Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This study focuses on collaboration among team members in educational escape rooms in higher education. The objective of this study was to understand how collective mindfulness and less mindful behavior unfold in physical and digital... more
This study focuses on collaboration among team members in educational escape rooms in higher education. The objective of this study was to understand how collective mindfulness and less mindful behavior unfold in physical and digital game-based learning. The video data were collected from three different courses comprising 107 students on 28 teams, totaling more than 16 hours of material. The qualitative analysis revealed both collectively mindful and less mindful behaviors in team interactions. This paper contributes to collective mindfulness literature in understanding team collaboration by observing that mindfulness may be relative depending on the observation perspective. It also presents factors that affect member equality in both digital and physical escape rooms. Lastly, a nuanced description of how team collaboration occurred in a short-term problem-solving situation is developed.
... and individuals associated with the conference under the guidance of the conference chair,Professor Reima Suomi from ... UK Mieczyslaw Muraszkiewicz, Warsaw University of Technology, Poland Harri Oinas-Kukkonen, University ofOulu,... more
... and individuals associated with the conference under the guidance of the conference chair,Professor Reima Suomi from ... UK Mieczyslaw Muraszkiewicz, Warsaw University of Technology, Poland Harri Oinas-Kukkonen, University ofOulu, Finland Aris M. Ouksel, University of ...
Business continuity (BC) management is an organizational approach to preparing information systems (IS) for incidents, but such approaches are uncommon among small and medium-sized enterprises (SMEs). Past research has indicated a gap in... more
Business continuity (BC) management is an organizational approach to preparing information systems (IS) for incidents, but such approaches are uncommon among small and medium-sized enterprises (SMEs). Past research has indicated a gap in approaches that are designed for SMEs since BC management approaches tend to originate from larger organizations and SMEs lack the resources to implement them. To fill this gap, and to respond to a practical need by an IT consultancy company, we employed design science research (DSR) to develop a BC approach for SMEs coined as the thrifty BC management approach. Jointly with the company’s practitioners, we developed a set of meta-requirements for BC approaches for SMEs anchored in prior BC literature, practitioners’ practical expertise, and the theories of collective mindfulness and sociotechnical systems. We evaluated our thrifty BC management approach with multiple SMEs. These evaluations suggest that the designed approach mostly meets the defined...
Game-based learning and educational escape rooms are increasingly used in teaching and learning since they improve student motivation, engagement and learning. However, prior literature has not studied team collaboration in gamified... more
Game-based learning and educational escape rooms are increasingly used in teaching and learning since they improve student motivation, engagement and learning. However, prior literature has not studied team collaboration in gamified contexts sufficiently according to recent literature reviews. This study focuses on collaboration among team members in educational escape rooms in higher education. The objective of this study was to understand how collective mindfulness and mindlessness occur in physical and digital game-based learning. The video data was collected from three different courses, with 25 student teams, 96 participants and contains more than 15 hours of material. The analysis revealed both mindful and mindless behaviors in team interaction. Paper contributes to gamification literature by presenting the first study using collective mindfulness and mindlessness theory in understanding team collaboration noticing factors affecting member equality in both digital and physical...
PurposeThis paper aims to understand how managers of IT and information security aim to enhance information security and business continuity management in interorganizational IT relationships, such as outsourcing, cloud computing and... more
PurposeThis paper aims to understand how managers of IT and information security aim to enhance information security and business continuity management in interorganizational IT relationships, such as outsourcing, cloud computing and interorganizational systems.Design/methodology/approachAn explorative study of large multinational or local organizations operating in Finland was conducted. In total, 18 IT and information security managers were interviewed with semi‐structured questions.FindingsFirst, the author discovered that several methods such as contracts, audits and standards were applied to balance power relationships between organizations or transfer responsibilities to other parties. The objectives of these methods are different within organizations. Second, the paper presents a comprehensive view of different security and continuity solutions in interorganizational IT relationships. The findings have practical value for IT managers and information security experts.Research ...
