44,332 research outputs found

    E-mail and Direct Participation in Decision Making: A Literature Review

    Get PDF
    This paper reviews the literature on the effects of the use of e-mail on direct participation in decision making (PDM) in organisations. After a brief review of the organisational literature on participation the paper distinguishes e-mail theories on direct participation in three different theoretical perspectives. Then the paper focuses the attention on the role of e-mail in affecting task type, vertical and horizontal communication and their consequences for PDM. Finally the paper presents indications and open questions for future research.email, e-mail, decision making, participation in decision making, literature review,

    Internet Information and Communication Behavior during a Political Moment: The Iraq War, March 2003

    Get PDF
    This article explores the Internet as a resource for political information and communication in March 2003, when American troops were first sent to Iraq, offering us a unique setting of political context, information use, and technology. Employing a national survey conducted by the Pew Internet & American Life project. We examine the political information behavior of the Internet respondents through an exploratory factor analysis; analyze the effects of personal demographic attributes and political attitudes, traditional and new media use, and technology on online behavior through multiple regression analysis; and assess the online political information and communication behavior of supporters and dissenters of the Iraq War. The factor analysis suggests four factors: activism, support, information seeking, and communication. The regression analysis indicates that gender, political attitudes and beliefs, motivation, traditional media consumption, perceptions of bias in the media, and computer experience and use predict online political information behavior, although the effects of these variables differ for the four factors. The information and communication behavior of supporters and dissenters of the Iraq War differed significantly. We conclude with a brief discussion of the value of "interdisciplinary poaching" for advancing the study of Internet information practices

    E-learning: Designing new business education

    Get PDF
    Business Schools are under intense competitive pressure, and one way for them to differentiate themselves and compete distinctively is by adopting innovative uses of information technology. However, incorporating information technology in business education is no trivial undertaking. This research is intended to provide some guidance about the effect that new information technologies can have in the field of high-level executive education and provide a conceptual framework of the key factors that need to be taken into account for efficient and effective course design in executive education.e-learning; information & communication technology; execute education; learning; business schools; on-line teaching; residential learning; ethnography;

    Cyberpsychology and Human Factors

    Get PDF
    The online environment has become a significant focus of the everyday behaviour and activities of individuals and organisations in contemporary society. The increasing mediation of communication has led to concerns about the potential risks and associated negative experiences which can occur to users, particularly children and young people. This is related to the emergence of the online environment as a location for criminal and abusive behaviour (e.g., harassment, sexual exploitation, fraud, hacking, malware). One of the key aspects of understanding online victimisation and engagement in criminal behaviours is the characteristics of online communication that are related to the affordances of the technologies, services and applications which constitute digital environments. The aim of this paper is to examine the influence of these characteristics on individual and group behaviour, as well as the associated opportunities for victimisation and criminal behaviour. These issues are of relevance for those involved in the design and implementation of technologies and services, as the ability to assess their potential use in this way can enhance strategies for improving the security of systems and users. It can also inform educational strategies for increasing user understanding of potential informational, privacy and personal risks, and associated steps to improve their security and privacy. Each of the main characteristics of mediated communication is examined, as well as their potential impact on individual and group behaviour, and associated opportunities for victimisation and offending. The article ends by considering the importance of recognising these issues when designing and implementing new technologies, services and applications

    Computational Courtship: Understanding the Evolution of Online Dating through Large-scale Data Analysis

    Full text link
    Have we become more tolerant of dating people of different social backgrounds compared to ten years ago? Has the rise of online dating exacerbated or alleviated gender inequalities in modern courtship? Are the most attractive people on these platforms necessarily the most successful? In this work, we examine the mate preferences and communication patterns of male and female users of the online dating site eHarmony over the past decade to identify how attitudes and behaviors have changed over this time period. While other studies have investigated disparities in user behavior between male and female users, this study is unique in its longitudinal approach. Specifically, we analyze how men and women differ in their preferences for certain traits in potential partners and how those preferences have changed over time. The second line of inquiry investigates to what extent physical attractiveness determines the rate of messages a user receives, and how this relationship varies between men and women. Thirdly, we explore whether online dating practices between males and females have become more equal over time or if biases and inequalities have remained constant (or increased). Fourthly, we study the behavioural traits in sending and replying to messages based on one's own experience of receiving messages and being replied to. Finally, we found that similarity between profiles is not a predictor for success except for the number of children and smoking habits. This work could have broader implications for shifting gender norms and social attitudes, reflected in online courtship rituals. Apart from the data-based research, we connect the results to existing theories that concern the role of ICTs in societal change. As searching for love online becomes increasingly common across generations and geographies, these findings may shed light on how people can build relationships through the Internet.Comment: Preprint, under revie

