Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2020
|
Schriftenreihe: | Lecture Notes in Computer Science Ser.
v.12067 |
Schlagworte: | |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (479 Seiten) |
ISBN: | 9783030450021 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048226053 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220517s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030450021 |9 978-3-030-45002-1 | ||
035 | |a (ZDB-30-PQE)EBC6166896 | ||
035 | |a (ZDB-30-PAD)EBC6166896 | ||
035 | |a (ZDB-89-EBL)EBL6166896 | ||
035 | |a (OCoLC)1150167023 | ||
035 | |a (DE-599)BVBBV048226053 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 6.7539999999999996 | |
100 | 1 | |a Hattingh, Marié |e Verfasser |4 aut | |
245 | 1 | 0 | |a Responsible Design, Implementation and Use of Information and Communication Technology |b 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (479 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Computer Science Ser. |v v.12067 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- eGovernment -- Enterprise Architectures in E-Governments Studies: Why, What and How? -- Abstract -- 1 Introduction -- 2 Methods -- 3 Literature Synthesis -- 3.1 Why (Motivations) -- 3.2 What (Contributions) -- 3.3 How (Methods) -- 4 Discussion -- 5 Related Work -- 6 Conclusions -- Acknowledgement -- References -- An e-Government Implementation Framework: A Developing Country Case Study -- Abstract -- 1 Introduction -- 2 Background -- 2.1 e-Government and ICT Implementation in Developing Countries -- 2.2 Diffusion of Innovation (DOI) Theory -- 2.3 e-Government Critical Success Factors -- 3 Research Approach -- 4 Case Study Data Analysis and Findings -- 5 Conclusion -- References -- Institutional Effects on National Health Insurance Digital Platform Development and Use: The Case of Ghana -- Abstract -- 1 Introduction -- 2 Digital Platform and Health Care -- 3 Theoretical Foundation: Institutional Theory -- 4 Research Setting and Methodology -- 4.1 Methodology -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Case Description -- 5.1 Pre-digital Platform -- 5.2 Digital Platform Development (Mobile Renewals and Digital Authentication) -- 5.3 Post-digital Platform Development -- 6 Analysis and Discussion -- 6.1 Institutional Enablers -- 6.2 Institutional Constraints -- 7 Conclusion -- References -- Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research -- Abstract -- 1 Introduction -- 2 Background -- 3 Research Methodology -- 3.1 Problem Formulation -- 3.2 Building, Intervention and Evaluation -- 3.3 Formalization of Learning -- 4 Expected Results, Conclusion and Further Research -- References -- A Systematic Review of Implementation Challenges in Public E-Procurement -- Abstract -- 1 Introduction -- 2 Conceptual Background | |
505 | 8 | |a 3 Research Methodology -- 3.1 Research Approach -- 3.2 Data Collection -- 3.3 Analysis -- 4 Findings and Discussion -- 4.1 Technological Challenges -- 4.2 Organizational Challenges -- 4.3 Environmental Challenges -- 5 Conclusion -- References -- eHealth -- Barriers for User Acceptance of Mobile Health Applications for Diabetic Patients: Applying the UTAUT Model -- Abstract -- 1 Introduction -- 2 Challenges for User Acceptance -- 2.1 Effort Expectancy -- 2.2 Performance Expectancy -- 2.3 Social Influence -- 2.4 Facilitating Conditions -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Ethical Considerations -- 4 Results -- 4.1 Demographics -- 4.2 Themes Identified from the UTAUT Model -- 4.2.1 Performance Expectancy -- 4.2.2 Effort Expectancy -- 4.2.3 Social Influence -- 4.2.4 Facilitating Conditions -- 5 Implications for the Design of M-Health Interventions -- 6 Conclusion -- References -- Impact of Socio-Demographic Factors on the Acceptance of Information Communication and Technology (ICT) for Diabetes Self-care -- Abstract -- 1 Introduction -- 2 Objectives -- 3 Methodology -- 4 Research Model -- 5 Results -- 6 Discussion -- 6.1 Significant Factors -- 6.2 Non-significant Factors -- 7 Conclusion -- References -- Categorization of Factors Influencing Community Health Workers from a Socio-Technical Systems Perspective -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Methodological Approach -- 2.2 The Case for STS as a Priori Framework -- 2.3 Search Strategy and Inclusion Criteria -- 3 Descriptive Statistics Findings -- 4 Discussion: Synthesis and Categorization of Factors -- 4.1 Social Aspect -- 4.2 Technical Aspect -- 4.3 Integrating Factors into Concepts -- 5 Conclusion -- References -- A Systematic Literature Review of the Factors that Influence the Accuracy of Consumer Wearable Health Device Data -- Abstract | |
505 | 8 | |a 1 Introduction and Background -- 2 Systematic Literature Review Process -- 3 Results -- 3.1 The Tracker and Sensor Types -- 3.2 The Algorithm Used in Consumer Wearable Health Devices -- 3.3 Limitations in the Design, Energy Consumption, and Processing Capabilities -- 4 Conclusion -- References -- Gamification in Healthcare: Motivating South Africans to Exercise -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 What Is Gamification? -- 2.2 The Octalysis Framework -- 2.3 Examples of Gamification in E-Health -- 3 Research Question and Objectives -- 4 Research Methodology -- 4.1 Research Strategy and Data Collection -- 4.2 Data Analysis -- 5 Results -- 5.1 Multiply Active Dayz™ Results -- 5.2 Questionnaire Results -- 6 Discussion and Conclusions -- References -- A Twitter Social Network Analysis: The South African Health Insurance Bill Case -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Methodological Framework -- 3.2 The Case: Announcement of the South African NHI Bill in Parliament -- 3.3 NodeXL Pro for SNA -- 3.4 Data Collection and Analysis -- 4 Results and Discussion -- 4.1 Prevalence and Patterns of #NHI Twitter Users -- 4.2 Influence and Network Analysis Results -- 4.3 Analytics and Visualisation -- 5 Conclusions -- Security -- Cyber-Harassment Victimization Among South African LGBTQIA+ Youth -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber-Harassment -- 2.2 Context: The LGBTQIA+ Community in South Africa -- 2.3 Theoretical Framework -- 3 Research Methodology -- 4 Research Findings and Discussion -- 4.1 Demographics -- 4.2 Research Question 1: "What Is the Current Nature and Level of Cyber-Harassment?" -- 4.3 Research Question 2: "Which Aspects of Online Platforms Enable Cyber-Harassment?" | |
