{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:40:22Z","timestamp":1762875622452,"version":"3.41.2"},"reference-count":42,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2014,7,7]],"date-time":"2014-07-07T00:00:00Z","timestamp":1404691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7,7]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of the paper is to understand the values perceived and the priorities attributed by the managers to four dimensions of information quality associated with meta-information commonly used in the initial selection (scanning) of content by managers: source credibility, comprehensiveness, timeliness, and confidentiality.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 The study involved conducting simulations of information selection for decision making with 124 professionals from 11 different companies. The results were analysed with content analysis techniques, nonparametric statistics, and cluster analysis.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 Three levels of priority were found in the managers\u2019 information selection process: the credibility and timeliness dimensions were the most highly prioritised, the comprehensiveness dimension was the least prioritised, and the confidentiality dimension occupied an intermediate position. The preferences of the managers are for current information and a well-known source with respect to the timeliness and source credibility dimensions, respectively. Regarding the confidentiality dimension, the preference is for restricted information, valued for the desire to know. For the comprehensiveness dimension, there was no well-defined preference for managers with respect to the quantity of text in a managerial report.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>\u2013 The knowledge of priorities and values attributed to the dimensions of information quality is critical for the definition of characteristics to be incorporated into information projects.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 This study's contribution is related to the process of information selection in a dynamic situation in which little time is available to information analysis.<\/jats:p><\/jats:sec>","DOI":"10.1108\/oir-01-2014-0006","type":"journal-article","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T07:53:17Z","timestamp":1408607597000},"page":"661-679","source":"Crossref","is-referenced-by-count":10,"title":["Information selection by managers: priorities and values attributed to the dimensions of information"],"prefix":"10.1108","volume":"38","author":[{"given":"Jos\u00e9","family":"Osvaldo De Sordi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manuel","family":"Meireles","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcia","family":"Carvalho de Azevedo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2020123019553857400_b1","doi-asserted-by":"crossref","unstructured":"Anderson, S.P. and de Palma, A. (2012), \u201cCompetition for attention in the information (overload) age\u201d, RAND Journal of Economics, Vol. 43 No. 1, pp. 1-25.","DOI":"10.1111\/j.1756-2171.2011.00155.x"},{"key":"key2020123019553857400_b2","doi-asserted-by":"crossref","unstructured":"Arruda, M.C. (1997), \u201cBusiness ethics in Latin America\u201d, Journal of Business Ethics, Vol. 16 No. 14, pp. 1597-1603.","DOI":"10.1023\/A:1005823317019"},{"key":"key2020123019553857400_b3","doi-asserted-by":"crossref","unstructured":"Ballou, D. , Wang, R. , Pazer, H. and Kumar Tayi, G. (1998), \u201cModeling information manufacturing systems to determine information product quality\u201d, Management Science, Vol. 44 No. 4, pp. 462-484.","DOI":"10.1287\/mnsc.44.4.462"},{"key":"key2020123019553857400_b4","doi-asserted-by":"crossref","unstructured":"Bates, B.R. , Romina, S. , Ahmed, R. and Hopson, D. (2006), \u201cThe effect of source credibility on consumers\u2019 perceptions of the quality of health information on the internet\u201d, Medical Informatics & the Internet in Medicine, Vol. 31 No. 1, pp. 45-52.","DOI":"10.1080\/14639230600552601"},{"key":"key2020123019553857400_b5","unstructured":"Beath, C. , Becerra-Fernandez, I. , Ross, J. and Short, J. (2012), \u201cFinding value in the information explosion\u201d, MIT Sloan Management Review, Vol. 53 No. 4, pp. 18-20."