ABSTRACT Business customers and regulations as well as different IT service management frameworks expect that IT services are continuously operating. A service interruption might have severe impact on customer relationships, business,... more
ABSTRACT Business customers and regulations as well as different IT service management frameworks expect that IT services are continuously operating. A service interruption might have severe impact on customer relationships, business, sales or image of the company. Therefore, organisations spend enormous amounts of time in continuity and recovery planning for IT services, and several continuity planning methodologies have been introduced. However, the connection between continuity planning and continuity management is somewhat unclear, and embedding the continuity practices into organisations have not been discussed in detail in planning methodologies. This paper will focus on how IT service continuity planning embeds continuity by reviewing continuity planning methods. The continuity planning practices that influence achieving embedded ness are analysed from qualitative and quantitative data from large organisations operating in Finland. The findings suggest that a number of planning practices support the transition from planning to embedded ness, such as creating awareness, increasing commitment, integrating the continuity practices into organisational processes and learning from incidents.
This paper discusses the direct and indirect effects of online shopping experience on selecting and the intention to select the Internet as the purchasing channel. The theoretical approach is based on the technology acceptance model and... more
This paper discusses the direct and indirect effects of online shopping experience on selecting and the intention to select the Internet as the purchasing channel. The theoretical approach is based on the technology acceptance model and media appropriateness theory. The data was collected with a Web survey from 2479 visitors at the web site of a passenger cruise company. Prior online shopping experience was found to have a very significant effect on the purchasing channel choice both directly as well as indirectly, and even more on the intention to select the Internet as the purchasing channel. In addition, the perceived ease-ofuse and usefulness as well as the perceived appropriateness of the Internet as a purchasing channel were found to have an important impact on the choice. Preferring conversation with customer service personnel had the most influential effect on intention and behaviour, which can be explained by satisfaction with traditional channels as well as distrust of one...
Internet is just one additional medium to make travel reservation alongside traditional telephone and personal visit to travel agency. This paper examines Internet reservation systems' competitiveness compared to traditional... more
Internet is just one additional medium to make travel reservation alongside traditional telephone and personal visit to travel agency. This paper examines Internet reservation systems' competitiveness compared to traditional reservation media, in media richness theory's perspective. In total 92 Web sites of European passenger cruise companies were browsed through to find best practices in Internet reservation systems. Results indicate that few companies have invested in state-of-the-art interactive online reservation systems, although according to media richness theory Internet would be the most effective medium for the customer to make the travel reservation. Keywords: cruise reservation system, Internet, media richness 1. Introduction Making a travel reservation can be a very complicated task. There are several components to be reserved, for outward and return journeys, or even for different legs. If we consider cruise reservation, a mutual understanding between the cust...
This paper is available online at www.jtaer.com DOI: 10.4067/S0718-18762015000200002
Gaining revenues from e-commerce has proven to be far trickier that could have been expected from the hype in the late 1990's. The majority of online customers are still information seekers, who make their purchases offline. The... more
Gaining revenues from e-commerce has proven to be far trickier that could have been expected from the hype in the late 1990's. The majority of online customers are still information seekers, who make their purchases offline. The tourism industry has achieved a competitive advantage over other sectors, since it has been able to transfer more customers online. Therefore, we should examine and learn from the companies in travel business. This paper reports the findings from a study exploring motives behind booking channel choice. For testing eight hypotheses based on media choice theories, a questionnaire was designed and implemented in a Web survey for customers visiting the Web site of a passenger cruise company. The primary reasons for not using the Internet for travel reservations were: perceiving the booking so complex that discussion with customer service was required, having many special arrangements included in the booking, and distrust in finding the cheapest alternative ...
