12 research outputs found

    Exploring Mobile Social Networking Sites Continuance Intention from the Perspective of Network Externalities and Mobile Value

    Get PDF
    Key shifts in the nature and characteristics of technology have led to evolutions in social media usage. For the first time in history, the internet is being accessed from more mobile devices than desktop computers. This revolution is especially felt among social networking sites, many of whom have presciently developed and released mobile applications of their platforms. Drawing from the Perceived Value Theory, Network Externalities and the Expectation Confirmation Theory of IS Continuance, we tested a model that sought to explain the effect of Network Externalities on Perceived Value and in turn Continuance Intention. Data was collected from 452 students from a university in Ghana and analyzed using the Partial Least Square approach to Structural Equation Modeling. Results from the current study showed that Referent Network Size and Perceived Complementarity had significant effects on both Utilitarian and Hedonic Value as well as Satisfaction. Hedonic Value, Utilitarian Value and Satisfaction in turn were found to be significant predictors of Continuance Intention. In all, the model accounted for 58.0% of the variance in continuance intention. The implications and limitations of the current study are discussed, and directions for future research proposed

    Examining Self-Disclosure on Social Networking Sites: A Flow Theory and Privacy Perspective

    No full text
    Social media and other web 2.0 tools have provided users with the platform to interact with and also disclose personal information to not only their friends and acquaintances but also relative strangers with unprecedented ease. This has enhanced the ability of people to share more about themselves, their families, and their friends through a variety of media including text, photo, and video, thus developing and sustaining social and business relationships. The purpose of the paper is to identify the factors that predict self-disclosure on social networking sites from the perspective of privacy and flow. Data was collected from 452 students in three leading universities in Ghana and analyzed with Partial Least Square-Structural Equation Modeling. Results from the study revealed that privacy risk was the most significant predictor. We also found privacy awareness, privacy concerns, and privacy invasion experience to be significant predictors of self-disclosure. Interaction and perceived control were found to have significant effect on self-disclosure. In all, the model accounted for 54.6 percent of the variance in self-disclosure. The implications and limitations of the current study are discussed, and directions for future research proposed

    Development and Validation of Work Place Integrity Scale; Evidence from Ghana.

    Get PDF
    This article developed and validated work place integrity scale that are applicable across industries. Responded questionnaire perceived to contribute to integrity were subjected to principal components analysis. Overall Cronbach’s alpha coefficient of 0.843 was reported. The Kaiser-Meyer-Olkin value was 0.887, whiles the Bartlett’s Test of Sphericity reached statistical significance, supporting the use of factor analysis. Total variance explained initially, revealed the presence of six components with eigenvalues 24.973%, 8.309%, 5.045%, 4.843%, 4.077%, 3.969% of the variance respectively contributing to a cumulative variance of 51.2%. Using Cattell’s scree test, it was decided to retain components 1&2 for further investigation. To aid in the interpretation of these two components, oblimin rotation was performed which resulted in a simple pattern matrix with 2 components showing a number of strong loadings. The resulted component correlation matrix was very strong (0.346). The two-component solution explained a total of 33.2% of the variance, with Component 1 contributing 24.9% and Component 2 contributing 8.3%. The resulted pattern matrix relating to component 1 supports the non- usage of inducement to assess the integrity of a person, whiles component 2 support the use of inducement to assess the integrity of a person. Key Words: Integrity; Reliability test; Validation test; Cronbach’s alpha; Bartlett’s test of sphericity, Oblimin rotation

    Opportunities and challenges of ICTs for youth development in Ghana : policy and programme implications for the Ghana ICT4D process

    No full text
    Ghana is trying to respond to the global changes by developing the ICT sector. The characteristics of the ICT sector include cellular phones, cable TV, internet, computers, fixed line, fax, digital camera, radio set and video deck. A policy on ICT for development was adopted in 2003 which among other things acknowledges the social and economic pressures of youthful population and the challenge of turning them into an asset for development. The lack of clear objectives, strategies and programmes to address these specific areas for the benefit of the youth in Ghana gave an impetus for this project. The policy document among other things is silent on youth development, education and employment opportunities as well as gender parity. The general objective of the project is to explore the opportunities and challenges of ICT for youth development in Ghana in order to contribute to the policies and programmes in this area