    Product Intelligence: Its Conceptualization, Measurement and Impact on Consumer Satisfaction

    Get PDF
    In the last decade, companies have developed a large number of intelligent products. Due to the use of information technology, these products, for example, are able to work autonomously, cooperate with other products, or adapt to changing circumstances. Although intelligent products appear an attractive category of products, they have received little attention in the literature. The present article provides a conceptualization of the new construct of product intelligence and describes the development procedure of a measure for the construct. In addition, the article sets up and empirically tests a conceptual framework in which product intelligence leads to consumer satisfaction through the innovation attributes of relative advantage, compatibility, and complexity. Managerial implications for new product development and marketing of intelligent products are considered and suggestions for further research provided.Adoption;Innovation;Intelligent products;New product development;Smart products

    Virtual teams: A literature review

    Get PDF
    In the competitive market, virtual teams represent a growing response to the need for fasting time-to-market, low-cost and rapid solutions to complex organizational problems. Virtual teams enable organizations to pool the talents and expertise of employees and non-employees by eliminating time and space barriers. Nowadays, companies are heavily investing in virtual team to enhance their performance and competitiveness. Despite virtual teams growing prevalence, relatively little is known about this new form of team. Hence the study offers an extensive literature review with definitions of virtual teams and a structured analysis of the present body of knowledge of virtual teams. First, we distinguish virtual teams from conventional teams, different types of virtual teams to identify where current knowledge applies. Second, we distinguish what is needed for effective virtual team considering the people, process and technology point of view and underlying characteristics of virtual teams and challenges they entail. Finally, we have identified and extended 12 key factors that need to be considered, and describes a methodology focused on supporting virtual team working, with a new approach that has not been specifically addressed in the existing literature and some guide line for future research extracted.Virtual team, Literature review, Effective virtual team,

    Building trustworthy e-Commerce wesite

    Get PDF
    The process of building consumer trust in E-Commerce is based on the presence of trust features or trust attributes in the websites. Consumer may examine e-Commerce websites for the existence of trust attributes. However, to date, which trust attributes contribute to the websiteñ€ℱs trustworthiness and which trust attributes give more value to consumer has not been adequately explored. Therefore, the purpose of the paper is to look for the relevant trust attributes for e-Commerce websites and to identify the importance ranking of trust attributes that contribute significantly to the trustworthiness of e-Commerce website. Various journal papers and articles related to e-Commerce field have been referred in order to identify the trust attributes. An online survey that received 1230 respondents was carried out to investigate the importance ranking of ten trust attributes. The paper contributes to the discussion on how to build trust in e-Commerc

    The impacts of text-based CMC on online social presence

    Get PDF
    Social presence is a critical influence on learners’ online social interaction in an online learning environment via computer-mediated communication (CMC) systems. This study examines how three CMC systems, e-mail, bulletin board, and real-time discussion, influence the level of online social presence and privacy. Mixed methods were applied to examine the relationships of three CMC systems with social presence and privacy. The results indicate (a) E-mail is perceived to possess the highest level of social presence, followed by the real-time discussion and bulletin board; (b) one-to-one e-mail was perceived to have a higher level of privacy while one-to-many was perceived less privacy; and (c) in addition to the attributes of CMC systems, learners’ perceptions of CMC systems impacted level of privacy as well. This study suggested that the format of CMC systems, e-mail and real-time discussion should be examined in two different formats: one-to-one e-mail, one-to-many e-mail, one-to-one real-time discussion, and many-to-many real-time discussion
    • 

    corecore