505 | 8 | |a 4.4 Research Question 3: "Which Aspects of Online Platforms Are Considered as Coping Mechanisms Against Harassment?" -- 4.5 Inferential Statistics: Harassment Effects by Harassment Type and Attribute -- 5 Conclusion -- 6 Limitations and Further Research -- References -- Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern -- Abstract -- 1 Introduction -- 2 Related Works on Online Identity Theft -- 2.1 Conceptual Model Development and Research Hypotheses -- 2.1.1 The Relationship Between Fear of Financial Loss, Online Security and Privacy Concern, and Online Customer Purchase Intention -- 2.1.2 The Relationship Between Fear of Reputational Damage, Online Security and Privacy Concern, and Online Purchase Intention -- 3 Methodology -- 3.1 Constructs Measurement -- 4 Results -- 4.1 Model Fit Tests -- 4.2 Test of Structural Model: A Mediation Analysis -- 5 Discussions -- 5.1 Limitations and Future Research -- 5.2 Concluding Observations -- Acknowledgment -- References -- On the Ethics of Using Publicly-Available Data -- Abstract -- 1 Introduction -- 1.1 Characteristics of Publicly Available Data -- 1.2 Potential Ethical Issues with Publicly-Available Data -- 2 Ethics -- 3 Privacy and Protecting Privacy -- 4 Invasion of Privacy -- 4.1 Covert Surveillance -- 4.2 Trans-Jurisdiction Surveillance -- 4.3 Overt Surveillance -- 4.4 Overloaded Surveillance -- 4.5 Becoming Accustomed to the Surveillance Society -- 4.6 Mutual Surveillance -- 4.7 Making Data Already in the Public Domain More Visible -- 4.8 Combining and Processing Available Data -- 4.9 Opting in vs Opting Out -- 4.10 Assuming One Has Nothing to Hide -- 4.11 Legal Complexities -- 5 Conclusions and Discussion -- References -- Social Media -- Introducing the Media Use Behaviour Conceptual Framework -- 1 Introduction | |
505 | 8 | |a 2 A Conceptual Framework for Understanding Media Use Behaviour -- 3 An Affordances Perspective -- 4 User Factors -- 4.1 Cognitive Factors -- 4.2 Personal Characteristics -- 5 Situational Factors -- 5.1 Artefacts -- 6 Behavioural Outcomes -- 7 Discussion and Conclusions -- References -- The Town Square in Your Pocket: Exploring Four Metaphors of Social Media -- 1 Introduction -- 2 Defining Metaphor -- 3 Metaphors -- 3.1 Social Media as a Town Square -- 3.2 Social Media as a Beauty Pageant -- 3.3 Social Media as a Parliament -- 3.4 Social Media as a Masquerade Ball -- 4 Discussion -- References -- How Can Critical Thinking Be Used to Assess the Credibility of Online Information? -- Abstract -- 1 Introduction -- 2 Existing Research on Assessing the Credibility of Online Information -- 2.1 A Checklist for Information Credibility Assessment -- 2.2 Descriptive Models and Theories Related to Information Credibility Assessment -- 2.3 A Synthesised Summary of Existing Work on the Credibility Assessment Process -- 3 Critical Thinking -- 3.1 The Use of Critical Thinking in the Context of Existing Credibility Assessment Models -- 4 Discussion: Potential Challenges to Using Critical Thinking to Assess the Credibility of Online Information -- 4.1 Addressing the Challenges -- 5 Conclusion -- References -- An Analysis of Problematic Media Use and Technology Use Addiction Scales - What Are They Actually Assessing? -- 1 Introduction -- 1.1 The Present Study -- 2 Methodology -- 2.1 Inclusion Criteria -- 2.2 Search Strategy -- 2.3 Data Extraction, Management, and Analysis Procedures -- 3 Analysis and Results -- 3.1 Search Results -- 3.2 Mapping of Scale Items to Dimensions -- 3.3 The Dimensional Structure of the Scales -- 4 Discussion -- 5 Conclusion -- References -- A Systematic Review on Fake News Themes Reported in Literature -- Abstract -- 1 Introduction | |
505 | 8 | |a 2 Literature Background | |
650 | 4 | |a Online social networks | |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2020 |z Skukuza |2 gnd-content | |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 2 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Matthee, Machdel |e Sonstige |4 oth | |
700 | 1 | |a Smuts, Hanlie |e Sonstige |4 oth | |
700 | 1 | |a Pappas, Ilias |e Sonstige |4 oth | |
700 | 1 | |a Dwivedi, Yogesh K. |e Sonstige |4 oth | |
700 | 1 | |a Mäntymäki, Matti |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Hattingh, Marié |t Responsible Design, Implementation and Use of Information and Communication Technology |d Cham : Springer International Publishing AG,c2020 |z 9783030450014 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033606783 |
Datensatz im Suchindex
_version_ | 1804184008289943552 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Hattingh, Marié |
author_facet | Hattingh, Marié |
author_role | aut |
author_sort | Hattingh, Marié |
author_variant | m h mh |
building | Verbundindex |
bvnumber | BV048226053 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- eGovernment -- Enterprise Architectures in E-Governments Studies: Why, What and How? -- Abstract -- 1 Introduction -- 2 Methods -- 3 Literature Synthesis -- 3.1 Why (Motivations) -- 3.2 What (Contributions) -- 3.3 How (Methods) -- 4 Discussion -- 5 Related Work -- 6 Conclusions -- Acknowledgement -- References -- An e-Government Implementation Framework: A Developing Country Case Study -- Abstract -- 1 Introduction -- 2 Background -- 2.1 e-Government and ICT Implementation in Developing Countries -- 2.2 Diffusion of Innovation (DOI) Theory -- 2.3 e-Government Critical Success Factors -- 3 Research Approach -- 4 Case Study Data Analysis and Findings -- 5 Conclusion -- References -- Institutional Effects on National Health Insurance Digital Platform Development and Use: The Case of Ghana -- Abstract -- 1 Introduction -- 2 Digital Platform and Health Care -- 3 Theoretical Foundation: Institutional Theory -- 4 Research Setting and Methodology -- 4.1 Methodology -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Case Description -- 5.1 Pre-digital Platform -- 5.2 Digital Platform Development (Mobile Renewals and Digital Authentication) -- 5.3 Post-digital Platform Development -- 6 Analysis and Discussion -- 6.1 Institutional Enablers -- 6.2 Institutional Constraints -- 7 Conclusion -- References -- Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research -- Abstract -- 1 Introduction -- 2 Background -- 3 Research Methodology -- 3.1 Problem Formulation -- 3.2 Building, Intervention and Evaluation -- 3.3 Formalization of Learning -- 4 Expected Results, Conclusion and Further Research -- References -- A Systematic Review of Implementation Challenges in Public E-Procurement -- Abstract -- 1 Introduction -- 2 Conceptual Background 3 Research Methodology -- 3.1 Research Approach -- 3.2 Data Collection -- 3.3 Analysis -- 4 Findings and Discussion -- 4.1 Technological Challenges -- 4.2 Organizational Challenges -- 4.3 Environmental Challenges -- 5 Conclusion -- References -- eHealth -- Barriers for User Acceptance of Mobile Health Applications for Diabetic Patients: Applying the UTAUT Model -- Abstract -- 1 Introduction -- 2 Challenges for User Acceptance -- 2.1 Effort Expectancy -- 2.2 Performance Expectancy -- 2.3 Social Influence -- 2.4 Facilitating Conditions -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Ethical Considerations -- 4 Results -- 4.1 Demographics -- 4.2 Themes Identified from the UTAUT Model -- 4.2.1 Performance Expectancy -- 4.2.2 Effort Expectancy -- 4.2.3 Social Influence -- 4.2.4 Facilitating Conditions -- 5 Implications for the Design of M-Health Interventions -- 6 Conclusion -- References -- Impact of Socio-Demographic Factors on the Acceptance of Information Communication and Technology (ICT) for Diabetes Self-care -- Abstract -- 1 Introduction -- 2 Objectives -- 3 Methodology -- 4 Research Model -- 5 Results -- 6 Discussion -- 6.1 Significant Factors -- 6.2 Non-significant Factors -- 7 Conclusion -- References -- Categorization of Factors Influencing Community Health Workers from a Socio-Technical Systems Perspective -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Methodological Approach -- 2.2 The Case for STS as a Priori Framework -- 2.3 Search Strategy and Inclusion Criteria -- 3 Descriptive Statistics Findings -- 4 Discussion: Synthesis and Categorization of Factors -- 4.1 Social Aspect -- 4.2 Technical Aspect -- 4.3 Integrating Factors into Concepts -- 5 Conclusion -- References -- A Systematic Literature Review of the Factors that Influence the Accuracy of Consumer Wearable Health Device Data -- Abstract 1 Introduction and Background -- 2 Systematic Literature Review Process -- 3 Results -- 3.1 The Tracker and Sensor Types -- 3.2 The Algorithm Used in Consumer Wearable Health Devices -- 3.3 Limitations in the Design, Energy Consumption, and Processing Capabilities -- 4 Conclusion -- References -- Gamification in Healthcare: Motivating South Africans to Exercise -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 What Is Gamification? -- 2.2 The Octalysis Framework -- 2.3 Examples of Gamification in E-Health -- 3 Research Question and Objectives -- 4 Research Methodology -- 4.1 Research Strategy and Data Collection -- 4.2 Data Analysis -- 5 Results -- 5.1 Multiply Active Dayz™ Results -- 5.2 Questionnaire Results -- 6 Discussion and Conclusions -- References -- A Twitter Social Network Analysis: The South African Health Insurance Bill Case -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Methodological Framework -- 3.2 The Case: Announcement of the South African NHI Bill in Parliament -- 3.3 NodeXL Pro for SNA -- 3.4 Data Collection and Analysis -- 4 Results and Discussion -- 4.1 Prevalence and Patterns of #NHI Twitter Users -- 4.2 Influence and Network Analysis Results -- 4.3 Analytics and Visualisation -- 5 Conclusions -- Security -- Cyber-Harassment Victimization Among South African LGBTQIA+ Youth -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber-Harassment -- 2.2 Context: The LGBTQIA+ Community in South Africa -- 2.3 Theoretical Framework -- 3 Research Methodology -- 4 Research Findings and Discussion -- 4.1 Demographics -- 4.2 Research Question 1: "What Is the Current Nature and Level of Cyber-Harassment?" -- 4.3 Research Question 2: "Which Aspects of Online Platforms Enable Cyber-Harassment?" 4.4 Research Question 3: "Which Aspects of Online Platforms Are Considered as Coping Mechanisms Against Harassment?" -- 4.5 Inferential Statistics: Harassment Effects by Harassment Type and Attribute -- 5 Conclusion -- 6 Limitations and Further Research -- References -- Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern -- Abstract -- 1 Introduction -- 2 Related Works on Online Identity Theft -- 2.1 Conceptual Model Development and Research Hypotheses -- 2.1.1 The Relationship Between Fear of Financial Loss, Online Security and Privacy Concern, and Online Customer Purchase Intention -- 2.1.2 The Relationship Between Fear of Reputational Damage, Online Security and Privacy Concern, and Online Purchase Intention -- 3 Methodology -- 3.1 Constructs Measurement -- 4 Results -- 4.1 Model Fit Tests -- 4.2 Test of Structural Model: A Mediation Analysis -- 5 Discussions -- 5.1 Limitations and Future Research -- 5.2 Concluding Observations -- Acknowledgment -- References -- On the Ethics of Using Publicly-Available Data -- Abstract -- 1 Introduction -- 1.1 Characteristics of Publicly Available Data -- 1.2 Potential Ethical Issues with Publicly-Available Data -- 2 Ethics -- 3 Privacy and Protecting Privacy -- 4 Invasion of Privacy -- 4.1 Covert Surveillance -- 4.2 Trans-Jurisdiction Surveillance -- 4.3 Overt Surveillance -- 4.4 Overloaded Surveillance -- 4.5 Becoming Accustomed to the Surveillance Society -- 4.6 Mutual Surveillance -- 4.7 Making Data Already in the Public Domain More Visible -- 4.8 Combining and Processing Available Data -- 4.9 Opting in vs Opting Out -- 4.10 Assuming One Has Nothing to Hide -- 4.11 Legal Complexities -- 5 Conclusions and Discussion -- References -- Social Media -- Introducing the Media Use Behaviour Conceptual Framework -- 1 Introduction 2 A Conceptual Framework for Understanding Media Use Behaviour -- 3 An Affordances Perspective -- 4 User Factors -- 4.1 Cognitive Factors -- 4.2 Personal Characteristics -- 5 Situational Factors -- 5.1 Artefacts -- 6 Behavioural Outcomes -- 7 Discussion and Conclusions -- References -- The Town Square in Your Pocket: Exploring Four Metaphors of Social Media -- 1 Introduction -- 2 Defining Metaphor -- 3 Metaphors -- 3.1 Social Media as a Town Square -- 3.2 Social Media as a Beauty Pageant -- 3.3 Social Media as a Parliament -- 3.4 Social Media as a Masquerade Ball -- 4 Discussion -- References -- How Can Critical Thinking Be Used to Assess the Credibility of Online Information? -- Abstract -- 1 Introduction -- 2 Existing Research on Assessing the Credibility of Online Information -- 2.1 A Checklist for Information Credibility Assessment -- 2.2 Descriptive Models and Theories Related to Information Credibility Assessment -- 2.3 A Synthesised Summary of Existing Work on the Credibility Assessment Process -- 3 Critical Thinking -- 3.1 The Use of Critical Thinking in the Context of Existing Credibility Assessment Models -- 4 Discussion: Potential Challenges to Using Critical Thinking to Assess the Credibility of Online Information -- 4.1 Addressing the Challenges -- 5 Conclusion -- References -- An Analysis of Problematic Media Use and Technology Use Addiction Scales - What Are They Actually Assessing? -- 1 Introduction -- 1.1 The Present Study -- 2 Methodology -- 2.1 Inclusion Criteria -- 2.2 Search Strategy -- 2.3 Data Extraction, Management, and Analysis Procedures -- 3 Analysis and Results -- 3.1 Search Results -- 3.2 Mapping of Scale Items to Dimensions -- 3.3 The Dimensional Structure of the Scales -- 4 Discussion -- 5 Conclusion -- References -- A Systematic Review on Fake News Themes Reported in Literature -- Abstract -- 1 Introduction 2 Literature Background |
