- Journal Issue
2
- 10.13165/st-15-5-1-05
- Jan 1, 2015
- Social Technologies
- Jaime Campos
Purpose – The paper goes through and outlines the developments of IS methodologies as well as certain research approaches applied. In addition, the technical aspects of the ICT architectures are discussed for purposes of the development and implementation of the mobile web technologies for the industrial domain. Design/methodology/approach – The author organizes the relevant literature findings in three sections named the ICTs in the industrial maintenance domain, web oriented architecture and the IS development methodologies. The findings are analysed and discussed while highlighting aspects of the ICT architectures, IS methodologies and different approaches that one needs to be aware of for successful design and implementation of the mobile web technologies. Findings – The results reveal that mobile technologies have been developed mainly with the prototype and design approach where emphasis has been on the technical aspects. For the above mentioned reason the author reviews the area of the IS development methodologies as well as the ICT architectures, which shows rapid and dynamic process over time. In addition, it was found that for successful planning, implementation and use of the mobile web technologies it is important to emphasize other aspects and not just the technological ones. The research approaches that shed light on the IS development process are the Action design research as well as Participatory design approach. Research limitations/implications – The current work presented in this paper hows that to develop sustainable ICTs, especially mobile web technologies for the industrial domain, there is a need to consider various aspects which put an emphasis on not just the technological aspects of the developed systems but also, for instance, on the organizational context as well as the user’s needs and various stakeholders. It is, therefore, important to choose proper IS methodologies, tools, techniques and approaches for sustainable ICTs in the domain of interest. Practical implications – The current work pinpoints important aspects to understand and consider when choosing the IS methodology, tools and techniques for the mobile web technologies. Originality/Value – The paper pinpoints important characteristics to consider when planning to develop and implement mobile web technologies into the industrial maintenance engineering domain.
- Journal Issue
2
- 10.13165/st-15-5-1-02
- Jan 1, 2015
- Social Technologies
- Václav Stříteský + 1 more
Purpose – to present the issue of dealing with negative word-of-mouth under the newly created conditions of social media and formulate a set of rules for dealing with negative contributions in social networks such as Facebook. Design/methodology/approach – The paper presents findings from both a quantitative survey of Czech Facebook users and expert interviews. Findings – The results of the survey that was done among internet users has proven, that Czech Facebook users are fully aware of the fact that by complaining publicly via social media they can get a company in a serious trouble and want to use it to their advantage. Expert interviews agreed on necessity of good knowledge of the community, quick response to the posts and careful consideration of deleting negative contributions. Research limitations/implications – the empirical research is focused on the Czech market that is specific in the field of internet user behaviour. Findings are primarily valid solely for the social network Facebook. Other platforms may differ in complaining behaviour of the users. Practical implications – research findings show, that social media play an important role in complaining behaviour of Czech internet users. This fact results in the necessity of the presence in social media and careful monitoring the word-of-mouth. Crucial factors of successful communication in social media are knowledge of the com munity, quick response to the posts and careful consideration of deleting negative contributions.Originality/Value – Word of mouth, nowadays the most powerful marketing tool and the strongest argument in the decision making process, is now not limited to the circle of nearest friends of family. Social media gives people a voice that is immediate and can have impact. Without an effective and fast reaction of the company, a serious harm can be suffered. The significance of social network Facebook in complaining behaviour of Czech consumers is assessed. Basic rules for dealing with negative contributions were defined.
- Journal Issue
- 10.13165/st-15-5-1-03
- Jan 1, 2015
- Social Technologies
- Laura Gudelytė
This article aims to determine and analyse the main approaches of evaluation of cluster or group performance under information asymmetry within cluster. It is assumed that one of the most relevant causes of information asymmetry inside the business clusters are the different interests of its stakeholders and their willingness to dominate. This paper contributes to the further analysis, development and generalisation of evaluation approach of cluster performance and of the impact of information asymmetry on the activities of business clusters. Purpose – is to investigate the impact of information asymmetry on the evaluation on performance of business clusters and the methods and approaches of evaluation of performance with regard to information asymmetry. Design/methodology/approach – general overview of research papers presenting concepts and methodologies of evaluation of performance with regard to information asymmetry. Findings – information asymmetry has a significant impact on the performance of business clusters, and can be the decisive factor in the viability of a cluster. The members of cluster can be seem as subjects willing to dominate in cluster and to gain a relatively more portion of profit of clusters, some conflicts of interests can appear. However, there is no universal approach for evaluation of the impact of information asymmetry on cluster or group efficiency. This paper aims to highlight the main types of information asymmetry and respective approaches of evaluation analysed by the researchers.Research limitations/implications – the complexity and nature of information that can be used in the process of creation of innovation. The strong assumptions on information asymmetry from one side and the lack of advanced investigation focussed on the evaluation of business clusters performance efficiency under information asymmetry from other side are the most relevant limitations of research. Therefore the conclusions are focussed only on the conceptual level and analysis of possible further steps in creation of respective methods or models. Practical implications – information asymmetry has a significant impact on the activities and performance of business clusters, and can be the decisive factor for a viability of a cluster and creation of innovations. This study will contribute to the further development and generalisation of evaluation approach of cluster performance and of the impact of information asymmetry on the activities of business clusters. Originality/Value – This case in terms of business cluster performance and creation of innovations is not exhaustively analysed by other researchers. This paper is one of the first attempts to describe and make an assessment of the evaluation of clusters with financial contagion in the Baltic States. The findings of this article should ground the further steps of the creation of evaluation of performance efficiency under information asymmetry.