},{"key":"key2020123019553857400_b8","doi-asserted-by":"crossref","unstructured":"Boss, S.R. , Kirsch, L.J. , Angermeier, I. , Shingler, R.A. and Boss, R.W. (2009), \u201cIf someone is watching, I\u2019ll do what I\u2019m asked: mandatoriness, control, and information security\u201d, European Journal of Information Systems, Vol. 18 No. 2, pp. 151-164.","DOI":"10.1057\/ejis.2009.8"},{"key":"key2020123019553857400_b6","unstructured":"Brazilian Criminal Code 1940, \u201cLaw No. 2,848 of December 7\u201d, available at: www.planalto.gov.br\/ccivil_03\/Decreto-Lei\/Del2848compilado.htm (accessed 14 October 2013)."},{"key":"key2020123019553857400_b7","unstructured":"Brennan, L.L. (2011), \u201cThe scientific management of information overload\u201d, Journal of Business and Management, Vol. 17 No. 1, pp. 121-134."},{"key":"key2020123019553857400_b9","unstructured":"Buscaglia, C.A. and Weismann, M.F. (2012), \u201cHow \u2018cybersafe\u2019 are the BRICS?\u201d, Journal of Legal, Ethical and Regulatory Issues, Vol. 15 No. 2, pp. 61-91."},{"key":"key2020123019553857400_b10","unstructured":"Creswell, J.W. (2003), Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 2nd ed., Sage Publications, Thousand Oaks, CA."},{"key":"key2020123019553857400_b11","doi-asserted-by":"crossref","unstructured":"Doherty, N.F. and Fulford, H. (2005), \u201cDo information security policies reduce the incidence of security breaches: an exploratory analysis\u201d, Information Resources Management Journal, Vol. 18 No. 4, pp. 21-39.","DOI":"10.4018\/irmj.2005100102"},{"key":"key2020123019553857400_b12","doi-asserted-by":"crossref","unstructured":"Eppler, M.J. (2006), Managing Information Quality: Increasing the Value of Information in Knowledge-Intensive Products and Processes, 2nd ed., Springer, New York, NY.","DOI":"10.1007\/3-540-32225-6"},{"key":"key2020123019553857400_b13","doi-asserted-by":"crossref","unstructured":"Festinger, L. (1957), A Theory of Cognitive Dissonance, Row Peterson, Evanston, IL.","DOI":"10.1515\/9781503620766"},{"key":"key2020123019553857400_b14","doi-asserted-by":"crossref","unstructured":"Gelle, E. and Karhu, K. (2003), \u201cInformation quality for strategic technology planning\u201d, Industrial Management+Data Systems, Vol. 103 No. 8, pp. 633-643.","DOI":"10.1108\/02635570310497675"},{"key":"key2020123019553857400_b16","doi-asserted-by":"crossref","unstructured":"Gibbs, S. and Linley, R. (2000), \u201c\u2018A bit of a mess?\u2019: training and education for information workers in the voluntary sector\u201d, Education for Information, Vol. 18 Nos 2\/3, pp. 155-167.","DOI":"10.3233\/EFI-2000-182-306"},{"key":"key2020123019553857400_b15","unstructured":"Gi-Yong, K. , Ruihley, B.J. and Dittmore, S.W. (2012), \u201cImpact of perceived on-field performance on sport celebrity source credibility\u201d, Sport Marketing Quarterly, Vol. 21 No. 3, pp. 147-158."},{"key":"key2020123019553857400_b17","unstructured":"Gravetter, F. and Forzano, L.A. (2012), Research Methods for the Behavioral Sciences, 4th ed., Wadsworth Cengage Learning, Belmont, CA."