Mobile system implementation in a technology laggard organisation with resistant users might not sound like a good idea. Prior literature on user resistance has concentrated on failures, reasons behind the resistance and management... more
Mobile system implementation in a technology laggard organisation with resistant users might not sound like a good idea. Prior literature on user resistance has concentrated on failures, reasons behind the resistance and management strategies for decreasing resistance. This paper provides a view on successful system implementation, and most notably describes in detail how the different strategies affected the resistance during the process.
... In: Proceedings of the 16th Bled eCommerce Conference, ed. by Rolf T. Wigand - Yao-Hua Tan - Jože Gricar - Andreja Pucihar - Tjasa Lunar. Bled, Slovenia, June 9-11 2003. …………109 2. Järveläinen, Jonna (2003) The Impact of Prior Online... more
... In: Proceedings of the 16th Bled eCommerce Conference, ed. by Rolf T. Wigand - Yao-Hua Tan - Jože Gricar - Andreja Pucihar - Tjasa Lunar. Bled, Slovenia, June 9-11 2003. …………109 2. Järveläinen, Jonna (2003) The Impact of Prior Online Shopping ...
In prior literature, information security policies are often accused to be too general and irrelevant to employees, who do not therefore follow the policies. It has been proposed that an organization-specific customized information... more
In prior literature, information security policies are often accused to be too general and irrelevant to employees, who do not therefore follow the policies. It has been proposed that an organization-specific customized information security policy might be followed better. Closely related business continuity plans are system-specific and created in close cooperation with business units and therefore continuity issues are embedded in organizations. However, they are usually targeted only for people responsible for continuity, not all employees. In this paper, we propose an integrated business continuity planning and information security policy development approach based on prior literature for creating customized security policies and continuity plans for critical processes in organizations. The integrated approach emphasizes the phases increasing awareness from both development methods such as training, top management setting the scope and a multi-functional development team.
This paper discusses the direct and indirect effects of online shopping experience on selecting and the intention to select the Internet as the purchasing channel. The theoretical approach is based on the technology acceptance model and... more
This paper discusses the direct and indirect effects of online shopping experience on selecting and the intention to select the Internet as the purchasing channel. The theoretical approach is based on the technology acceptance model and media appropriateness theory. The data was collected with a Web survey from 2479 visitors at the web site of a passenger cruise company. Prior online shopping experience was found to have a very significant effect on the purchasing channel choice both directly as well as indirectly, and even more on the intention to select the Internet as the purchasing channel. In addition, the perceived ease-ofuse and usefulness as well as the perceived appropriateness of the Internet as a purchasing channel were found to have an important impact on the choice. Preferring conversation with customer service personnel had the most influential effect on intention and behaviour, which can be explained by satisfaction with traditional channels as well as distrust of one...
Tässä tutkimuksessa selvitettiin suomalaisten suuryritysten tietohallinnon jatku-vuudenhallintaa (engl. business continuity management, jatkossa myös BCM). Suuryrityksillä tarkoitetaan yli 250 henkilöä työllistäviä yksityisen sektorin... more
Tässä tutkimuksessa selvitettiin suomalaisten suuryritysten tietohallinnon jatku-vuudenhallintaa (engl. business continuity management, jatkossa myös BCM). Suuryrityksillä tarkoitetaan yli 250 henkilöä työllistäviä yksityisen sektorin orga-nisaatioita, ja tutkimuksen puitteissa tehtiin ...
Abstract Company business models are vulnerable to various contingencies in the business environment that may unexpectedly render their business logic ineffective. In particular, technological advancements, such as the Internet of things,... more
Abstract Company business models are vulnerable to various contingencies in the business environment that may unexpectedly render their business logic ineffective. In particular, technological advancements, such as the Internet of things, big data, sharing economy and crowdsourcing, have enabled new forms of business models that can effectively and abruptly make traditional business models obsolete. By disrupting or even diminishing companies’ revenue streams, environmental contingencies may present a significant threat to business continuity (BC). Evaluating the resilience of business models against these contingencies should therefore be a core area of BC. However, existing BC approaches tend to focus on the continuity of the resources and processes through which a particular business model is accomplished in practice but omit the business model itself. We argue that in order for BC approaches to become holistic and strategic, business models need to become a part of the BC considerations, entailing an expansion of the scope of BC from value preservation to value creation. We propose an approach of Strategic Business Continuity Management, which consists of two parts: (1) sustaining the continuity of the company business model (value preservation) and (2) evaluating and modifying the business model (value creation). We illustrate conceptually the value creation part with an example drawn from the sharing economy.