ctrlnum | (ZDB-30-PQE)EBC6166896 (ZDB-30-PAD)EBC6166896 (ZDB-89-EBL)EBL6166896 (OCoLC)1150167023 (DE-599)BVBBV048226053 |
dewey-full | 6.7539999999999996 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 6.7539999999999996 |
dewey-search | 6.7539999999999996 |
dewey-sort | 16.7539999999999996 |
dewey-tens | 000 - Computer science, information, general works |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11600nmm a2200589zcb4500</leader><controlfield tag="001">BV048226053</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220517s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030450021</subfield><subfield code="9">978-3-030-45002-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6166896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6166896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6166896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1150167023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048226053</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">6.7539999999999996</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hattingh, Marié</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Responsible Design, Implementation and Use of Information and Communication Technology</subfield><subfield code="b">19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (479 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Computer Science Ser.</subfield><subfield code="v">v.12067</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- eGovernment -- Enterprise Architectures in E-Governments Studies: Why, What and How? -- Abstract -- 1 Introduction -- 2 Methods -- 3 Literature Synthesis -- 3.1 Why (Motivations) -- 3.2 What (Contributions) -- 3.3 How (Methods) -- 4 Discussion -- 5 Related Work -- 6 Conclusions -- Acknowledgement -- References -- An e-Government Implementation Framework: A Developing Country Case Study -- Abstract -- 1 Introduction -- 2 Background -- 2.1 e-Government and ICT Implementation in Developing Countries -- 2.2 Diffusion of Innovation (DOI) Theory -- 2.3 e-Government Critical Success Factors -- 3 Research Approach -- 4 Case Study Data Analysis and Findings -- 5 Conclusion -- References -- Institutional Effects on National Health Insurance Digital Platform Development and Use: The Case of Ghana -- Abstract -- 1 Introduction -- 2 Digital Platform and Health Care -- 3 Theoretical Foundation: Institutional Theory -- 4 Research Setting and Methodology -- 4.1 Methodology -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Case Description -- 5.1 Pre-digital Platform -- 5.2 Digital Platform Development (Mobile Renewals and Digital Authentication) -- 5.3 Post-digital Platform Development -- 6 Analysis and Discussion -- 6.1 Institutional Enablers -- 6.2 Institutional Constraints -- 7 Conclusion -- References -- Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research -- Abstract -- 1 Introduction -- 2 Background -- 3 Research Methodology -- 3.1 Problem Formulation -- 3.2 Building, Intervention and Evaluation -- 3.3 Formalization of Learning -- 4 Expected Results, Conclusion and Further Research -- References -- A Systematic Review of Implementation Challenges in Public E-Procurement -- Abstract -- 1 Introduction -- 2 Conceptual Background</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3 Research Methodology -- 3.1 Research Approach -- 3.2 Data Collection -- 3.3 Analysis -- 4 Findings and Discussion -- 4.1 Technological Challenges -- 4.2 Organizational Challenges -- 4.3 Environmental Challenges -- 5 Conclusion -- References -- eHealth -- Barriers for User Acceptance of Mobile Health Applications for Diabetic Patients: Applying the UTAUT Model -- Abstract -- 1 Introduction -- 2 Challenges for User Acceptance -- 2.1 Effort Expectancy -- 2.2 Performance Expectancy -- 2.3 Social Influence -- 2.4 Facilitating Conditions -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Ethical Considerations -- 4 Results -- 4.1 Demographics -- 4.2 Themes Identified from the UTAUT Model -- 4.2.1 Performance Expectancy -- 4.2.2 Effort Expectancy -- 4.2.3 Social Influence -- 4.2.4 Facilitating Conditions -- 5 Implications for the Design of M-Health Interventions -- 6 Conclusion -- References -- Impact of Socio-Demographic Factors on the Acceptance of Information Communication and Technology (ICT) for Diabetes Self-care -- Abstract -- 1 Introduction -- 2 Objectives -- 3 Methodology -- 4 Research Model -- 5 Results -- 6 Discussion -- 6.1 Significant Factors -- 6.2 Non-significant Factors -- 7 Conclusion -- References -- Categorization of Factors Influencing Community Health Workers from a Socio-Technical Systems Perspective -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Methodological Approach -- 2.2 The Case for STS as a Priori Framework -- 2.3 Search Strategy and Inclusion Criteria -- 3 Descriptive Statistics Findings -- 4 Discussion: Synthesis and Categorization of Factors -- 4.1 Social Aspect -- 4.2 Technical Aspect -- 4.3 Integrating Factors into Concepts -- 5 Conclusion -- References -- A Systematic Literature Review of the Factors that Influence the Accuracy of Consumer Wearable Health Device Data -- Abstract</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1 Introduction and Background -- 2 Systematic Literature Review Process -- 3 Results -- 3.1 The Tracker and Sensor Types -- 3.2 The Algorithm Used in Consumer Wearable Health Devices -- 3.3 Limitations in the Design, Energy Consumption, and Processing Capabilities -- 4 Conclusion -- References -- Gamification in Healthcare: Motivating South Africans to Exercise -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 What Is Gamification? -- 2.2 The Octalysis Framework -- 2.3 Examples of Gamification in E-Health -- 3 Research Question and Objectives -- 4 Research Methodology -- 4.1 Research Strategy and Data Collection -- 4.2 Data Analysis -- 5 Results -- 5.1 Multiply Active Dayz™ Results -- 5.2 Questionnaire Results -- 6 Discussion and Conclusions -- References -- A Twitter Social Network Analysis: The South African Health Insurance Bill Case -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Methodological Framework -- 3.2 The Case: Announcement of the South African NHI Bill in Parliament -- 3.3 NodeXL Pro for SNA -- 3.4 Data Collection and Analysis -- 4 Results and Discussion -- 4.1 Prevalence and Patterns of #NHI Twitter Users -- 4.2 Influence and Network Analysis Results -- 4.3 Analytics and Visualisation -- 5 Conclusions -- Security -- Cyber-Harassment Victimization Among South African LGBTQIA+ Youth -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber-Harassment -- 2.2 Context: The LGBTQIA+ Community in South Africa -- 2.3 Theoretical Framework -- 3 Research Methodology -- 4 Research Findings and Discussion -- 4.1 Demographics -- 4.2 Research Question 1: "What Is the Current Nature and Level of Cyber-Harassment?" -- 4.3 Research Question 2: "Which Aspects of Online Platforms Enable Cyber-Harassment?"