- Journal Issue
45
- 10.13165/st-15-5-1-06
- Jan 1, 2015
- Social Technologies
- Živilė Baubonienė + 1 more
Purpose – The purpose of this paper is to look at the factors driving online shopping and to develop an understanding of the factors influencing the online shopping by the consumers. This is done by exploring the factors that encourage consumers to shop online through analysis of such advantages as security, fast delivery, comparable price, convenience, cheaper prices and a wider choice. At the same time, the research project reveals the factors that are discouraging for consumers and the benefits received by buyers making purchases online. Specifically, the research explores how online shopping can be affected by such factors as age, gender or occupation. Design/methodology/approach – The factors that affect the consumer online shopping have been disclosed through quantitative research by analysing data collected via a web‐based questionnaire survey. The sample consisted of 183 Lithuanian consumers who were purchasing online. Findings –The empirical findings of this study indicate that the main factors influencing consumers to shop online are convenience, simplicity and better price. Analysis of socio-demographical characteristics such as gender has shown that men shop more often online because of the lower price. Respondents of the 25–35 year age group more often choose shopping online for such reasons as lack of time and a wide range of products. The most beneficial factor of shopping online was identified as a possibility to compare prices and buy at a lower price. Research limitations/implications – This study was done regarding only general conditions and the findings may not necessarily be applicable to a particular e-business. Therefore, in the future it would be highly encouraged to examine consumers’ attitudes towards specialized online shopping websites to look for differences by kind of products or services.Practical implications – Attributes identified by this study could help e-business developers to forme their marketing strategy, identify and remove the main obstacles to creating a highly convenient online shopping service to customers. Online stores can devote valuable corporate resources to better mapping of the online consumers’ behaviour, future technologies and developments. Originality/Value – This paper may be valuable for online retailers, as it will help them to attract consumers and enable to better form their e-marketing strategies allowing to understand the consumers’ changing needs and lifestyles as well as to to attract them with regard to their online shopping experience.
- Journal Issue
3
- 10.13165/st-15-5-1-01
- Jan 1, 2015
- Social Technologies
- Valdonė Indrašienė + 2 more
Aim: To analyse teachers’ experience in applying information communication technologies (from now on referred to as ICT) during the study process. Methodology: The analysis is based on a qualitative research methodology determined by the novelty of the problem under analysis. Six teachers of the University X (faculty Y) participating in the study were selected by applying a random sampling procedure and were interviewed by using the semi-structured interviews. Results: The research revealed that the use of ICT in the study process is still fragmented due to the lack of the teachers` ICT competence and to teaching priority given to direct communication. Because of the lack of higher level competence in ICT necessary for the efficient use of ICT tools in the study process, teachers as a rule resort to limited opportunities to increase the attractiveness of the process. Research limitations: in order to theoretically and empirically validate ICT applicationpossibilities in the study process, teachers of one faculty of one university have been interviewed. In view of this, the conclusions cannot be extended to all teachers. Practical significance: the research revealed problems faced by the university teachers in applying ICT during the study process. Identification of problems will facilitate a more efficient use of ICT in the study process, as well as the development of teachers’ qualification. Originality and value: the research provided more information on teachers` competence in using ICT.
- Journal Issue
- 10.13165/st-15-5-1-04
- Jan 1, 2015
- Social Technologies
- Joseph J Pilotta
Purpose – the study will be an investigation and articulation of the question “how does the Internet of Things (IoT) work”? Design/methodology/approach – a phenomenological investigation of complementarity with Contemporary Systems Thinking uncovering the temporal reflex of the Internet. The Internet is to be understood to be a part of our life world of technology as well as a network of signs. Findings – the Internet’s temporal reflex is more than the various combinations of past-present-future. Practical implications – understanding the temporal reflex of the Internet is more than mere interconnectivity and a series of nodes but a self-processing system creating various possibilities which can be unintended consequences. The unintended now can be anticipated and avoid significant disruptions. Originality/Value – the values of the research demonstrates an anticipatory dimension of the IoT in which we may foresee a type of fore-knowledge of what can or will be next. Such fore-knowledge allows risk mitigation at all levels of sociality; organizational cultural and societal.