},{"key":"key2020123019553857400_b18","doi-asserted-by":"crossref","unstructured":"Higgins, M. (1999), \u201cMeta-information, and time: factors in human decision making\u201d, Journal of the American Society for Information Science, Vol. 50 No. 2, pp. 132-139.","DOI":"10.1002\/(SICI)1097-4571(1999)50:2<132::AID-ASI4>3.0.CO;2-N"},{"key":"key2020123019553857400_b19","unstructured":"Hogarth, R.M. (1987), Judgment and Choice: The Psychology of Decision, 2nd ed., John Wiley & Sons, New York, NY."},{"key":"key2020123019553857400_b20","doi-asserted-by":"crossref","unstructured":"Hoggatt, V.E. and Linda, D.A. (1968), \u201cFibonacci and binomial properties of weighted compositions\u201d, Journal of Combinatorial Theory, Vol. 4 No. 2, pp. 121-124.","DOI":"10.1016\/S0021-9800(68)80037-7"},{"key":"key2020123019553857400_b21","doi-asserted-by":"crossref","unstructured":"Hone, K. and Eloff, J.H.P. (2002), \u201cInformation security policy: what do international security standards say\u201d, Computers & Security, Vol. 27 No. 5, pp. 402-409.","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"key2020123019553857400_b22","unstructured":"Hovland, C.I. , Janis, I.K. and Kelley, H.H. (1953), Communication and Persuasion, Yale University Press, New Haven, CT."},{"key":"key2020123019553857400_b23","unstructured":"Huang, K.Y. , Lee, Y.W. and Wang, R.Y. (1999), Quality Information and Knowledge, Prentice-Hall, Upper Saddle River, NJ."},{"key":"key2020123019553857400_b24","doi-asserted-by":"crossref","unstructured":"Hunter, G.L. (2004), \u201cInformation overload: guidance for identifying when information becomes detrimental to sales force performance\u201d, Journal of Personal Selling & Sales Management, Vol. 24 No. 2, pp. 91-100.","DOI":"10.1080\/08853134.2004.10749021"},{"key":"key2020123019553857400_b25","unstructured":"ISO\/IEC (2000), Information Technology. Code of Practice for Information Security Management (No. ISOAEC 17799:2000(E)), The International Standards Organization\/The International Electrotechnical Commission, Geneva."},{"key":"key2020123019553857400_b26","doi-asserted-by":"crossref","unstructured":"Jarcho, J. , Berkman, E. and Lieberman, M. (2011), \u201cThe neural basis of rationalization: cognitive dissonance reduction during decision-making\u201d, Social Cognitive and Affective Neuroscience, Vol. 6 No. 4, pp. 460-467.","DOI":"10.1093\/scan\/nsq054"},{"key":"key2020123019553857400_b27","doi-asserted-by":"crossref","unstructured":"Karmarkar, U.S. and Apte, U.M. (2007), \u201cOperations management in the information economy: information products, processes, and chains\u201d, Journal of Operations Management, Vol. 25 No. 2, pp. 438-453.","DOI":"10.1016\/j.jom.2006.11.001"},{"key":"key2020123019553857400_b28","doi-asserted-by":"crossref","unstructured":"Kenward, R.E. , Clarke, R.T. , Hodder, K. and Walls, S.S. (2001), \u201cDensity and linkage estimators of home range: nearest-neighbor clustering defines multinuclear cores\u201d, Ecology, Vol. 82 No. 7, pp. 1905-1920.","DOI":"10.1890\/0012-9658(2001)082[1905:DALEOH]2.0.CO;2"},{"key":"key2020123019553857400_b29","doi-asserted-by":"crossref","unstructured":"Lee, Y.W. , Strong, D.M. , Kahn, B.K. and Wang, R.Y. (2002), \u201cAIMQ: a methodology for information quality assessment\u201d, Information & Management, Vol. 40 No. 2, pp. 133-146.","DOI":"10.1016\/S0378-7206(02)00043-5"},{"key":"key2020123019553857400_b30","doi-asserted-by":"crossref","unstructured":"Ma, X.J. , Wang, W.X. , Lai, Y.C. and Zheng, Z.Z. (2010), \u201cInformation explosion on complex networks and control\u201d, European Physical Journal B \u2013 Condensed Matter, Vol. 76 No. 1, pp. 179-183.","DOI":"10.1140\/epjb\/e2010-00208-1"},{"key":"key2020123019553857400_b31","unstructured":"Mensch, S. and Wilkie, L. (2011), \u201cInformation security activities of college students: an exploratory study\u201d, Academy of Information and Management Sciences Journal, Vol. 14 No. 2, pp. 91-116."