</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4 Research Question 3: "Which Aspects of Online Platforms Are Considered as Coping Mechanisms Against Harassment?" -- 4.5 Inferential Statistics: Harassment Effects by Harassment Type and Attribute -- 5 Conclusion -- 6 Limitations and Further Research -- References -- Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern -- Abstract -- 1 Introduction -- 2 Related Works on Online Identity Theft -- 2.1 Conceptual Model Development and Research Hypotheses -- 2.1.1 The Relationship Between Fear of Financial Loss, Online Security and Privacy Concern, and Online Customer Purchase Intention -- 2.1.2 The Relationship Between Fear of Reputational Damage, Online Security and Privacy Concern, and Online Purchase Intention -- 3 Methodology -- 3.1 Constructs Measurement -- 4 Results -- 4.1 Model Fit Tests -- 4.2 Test of Structural Model: A Mediation Analysis -- 5 Discussions -- 5.1 Limitations and Future Research -- 5.2 Concluding Observations -- Acknowledgment -- References -- On the Ethics of Using Publicly-Available Data -- Abstract -- 1 Introduction -- 1.1 Characteristics of Publicly Available Data -- 1.2 Potential Ethical Issues with Publicly-Available Data -- 2 Ethics -- 3 Privacy and Protecting Privacy -- 4 Invasion of Privacy -- 4.1 Covert Surveillance -- 4.2 Trans-Jurisdiction Surveillance -- 4.3 Overt Surveillance -- 4.4 Overloaded Surveillance -- 4.5 Becoming Accustomed to the Surveillance Society -- 4.6 Mutual Surveillance -- 4.7 Making Data Already in the Public Domain More Visible -- 4.8 Combining and Processing Available Data -- 4.9 Opting in vs Opting Out -- 4.10 Assuming One Has Nothing to Hide -- 4.11 Legal Complexities -- 5 Conclusions and Discussion -- References -- Social Media -- Introducing the Media Use Behaviour Conceptual Framework -- 1 Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 A Conceptual Framework for Understanding Media Use Behaviour -- 3 An Affordances Perspective -- 4 User Factors -- 4.1 Cognitive Factors -- 4.2 Personal Characteristics -- 5 Situational Factors -- 5.1 Artefacts -- 6 Behavioural Outcomes -- 7 Discussion and Conclusions -- References -- The Town Square in Your Pocket: Exploring Four Metaphors of Social Media -- 1 Introduction -- 2 Defining Metaphor -- 3 Metaphors -- 3.1 Social Media as a Town Square -- 3.2 Social Media as a Beauty Pageant -- 3.3 Social Media as a Parliament -- 3.4 Social Media as a Masquerade Ball -- 4 Discussion -- References -- How Can Critical Thinking Be Used to Assess the Credibility of Online Information? -- Abstract -- 1 Introduction -- 2 Existing Research on Assessing the Credibility of Online Information -- 2.1 A Checklist for Information Credibility Assessment -- 2.2 Descriptive Models and Theories Related to Information Credibility Assessment -- 2.3 A Synthesised Summary of Existing Work on the Credibility Assessment Process -- 3 Critical Thinking -- 3.1 The Use of Critical Thinking in the Context of Existing Credibility Assessment Models -- 4 Discussion: Potential Challenges to Using Critical Thinking to Assess the Credibility of Online Information -- 4.1 Addressing the Challenges -- 5 Conclusion -- References -- An Analysis of Problematic Media Use and Technology Use Addiction Scales - What Are They Actually Assessing? -- 1 Introduction -- 1.1 The Present Study -- 2 Methodology -- 2.1 Inclusion Criteria -- 2.2 Search Strategy -- 2.3 Data Extraction, Management, and Analysis Procedures -- 3 Analysis and Results -- 3.1 Search Results -- 3.2 Mapping of Scale Items to Dimensions -- 3.3 The Dimensional Structure of the Scales -- 4 Discussion -- 5 Conclusion -- References -- A Systematic Review on Fake News Themes Reported in Literature -- Abstract -- 1 Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Literature Background</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Skukuza</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Matthee, Machdel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smuts, Hanlie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pappas, Ilias</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dwivedi, Yogesh K.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mäntymäki, Matti</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Hattingh, Marié</subfield><subfield code="t">Responsible Design, Implementation and Use of Information and Communication Technology</subfield><subfield code="d">Cham : Springer International Publishing AG,c2020</subfield><subfield code="z">9783030450014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033606783</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2020 Skukuza gnd-content |
genre_facet | Konferenzschrift 2020 Skukuza |
id | DE-604.BV048226053 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:44Z |
indexdate | 2024-07-10T09:32:30Z |
institution | BVB |
isbn | 9783030450021 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033606783 |
oclc_num | 1150167023 |
open_access_boolean | |
physical | 1 Online-Ressource (479 Seiten) |
psigel | ZDB-30-PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes in Computer Science Ser. |
spelling | Hattingh, Marié Verfasser aut Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. Cham Springer International Publishing AG 2020 ©2020 1 Online-Ressource (479 Seiten) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Ser. v.12067 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- eGovernment -- Enterprise Architectures in E-Governments Studies: Why, What and How? -- Abstract -- 1 Introduction -- 2 Methods -- 3 Literature Synthesis -- 3.1 Why (Motivations) -- 3.2 What (Contributions) -- 3.3 How (Methods) -- 4 Discussion -- 5 Related Work -- 6 Conclusions -- Acknowledgement -- References -- An e-Government Implementation Framework: A Developing Country Case Study -- Abstract -- 1 Introduction -- 2 Background -- 2.1 e-Government and ICT Implementation in Developing Countries -- 2.2 Diffusion of Innovation (DOI) Theory -- 2.3 e-Government Critical Success Factors -- 3 Research Approach -- 4 Case Study Data Analysis and Findings -- 5 Conclusion -- References -- Institutional Effects on National Health Insurance Digital Platform Development and Use: The Case of Ghana -- Abstract -- 1 Introduction -- 2 Digital Platform and Health Care -- 3 Theoretical Foundation: Institutional Theory -- 4 Research Setting and Methodology -- 4.1 Methodology -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Case Description -- 5.1 Pre-digital Platform -- 5.2 Digital Platform Development (Mobile Renewals and Digital Authentication) -- 5.3 Post-digital Platform Development -- 6 Analysis and