    Factors Affecting MOOC Usage by Students in Selected Ghanaian Universities

    No full text
    There has been widespread criticism about the rates of participation of students enrolled on MOOCs (Massive Open Online Courses), more importantly, the percentage of students who actively consume course materials from beginning to the end. The current study sought to investigate this trend by examining the factors that influence MOOC adoption and use by students in selected Ghanaian universities. The Unified Theory of Acceptance and Use of Technology (UTAUT) was extended to develop a research model. A survey was conducted with 270 questionnaires administered to students who had been assigned MOOCs; 204 questionnaires were retrieved for analysis. Findings of the study show that MOOC usage intention is influenced by computer self-efficacy, performance expectancy, and system quality. Results also showed that MOOC usage is influenced by facilitating conditions, instructional quality, and MOOC usage intention. Social influence and effort expectancy were found not to have a significant influence on MOOC usage intention. The authors conclude that universities must have structures and resources in place to promote the use of MOOCs by students. Computer skills training should also be part of the educational curriculum at all levels. MOOC designers must ensure that the MOOCs have good instructional quality by using the right pedagogical approaches and also ensure that the sites and learning materials are of good quality

    Enhancing export intensity of entrepreneurial firms through bricolage and international opportunity recognition: The differential roles of explorative and exploitative learning

    No full text
    This study proposes and tests a framework relating to the effect of entrepreneurial bricolage on international opportunity recognition (IOR) and the influence of the latter on export intensity. Survey data from 193 export-oriented entrepreneurial firms operating in Ghana indicates that entrepreneurial bricolage has an inverted U-shaped relationship with IOR – and that IOR has a positive effect on export intensity. A further analysis reveals that explorative learning enhances the inverted U-shaped relationship between bricolage and IOR, while exploitative learning improves the IOR–export intensity relationship. Our findings present important implications for international entrepreneurship research and the management of export-oriented entrepreneurial firms in developing economies. </p

    Information flow between BRVM and ESG stock returns: A frequency-dependent analysis

    No full text
    This paper seeks to analyze the information flow between the Bourse Régionale des Valeurs Mobilières (BRVM) and Environmental, Social, and Governance (ESG) stocks, focusing on the time and frequency domains. By studying these aspects, we aim to gain a deeper understanding of how information is transmitted between BRVM and ESG stocks, shedding light on the dynamics and interactions within this context. The study analyzes the decomposed daily returns of four indices: BRVM Composite Index (BRVMCI), BRVM 10 Index (BRVM10), FTSE/JSE SA All Share Index (FTSEJSE), and FTSE/JSE Top 30 Responsible Investment Index (FTSERI). We employed Rényi transfer entropy estimates to measure the information flow between the stocks returns.To ensure the robustness of the findings, the study also utilizes the Dynamic Conditional Co-variance-Generalized autoregressive Conditional Heteroscedasticity (DCC-GARCH) method. The study covers the period from June 23, 2014, to April 22, 2022. The results showed positive information flow but a mixture of significant and insignificant transfer entropies. The decomposed findings give evidence to reject the null hypothesis of no information flow in the short-and medium-terms but not in the longterm.The exchange of seemingly insignificant information among stocks presents opportunities for fund managers to diversify their portfolios across various time frames.To expedite economic growth and lower equity costs, institutional leaders should collaborate with governments to establish economic and political foundations that integrate markets. Such integration would yield benefits for both markets, but the BRVM stands to gain more due to its less developed and illiquid nature

    Examining Self-Disclosure on Social Networking Sites: A Flow Theory and Privacy Perspective

    No full text
    Social media and other web 2.0 tools have provided users with the platform to interact with and also disclose personal information to not only their friends and acquaintances but also relative strangers with unprecedented ease. This has enhanced the ability of people to share more about themselves, their families, and their friends through a variety of media including text, photo, and video, thus developing and sustaining social and business relationships. The purpose of the paper is to identify the factors that predict self-disclosure on social networking sites from the perspective of privacy and flow. Data was collected from 452 students in three leading universities in Ghana and analyzed with Partial Least Square-Structural Equation Modeling. Results from the study revealed that privacy risk was the most significant predictor. We also found privacy awareness, privacy concerns, and privacy invasion experience to be significant predictors of self-disclosure. Interaction and perceived control were found to have significant effect on self-disclosure. In all, the model accounted for 54.6 percent of the variance in self-disclosure. The implications and limitations of the current study are discussed, and directions for future research proposed
    corecore