- Research Article
1
- 10.13165/st-14-4-1-02
- Jan 1, 2014
- Social Technologies
- Galina Kavaliauskienė + 1 more
Purpose – the focus of this article is to explore self-evaluation of performance in professional English that students have to do in university studies. It is clear that students can have various problems in learning English and make mistakes in listening, speaking, reading, writing, and vocabulary. Speaking and listening are the skills that are more common on an everyday basis than reading and writing. Speaking and listening skills have been known to be more difficult to master. English vocabulary presents another problem for language learners. At the university level, students study professional English, also called English for Specific Purposes (ESP). Students will need it for their future profession, so it is important for them to be able to evaluate their achievements in learning.Methodology/approach – the research paper adopts the qualitative research approach. The questionnaire on learner perceptions of computerized self-evaluation of various activities was administered to students of three different specializations. Students‘ perceptions of success or failure in their performance were analyzed.Findings. The results indicated that attitudes to computerized self-evaluation depended on the difficulty of tasks and chosen future specialization. The findings show that respondents of three investigated specializations encounter similar difficulties, but to a different degree. There are no specific problems in performance due to the complexity of the professional vocabulary that students must learn. The computations of Pearson’s correlations coefficients demonstrate that there are good correlational relationships within each specialization. The ratings of Psychology (PS) students reveal higher mean values and lower scattering of Standard Deviations in Moodle tasks than the ratings of Internet Management and Communication (IMC) students.Research limitations. The investigated samples contain the limited number of respondents, which might raise a question of the reliability of the findings. The statistical computation of the reliability of the obtained responses will prove whether the data are reliable and may be extended beyond the studied samples.The hypothesis for the research: students’ performance might depend on their specialization. Practical implications. The respondents were asked to indicate the degree of difficulty in performing various online tasks on the Likert’s scale ranging from “very difficult” to “very easy”. The analysis of the responses by a means of the Statistical Package for the Social Sciences (SPSS) software proves that despite the limited number of the respondents, the results may be extended beyond the studied samples. It means that self-evaluation of computerized activities by students studying professional English is recommended at the university level.Originality/Value. The value of this study encompasses the statistical processing of the responses, which should prove whether the findings are reliable or not.Research type: research paper.
- Research Article
2
- 10.13165/st-14-4-1-11
- Jan 1, 2014
- Social Technologies
- Monika Mačiulienė
<strong>Purpose </strong>– it is becoming increasingly difficult to ignore the input Internet of Things (IoT) has to offer in development of public, business and other societal structures. Therefore, paper seeks to determine the current state of knowledge in the field of IoT terms of wisdom creation and emergence of collective intelligence. First, we discuss concept of collective intelligence, then we define phenomena of IoT and identify areas of its application. Later, the author reviews how intelligent outputs of IoT are defined in scientific literature. These findings of theoretical investigation may shed some light on research field that is promising but still very vague. <strong>Design/methodology/approach – </strong>this article provides a general overview of IoT concept and its growing relation to collective intelligence. Methods of document analysis and content analysis were applied. Theoretical analysis enabled recognition of IoT phenomena in relation to wisdom creation and emergence of collective intelligence. <strong>Findings</strong> – general overview of the field revealed that new understanding of collective intelligence surfaces. Often intelligent behavior and decisions emerge from ever increasing cooperation between ‘things’ and humans. The variety of new concepts and authors trying to describe relationship of ‘things’ with each other and humans when creating intelligent outcomes revealed that this field is still in its very infancy and still needs considerable amount of industry and scientific efforts to be understood and executed. <strong>Research limitations – </strong>although the paper has successfully demonstrated that IoT provides vast amounts of data for people to process and create knowledge this could be considered only as initial phase in studying the field. IoT and its intelligent outcomes need more investigations in terms of real life case studies and industry reviews in order to create valid definitions, models and future guidelines. <strong>Practical implications – </strong>this study provides an exciting opportunity to advance our knowledge of Internet of Things and could be used as theoretical background for further analysis of emergence of collective intelligence in interactive networks of people and things. <strong>Value – </strong>to date there has been little research summarizing scientific efforts in the field of IoT. This paper provides general overview of the knowledge on IoT and could be used as guidelines for further research. <strong>Keywords: </strong>Internet of Things, Collective Intelligence, Wisdom. <strong>Research type: </strong>General overview.<strong></strong>
- Research Article
13
- 10.13165/st-14-4-1-04
- Jan 1, 2014
