51 research outputs found

    Antecedents for Cyberloafing – A Literature Review

    Get PDF
    The private use of the Internet via desktop and smartphones during working time, also known as cyberloafing, has become a common practice at many workplaces. While critical voices expect performance losses through such behavior, their opponents perceive of the interruptions created by cyberloafing as an opportunity to recover and continue working with increased productivity afterwards. Given the growing body of research on Internet-related employees’ opportunism, this paper presents a systematic literature review of 69 studies to identify the factors behind cyberloafing. The classification includes personality traits as well as antecedents related to the job, organization and personal life. The paper concludes with a clear picture of the kind of circumstances which tend to increase cyberloafing and which factors statistically do not seem to have any impact on the abuse of Internet during working time

    DO THEY REALLY CARE ABOUT TARGETED POLITICAL ADS? INVESTIGATION OF USER PRIVACY CONCERNS AND PREFERENCES

    Get PDF
    Reliance on targeted political ads has skyrocketed in recent years, leading to negative reactions in media and society. Nonetheless, only few studies investigate user privacy concerns and their role in user acceptance decisions in the context of online political targeting. To fill this gap, in this study we explore the magnitude of privacy concerns towards targeted political ads compared to “tradi-tional” targeting in the product context. Surprisingly, we find no notable differences in privacy concerns between these use purposes. In the next step, user preferences over ad types are elicited with the help of a discrete choice experiment in the mobile app adoption context. Among others, our findings from simulations on the basis of a mixed logit model cautiously suggest that while targeted political advertising is perceived as somewhat less desirable by respondents, its presence does not consequentially deter users from choosing such an app, with user preferences being high-ly volatile. Together, these results contribute to a better understanding of users’ privacy concerns and preferences in the context of targeted political advertising online. Acknowledgment This work has been funded by the Federal Ministry of Education and Research of Germany (BMBF) under grant no. 16DII116 (“Deutsches Internet-Institut”)

    WHY PHUBBING IS TOXIC FOR YOUR RELATIONSHIP: UNDERSTANDING THE ROLE OF SMARTPHONE JEALOUSY AMONG “GENERATION Y” USERS

    Get PDF
    Coined as “phubbing”, excessive use of smartphones in the romantic context has been shown to rep-resent a barrier to meaningful communication, causing conflict, lowering relationship satisfaction, and undermining individual well-being. While these findings project a dire picture of the future of romance, the mechanisms behind the detrimental influence of partner phubbing on relationship-relevant markers are still little understood. Considering prior evidence that partner phubbing leads to the loss of exclusive attention towards the other party, we argue that these are rather the feelings of jealousy partner phubbing is triggering that are responsible for the negative relational outcomes. Based on the analysis of qualitative and quantitative responses from “generation Y” users, we find that partner phubbing is associated with heightened feelings of jealousy, which is inversely related to couple’s relational cohesion. Moreover, jealousy plays a mediating role in the relationship between partner’s smartphone use and relational cohesion, acting as a mechanism behind this undesirable link. Challenging the frequently promoted euphoria with regard to permanent “connectedness”, our study contributes to a growing body of IS research that addresses dark sides of information technolo-gy use and provides corresponding implications for IS practitioners

    When You Share, You Should Care: Examining the Role of Perspective-Taking on Social Networking Sites

    Get PDF
    Despite good intentions of users who share updates on SNSs, there is mounting evidence that recipients of SNS content frequently perceive shared information as inappropriate, annoying, envy-inducing, and excessive. To examine this apparent gap, we draw on the communication theory and the perceptual congruence model to analyze perceptual differences with the help of dyadic data analysis. Our findings based on 90 sender-recipient pairs show significant percep-tual differences between senders and corresponding recipients of content, with senders attach-ing greater value to their content and scoring both hedonic and utilitarian attributes higher. Additionally, we demonstrate the presence of “false consensus effect” in the SNS environment, meaning that senders anticipate perceptions of recipients to be more similar to their own, than they actually are. Our results provide evidence that sender’s accuracy in predicting recipient’s perceptions contributes to favorable outcomes for both parties, including recipient’s satisfaction with the SNS relationship and positive feedback, desirable for senders. This highlights the im-portance of perspective-taking ability among senders of content. Implications for stakeholders in research and practice are discussed

    Dangers of ‘Facebook Login’ for Mobile Apps: Is There a Price Tag for Social Information?