Online recommendations and user reviews have become an important channel for promotion of consumer services and products. Electronic word-of-mouth (eWOM) enables one-to-many communication, the relevance of eWOM has increased... more
Online recommendations and user reviews have become an important channel for promotion of consumer services and products. Electronic word-of-mouth (eWOM) enables one-to-many communication, the relevance of eWOM has increased exponentially. It occurs through discussion forums, blogs, online opinion sites, online communities, online product reviews and comments written by consumers on web pages. According to our view, ratings and review systems differ in terms of how they are controlled by the firms which consequently also impacts the features and effects of realized eWOM. Therefore the purpose of this paper is to investigate the diversity of eWOM, to identify and analyse divergent occurrences of eWOM in-depth, to sort types/mechanisms and develop an integrative typology for divergent mechanisms of eWOM. The empirical part of the study comprises analysis of different known e-commerce websites (e.g. Ebay, Booking.com). The main results of this research are firstly the analysis schema b...
Unfamiliar vendors as well as insecure transactions and personal information have been presented to be the most important reasons why consumers do not choose to buy products from the Internet. However, with reliable companies operating... more
Unfamiliar vendors as well as insecure transactions and personal information have been presented to be the most important reasons why consumers do not choose to buy products from the Internet. However, with reliable companies operating online and offline, secure transactions in addition to guaranteed information privacy, other barriers exist. Approximately 2500 customers of a passenger cruise company answered a Web survey, which was used to test hypotheses based on media richness theory, revealed that one major barrier could also be lack of trust in customer's own online skills.
Online advertising is a high and a constantly growing business with an elaborate complexity. An important position is occupied by intermediaries, such as ad networks, marketing agencies and companies specialized in delivering software for... more
Online advertising is a high and a constantly growing business with an elaborate complexity. An important position is occupied by intermediaries, such as ad networks, marketing agencies and companies specialized in delivering software for managing and displaying advertising campaigns. Efficient use of advertising budgets and maximizing profits from ad impressions are the common goal of all players. This goal is usually achieved by manual management of advertising campaigns. Such management requires a very good prediction of Web users’ behavior and web site traffic. We have tested the performance of an ad emission simulator for various campaigns and different types of constraints (e.g. capping or targeting). Real data from completed campaigns has been used for the experiment. It has been shown that predicting performance of advertising campaigns that have constraints is considerably more difficult than predicting simple campaigns. Our result applies even if we use a Web traffic sample from the current period (idealized Web traffic prediction) and a simulator that practically emulates ad server operation (the most realistic prediction approach).
Batini, C., Cabitza, FA, Cammarota, G., Ciriaci, D., Corsi, M., Maurino, A., et al. (2006). Project E-Society: Building Bricks. In R. Suomi, R. Cabral, JF Hampe, A. Heikkilä, J. Järveläinen, & E. Koskivaara (a cura di), IFIP International... more
Batini, C., Cabitza, FA, Cammarota, G., Ciriaci, D., Corsi, M., Maurino, A., et al. (2006). Project E-Society: Building Bricks. In R. Suomi, R. Cabral, JF Hampe, A. Heikkilä, J. Järveläinen, & E. Koskivaara (a cura di), IFIP International Federation for Information Processing (pp. 140-152). Springer. ... There are no files associated with this item. ... Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
In prior literature, information security policies are often accused to be too general and irrelevant to employees, who do not therefore follow the policies. It has been proposed that an organization-specific customized information... more
In prior literature, information security policies are often accused to be too general and irrelevant to employees, who do not therefore follow the policies. It has been proposed that an organization-specific customized information security policy might be followed better. Closely related business continuity plans are system-specific and created in close cooperation with business units and therefore continuity issues are embedded in organizations. However, they are usually targeted only for people responsible for continuity, not all employees. In this paper, we propose an integrated business continuity planning and information security policy development approach based on prior literature for creating customized security policies and continuity plans for critical processes in organizations. The integrated approach emphasizes the phases increasing awareness from both development methods such as training, top management setting the scope and a multi-functional development team.
