Virtual Reality (VR) has been constantly evolving since its early days, and is now a fundamental technology in different application areas. User evaluation is a crucial step in the design and ...development of VR systems that do respond to users’ needs, as well as for identifying applications that indeed gain from the use of such technology. Yet, there is not much work reported concerning usability evaluation and validation of VR systems, when compared with the traditional desktop setup. The paper presents a user study performed, as a first step, for the evaluation of a low-cost VR system using a Head-Mounted Display (HMD). That system was compared to a traditional desktop setup through an experiment that assessed user performance, when carrying out navigation tasks in a game scenario for a short period. The results show that, although users were generally satisfied with the VR system, and found the HMD interaction intuitive and natural, most performed better with the desktop setup.
An experiment was piloted by Nantes Métropole concerning a transport service operated by an autonomous shuttle in spring 2019 in the Nantes-Bouguenais airport area. This paper aims to present the ...acceptance of the autonomous shuttle of the Nantes site. 85 respondents, users and non-users of the shuttle, answered a questionnaire. The results show differences between these two populations of respondents, particularly in terms of their feeling of safety, the time saved on their trip compared to their usual mode of travel and the number of seats available in the shuttle.
The effect of motivations on knowledge sharing behavior has been extensively investigated in various online communities. However, this topic is rarely examined in the context of online health ...communities (OHCs). Furthermore, the difference in the motivations of sharing knowledge between two types of members in OHCs − health professionals and normal users, is never examined. The present study models and examines both the extrinsic (reputation and reciprocity) and intrinsic (knowledge self-efficacy, altruism, and empathy) motivations of health professionals and normal users. The hypotheses derived from the research model were empirically validated using an online survey of 443 members of three famous online health communities in China. Results show that reciprocity and altruism positively affect the knowledge sharing intention of both health professionals and normal users. Moreover, reputation and knowledge self-efficacy have a greater influence on the knowledge sharing intentions of health professionals than normal users; whereas reciprocity, altruism, and empathy have a greater influence on the knowledge sharing intentions of normal users than health professionals. These new findings expand our understanding on the motivations that may affect knowledge sharing intentions in the context of OHCs.
•Reciprocity and altruism positively affect knowledge sharing intention.•Self-efficacy and reputation have a greater effect for health professionals.•Reciprocity, altruism and empathy have a greater influence for normal users.
Secure management of information systems is crucially important in information intensive organizations. Although most organizations have long been using security technologies, it is well known that ...technology tools alone are not sufficient. Thus, the area of end-user security behaviors in organizations has gained an increased attention. In information security observing end-user security behaviors is challenging. Moreover, recent studies have shown that the end users have divergent security views. The inability to monitor employee IT security behaviors and divergent views regarding security policies, in our view, provide a setting where the principal agent paradigm applies. In this paper, we develop and test a theoretical model of the incentive effects of penalties, pressures and perceived effectiveness of employee actions that enhances our understanding of employee compliance to information security policies. Based on 312 employee responses from 77 organizations, we empirically validate and test the model. Our findings suggest that security behaviors can be influenced by both intrinsic and extrinsic motivators. Pressures exerted by subjective norms and peer behaviors influence employee information security behaviors. Intrinsic motivation of employee perceived effectiveness of their actions was also found to play an important role in security policy compliance intentions. In analyzing the penalties, certainty of detection was found to be significant while surprisingly, severity of punishment was found to have a negative effect on security behavior intentions. We discuss the implications of our findings for theory and practice.
Purpose
The purpose of this paper is to generate awareness of and interest in the photovoice method, and help librarians to be more creative in examining user needs, perceptions and behavior and be ...more effective in conducting outreach to user communities.
Design/methodology/approach
Photovice is a qualitative method that combines visuals and narratives in exploring community issues. This paper reviews the photovoice method and discusses its implications in engaging library user communities.
Findings
Photovoice is rarely used in library research and practice and only three published studies reported the use of this method. The three studies were reviewed in this paper to offer ideas regarding the potential application of this method in the library profession.
