Published: Apr 1, 2020
Converted to Gold OA:
DOI: 10.4018/IJESMA.20200401.pre
Volume 12
Adamantia G. Pateli, Panos Kourouthanassis, João Vieira da Cunha, Panos Markopoulos
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Pateli, Adamantia G., et al. "Special Issue on Digital and Social Transformation for a Better Society and Economic Growth in the Mediterranean Region." IJESMA vol.12, no.2 2020: pp.5-8. http://doi.org/10.4018/IJESMA.20200401.pre
APA
Pateli, A. G., Kourouthanassis, P., Vieira da Cunha, J., & Markopoulos, P. (2020). Special Issue on Digital and Social Transformation for a Better Society and Economic Growth in the Mediterranean Region. International Journal of E-Services and Mobile Applications (IJESMA), 12(2), 5-8. http://doi.org/10.4018/IJESMA.20200401.pre
Chicago
Pateli, Adamantia G., et al. "Special Issue on Digital and Social Transformation for a Better Society and Economic Growth in the Mediterranean Region," International Journal of E-Services and Mobile Applications (IJESMA) 12, no.2: 5-8. http://doi.org/10.4018/IJESMA.20200401.pre
Export Reference
Published: Apr 1, 2020
Converted to Gold OA:
DOI: 10.4018/IJESMA.2020040101
Volume 12
Eli Hustad, Frode Mathias Bekkevik, Ole Reidar Holm, Polyxeni Vassilakopoulou
Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This article synthesizes insights from research on challenges related to employee...
Show More
Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This article synthesizes insights from research on challenges related to employee information security practices and measures to address them. The challenges identified are associated to idiosyncratic aspects of communities and individuals within organizations (culture and personal characteristics) and to systemic aspects of organizations (procedural and structural arrangements). The measures aimed to enhance systemic capabilities and to adapt security mechanisms to the idiosyncratic characteristics and are categorized as: (a) measures of training and awareness; (b) measures of organizational support; and (c) measures of rewards and penalties. Further research is needed to explore the dynamics related to how challenges emerge, develop, and get addressed over time and also, to explore the interplay between systemic and idiosyncratic aspects. Additionally, research is needed on the role of security managers and how it can be reconfigured to suit flatter organizations.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hustad, Eli, et al. "Employee Information Security Practices: A Framework and Research Agenda." IJESMA vol.12, no.2 2020: pp.1-14. http://doi.org/10.4018/IJESMA.2020040101
APA
Hustad, E., Bekkevik, F. M., Holm, O. R., & Vassilakopoulou, P. (2020). Employee Information Security Practices: A Framework and Research Agenda. International Journal of E-Services and Mobile Applications (IJESMA), 12(2), 1-14. http://doi.org/10.4018/IJESMA.2020040101
Chicago
Hustad, Eli, et al. "Employee Information Security Practices: A Framework and Research Agenda," International Journal of E-Services and Mobile Applications (IJESMA) 12, no.2: 1-14. http://doi.org/10.4018/IJESMA.2020040101
Export Reference
Published: Apr 1, 2020
Converted to Gold OA:
DOI: 10.4018/IJESMA.2020040102
Volume 12
Dimosthenis Kotsopoulos, Cleopatra Bardaki, Thanasis G. Papaioannou, Katerina Pramatari, George D. Stamoulis
Gamification is a contemporary powerful means of affecting human behavior. However, its effectiveness relies on both the users' profiles and non-game context characteristics. This article focused on...
Show More
Gamification is a contemporary powerful means of affecting human behavior. However, its effectiveness relies on both the users' profiles and non-game context characteristics. This article focused on designing gamified interventions guided by the users' profiles and the application context, towards increasing the potential for user engagement and behavior change. The authors apply a structured process while designing a serious game for energy conservation in three workplaces. First employee needs for self-actualisation, self-regulation, rewards and recognition, and affiliation are identified as the most prominent motivations to participate in gamification at work. Then their relationships with employee game element preferences and energy-saving behaviors are explored. Additionally, a mechanism producing personalized messages, which can be integrated with the gamified intervention, is proposed. Overall, this research can be useful to future researchers and practitioners that aspire to design successful user-oriented gamified interventions at work as well as different non-game contexts.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kotsopoulos, Dimosthenis, et al. "User-Centered Gamification: The Case of IoT-Enabled Energy Conservation at Work." IJESMA vol.12, no.2 2020: pp.15-39. http://doi.org/10.4018/IJESMA.2020040102
APA
Kotsopoulos, D., Bardaki, C., Papaioannou, T. G., Pramatari, K., & Stamoulis, G. D. (2020). User-Centered Gamification: The Case of IoT-Enabled Energy Conservation at Work. International Journal of E-Services and Mobile Applications (IJESMA), 12(2), 15-39. http://doi.org/10.4018/IJESMA.2020040102
Chicago
Kotsopoulos, Dimosthenis, et al. "User-Centered Gamification: The Case of IoT-Enabled Energy Conservation at Work," International Journal of E-Services and Mobile Applications (IJESMA) 12, no.2: 15-39. http://doi.org/10.4018/IJESMA.2020040102
Export Reference
Published: Apr 1, 2020
Converted to Gold OA:
DOI: 10.4018/IJESMA.2020040103
Volume 12
Ioannis Karydis, Andreas Kanavos, Spyros Sioutas, Markos Avlonitis, Nikos Karacapilidis
Metadata-based similarity measurement is far from obsolete nowadays, despite research's focus on content and context-based information. It allows for aggregating information from textual references...