Research Interests:
Abstract Business and academic research frequently highlights the power of electronic word of mouth, relying on the knowledge that online customer ratings and reviews influence consumer decision making. Numerous studies in different... more
Abstract
Business and academic research frequently highlights the power of electronic word of mouth, relying on the knowledge that online customer ratings and reviews influence consumer decision making. Numerous studies in different disciplines have been conducted to examine the effectiveness of electronic word of mouth communication. Previously, typically small sample studies suggest that positive electronic word of mouth increases sales and that the effects depend on the volume and valence of reviews and ratings. This study’s contribution lies in testing the relationship between electronic word of mouth and the sales of applications in a mobile application ecosystem (Google Play) with an extensive dataset (over 260 million customer ratings; 18 months). The results show that higher values of valence of customer ratings correlate statistically significantly with higher sales. The volume of ratings correlates positively with sales in the long term but negatively in the short term. Furthermore, the relationship between electronic word of mouth and sales seems to be more important when the price of the application increases. The findings also underline the importance of the choice of a measurement period in studies.
Business customers and regulations as well as different IT service management frameworks expect that IT services are continuously operating. A service interruption might have severe impact on customer relationships, business, sales or... more
Business customers and regulations as well as different IT service management frameworks expect that IT services are continuously operating. A service interruption might have severe impact on customer relationships, business, sales or image of the company. Therefore, organisations spend enormous amounts of time in continuity and recovery planning for IT services, and several continuity planning methodologies have been introduced. However, the connection between continuity planning and continuity management is somewhat unclear, and embedding the continuity practices into organisations have not been discussed in detail in planning methodologies. This paper will focus on how IT service continuity planning embeds continuity by reviewing continuity planning methods. The continuity planning practices that influence achieving embeddedness are analysed from qualitative and quantitative data from large organisations operating in Finland. The findings suggest that a number of planning practices support the transition from planning to embeddedness, such as creating awareness, increasing commitment, integrating the continuity practices into organisational processes and learning from incidents.
Information technology (IT) incidents that make data inaccessible may cause businesses to lose customers, reputation and market position. Previous studies on information management have identified data availability as a key priority, and... more
Information technology (IT) incidents that make data inaccessible may cause businesses to lose customers, reputation and market position. Previous studies on information management have identified data availability as a key priority, and the literature on disaster recovery and business continuity describes ways of preparing for and avoiding IT incidents. However, no frameworks for information system continuity management (ISCM) have yet been validated. This research draws on a framework for business continuity management, and extends it to the context of information systems. The framework is validated in a survey of IT managers and chief information officers in large private and public organisations operating in Finland. The results suggest that the embeddedness of continuity practices in an organisation has perceived business impacts whereas, in contradiction of previous theory, there is no such direct relation in the case of organisational alertness and preparedness. The theoretical contribution is to validate the ISCM framework statistically. On the practical level, social factors such as committed managers and employees are influential in decreasing negative business impacts. Further research on the embeddedness of continuity practices is called for.
Research Interests:
Mobile system implementation in a technology laggard organisation with resistant users might not sound like a good idea. Prior literature on user resistance has concentrated on failures, reasons behind the resistance and management... more
Mobile system implementation in a technology laggard organisation with resistant users might not sound like a good idea. Prior literature on user resistance has concentrated on failures, reasons behind the resistance and management strategies for decreasing resistance. This paper provides a view on successful system implementation, and most notably describes in detail how the different strategies affected the resistance during the process.