Discussion -- 6.1 Institutional Enablers -- 6.2 Institutional Constraints -- 7 Conclusion -- References -- Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research -- Abstract -- 1 Introduction -- 2 Background -- 3 Research Methodology -- 3.1 Problem Formulation -- 3.2 Building, Intervention and Evaluation -- 3.3 Formalization of Learning -- 4 Expected Results, Conclusion and Further Research -- References -- A Systematic Review of Implementation Challenges in Public E-Procurement -- Abstract -- 1 Introduction -- 2 Conceptual Background 3 Research Methodology -- 3.1 Research Approach -- 3.2 Data Collection -- 3.3 Analysis -- 4 Findings and Discussion -- 4.1 Technological Challenges -- 4.2 Organizational Challenges -- 4.3 Environmental Challenges -- 5 Conclusion -- References -- eHealth -- Barriers for User Acceptance of Mobile Health Applications for Diabetic Patients: Applying the UTAUT Model -- Abstract -- 1 Introduction -- 2 Challenges for User Acceptance -- 2.1 Effort Expectancy -- 2.2 Performance Expectancy -- 2.3 Social Influence -- 2.4 Facilitating Conditions -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Ethical Considerations -- 4 Results -- 4.1 Demographics -- 4.2 Themes Identified from the UTAUT Model -- 4.2.1 Performance Expectancy -- 4.2.2 Effort Expectancy -- 4.2.3 Social Influence -- 4.2.4 Facilitating Conditions -- 5 Implications for the Design of M-Health Interventions -- 6 Conclusion -- References -- Impact of Socio-Demographic Factors on the Acceptance of Information Communication and Technology (ICT) for Diabetes Self-care -- Abstract -- 1 Introduction -- 2 Objectives -- 3 Methodology -- 4 Research Model -- 5 Results -- 6 Discussion -- 6.1 Significant Factors -- 6.2 Non-significant Factors -- 7 Conclusion -- References -- Categorization of Factors Influencing Community Health Workers from a Socio-Technical Systems Perspective -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Methodological Approach -- 2.2 The Case for STS as a Priori Framework -- 2.3 Search Strategy and Inclusion Criteria -- 3 Descriptive Statistics Findings -- 4 Discussion: Synthesis and Categorization of Factors -- 4.1 Social Aspect -- 4.2 Technical Aspect -- 4.3 Integrating Factors into Concepts -- 5 Conclusion -- References -- A Systematic Literature Review of the Factors that Influence the Accuracy of Consumer Wearable Health Device Data -- Abstract 1 Introduction and Background -- 2 Systematic Literature Review Process -- 3 Results -- 3.1 The Tracker and Sensor Types -- 3.2 The Algorithm Used in Consumer Wearable Health Devices -- 3.3 Limitations in the Design, Energy Consumption, and Processing Capabilities -- 4 Conclusion -- References -- Gamification in Healthcare: Motivating South Africans to Exercise -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 What Is Gamification? -- 2.2 The Octalysis Framework -- 2.3 Examples of Gamification in E-Health -- 3 Research Question and Objectives -- 4 Research Methodology -- 4.1 Research Strategy and Data Collection -- 4.2 Data Analysis -- 5 Results -- 5.1 Multiply Active Dayz™ Results -- 5.2 Questionnaire Results -- 6 Discussion and Conclusions -- References -- A Twitter Social Network Analysis: The South African Health Insurance Bill Case -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Methodological Framework -- 3.2 The Case: Announcement of the South African NHI Bill in Parliament -- 3.3 NodeXL Pro for SNA -- 3.4 Data Collection and Analysis -- 4 Results and Discussion -- 4.1 Prevalence and Patterns of #NHI Twitter Users -- 4.2 Influence and Network Analysis Results -- 4.3 Analytics and Visualisation -- 5 Conclusions -- Security -- Cyber-Harassment Victimization Among South African LGBTQIA+ Youth -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber-Harassment -- 2.2 Context: The LGBTQIA+ Community in South Africa -- 2.3 Theoretical Framework -- 3 Research Methodology -- 4 Research Findings and Discussion -- 4.1 Demographics -- 4.2 Research Question 1: "What Is the Current Nature and Level of Cyber-Harassment?" -- 4.3 Research Question 2: "Which Aspects of Online Platforms Enable Cyber-Harassment?" 4.4 Research Question 3: "Which Aspects of Online Platforms Are Considered as Coping Mechanisms Against Harassment?" -- 4.5 Inferential Statistics: Harassment Effects by Harassment Type and Attribute -- 5 Conclusion -- 6 Limitations and Further Research -- References -- Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern -- Abstract -- 1 Introduction -- 2 Related Works on Online Identity Theft -- 2.1 Conceptual Model Development and Research Hypotheses -- 2.1.1 The Relationship Between Fear of Financial Loss, Online Security and Privacy Concern, and Online Customer Purchase Intention -- 2.1.2 The Relationship Between Fear of Reputational Damage, Online Security and Privacy Concern, and Online Purchase Intention -- 3 Methodology -- 3.1 Constructs Measurement -- 4 Results -- 4.1 Model Fit Tests -- 4.2 Test of Structural Model: A Mediation Analysis -- 5 Discussions -- 5.1 Limitations and Future Research -- 5.2 Concluding Observations -- Acknowledgment -- References -- On the Ethics of Using Publicly-Available Data -- Abstract -- 1 Introduction -- 1.1 Characteristics of Publicly Available Data -- 1.2 Potential Ethical Issues with Publicly-Available Data -- 2 Ethics -- 3 Privacy and Protecting Privacy -- 4 Invasion of Privacy -- 4.1 Covert Surveillance -- 4.2 Trans-Jurisdiction Surveillance -- 4.3 Overt Surveillance -- 4.4 Overloaded Surveillance -- 4.5 Becoming Accustomed to the Surveillance Society -- 4.6 Mutual Surveillance -- 4.7 Making Data Already in the Public Domain More Visible -- 4.8 Combining and Processing Available Data -- 4.9 Opting in vs Opting Out -- 4.10 Assuming One Has Nothing to Hide -- 4.11 Legal Complexities -- 5 Conclusions and Discussion -- References -- Social Media -- Introducing the Media Use Behaviour Conceptual Framework -- 1 Introduction 2 A Conceptual Framework for Understanding Media Use Behaviour -- 3 An Affordances Perspective -- 4 User Factors -- 4.1 Cognitive Factors -- 4.2 Personal Characteristics -- 5 Situational Factors -- 5.1 Artefacts -- 6 Behavioural Outcomes -- 7 Discussion and Conclusions -- References -- The Town Square in Your Pocket: Exploring Four Metaphors of Social Media -- 1 Introduction -- 2 Defining Metaphor -- 3 Metaphors -- 3.1 Social Media as a Town Square -- 3.2 Social Media as a Beauty Pageant -- 3.3 Social Media as a Parliament -- 3.4 Social Media as a Masquerade Ball -- 4 Discussion -- References -- How Can Critical Thinking Be Used to Assess the Credibility of Online Information? -- Abstract -- 1 Introduction -- 2 Existing Research on Assessing the Credibility of Online Information -- 2.1 A Checklist for Information Credibility Assessment -- 