- Social Technologies
- Femi Richard Omotoyinbo
Purpose - Radicalization has gained some unusual prominence in the academic circles; maintaining a generic existence not only in the political sector. And with the advent of the Information Communication Technology (ICT), radicalization has begun to have some virtual dimension even in the remotest of human communities. This study seeks to mobilize a universal awareness on the collective urgency to oppose Online Radicalization (a radicalization that happens through the internet) due to its propensity to engendering conflicts. It also aims at identifying the principal cause of online radicalization and steer a clear course for a practical reversal in the systems of online radicalization.Design/methodology/approach - The study is divided into three primary parts. The general notion of radicalization is the focus of the first part; which is further analysed into the levels of online radicalization with its accompanying developments and segments. The second part utilizes analytic and historical method to pinpoint the principal cause of online radicalization amidst the suspected causal factors (the Net and the Netizen). The final part analytically focuses on the Netizen (a user/citizen of the internet) as the primary cause of online radicalization, and how the global community can bring about a corresponding change in the Net by the application of some measures on the Netizen.Findings - By virtue of the analytic plus historical methods employed by this study; it was initially identified that radicalization is basically having two versions which are online and offline. Further emphasis on the online version reveals that its existence is only made possible by the availability of the internet (the Net). Since the Net is a global phenomenon online radicalization is considered to be worldwide: a menace of globalization. However, the study later indicated that the Net is a facilitator and a cause of online radicalization. A view was deduced that the Netizen is of two categories that include the broad category and the jargon category. The Netizen in the former category was later on conceived as the principal cause of online radicalization.Research limitations/implications - The study averred that all attempts/measures to bring about a reversal in the status quo of online radicalization [De-Radicalization measures] should be directly applied to the principal cause, which is the Netizen. Although the content of the de-radicalization measures were not fully provided by this study due to the reason that the contents can best be supplied by almost everyone that has a vivid understanding of online radicalization. The study continues to affirm that the application of the measures of de-radicalization on the Netizen will bring a corresponding ameliorative effect on the Net against its perpetuation of online radicalization.Practical implications - It is important for domain name providers, governments, internet service providers, mass media, NGOs, parents, politicians, religious organisations, schools, teachers, and web hosting companies to collaborate to create practicable contents for a Gradual Online De-Radicalization (G.O.D) which will suppress the perturbing rate of Online Radicalization to the minimal. No unit or sector can singly tackle online radicalization effectively. Therefore, measures of De-Radicalization should be governed by international treaties and laws, and there should be credible agents to legislate and execute the laws respectively.Originality and value - This study broadens the possibilities of reducing online radicalization to the barest minimum globally with some novel strategies categorized broadly as Gradual Online De-Radicalization (G.O.D). The analytic methods applied were plausible skills from the realm of Philosophy and Science respectively. Thus, the findings and suggestions of this study are considered reasonable and universally pragmatic.Research type - general review and viewpoint.
- Research Article
- 10.13165/st-14-4-1-08
- Jan 1, 2014
- Social Technologies
- Vazgen Ghazaryan + 1 more
Purpose – The purpose of the research is to clarify benefits and risks in regards with data protection, cost; business can have by the use of this new technologies for the implementation and management of organization’s information systems.Design/methodology/approach – Qualitative case study of the results obtained via interviews. Three research questions were raised: Q1: How can company benefit from using Cloud Computing compared to other solutions?; Q2: What are possible issues that occur with Cloud Computing?; Q3: How would Cloud Computing change an organizations’ IT infrastructure?Findings – The calculations provided in the interview section prove the financial advantages, even though the precise degree of flexibility and performance has not been assessed. Cloud Computing offers great scalability. Another benefit that Cloud Computing offers, in addition to better performance and flexibility, is reliable and simple backup data storage, physically distributed and so almost invulnerable to damage. Although the advantages of Cloud Computing more than compensate for the difficulties associated with it, the latter must be carefully considered. Since the cloud architecture is relatively new, so far the best guarantee against all risks it entails, from a single company's perspective, is a well-formulated service-level agreement, where the terms of service and the shared responsibility and security roles between the client and the provider are defined.Research limitations/implications – study was carried out on the bases of two companies, which gives deeper view, but for more widely applicable results, a wider analysis is necessary.Practical implications:Originality/Value – novelty of the research depends on the fact that existing approaches on this problem mainly focus on technical side of computing.Research type: case study