Originality/value
This paper provides an overview of an innovative method and contributes new ideas to library outreach and user engagement.
Purpose
Mobile services are expanding rapidly, and in this tremendously dynamic environment, companies should provide value-added services to meet users’ demand. In this context, the study aims to ...determine whether different user groups exist in this market and profile them.
Methodology
Based on the information of 568 mobile service users, a research was developed in the context of a mature mobile services market – Spain. A behavior-based cluster analysis is developed by means of confirmatory factor analysis (CFA), followed by two-step clustering. Then, an ANOVA and
post hoc
Tukey tests are conducted to confirm differences among the obtained clusters.
Findings
The study findings show that mobile service users cannot be perceived as a homogenous group, as different users with different behaviors coexist in this market. More specifically, four behavior-based segments emerge in the mobile service sector: “service connoisseurs,” “uninvolved pragmatics,” “potential switchers” and “delighted loyal”; “potential switchers” being the most challenging segment for mobile service companies.
Value
This study reports mobile service users’ heterogeneity; and in turn, mobile service managers should consider customers as four different types, instead of considering them as one single customer.
Propósito
Los servicios móviles se están expandiendo rápidamente y en este entorno tremendamente dinámico, las compañías de servicios móviles deberían de proporcionar servicios de valor añadido para satisfacer la demanda de sus usuarios. En este contexto, esta investigación tiene como objetivo determinar si existen diferentes grupo de usuarios en este mercado y aportar su pefil.
Metodología
Sobre la base de información de 568 usuarios de servicios móviles se lleva a cabo una investigación en el contexto de un mercado de servicios móviles maduro –España-. Se lleva a cabo un análisis clúster basado en el comportamiento de los usuarios, mediante un análisis factorial confirmatorio (CFA), seguido de un análisis clúster bi-etápico. A continuación, se realizan un test Anova y un test pos hoc de Tuckey para confirmar las diferencias entre los grupos obtenidos.
Resultados
Los resultados de la investigación muestran que los usuarios de servicios móviles no pueden ser percibidos como un grupo homogéneo, ya que en este mercado coexisten diferentes usuarios con diferentes comportamientos. Más específicamente, cuatro segmentos de usuarios surgen en el sector de los servicios móviles basados en su comportamiento: “
conocedores del servicio
”, “
pragmáticos no involucrados
”, “
potenciales cambiadores de servicio
” y “
leales encantados
”, siendo “
potenciales cambiadores de servicio”
los que presentan un mayor desafío las empresas de servicios móviles.
Valor
Este estudio muestra la heterogeneidad de los usuarios de servicios móviles, y por tanto, los gestores de los servicios móviles deben considerar a sus clientes como cuatro tipos diferentes, en lugar de considerarlos como un único tipo de cliente.
摘要
研究目的
移动服务正在迅速扩张,在这个巨大的动态环境中,企业应该提供增值服务来满足用户的需求。在此背景下,本研究旨在确定该市场是否存在不同的用户群体,并对其进行分析。
研究方法
基于568名移动服务用户的信息,在一个成熟的移动服务市场(西班牙)的背景下开展了本次研究。通过确认性因子分析(CFA)进行基于行为的聚类分析,然后进行两步聚类。最后,方差分析和事后Tukey检验被用于确认获得的聚类之间的差异。
研究结果
研究结果表明,移动服务用户不能被看作是一个同质的群体,因为在这个市场上共存着不同的用户,他们具有不同的行为。具体来说,移动服务领域可以划分为基于用户行为的四个细分市场:"服务行家"、"不参与的实用主义者"、"潜在的转换者 "和 "愉悦的忠诚者";其中,"潜在的转换者 "是对移动服务企业来说最具挑战性的细分市场。
研究价值
本研究报告了移动服务用户的异质性;反过来,移动服务管理者应该考虑把客户划分为四种不同的类型,而不是将他们视为一个单一的整体。
Formally launched in 2014, ALA's Center for the Future of Libraries works to identify emerging trends relevant to libraries and the communities they serve, promote futuring and innovation techniques ...to help librarians and library professionals shape their future, and build connections with experts and innovative thinkers to help libraries address emerging issues. The first volume in a new series presented in partnership with the Center, Anonymity explores the roles and ramifications of this hallmark of technology. In the virtual realm, anonymity means that such bedrock values of librarianship as privacy, free speech, and intellectual freedom coexist uneasily with the proliferation of fake news, sexist and racist sentiments, and repugnant ideologies. As trusted guardians of knowledge, libraries and librarians can fill a growing need for reputable information and open dialog. Macrina, founder and director of the Library Freedom Project and a core contributor to the Tor Project, along with co-author Cooper, whose important advocacy in archives informs this work, discuss apps (Whisper, Secret) and forums (Reddit) that promote anonymity as a central feature, even as so-called true anonymity remains elusive because of pervasive user data tracking. They also examine how anonymous content has become valuable fodder for both news organizations and clickbait websites. Will the rise of anonymity and the vulnerabilities it exposes, especially for governments and businesses, lead to a movement against it? Or have our society and its technology passed the point of no return? Bringing issues and viewpoints from outside the profession into the conversation, this book will encourage libraries to think about anonymity and what it means for the future of our institutions.
