Antecedents and consequences of excessive online social gaming: a social learning perspective

2019 ◽  
Vol 33 (2) ◽  
pp. 657-688 ◽  
Author(s):  
Xiang Gong ◽  
Kem Z.K. Zhang ◽  
Chongyang Chen ◽  
Christy M.K. Cheung ◽  
Matthew K.O. Lee

Purpose Drawing on the social learning theory, the purpose of this paper is to examine the antecedents and consequences of users’ excessive online social gaming. Specifically, the authors develop a model to propose that observational learning and reinforcement learning mechanisms together determine excessive online social gaming, which further foster adverse consequences. Design/methodology/approach The model is empirically validated by a longitudinal survey among users of a popular online social game: Arena of Valor. The empirical data are analyzed using component-based structural equation modeling approach. Findings The empirical results offer two key findings. First, excessive online social gaming is determined by observational learning factors, i.e. social frequency and social norm, and reinforcement learning factors, i.e. perceived enjoyment and perceived escapism. Second, excessive online social gaming leads to three categories of adverse consequences: technology-family conflict, technology-work conflict and technology-person conflict. Meanwhile, technology-family conflict and technology-work conflict further foster technology-person conflict. Originality/value This study contributes to the literature by developing a nomological framework of excessive online social gaming and by extending the social learning theory to excessive technology use.

Author(s):  
Zarihan Samsudin ◽  
Zainon Shamsudin ◽  
Mohd. Faisal Mohd Arif

Objective - This experimental study seeks to ascertain whether Bandura's (1977) Social Learning Theory can be used to teach academic writing. Interpreted in terms of an approach to the teaching of writing, the theory suggests that students can learn to write a particular text by observing closely the structural as well as the linguistic features of that text. Methodology/Technique - By observing how the text is written, students obtain an idea of how it is formed, and on later occasions they can use this information as a guide to produce similar texts. The sample of this study consists of 100 students from College University Poly-Tech MARA, Kuala Lumpur. The study adopts a pre/post-assessment of the students' writing performances for three types of academic essays. T-tests were used to compare the results of the 3 pre-tests with the results of the 3 post-tests which were administered to the participants after they underwent each of the 3 treatment sessions. Findings - The study reveals that the Social Learning Theory speaks the truth about the human natural learning process. Thus, this implies that this potent theory be used in designing varying approaches to teaching students the skills to write academic texts. Novelty - The study suggests that observational learning of sample texts provides students with guidance on how to improve their writing as it makes them aware of the different ways texts are organized for different communicative purposes, thereby promoting their confidence and positive attitude towards writing. Type of Paper - Empirical Keywords: Academic Writing; Social Learning Theory; Observational Learning; Analyzing; Emulating; Model Text.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Chuang Wang ◽  
Jun Zhang ◽  
Matthew K.O. Lee

PurposeWidespread concerns about excessive use of mobile instant messaging (MIM) have inspired research in different disciplines. However, the focus thus far tends to be on diagnostics and cognitive predictors. There is little understanding from the socio-technical perspective to capture the drivers of excessive use of MIM. To address this research gap, the authors aim to enrich existing literature by adopting a social structure and social learning model (SSSLM) to understand the excessive use of MIM. The authors argue that excessive MIM use is developed and reinforced in highly interactive online communication, through a social learning process.Design/methodology/approachThe authors conduct a cross-sectional online survey to validate our proposed research model on excessive use of mobile instant messaging (MIM). 368 valid responses are obtained from active MIM users in China.FindingsThe results suggest that highly interactive MIM creates a technology-based social structure that facilitates the social learning process of excessive technology use. The influence of perceived interactivity of MIM on excessive MIM use is mediated by a series of contextualized social learning factors. Furthermore, the influences of perceived interactivity on social learning factors are moderated by MIM use experience.Originality/valueThe authors contribute to literature in related fields by highlighting the crucial role of social learning in facilitating excessive technology use. The authors contribute to the social structure and social learning model by contextualizing it into the context of excessive MIM use. Design guidelines are provided with a purpose to inhibit excessive use of MIM.


1970 ◽  
pp. 387-397
Author(s):  
Konrad Kulikowski

The first part of this article introduces the work engagement concept in a framework of the Job Demands-Resources Theory and discusses a relation between work engagement and job crafting. Next, the author presents the hypothesis that university education can form engaged employees by enhancing students’ self-efficacy beliefs about their ability to effectively crafting their future job environments. On the basis of the Social Learning Theory the author proposed three possible methods on how the university community could promote job crafting behaviors among students. These methods are: trainings and persuasions, modeling, or observation of how university top researchers work, and allowing students to experience success in changing different aspects of the university environment.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Cong Doanh Duong ◽  
Thi Loan Le

Purpose This study aims to develop a conceptual framework that integrated insights from Shapero and Sokol (1982)’s model of entrepreneurial event, Bandura (1977)’s social learning theory and clinical psychology to empirically test and discover the underlying mechanism of how attention deficit hyperactive disorder (ADHD) symptoms can influence student entrepreneurial intention. Design/methodology/approach The study uses structural equation modeling with a sample of 2,218 students from 14 universities in Vietnam. Findings The research reveals that although ADHD symptoms are not found to have the direct role in shaping student perceived feasibility entrepreneurial intention, these psychiatric symptoms have more influences and significances in the growth of entrepreneurial self-efficacy and perceived desirability. Also, entrepreneurial self-efficacy and perceived desirability are found to be full mediators in ADHD symptoms and entrepreneurial intention linkage. Besides, both perceived desirability and perceived feasibility partially mediate the entrepreneurial self-efficacy effect on entrepreneurial intention. Practical implications The findings provide policymakers and universities with important insights into how to nurture intention to become entrepreneurs among college students, especially those individuals. Originality/value The present study offers a new insight about the linkage between ADHD symptoms and entrepreneurial intention. Also, the model of entrepreneurial event and the social learning theory are shown to be unifying theoretical construct of the relationship between psychiatric symptoms and entrepreneurial intention among Vietnamese students.


