Search results

1 – 10 of 20

Abstract

Purpose

This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and becoming of entrepreneurial phenomena in business families and family firms.

Design/methodology/approach

Because of the novelty of this research stream, the authors asked 20 scholars in entrepreneurship and family business to reflect on topics, methods and issues that should be addressed to move this field forward.

Findings

Authors highlight key challenges and point to new research directions for understanding family entrepreneuring in relation to issues such as agency, processualism and context.

Originality/value

This study offers a compilation of multiple perspectives and leverage recent developments in the fields of entrepreneurship and family business to advance research on family entrepreneuring.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 February 2024

Rajni Singh, Kuldip Singh Sangwan and Devika Sangwan

This study seeks insights into the engineering undergraduates’ knowledge of problem-solving process, teamwork characteristics and communication skills.

Abstract

Purpose

This study seeks insights into the engineering undergraduates’ knowledge of problem-solving process, teamwork characteristics and communication skills.

Design/methodology/approach

The data for the study were collected through consecutive sampling technique from 78 engineering undergraduates at the Birla Institute of Technology and Science Pilani, Pilani Campus, India on a five-point Likert scale-based questionnaire.

Findings

Exploratory factor analysis results traced three stages of the problem-solving process. However, the results of teamwork characteristics and communication skills validated the literature-based results. An important finding was that all the three skills were correlated. This means that one skill can be used to develop and promote other skills. The paired sample t-test demonstrated that all the three skills were perceived with a difference, which indicates that these skills worked in collaboration without losing their individuality.

Research limitations/implications

This study supports that there is a need to engage learners in an active and collaborative environment to improve the engineering undergraduates’ knowledge of skills.

Originality/value

The conscious effort to make the engineering undergraduates aware would reduce the gap between the graduating engineers skills currently possessed in academia and the required skills at workplace.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Open Access
Article
Publication date: 7 February 2024

Mahwish Jamil, Simon Stephens and Ahmad Firdause Md Fadzil

Family business sustainability is a critical issue. This study considers if adopting a strategic entrepreneurship orientation can support the sustainability of a family business.

1423

Abstract

Purpose

Family business sustainability is a critical issue. This study considers if adopting a strategic entrepreneurship orientation can support the sustainability of a family business.

Design/methodology/approach

A qualitative approach is used, in which semi-structured interviews were conducted with twelve family business owners. Data collected during the interviews provides insights into understanding, practices, motivations, behaviours and attitudes relating to sustainability.

Findings

Although awareness of sustainability processes and procedures is found to be low, sustainability is important to the family business. However, sustainability is not managed or implemented systematically.

Originality/value

The paper presents a new model to describe the sustainability practices of family businesses. Adoption of strategic entrepreneurship is advocated as mechanism for improving sustainability. Practical and policy implications are suggested to enhance the effectiveness of sustainability initiatives in family business settings.

Details

Journal of Family Business Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2043-6238

Keywords

Article
Publication date: 31 July 2023

Samar Rahi, Mahmoud Alghizzawi and Abdul Hafaz Ngah

Over the last few decades, electronic banking has been used widely to manage financial transactions worldwide. More recently electronic wallet (e-wallet) banking has been…

Abstract

Purpose

Over the last few decades, electronic banking has been used widely to manage financial transactions worldwide. More recently electronic wallet (e-wallet) banking has been identified as an innovative mode of e-payment and enhances e-banking customer experience. Although e-wallet banking service is more secure, fast, convenient and cost effective, compared to conventional web-based banking, adoption of e-wallet application is limited among e-banking consumers. To address this issue, the current study has conceptualized task technology fit (TTF) model, diffusion of innovation (DOI) theory and protection motivation theory towards adoption of e-wallet service. Moreover, pandemic risk is studied as moderating factor between the relationship of e-wallet and use of e-wallet banking among banking consumers.

Design/methodology/approach

The research design of this study is based on positivism research paradigm. This study is cross-sectional and used deductive level of theory to formulate hypotheses. Research survey was conducted towards e-banking users. For statistical findings research framework is tested with 280 numerical responses. Data are estimated through partial least square structural equation modeling (PLS-SEM) approach.

Findings

Statistical results demonstrates that collectively factors underpinned protection motivation theory, TTF and DOI have shown large variance R2 65.7% in adoption of e-wallet. The effect size f2 analysis has revealed that compatibility is one of the most influential factors in determining individual behavior to adopt e-wallet. Similarly, Geisser and Stone Q2 analysis has disclosed substantial predictive power to predict adoption and use of e-wallet service.

Practical implications

Theoretically, this study integrates protection motivation theory, DOI theory and TTF model toward adoption of e-wallet service and hence contributes to information system literature. To practice this, research has suggested that factors such as pandemic risk, perceived severity and compatibility are most influential factors and hence need policy makers' attention to boost e-wallet adoption.

