Once upon a time, there was a group of management scholars. They spent their time in an ivory tower, thinking great thoughts. Sometimes, when the scholars had an especially exciting thought, they ...would try to share it with end users. The scholars would rush to the tower's windows and toss paper airplanes out into the air. But, alas, their thoughts were not relevant to the end users. The scholars' paper airplanes crashed to the ground, and so the scholars' work had very little impact.
Results from a national representative telephone survey of Americans in 2000 show that Internet and mobile phone usage was very similar, and that several digital divides exist with respect to both ...Internet and mobile phone usage. The study identifies and analyzes three kinds of digital divides for both the Internet and mobile phones—users/nonuser, veteran/recent, and continuing/dropout—and similarities and differences among those digital divides based on demographic variables. The gap between Internet users and nonusers is associated with income and age, but no longer with gender and race, once other variables are controlled. The gap between mobile phone users and nonusers is associated with income, work status, and marital status. The veteran/recent Internet gap is predicted by income, age, education, phone user, membership in community religious organizations, having children, and gender; for mobile phones, age, work status and marital status are predictors. The gap between continuing and dropout users is predicted by education for Internet usage and income for mobile phone usage. Finally, cross-categorization of Internet and mobile phone usage/nonusage is distinguished (significantly though weakly) primarily by income and education. Thus, there are several digital divides, each predicted by somewhat different variables; and while Internet and mobile phone usage levels in 2000 were about the same, their users overlap but do not constitute completely equivalent populations.
The effect of motivations on knowledge sharing behavior has been extensively investigated in various online communities. However, this topic is rarely examined in the context of online health ...communities (OHCs). Furthermore, the difference in the motivations of sharing knowledge between two types of members in OHCs − health professionals and normal users, is never examined. The present study models and examines both the extrinsic (reputation and reciprocity) and intrinsic (knowledge self-efficacy, altruism, and empathy) motivations of health professionals and normal users. The hypotheses derived from the research model were empirically validated using an online survey of 443 members of three famous online health communities in China. Results show that reciprocity and altruism positively affect the knowledge sharing intention of both health professionals and normal users. Moreover, reputation and knowledge self-efficacy have a greater influence on the knowledge sharing intentions of health professionals than normal users; whereas reciprocity, altruism, and empathy have a greater influence on the knowledge sharing intentions of normal users than health professionals. These new findings expand our understanding on the motivations that may affect knowledge sharing intentions in the context of OHCs.
•Reciprocity and altruism positively affect knowledge sharing intention.•Self-efficacy and reputation have a greater effect for health professionals.•Reciprocity, altruism and empathy have a greater influence for normal users.
CERN IT has consolidated all life-cycle management of its physical server fleet on the Ironic bare-metal API. From the initial registration upon the first boot, over the inventory checking, the ...burn-in and the benchmarking for acceptance, the provisioning to the end users and the repairs during its service, up to the retirement at the end of the servers’ life, all stages can be managed within this framework. This article will walk you through the server’s life in the CERN data center, and explain how this enables us to handle a fleet of almost 10,000 nodes in an automated and efficient way and to prepare for the new data center which is currently being built. Eventually, we will round up things with the top challenges we faced when moving to this system, like the transparent adoption of already in-production nodes, after-the-fact inventory updates, or scaling issues.
Virtual Reality (VR) has been constantly evolving since its early days, and is now a fundamental technology in different application areas. User evaluation is a crucial step in the design and ...development of VR systems that do respond to users’ needs, as well as for identifying applications that indeed gain from the use of such technology. Yet, there is not much work reported concerning usability evaluation and validation of VR systems, when compared with the traditional desktop setup. The paper presents a user study performed, as a first step, for the evaluation of a low-cost VR system using a Head-Mounted Display (HMD). That system was compared to a traditional desktop setup through an experiment that assessed user performance, when carrying out navigation tasks in a game scenario for a short period. The results show that, although users were generally satisfied with the VR system, and found the HMD interaction intuitive and natural, most performed better with the desktop setup.
Public perceptions play a crucial role in wider adoption of autonomous vehicles (AVs). This paper aims to make two contributions to the understanding of public attitudes toward AVs. First, we explore ...opinions regarding the perceived benefits and challenges of AVs among vulnerable road users – in particular, pedestrians and bicyclists. Second, the paper evaluated whether interaction experiences with AVs influence perceptions among vulnerable road users. To explore this, we examined survey data collected by Bike PGH, a Pittsburgh based organization involved in programs to promote safe mobility options for road users. Analysis of the data revealed that respondents with direct experience interacting with AVs reported significantly higher expectations of the safety benefits of the transition to AVs than respondents with no AV interaction experience. This finding did not differ across pedestrian and bicyclist respondents. The results of this study indicate that as the public increasingly interacts with AVs, their attitudes toward the technology are more likely to be positive. Thus, this study recommends that policy makers should provide the opportunities for the public to have interaction experience with AVs. The opportunities can be provided through legislation that allows auto manufacturers and technology industries to operate and test AVs on public roads. This interactive experience will positively affect people's perceptions and help in wider adoption of AV technology.
•Public perceptions play a crucial role in wider adoption of autonomous vehicles (AVs).•As the public increasingly interacts with AVs, their attitudes toward the technology are more likely to be positive.•We recommend policy makers to pass legislation that will authorize testing and operation of AVs on public roads.•Interaction experience with AVs will positively affect people's perceptions and help in wider adoption of the technology.
Secure management of information systems is crucially important in information intensive organizations. Although most organizations have long been using security technologies, it is well known that ...technology tools alone are not sufficient. Thus, the area of end-user security behaviors in organizations has gained an increased attention. In information security observing end-user security behaviors is challenging. Moreover, recent studies have shown that the end users have divergent security views. The inability to monitor employee IT security behaviors and divergent views regarding security policies, in our view, provide a setting where the principal agent paradigm applies. In this paper, we develop and test a theoretical model of the incentive effects of penalties, pressures and perceived effectiveness of employee actions that enhances our understanding of employee compliance to information security policies. Based on 312 employee responses from 77 organizations, we empirically validate and test the model. Our findings suggest that security behaviors can be influenced by both intrinsic and extrinsic motivators. Pressures exerted by subjective norms and peer behaviors influence employee information security behaviors. Intrinsic motivation of employee perceived effectiveness of their actions was also found to play an important role in security policy compliance intentions. In analyzing the penalties, certainty of detection was found to be significant while surprisingly, severity of punishment was found to have a negative effect on security behavior intentions. We discuss the implications of our findings for theory and practice.
An experiment was piloted by Nantes Métropole concerning a transport service operated by an autonomous shuttle in spring 2019 in the Nantes-Bouguenais airport area. This paper aims to present the ...acceptance of the autonomous shuttle of the Nantes site. 85 respondents, users and non-users of the shuttle, answered a questionnaire. The results show differences between these two populations of respondents, particularly in terms of their feeling of safety, the time saved on their trip compared to their usual mode of travel and the number of seats available in the shuttle.
Purpose
The purpose of this paper is to generate awareness of and interest in the photovoice method, and help librarians to be more creative in examining user needs, perceptions and behavior and be ...more effective in conducting outreach to user communities.
Design/methodology/approach
Photovice is a qualitative method that combines visuals and narratives in exploring community issues. This paper reviews the photovoice method and discusses its implications in engaging library user communities.
Findings
Photovoice is rarely used in library research and practice and only three published studies reported the use of this method. The three studies were reviewed in this paper to offer ideas regarding the potential application of this method in the library profession.
Originality/value
This paper provides an overview of an innovative method and contributes new ideas to library outreach and user engagement.