3,486 research outputs found

    The Role of Espoused National Cultural Values in Cross-National Cultural IS Studies

    Get PDF
    Hofstede’s work on national culture has been extensively used in cross-national studies in the information systems discipline. In particular, many cross-national cultural researchers have used Hofstede’s cultural index. This study argues that espoused national cultural values should be measured when the unit of analysis of the cross-national cultural study is the individual. This study reviews cross-national studies published in eight IS journals and examines both cross-national studies and cross-national cultural studies. After that, this work provides rationales of why espoused national cultural values should be measured. Finally, we conclude that espoused national culture is more appropriate for individual behavior research

    Mobile Commerce Adoption in China and the United States: A Cross-Cultural Study

    Get PDF
    Mobile communication technologies have penetrated consumer markets throughout the world. Mobile commerce is likely to make a strong influence on business activities, consumer behavior, as well as national and global markets. Thus the identification of factors that influence mobile commerce adoption has significant value. In a global context, this study identified nine factors affecting mobile commerce adoption based on published research in MIS. These factors were investigated in China and the United States, and a comparative examination was conducted. A survey was conducted on 190 individual mobile commerce users in China and USA. Results show that there are several significant differences among the antecedents and their impacts on consumer intention to use mobile commerce in the two cultural settings. The study provides a number of practical insights and informs vendors seeking to enter the Chinese and the US marketplace with specific information on user perspectives

    Cyber-Mediation: Computer-Mediated Communications Medium Massaging the Message

    Get PDF

    Border Patrol, social media, and transnational messaging

    Get PDF
    Since the U.S. Border Patrol was established in 1924, agents have been an integral part of the community and have worked to educate the public on the Border Patrol mission and how they can support it. Outreach campaigns began with such programs as D.A.R.E., Red Ribbon Week, and No Mas Cruces. The campaigns were conducted via schools and traditional media such as radio, television, and print. In 2003, Border Patrol's Public Affairs Office was absorbed into the newly created Department of Homeland Security's Customs and Border Protection (CBP) agency. While Border Patrol conducts public affairs, the messaging is controlled by CBP. The prevalence of social media has provided an inexpensive, high-capacity way for Border Patrol to conduct community engagement. However, CBP retains the authority to approve social media use in an official capacity and only allows Border Patrol to use social media under the CBP umbrella. This thesis argues that Border Patrol should be allowed to use Border Patrol–specific social media accounts for community engagement and to educate the public on the Border Patrol mission. Furthermore, engagement should occur with Canadian and Mexican citizens in their native languages when possible and applicable.http://archive.org/details/borderpatrolsoci1094556888Patrol Agent in Charge, United States Border PatrolApproved for public release; distribution is unlimited

    The Sociological Eye 2015

    Get PDF
    Faculty Advisor: Dr. Nadia Kim & Dr. Rebecca Sager Co-Editors: Elizabeth Ashton Harris & Monica Zamorahttps://digitalcommons.lmu.edu/thesociologicaleyestudentjournal/1001/thumbnail.jp

    Smartphones

    Get PDF
    Many of the research approaches to smartphones actually regard them as more or less transparent points of access to other kinds of communication experiences. That is, rather than considering the smartphone as something in itself, the researchers look at how individuals use the smartphone for their communicative purposes, whether these be talking, surfing the web, using on-line data access for off-site data sources, downloading or uploading materials, or any kind of interaction with social media. They focus not so much on the smartphone itself but on the activities that people engage in with their smartphones

    DIFFERENCES IN ONLINE PRIVACY & SECURITY ATTITUDES BASED ON ECONOMIC LIVING STANDARDS: A GLOBAL STUDY OF 24 COUNTRIES

    Get PDF
    This work explores online privacy and security attitudes from 24,143 individuals across 24 countries with diverse economic living standards. By using k-mode analysis, we identified three distinct profiles based on similarity in Internet security and privacy attitudes measured by 83 items. By comparing the aggregated dissimilarity measures between each respondent and the centroid values of the three profiles at the country level, we assigned each country to their best-fitting privacy profile. We found significant differences in GDP per capita between profiles 1 (highest GDP) to 3 (lowest). People in profiles with higher GDP per capita have significantly greater privacy concerns in relation to information being monitored or bought and sold. These individuals are also more reluctant towards government surveillance of online communication as well as less likely to agree that governments should work with other public and private entities to develop online security laws. As economic living standards improve, the proportion of individuals increases in profile 1, decreases in profile 2, and most rapidly drops in profile 3. To the best of our knowledge, it is the first research that systematically examines country-level privacy in relation to a national economic variable using GDP per capita

    What's in a name? Cultural observations on nationally named hacking groups

    Get PDF
    Culture's role in cognition has long been established, but understanding national culture's role in cyber events currently remains an understudied research area. Michael Minkov observed that culture influences thought; even when people think they are in control, cultural biases are actually controlling their thoughts. Cultural values endure, and because they do, these cultural values leave artifacts can be revealed in thought patterns. This philosophy serves as a foundation for further work in progress on name choices by hackers. In this study, we examined 10 years' worth of Zone-H archives where hacker names that identified with national identities were analysed using Hofstede's cultural framework to determine whether culture may play a role in hacker name and name choices. The findings revealed cultural preferences in several of the six cultural dimensions. In addition, trending the results showed significant findings in two cultural dimensions: (1) masculinity versus femininity and (2) uncertainty avoidance. The results suggest that assumptions about the anonymous nature of the Internet influencing behaviours may not be universally applicable, and that culture should also be considered when evaluating cyber actor behaviours
    • …
    corecore