Originality/value

This study is original as the study develops an integrative research model to investigate e-banking user behavior to adopt of e-wallet service. Moreover, pandemic risk is tested as moderating factor between adoption and use of e-wallet which, in turn, enhance the value of this study and directs how to deal with existing and future pandemic crisis.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 27 May 2024

Moza Tahnoon Al Nahyan, Jawaher Majdi Al Ahbabi, Mesheal Abdulmohsen Alabdulrahman, Ibrahim Alhosani, Fauzia Jabeen and Sherine Farouk

Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19…

Abstract

Purpose

Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19 pandemic. It also examines the moderating effects of perceived organizational support and psychological capital on well-being and performance.

Design/methodology/approach

Using a two-wave time-lagged design, data were collected from 279 frontline employees in public service organizations in Saudi Arabia.

Findings

The study’s results show that perceived job security significantly affects job performance. Employee well-being significantly and positively influences job performance and partially mediates the relationship between perceived job security and job performance. Additionally, perceived organizational support and psychological capital positively moderated the relationship between employee well-being and job performance during the pandemic.

Practical implications

This study suggests that policymakers and practitioners need to prioritize addressing the job security concerns and well-being of frontline employees during a pandemic to enhance employee performance.

Originality/value

Our findings present significant implications for policymakers in the context of job security and performance within public organizations in emerging countries.

研究目的

本研究以社會認知生涯理論為基礎,去探討在2019冠狀病毒病疫情期間,僱員對職業保障和福祉的看法如何影響他們的工作績效; 研究亦擬探討感知組織支持和心理資本對福祉和工作績效所起的調節作用。

研究方法

研究人員使用雙波時間遞延設計收集數據; 數據取自於沙特阿拉伯的公共服務組織內工作的279名一線員工。

研究結果

研究結果顯示,僱員的感知職業保障會對他們的工作績效有顯著的影響; 另外,僱員的福祉會正面和顯著地影響他們的工作績效; 而且,僱員的福祉也會局部地調節感知職業保障與工作績效之間的關係。再者,研究人員發現,在大流行期間,感知組織支持和心理資本正面調節了僱員福祉與工作績效之間的關係。

研究的啟示

研究結果建議政策制定者和從業人員必須於大流行肆虐期間,優先處理有關職業保障的關注和一線員工的福祉,俾能提升僱員的工作績效。

研究的原創性

本研究的結果為政策制定者提供了重要的啟示,幫助他們於公共組織的環境內,能更有效地處理關於職業保障和僱員工作績效的事宜。

Article
Publication date: 27 May 2024

Derrick Ganye and Kane Smith

Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to soar…

Abstract

Purpose

Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to soar. To improve this situation, researchers have employed fear appeals that are based on protection motivation theory (PMT) to induce compliance behavior. However, extant research on fear appeals has yielded mixed findings. To help explain these mixed findings, the authors contend that efficacy formation is a cognitive process that is impacted by the cognitive load exerted by the design of fear appeal messages.

Design/methodology/approach

The study draws on cognitive load theory (CLT) to examine the effects of intrinsic cognitive load, extraneous cognitive load and germane cognitive load on stimulating an individual’s efficacy and coping appraisals. The authors designed a survey to collect data from 359 respondents and tested the model using partial least squares.

Findings

The analysis showed significant relationships between cognitive load (intrinsic, extraneous, and germane) and fear, maladaptive rewards, response costs, self-efficacy and response efficacy.

Originality/value

This provides support for the assertion that fear appeals impact the cognitive processes of individuals that then in turn can potentially affect the efficacy of fear and coping appraisals. These findings demonstrate the need to further investigate how individual cognition is impacted by fear appeal design and the resulting effects on compliance intention and behavior.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 December 2023

Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…

Abstract

Purpose

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.

Design/methodology/approach

This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.

Findings

The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.

Research limitations/implications

Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.

Practical implications

The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.

Social implications

This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.

Originality/value

This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 May 2024

Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le and Sam Thi Ngoc Nguyen

This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to…

Abstract

Purpose

This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to explore the complex correlation between the level of awareness about cybersecurity measures and attitudes towards compliance with these measures. Additionally, it looks at how these factors collectively impact employees’ behaviour to protect organisational assets and information.

Design/methodology/approach

This study uses a quantitative research methodology in which primary data are gathered using a survey questionnaire distributed to personnel employed at Vietnamese organisations. The data are analysed, and the validity of the measurement and structural equation model is assessed using a partial least squares–structural equation model approach after the collection of all the survey responses.

Findings

The provision of policies and security education, training and awareness programmes are strongly and positively associated with cybersecurity awareness. Moreover, cybersecurity awareness plays an important role in shaping attitudes and intentions towards information security policy compliance (ISPC). Attitude is positively associated with intention towards ISPC and employee protective behaviour. Finally, the intention towards ISPC is significant in shaping employee protective behaviour.

Originality/value

This study contributes to the understanding of the antecedents of cybersecurity in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding intention and protective behaviour through cybersecurity awareness and compliance attitudes. By combining the theory of planned behaviour and protection motivation theory with institutional governance, this study extends previous research on the effects of these variables on employee protective behaviour.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Access

Year

Last 12 months (20)

Content type

Earlycite article (20)
1 – 10 of 20