs as D.A.R.E., Red Ribbon Week, and No Mas Cruces. The campaigns were conducted via schools and traditional media such as radio, television, and print. In 2003, Border Patrol's Public Affairs Office was absorbed into the newly created Department of Homeland Security's Customs and Border Protection (CBP) agency. While Border Patrol conducts public affairs, the messaging is controlled by CBP. The prevalence of social media has provided an inexpensive, high-capacity way for Border Patrol to conduct community engagement. However, CBP retains the authority to approve social media use in an official capacity and only allows Border Patrol to use social media under the CBP umbrella. This thesis argues that Border Patrol should be allowed to use Border Patrol–specific social media accounts for community engagement and to educate the public on the Border Patrol mission. Furthermore, engagement should occur with Canadian and Mexican citizens in their native languages when possible and applicable.http://archive.org/details/borderpatrolsoci1094556888Patrol Agent in Charge, United States Border PatrolApproved for public release; distribution is unlimited
Recommended from our members
Determinants of Digital Distraction: A Cross-Cultural Investigation of Users In Africa, China and The U.S.
The Sociological Eye 2015
Faculty Advisor: Dr. Nadia Kim & Dr. Rebecca Sager
Co-Editors: Elizabeth Ashton Harris & Monica Zamorahttps://digitalcommons.lmu.edu/thesociologicaleyestudentjournal/1001/thumbnail.jp
Smartphones
Many of the research approaches to smartphones actually regard them as more or less transparent points of access to other kinds of communication experiences. That is, rather than considering the smartphone as something in itself, the researchers look at how individuals use the smartphone for their communicative purposes, whether these be talking, surfing the web, using on-line data access for off-site data sources, downloading or uploading materials, or any kind of interaction with social media. They focus not so much on the smartphone itself but on the activities that people engage in with their smartphones
DIFFERENCES IN ONLINE PRIVACY & SECURITY ATTITUDES BASED ON ECONOMIC LIVING STANDARDS: A GLOBAL STUDY OF 24 COUNTRIES
This work explores online privacy and security attitudes from 24,143 individuals across 24 countries with diverse economic living standards. By using k-mode analysis, we identified three distinct profiles based on similarity in Internet security and privacy attitudes measured by 83 items. By comparing the aggregated dissimilarity measures between each respondent and the centroid values of the three profiles at the country level, we assigned each country to their best-fitting privacy profile. We found significant differences in GDP per capita between profiles 1 (highest GDP) to 3 (lowest). People in profiles with higher GDP per capita have significantly greater privacy concerns in relation to information being monitored or bought and sold. These individuals are also more reluctant towards government surveillance of online communication as well as less likely to agree that governments should work with other public and private entities to develop online security laws. As economic living standards improve, the proportion of individuals increases in profile 1, decreases in profile 2, and most rapidly drops in profile 3. To the best of our knowledge, it is the first research that systematically examines country-level privacy in relation to a national economic variable using GDP per capita
What's in a name? Cultural observations on nationally named hacking groups
Culture's role in cognition has long been established, but understanding national culture's role in cyber events currently remains an understudied research area. Michael Minkov observed that culture influences thought; even when people think they are in control, cultural biases are actually controlling their thoughts. Cultural values endure, and because they do, these cultural values leave artifacts can be revealed in thought patterns. This philosophy serves as a foundation for further work in progress on name choices by hackers. In this study, we examined 10 years' worth of Zone-H archives where hacker names that identified with national identities were analysed using Hofstede's cultural framework to determine whether culture may play a role in hacker name and name choices. The findings revealed cultural preferences in several of the six cultural dimensions. In addition, trending the results showed significant findings in two cultural dimensions: (1) masculinity versus femininity and (2) uncertainty avoidance. The results suggest that assumptions about the anonymous nature of the Internet influencing behaviours may not be universally applicable, and that culture should also be considered when evaluating cyber actor behaviours
- …