The purpose of this paper is to establish a model for an end-user engagement process within innovative public procurement practices. Even though the importance of the public service end-user has been ...recognized by researchers and policy makers for some time, there's a genuine lack of commonly acknowledged user engagement tools for both procurer's and supplier's practical implementation. We focus on the way value creation can be enhanced through actively engaging end-users as co-creators of value in public procurement. The study employs an intensive single-case methodology, where the findings are based on qualitative data gathered on a Public–Private Partnership (PPP) -based school property procurement in Finland. The end-user's value potential does not rest only with creating individual user value but also with increasing e.g. the public service's social, environmental and political value. Our findings support the existing theoretical understanding according to which the most significant end-user value is achieved through interactive dialogue in the design phase of the public procurement project. The most significant advantages of active end-user engagement are especially seen in the usability of the provided public service. Study results also indicate positive effects of end-user's independent value creation and the sensation of involvement in the user's individual value experience.
•Main objective for end-user engagement is procurement's increased usability.•Most important engagement activities revolve on principles of dialogue and access.•User's individual sensation of involvement is crucial for procurement's success.•Collaborative innovation can be emphasized in all public procurement policies.
The Móstoles University Hospital Library in Madrid, Spain, conducts a yearly survey to determine user satisfaction with its support for caring, teaching and research endeavors. In 2020 the yearly ...questionnaire also contained items on the new services introduced by the library to help users deal with the effects of the health crisis faced by the hospital. The results revealed that the library continued to be among staff's most highly esteemed providers of high quality information. Librarians have been key players in a time of uncertainty, enabling healthcare professionals to find the information needed during a scenario in which decisions could not be adopted lightly.
Pedestrians, cyclists and powered two-wheeler riders are considered vulnerable road users, as they are prone to a high risk of injury in the event of vehicular collision. This paper sought to ...elucidate the road safety performance and attitudes of vulnerable road users in 32 countries. In addition, comparisons between countries and demographic characteristics have been conducted, and recommendations that could enhance vulnerable road users' safety have been provided. For the study, data from the second edition of the ESRA survey (E-Survey on Road Users' Attitudes – ESRA2) conducted in 2018 were utilized. The results indicate that crossing the road at places other than nearby pedestrian crossings, reading a text message or checking social media while walking on the streets, cycling and riding without wearing a helmet, and speeding on powered two-wheelers outside built-up areas but not on motorways/freeways were the most frequently reported self-declared behaviours in the 32 countries. Finally, some solutions on preventing road crashes and increasing vulnerable road users' safety such as infrastructure interventions, use of protective equipment, and training and educational campaigns are discussed.
•Vulnerable road users are prone to a high risk of injury in any vehicular collision•High rates of unsafe behaviours were reported by vulnerable road users•Clear need for road safety measures that would enhance the safety of vulnerable road users•ESRA survey is a valuable source of information and provides unique data on VRUs' performance