2.2 Descriptive Models and Theories Related to Information Credibility Assessment -- 2.3 A Synthesised Summary of Existing Work on the Credibility Assessment Process -- 3 Critical Thinking -- 3.1 The Use of Critical Thinking in the Context of Existing Credibility Assessment Models -- 4 Discussion: Potential Challenges to Using Critical Thinking to Assess the Credibility of Online Information -- 4.1 Addressing the Challenges -- 5 Conclusion -- References -- An Analysis of Problematic Media Use and Technology Use Addiction Scales - What Are They Actually Assessing? -- 1 Introduction -- 1.1 The Present Study -- 2 Methodology -- 2.1 Inclusion Criteria -- 2.2 Search Strategy -- 2.3 Data Extraction, Management, and Analysis Procedures -- 3 Analysis and Results -- 3.1 Search Results -- 3.2 Mapping of Scale Items to Dimensions -- 3.3 The Dimensional Structure of the Scales -- 4 Discussion -- 5 Conclusion -- References -- A Systematic Review on Fake News Themes Reported in Literature -- Abstract -- 1 Introduction 2 Literature Background Online social networks Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Anwendungssoftware (DE-588)4120906-0 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2020 Skukuza gnd-content Electronic Commerce (DE-588)4592128-3 s Künstliche Intelligenz (DE-588)4033447-8 s Anwendungssoftware (DE-588)4120906-0 s DE-604 Matthee, Machdel Sonstige oth Smuts, Hanlie Sonstige oth Pappas, Ilias Sonstige oth Dwivedi, Yogesh K. Sonstige oth Mäntymäki, Matti Sonstige oth Erscheint auch als Druck-Ausgabe Hattingh, Marié Responsible Design, Implementation and Use of Information and Communication Technology Cham : Springer International Publishing AG,c2020 9783030450014 |
spellingShingle | Hattingh, Marié Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- eGovernment -- Enterprise Architectures in E-Governments Studies: Why, What and How? -- Abstract -- 1 Introduction -- 2 Methods -- 3 Literature Synthesis -- 3.1 Why (Motivations) -- 3.2 What (Contributions) -- 3.3 How (Methods) -- 4 Discussion -- 5 Related Work -- 6 Conclusions -- Acknowledgement -- References -- An e-Government Implementation Framework: A Developing Country Case Study -- Abstract -- 1 Introduction -- 2 Background -- 2.1 e-Government and ICT Implementation in Developing Countries -- 2.2 Diffusion of Innovation (DOI) Theory -- 2.3 e-Government Critical Success Factors -- 3 Research Approach -- 4 Case Study Data Analysis and Findings -- 5 Conclusion -- References -- Institutional Effects on National Health Insurance Digital Platform Development and Use: The Case of Ghana -- Abstract -- 1 Introduction -- 2 Digital Platform and Health Care -- 3 Theoretical Foundation: Institutional Theory -- 4 Research Setting and Methodology -- 4.1 Methodology -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Case Description -- 5.1 Pre-digital Platform -- 5.2 Digital Platform Development (Mobile Renewals and Digital Authentication) -- 5.3 Post-digital Platform Development -- 6 Analysis and Discussion -- 6.1 Institutional Enablers -- 6.2 Institutional Constraints -- 7 Conclusion -- References -- Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research -- Abstract -- 1 Introduction -- 2 Background -- 3 Research Methodology -- 3.1 Problem Formulation -- 3.2 Building, Intervention and Evaluation -- 3.3 Formalization of Learning -- 4 Expected Results, Conclusion and Further Research -- References -- A Systematic Review of Implementation Challenges in Public E-Procurement -- Abstract -- 1 Introduction -- 2 Conceptual Background 3 Research Methodology -- 3.1 Research Approach -- 3.2 Data Collection -- 3.3 Analysis -- 4 Findings and Discussion -- 4.1 Technological Challenges -- 4.2 Organizational Challenges -- 4.3 Environmental Challenges -- 5 Conclusion -- References -- eHealth -- Barriers for User Acceptance of Mobile Health Applications for Diabetic Patients: Applying the UTAUT Model -- Abstract -- 1 Introduction -- 2 Challenges for User Acceptance -- 2.1 Effort Expectancy -- 2.2 Performance Expectancy -- 2.3 Social Influence -- 2.4 Facilitating Conditions -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Ethical Considerations -- 4 Results -- 4.1 Demographics -- 4.2 Themes Identified from the UTAUT Model -- 4.2.1 Performance Expectancy -- 4.2.2 Effort Expectancy -- 4.2.3 Social Influence -- 4.2.4 Facilitating Conditions -- 5 Implications for the Design of M-Health Interventions -- 6 Conclusion -- References -- Impact of Socio-Demographic Factors on the Acceptance of Information Communication and Technology (ICT) for Diabetes Self-care -- Abstract -- 1 Introduction -- 2 Objectives -- 3 Methodology -- 4 Research Model -- 5 Results -- 6 Discussion -- 6.1 Significant Factors -- 6.2 Non-significant Factors -- 7 Conclusion -- References -- Categorization of Factors Influencing Community Health Workers from a Socio-Technical Systems Perspective -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Methodological Approach -- 2.2 The Case for STS as a Priori Framework -- 2.3 Search Strategy and Inclusion Criteria -- 3 Descriptive Statistics Findings -- 4 Discussion: Synthesis and Categorization of Factors -- 4.1 Social Aspect -- 4.2 Technical Aspect -- 4.3 Integrating Factors into Concepts -- 5 Conclusion -- References -- A Systematic Literature Review of the Factors that Influence the Accuracy of Consumer Wearable Health Device Data -- Abstract 1 Introduction and Background -- 2 Systematic Literature Review Process -- 3 Results -- 3.1 The Tracker and Sensor Types -- 3.2 The Algorithm Used in Consumer Wearable Health Devices -- 3.3 Limitations in the Design, Energy Consumption, and Processing Capabilities -- 4 Conclusion -- References -- Gamification in Healthcare: Motivating South Africans to Exercise -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 What Is Gamification? -- 2.2 The Octalysis Framework -- 2.3 Examples of Gamification in E-Health -- 3 Research Question and Objectives -- 4 Research Methodology -- 4.1 Research Strategy and Data Collection -- 4.2 Data Analysis -- 5 Results -- 5.1 Multiply Active Dayz™ Results -- 5.2 Questionnaire Results -- 6 Discussion and Conclusions -- References -- A Twitter Social Network Analysis: The South African Health Insurance Bill Case -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Methodological Framework -- 3.2 The Case: Announcement of the South African NHI Bill in Parliament -- 3.3 NodeXL Pro for SNA -- 3.4 Data Collection and Analysis -- 4 Results and Discussion -- 4.1 Prevalence and Patterns of #NHI Twitter Users -- 4.2 Influence and Network Analysis Results -- 4.3 Analytics and Visualisation -- 5 Conclusions -- Security -- Cyber-Harassment Victimization Among South African LGBTQIA+ Youth -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber-Harassment -- 2.2 Context: The LGBTQIA+ Community in South Africa -- 2.3 Theoretical Framework -- 3 Research Methodology -- 4 Research Findings and Discussion -- 4.1 Demographics -- 4.2 Research Question 1: "What Is the Current Nature and Level of Cyber-Harassment?" -- 4.3 Research Question 2: "Which Aspects of Online Platforms Enable Cyber-Harassment?" 