},{"key":"key2020123019553857400_b32","doi-asserted-by":"crossref","unstructured":"Moser, L. and Whitney, E.L. (1961), \u201cWeighted compositions\u201d, Canadian Mathematical Bulletin, Vol. 4 No. 1, pp. 39-43.","DOI":"10.4153\/CMB-1961-006-0"},{"key":"key2020123019553857400_b33","unstructured":"Netcraft (2013), \u201cWeb server survey\u201d, available at: http:\/\/news.netcraft.com\/archives\/category\/web-server-survey\/ (accessed 2 September 2013)."},{"key":"key2020123019553857400_b34","doi-asserted-by":"crossref","unstructured":"Neumann, M. (2007), \u201cWeb-based data, document, and knowledge management in restoration projects\u201d, Restoration Ecology, Vol. 15 No. 2, pp. 326-329.","DOI":"10.1111\/j.1526-100X.2007.00218.x"},{"key":"key2020123019553857400_b35","doi-asserted-by":"crossref","unstructured":"Ohno, T. (2007), \u201cEyePrint: using passive eye trace from reading to enhance document access and comprehension\u201d, International Journal of Human-Computer Interaction, Vol. 23 Nos 1\/2, pp. 71-94.","DOI":"10.1080\/10447310701362934"},{"key":"key2020123019553857400_b36","doi-asserted-by":"crossref","unstructured":"Parssian, A. , Sarkar, S. and Jacob, V.S. (2004), \u201cAssessing data quality for information products: impact of selection, projection, and Cartesian product\u201d, Management Science, Vol. 50 No. 7, pp. 967-982.","DOI":"10.1287\/mnsc.1040.0237"},{"key":"key2020123019553857400_b37","doi-asserted-by":"crossref","unstructured":"Pierro, A. , Mannetti, L. , Kruglanski, A.W. , Klein, K. and Orehek, E. (2012), \u201cPersistence of attitude change and attitude-behavior correspondence based on extensive processing of source information\u201d, European Journal of Social Psychology, Vol. 42 No. 1, pp. 103-111.","DOI":"10.1002\/ejsp.853"},{"key":"key2020123019553857400_b38","unstructured":"Schou, C.D. and Trimmer, K.J. (2004), \u201cInformation assurance and security\u201d, Journal of Organizational and End User Computing, Vol. 16 No. 3, pp. i-vii."},{"key":"key2020123019553857400_b39","doi-asserted-by":"crossref","unstructured":"Shankaranarayan, G. , Ziad, M. and Wang, R.Y. (2003), \u201cManaging data quality in dynamic decision environments: an information product approach\u201d, Journal of Database Management, Vol. 14 No. 4, pp. 14-32.","DOI":"10.4018\/jdm.2003100102"},{"key":"key2020123019553857400_b40","doi-asserted-by":"crossref","unstructured":"Skagerberg, E.M. and Wright, D.B. (2009), \u201cSusceptibility to postidentification feedback is affected by source credibility\u201d, Applied Cognitive Psychology, Vol. 23 No. 4, pp. 506-523.","DOI":"10.1002\/acp.1470"},{"key":"key2020123019553857400_b41","doi-asserted-by":"crossref","unstructured":"Tormala, Z.L. , Bri\u00f1ol, P. and Petty, R.E. (2007), \u201cMultiple roles for source credibility under high elaboration: it's all in the timing\u201d, Social Cognition, Vol. 25 No. 4, pp. 536-552.","DOI":"10.1521\/soco.2007.25.4.536"},{"key":"key2020123019553857400_b42","unstructured":"Wurman, R.S. (2000), Information Anxiety 2, Que Publishing, Indianapolis, IN."}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/OIR-01-2014-0006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-01-2014-0006\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-01-2014-0006\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:41:57Z","timestamp":1753396917000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/38\/5\/661-679\/314887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,7]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,7,7]]}},"alternative-id":["10.1108\/OIR-01-2014-0006"],"URL":"https:\/\/doi.org\/10.1108\/oir-01-2014-0006","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2014,7,7]]}}}