    Get PDF
    Social networks offer horizontal integration for any mobile platform providing app users with a convenient single sign-on point. Nonetheless, there are growing privacy concerns regarding its use. These vulnerabilities trigger alarm among app developers who fight for their user base: While they are happy to act on users’ information collected via social networks, they are not always willing to sacrifice their adoption rate for this goal. So far, understanding of this trade-off has remained ambiguous. To fill this gap, we employ a discrete choice experiment to explore the role of Facebook Login and investigate the impact of accompanying requests for different information items / actions in the mobile app adoption process. We quantify users’ concerns regarding these items in monetary terms. Beyond hands-on insights for providers, our study contributes to the theoretical discourse on the value of privacy in the growing world of Social Media and mobile web

    Understanding Self-Disclosure on Social Networking Sites - A Literature Review

    Get PDF
    User-generated content is the backbone of any social networking site (SNS) and an important pillar of many business models online. While there is a growing body of research on self-disclosure on SNSs, existing insights remain scattered. To fill this gap, we undertake a systematic literature review by examining 50 studies to identify the factors behind self-disclosure on SNSs. We find that social exchange theory and its extension ‘privacy calculus’ represent a dominant theoretical perspective. Hence, we focus on perceived benefits and costs, as well as cost-mitigating factors as main areas of our investigation. Since personality traits are commonly controlled for or studied within the context of SNS disclosure, we additionally include an exploration of this factor group into our review

    Understanding the Sharing Economy: The Role of Response to Negative Reviews in the Peer-to-peer Accommodation Sharing Network

    Get PDF
    Recognizing the potentially ruinous effect of negative reviews on the reputation of the hosts as well as a subjective nature of the travel experience judgements, peer-to-peer accommodation sharing platforms, like Airbnb, have readily embraced the “response” option, empowering hosts with the voice to challenge, deny or at least apologize for the subject of critique. However, the effects of different response strategies on trusting beliefs towards the host remain unclear. To fill this gap, this study focuses on understanding the impact of different response strategies and review negativity on trusting beliefs towards the host in peer-to-peer accommodation sharing setting utilizing experimental methods. Examination of two different contexts, varying in the controllability of the subject of complaint, reveals that when the subject of complaint is controllable by a host, such strategies as confession / apology and denial can improve trusting beliefs towards the host. However, when the subject of criticism is beyond the control of the host, denial of the issue does not yield guest’s confidence in the host, whereas confession and excuse have positive influence on trusting beliefs

    Competence of university teachers in organizing and conducting distance learning at a university

    Get PDF
    Distance learning is a form of education that is perfectly suitable for the implementation of contemporary models of education in the information society. This fact relates to the tremendously progressive development of information technology and the increasingly more promising prospects for education. The present study aims to analyze the influence of professional self-improvement on the effectiveness of teachers’ work in the distance mode. Based on an empirical study using the survey method, the levels of competencies comprising competence in the organization and conduct of distance learning among teachers in the information-technical and pedagogical sphere are identified. The results obtained testify to the need to improve the pedagogical qualifications of teachers in the direction of improving competence in the field of information computer technologies and their application in education, as well as in the field of Internet technologies and distance learning

    How Morphology of the Human Pluripotent Stem Cells Determines the Selection of the Best Clone

    Get PDF
    The application of patient-specific human induced pluripotent stem cells (hiPSCs) has a great perspective for the development of personalized medicine. More than 10 hiPSCs clones can be obtained from one patient but not all of them are able to undergo directed differentiation with the same efficiency. Beside, some clones are even refractory to certain directions of differentiation. Therefore, the selection of the “best” or “true” hiPSC clone is very important, but this remains a challenge. Currently, this selection is based mostly on the clone’s morphological characteristics. Earlier, using methods of mathematical analysis and deep machine learning, we showed the fundamental possibility for selecting the best clone with about 89% accuracy based on only two to three morphological features. In this chapter, we will expand on how the morphological characteristics of various hiPSCs clones, the so-called “morphological portrait,” are reflected by their proteome. By reviewing previously published data and providing the new results, we will highlight which cytoskeletal proteins are responsible for the establishment of the “good” morphological phenotype. Finally, we will suggest further directions in this research area

    Elastin Barrier Membranes for Guided Tissue Regeneration Technologies

    Get PDF
    This article discusses the prospects for the use of new elastin barrier membranes manufactured using adapted technologies for the selective isolation of the elastin component from the extracellular xenogenic matrix of the pericardium ligamentous apparatus: (1) by high-temperature extraction under pressure; (2) cyanogen bromide method. A commercial material, Geistlich Bio–Gide¼ membrane (BG), was used as a control comparison group. It is shown that the materials of group (1) have a high degree of biocompatibility, exceeding the indicators of the control group BG. Based on the results of an study in a model of subcutaneous heterotopic implantation in rats, it was shown that elastin BM has a chemoattractant effect on the mesenchymal recipient cells and, unlike the control, is able to integrate to a high degree into the surrounding recipient tissues. At the same time, the materials of group (1) had a pronounced proangiogenic effect. Thus, it has been shown that elastin BM groups (1) have a medium-term barrier function and are able to induce full-fledged cellular repopulation and local neoangiogenesis, which can be useful in clinical practice, primarily in GTR technologies (with gingival flap augmentation) or when used together with other BM as an angiogenesis inducer to ensure formation of the vascular bed in GBR technologies of bone tissue
    • 

    corecore