4.4 Research Question 3: "Which Aspects of Online Platforms Are Considered as Coping Mechanisms Against Harassment?" -- 4.5 Inferential Statistics: Harassment Effects by Harassment Type and Attribute -- 5 Conclusion -- 6 Limitations and Further Research -- References -- Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern -- Abstract -- 1 Introduction -- 2 Related Works on Online Identity Theft -- 2.1 Conceptual Model Development and Research Hypotheses -- 2.1.1 The Relationship Between Fear of Financial Loss, Online Security and Privacy Concern, and Online Customer Purchase Intention -- 2.1.2 The Relationship Between Fear of Reputational Damage, Online Security and Privacy Concern, and Online Purchase Intention -- 3 Methodology -- 3.1 Constructs Measurement -- 4 Results -- 4.1 Model Fit Tests -- 4.2 Test of Structural Model: A Mediation Analysis -- 5 Discussions -- 5.1 Limitations and Future Research -- 5.2 Concluding Observations -- Acknowledgment -- References -- On the Ethics of Using Publicly-Available Data -- Abstract -- 1 Introduction -- 1.1 Characteristics of Publicly Available Data -- 1.2 Potential Ethical Issues with Publicly-Available Data -- 2 Ethics -- 3 Privacy and Protecting Privacy -- 4 Invasion of Privacy -- 4.1 Covert Surveillance -- 4.2 Trans-Jurisdiction Surveillance -- 4.3 Overt Surveillance -- 4.4 Overloaded Surveillance -- 4.5 Becoming Accustomed to the Surveillance Society -- 4.6 Mutual Surveillance -- 4.7 Making Data Already in the Public Domain More Visible -- 4.8 Combining and Processing Available Data -- 4.9 Opting in vs Opting Out -- 4.10 Assuming One Has Nothing to Hide -- 4.11 Legal Complexities -- 5 Conclusions and Discussion -- References -- Social Media -- Introducing the Media Use Behaviour Conceptual Framework -- 1 Introduction 2 A Conceptual Framework for Understanding Media Use Behaviour -- 3 An Affordances Perspective -- 4 User Factors -- 4.1 Cognitive Factors -- 4.2 Personal Characteristics -- 5 Situational Factors -- 5.1 Artefacts -- 6 Behavioural Outcomes -- 7 Discussion and Conclusions -- References -- The Town Square in Your Pocket: Exploring Four Metaphors of Social Media -- 1 Introduction -- 2 Defining Metaphor -- 3 Metaphors -- 3.1 Social Media as a Town Square -- 3.2 Social Media as a Beauty Pageant -- 3.3 Social Media as a Parliament -- 3.4 Social Media as a Masquerade Ball -- 4 Discussion -- References -- How Can Critical Thinking Be Used to Assess the Credibility of Online Information? -- Abstract -- 1 Introduction -- 2 Existing Research on Assessing the Credibility of Online Information -- 2.1 A Checklist for Information Credibility Assessment -- 2.2 Descriptive Models and Theories Related to Information Credibility Assessment -- 2.3 A Synthesised Summary of Existing Work on the Credibility Assessment Process -- 3 Critical Thinking -- 3.1 The Use of Critical Thinking in the Context of Existing Credibility Assessment Models -- 4 Discussion: Potential Challenges to Using Critical Thinking to Assess the Credibility of Online Information -- 4.1 Addressing the Challenges -- 5 Conclusion -- References -- An Analysis of Problematic Media Use and Technology Use Addiction Scales - What Are They Actually Assessing? -- 1 Introduction -- 1.1 The Present Study -- 2 Methodology -- 2.1 Inclusion Criteria -- 2.2 Search Strategy -- 2.3 Data Extraction, Management, and Analysis Procedures -- 3 Analysis and Results -- 3.1 Search Results -- 3.2 Mapping of Scale Items to Dimensions -- 3.3 The Dimensional Structure of the Scales -- 4 Discussion -- 5 Conclusion -- References -- A Systematic Review on Fake News Themes Reported in Literature -- Abstract -- 1 Introduction 2 Literature Background Online social networks Electronic Commerce (DE-588)4592128-3 gnd Anwendungssoftware (DE-588)4120906-0 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
subject_GND | (DE-588)4592128-3 (DE-588)4120906-0 (DE-588)4033447-8 (DE-588)1071861417 |
title | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_auth | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_exact_search | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_exact_search_txtP | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_full | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_fullStr | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_full_unstemmed | Responsible Design, Implementation and Use of Information and Communication Technology 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
title_short | Responsible Design, Implementation and Use of Information and Communication Technology |
title_sort | responsible design implementation and use of information and communication technology 19th ifip wg 6 11 conference on e business e services and e society i3e 2020 skukuza south africa april 6 8 2020 proceedings part ii |
title_sub | 19th IFIP WG 6. 11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part II. |
topic | Online social networks Electronic Commerce (DE-588)4592128-3 gnd Anwendungssoftware (DE-588)4120906-0 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
topic_facet | Online social networks Electronic Commerce Anwendungssoftware Künstliche Intelligenz Konferenzschrift 2020 Skukuza |
work_keys_str_mv | AT hattinghmarie responsibledesignimplementationanduseofinformationandcommunicationtechnology19thifipwg611conferenceonebusinesseservicesandesocietyi3e2020skukuzasouthafricaapril682020proceedingspartii AT mattheemachdel responsibledesignimplementationanduseofinformationandcommunicationtechnology19thifipwg611conferenceonebusinesseservicesandesocietyi3e2020skukuzasouthafricaapril682020proceedingspartii AT smutshanlie responsibledesignimplementationanduseofinformationandcommunicationtechnology19thifipwg611conferenceonebusinesseservicesandesocietyi3e2020skukuzasouthafricaapril682020proceedingspartii AT pappasilias responsibledesignimplementationanduseofinformationandcommunicationtechnology19thifipwg611conferenceonebusinesseservicesandesocietyi3e2020skukuzasouthafricaapril682020proceedingspartii AT dwivediyogeshk responsibledesignimplementationanduseofinformationandcommunicationtechnology19thifipwg611conferenceonebusinesseservicesandesocietyi3e2020skukuzasouthafricaapril682020proceedingspartii AT mantymakimatti responsibledesignimplementationanduseofinformationandcommunicationtechnology19thifipwg611conferenceonebusinesseservicesandesocietyi3e2020skukuzasouthafricaapril682020proceedingspartii |