2019 ◽  
Vol 35 (2) ◽  
pp. 284-305 ◽  
Author(s):  
Riyad Eid ◽  
Ziad Abdelmoety ◽  
Gomaa Agag

Purpose The social media have enabled companies to reach out to global markets and provided them with the opportunity to customize their strategies and offerings in an unprecedented way. Given the scant empirical evaluation of social media use in the small- and medium-sized enterprises (SMEs) business-to-business (B-to-B) context, this paper aims to offer a comprehensive description of the antecedents and consequences of social media use in international B-to-B SMEs and the way in which this use affects their export performance. Design/methodology/approach This study uses a sample of 277 British B-to-B SMEs and uses positivist research with a quantitative approach, adopting a survey strategy through questionnaires and structural equation modeling. Findings The results reveal that the use of social media influences export performance through the quality of international business contacts – understanding customers’ views and preferences, brand awareness and knowledge of the competition in various international markets. This study contributes to the emerging literature on B-to-B SMEs digital marketing by determining the mechanism through which B-to-B SMEs may benefit from using the social media in their efforts to export. Originality/value Despite the promising potential of the social media, especially for export-oriented companies, very limited attention has hitherto been paid to the relationship between the use of social media and export performance. This study attempts to fill the gap by investigating the extent to which actual use of social media impacts on the performance of exporting firms.


2019 ◽  
Vol 27 (2) ◽  
pp. 165-188 ◽  
Author(s):  
Zauwiyah Ahmad ◽  
Thian Song Ong ◽  
Tze Hui Liew ◽  
Mariati Norhashim

Purpose The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring. Design/methodology/approach Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, information security policy, self-efficacy and perceived inconvenience, were identified as significant in determining employees’ security assurance behaviour (SAB). The influence of these constructs on SAB could be explained by social cognitive theory and is empirically supported by past studies. An online questionnaire survey as the main research instrument is adopted to elicit information on the six constructs tested in this study. Opinion from industry and academic expert panels on the relevance and face validity of the questionnaire were obtained prior to the survey administration. Findings Findings from this research indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. This study also demonstrates that employees tend to abandon security behaviour when the behaviour is perceived as inconvenient. Hence, organisations must find ways to reduce the perceived inconvenience using various security automation methods and specialised security training. Reducing perceived inconvenience is a challenge to information security practitioners. Research limitations/implications There are some limitations in the existing work that could be addressed in future studies. One of them is the possible social desirability bias due to the self-reported measure adopted in the study. Even though the authors have made every effort possible to collect representative responses via anonymous survey, it is still possible that the respondents may not reveal true behaviour as good conduct is generally desired. This may lead to a bias towards favourable behaviour. Practical implications In general, the present research provides a number of significant insights and valuable information related to security assurance behaviour among employees. The major findings could assist security experts and organisations to develop better strategies and policies for information security protection. Findings of this research also indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. Social implications In this research, the social cognitive learning theory is used to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour; the finding implies that monitoring emphases expected behaviours and helps to reinforce organisational norms. Monitoring may also accelerate learning when employees become strongly mindful of their behaviours. Hence, it is important for organisations to communicate the monitoring practices implemented, even more imperative whenever security monitoring employed is unobtrusive in nature. Nonetheless, care must be taken in this communication to avoid resentment and mistrust among employees. Originality/value This study is significant in a number of ways. First, this study highlights significant antecedents of security assurance behaviour, which helps organisations to assess their current practices, which may nurture or suppress information security. Second, using users’ perspective, this study provides recommendations pertaining to monitoring as a form of information security measure. Third, this study provides theoretical contribution to the existing information security literature via the application of the social cognitive learning theory.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Barbara Barney-McNamara ◽  
James Peltier ◽  
Pavan Rao Chennamaneni ◽  
Keith Eric Niedermeier

Purpose The purpose of this paper is to provide a detail review of the social selling literature and to offer future research needs. Social selling has gained the attention of sales researchers. Rather than merely a new tool, social selling redefines the traditional sales process. However, the literature is spread across topics of social media and sales, social customer relationship management, salesforce automation and social selling, and does not provide an agreed-upon definition or tested construct for implementation. Design/methodology/approach The paper presents a comprehensive literature review of social selling and all related terminology. Findings The authors propose a social selling framework that includes personal branding, information exchange, networking and social listening to define and outline the construct while suggesting the antecedents and outcomes to guide future research. Findings from a literature review include outlining key theories used in social selling research. Originality/value This review offers a conceptual framework of social selling, including both antecedents and outcomes, to inform future research and guide academics and practitioners.


Author(s):  
Douglas J. Levey ◽  
PK Ramachandran Nair ◽  
Taylor V. Stein ◽  
Wendy Francesconi ◽  
Jaret C. Daniels ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document