Show More
Metadata-based similarity measurement is far from obsolete nowadays, despite research's focus on content and context-based information. It allows for aggregating information from textual references, measuring similarity when content is not available, traditional keyword searches in search engines, merging results in meta-search engines, etc. Existing similarity measures do not take into consideration neither the unique nature of multimedia metadata nor the requirements of metadata-based information retrieval of multimedia. This work presents a commonly available author-title multimedia metadata hybrid similarity measure customised that has been shown to be experimentally significantly more effective than baseline measures. In addition, the work presents an architecture and a web-based implementation of an information system for data collection and validation by expert users that allows distributed, binary and scalar result ground-truth definition for a similarity measurement that can be used in digital content's identification and sales.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Karydis, Ioannis, et al. "Multimedia Content's Brokerage: An Information System Based on LeSiM." IJESMA vol.12, no.2 2020: pp.40-58. http://doi.org/10.4018/IJESMA.2020040103
APA
Karydis, I., Kanavos, A., Sioutas, S., Avlonitis, M., & Karacapilidis, N. (2020). Multimedia Content's Brokerage: An Information System Based on LeSiM. International Journal of E-Services and Mobile Applications (IJESMA), 12(2), 40-58. http://doi.org/10.4018/IJESMA.2020040103
Chicago
Karydis, Ioannis, et al. "Multimedia Content's Brokerage: An Information System Based on LeSiM," International Journal of E-Services and Mobile Applications (IJESMA) 12, no.2: 40-58. http://doi.org/10.4018/IJESMA.2020040103
Export Reference
Published: Apr 1, 2020
Converted to Gold OA:
DOI: 10.4018/IJESMA.2020040104
Volume 12
Eeva Kettunen, Tiina Kemppainen, Matias Lievonen, Markus Makkonen, Lauri Frank, Tuomas Kari
The tremendous increase in online shopping has created a growing demand to understand online shopping behavior. This study contributes to this understanding by identifying ideal types among online...
Show More
The tremendous increase in online shopping has created a growing demand to understand online shopping behavior. This study contributes to this understanding by identifying ideal types among online shoppers. An ideal type is an analytical construct used to ascertain similarities and deviations to concrete cases in an individual phenomenon. Theoretically, the study draws from different perspectives to create a multifaceted view of online shoppers. The purpose is not to categorize online shoppers under a specific category but rather to help understand different typically occurring online shopping behaviors. Through thematic analysis of the data from 31 participants, this study presents five ideal types of online shoppers: conservative shoppers, rational shoppers, hedonistic shoppers, spontaneous shoppers, and vanguard shoppers. The formed ideal types serve as the main theoretical contribution of this study. From a practical standpoint, implications for online shop providers on how to accommodate the needs of each ideal type are provided.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kettunen, Eeva, et al. "Identifying the Ideal Types of Online Shoppers: A Qualitative Analysis of Online Shopping." IJESMA vol.12, no.2 2020: pp.59-78. http://doi.org/10.4018/IJESMA.2020040104
APA
Kettunen, E., Kemppainen, T., Lievonen, M., Makkonen, M., Frank, L., & Kari, T. (2020). Identifying the Ideal Types of Online Shoppers: A Qualitative Analysis of Online Shopping. International Journal of E-Services and Mobile Applications (IJESMA), 12(2), 59-78. http://doi.org/10.4018/IJESMA.2020040104
Chicago
Kettunen, Eeva, et al. "Identifying the Ideal Types of Online Shoppers: A Qualitative Analysis of Online Shopping," International Journal of E-Services and Mobile Applications (IJESMA) 12, no.2: 59-78. http://doi.org/10.4018/IJESMA.2020040104
Export Reference
Published: Apr 1, 2020
Converted to Gold OA:
DOI: 10.4018/IJESMA.2020040105
Volume 12
Zoi Lachana, Michalis Avgerinos Loutsaris, Charalampos Alexopoulos, Yannis Charalabidis
One of the most promising developments comes with the use of innovative technologies and thus with the availability of novel services. The combination of text mining with legal elements may...
Show More
One of the most promising developments comes with the use of innovative technologies and thus with the availability of novel services. The combination of text mining with legal elements may contribute to the development of many innovative legal IS. Moreover, in the case of public administrations and governments, the distribution, availability, and access towards legal information are essential and urgent. On the other hand, legal data and law texts are a potential open government data category in order for innovation to be achieved, regarding the development of new, better, and more cost-effective services for citizens. Those data need to be available 24/7 basis and compliant towards a standard. Yet, there exist some severe issues at the moment regarding this access. This, in turn, makes the use of automated crawling and analysis more than difficult. This paper describes the “Peri Nomou” system: an innovative legal information system for Greek laws utilising text mining techniques to indexing legal documents, identifying correlations and dividing legal documents into their articles.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Lachana, Zoi, et al. "Automated Analysis and Interrelation of Legal Elements Based on Text Mining." IJESMA vol.12, no.2 2020: pp.79-96. http://doi.org/10.4018/IJESMA.2020040105
APA
Lachana, Z., Loutsaris, M. A., Alexopoulos, C., & Charalabidis, Y. (2020). Automated Analysis and Interrelation of Legal Elements Based on Text Mining. International Journal of E-Services and Mobile Applications (IJESMA), 12(2), 79-96. http://doi.org/10.4018/IJESMA.2020040105
Chicago
Lachana, Zoi, et al. "Automated Analysis and Interrelation of Legal Elements Based on Text Mining," International Journal of E-Services and Mobile Applications (IJESMA) 12, no.2: 79-96. http://doi.org/10.4018/IJESMA.2020040105
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJESMA should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJESMA should be directed to the attention of:
Rajeev Dwivedi
Editor-in-Chief
International Journal of E-Services and Mobile Applications
Email:
rajeevdwivedi@gmail.com
Adilson Carlos Yoshikuni
Editor-in-Chief
International Journal of E-Services and Mobile Applications
Email:
adilson.yoshikuni@mackenzie.brAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100