User friendliness should be the aim of every web site design, but consumers with different levels of online shopping experience perceive different features as user friendly. Prior research has shown that the purchasing channel selection... more
User friendliness should be the aim of every web site design, but consumers with different levels of online shopping experience perceive different features as user friendly. Prior research has shown that the purchasing channel selection of consumers is influenced by many variables, for example Internet self-efficacy and prior online shopping experience. This study reports results of a web site evaluation, in which support features for customers with varying levels of experience and Internet self-efficacy were sought from top 9 European multi-category travel sites. Although the studied sites seemed to be quite similar, there were differences especially in features supporting inexperienced customers.
User friendliness should be the aim of every web site design, but consumers with different levels of online shopping experience perceive different features as user friendly. Prior research has shown that the purchasing channel selection... more
User friendliness should be the aim of every web site design, but consumers with different levels of online shopping experience perceive different features as user friendly. Prior research has shown that the purchasing channel selection of consumers is influenced by many variables, for example Internet self-efficacy and prior online shopping experience. This study reports results of a web site evaluation, in which support features for customers with varying levels of experience and Internet self-efficacy were sought from top 9 European multi-category travel sites. Although the studied sites seemed to be quite similar, there were differences especially in features supporting inexperienced customers.
In many cases, e-government is considered a name for transforming informative public services into electronic mode, although the focus of e-government should be on creating value for citizens as well as public organizations. In this... more
In many cases, e-government is considered a name for transforming informative public services into electronic mode, although the focus of e-government should be on creating value for citizens as well as public organizations. In this article we apply Amit and Zott’s (2001) e-business value creation methods to an egovernment environment, namely early childhood education in Finland. The objective of the collaborative action research study was to find out what kind of business models in e-government would create value for citizens. The methodological result based on the collaborative nature of the study is a method for analyzing and generating business models. Amit & Zott’s framework also seems to be applicable to the e-government environment, and we were able to draw many viable business models for early childhood education, which forms the practical contribution of the study.
Previous research has proposed that one of the most important reasons for not using an online channel for purchasing is the lack of trust: unfamiliar vendors as well as insecurity of transactions and personal information. However,... more
Previous research has proposed that one of the most important reasons for not using an online channel for purchasing is the lack of trust: unfamiliar vendors as well as insecurity of transactions and personal information. However, customers are learning to avoid risks in the Internet and secure online purchasing environments are already available. As companies are more and more using the Internet to change their distribution strategies and reduce costs, it is important to understand what makes some customers reluctant to handle their transactions online. In this study, we aim to explain the motivations of consumers who seek information online and make the transaction offline with a familiar and reliable company operating both online and offline, using secure transactions as well as guaranteeing information privacy. Approximately 2,500 customers of a passenger cruise company answered a Web survey, which was used to test hypotheses based on media appropriateness theory and related literature. The results suggest that one major cause for preferring offline channels could be lack of trust in customers' own online skills.
Security and privacy issues have drawn much attention in the electronic commerce research area, and e-vendors have adjusted their online shopping systems to convince customers that vendors and systems are trustworthy. Therefore, this... more
Security and privacy issues have drawn much attention in the electronic commerce research area, and e-vendors have adjusted their online shopping systems to convince customers that vendors and systems are trustworthy. Therefore, this study concentrates on how consumers choose their purchasing channel when the environment is relatively secure. Is the choice based on preferring conversation with customer service, complexity of product, prior online shopping experience, social influence or perception of system usefulness or ease-of-use? The technology acceptance model, media richness theory and social influence model were combined in a research model tested with a Web survey. Based on the responses of 1,501 customers of a passenger cruise company, prior experience of traditional and online channels and perceived usefulness had a substantial effect on behavioral intention to use the online channel in the future.