Search results
1 – 10 of 20Haya Al-Dajani, Nupur Pavan Bang, Rodrigo Basco, Andrea Calabrò, Jeremy Chi Yeung Cheng, Eric Clinton, Joshua J. Daspit, Alfredo De Massis, Allan Discua Cruz, Lucia Garcia-Lorenzo, William B. Gartner, Olivier Germain, Silvia Gherardi, Jenny Helin, Miguel Imas, Sarah Jack, Maura McAdam, Miruna Radu-Lefebvre, Paola Rovelli, Malin Tillmar, Mariateresa Torchia, Karen Verduijn and Friederike Welter
This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and…
Abstract
Purpose
This conceptual, multi-voiced paper aims to collectively explore and theorize family entrepreneuring, which is a research stream dedicated to investigating the emergence and becoming of entrepreneurial phenomena in business families and family firms.
Design/methodology/approach
Because of the novelty of this research stream, the authors asked 20 scholars in entrepreneurship and family business to reflect on topics, methods and issues that should be addressed to move this field forward.
Findings
Authors highlight key challenges and point to new research directions for understanding family entrepreneuring in relation to issues such as agency, processualism and context.
Originality/value
This study offers a compilation of multiple perspectives and leverage recent developments in the fields of entrepreneurship and family business to advance research on family entrepreneuring.
Details
Keywords
Sigi Goode and Amir Riaz
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…
Abstract
Purpose
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.
Design/methodology/approach
This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.
Findings
Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.
Originality/value
To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
Details
Keywords
Rajni Singh, Kuldip Singh Sangwan and Devika Sangwan
This study seeks insights into the engineering undergraduates’ knowledge of problem-solving process, teamwork characteristics and communication skills.
Abstract
Purpose
This study seeks insights into the engineering undergraduates’ knowledge of problem-solving process, teamwork characteristics and communication skills.
Design/methodology/approach
The data for the study were collected through consecutive sampling technique from 78 engineering undergraduates at the Birla Institute of Technology and Science Pilani, Pilani Campus, India on a five-point Likert scale-based questionnaire.
Findings
Exploratory factor analysis results traced three stages of the problem-solving process. However, the results of teamwork characteristics and communication skills validated the literature-based results. An important finding was that all the three skills were correlated. This means that one skill can be used to develop and promote other skills. The paired sample t-test demonstrated that all the three skills were perceived with a difference, which indicates that these skills worked in collaboration without losing their individuality.
Research limitations/implications
This study supports that there is a need to engage learners in an active and collaborative environment to improve the engineering undergraduates’ knowledge of skills.
Originality/value
The conscious effort to make the engineering undergraduates aware would reduce the gap between the graduating engineers skills currently possessed in academia and the required skills at workplace.
Details
Keywords
Mahwish Jamil, Simon Stephens and Ahmad Firdause Md Fadzil
Family business sustainability is a critical issue. This study considers if adopting a strategic entrepreneurship orientation can support the sustainability of a family business.
Abstract
Purpose
Family business sustainability is a critical issue. This study considers if adopting a strategic entrepreneurship orientation can support the sustainability of a family business.
Design/methodology/approach
A qualitative approach is used, in which semi-structured interviews were conducted with twelve family business owners. Data collected during the interviews provides insights into understanding, practices, motivations, behaviours and attitudes relating to sustainability.
Findings
Although awareness of sustainability processes and procedures is found to be low, sustainability is important to the family business. However, sustainability is not managed or implemented systematically.
Originality/value
The paper presents a new model to describe the sustainability practices of family businesses. Adoption of strategic entrepreneurship is advocated as mechanism for improving sustainability. Practical and policy implications are suggested to enhance the effectiveness of sustainability initiatives in family business settings.
Details
Keywords
Samar Rahi, Mahmoud Alghizzawi and Abdul Hafaz Ngah
Over the last few decades, electronic banking has been used widely to manage financial transactions worldwide. More recently electronic wallet (e-wallet) banking has been…
Abstract
Purpose
Over the last few decades, electronic banking has been used widely to manage financial transactions worldwide. More recently electronic wallet (e-wallet) banking has been identified as an innovative mode of e-payment and enhances e-banking customer experience. Although e-wallet banking service is more secure, fast, convenient and cost effective, compared to conventional web-based banking, adoption of e-wallet application is limited among e-banking consumers. To address this issue, the current study has conceptualized task technology fit (TTF) model, diffusion of innovation (DOI) theory and protection motivation theory towards adoption of e-wallet service. Moreover, pandemic risk is studied as moderating factor between the relationship of e-wallet and use of e-wallet banking among banking consumers.
Design/methodology/approach
The research design of this study is based on positivism research paradigm. This study is cross-sectional and used deductive level of theory to formulate hypotheses. Research survey was conducted towards e-banking users. For statistical findings research framework is tested with 280 numerical responses. Data are estimated through partial least square structural equation modeling (PLS-SEM) approach.
Findings
Statistical results demonstrates that collectively factors underpinned protection motivation theory, TTF and DOI have shown large variance R2 65.7% in adoption of e-wallet. The effect size f2 analysis has revealed that compatibility is one of the most influential factors in determining individual behavior to adopt e-wallet. Similarly, Geisser and Stone Q2 analysis has disclosed substantial predictive power to predict adoption and use of e-wallet service.
Practical implications
Theoretically, this study integrates protection motivation theory, DOI theory and TTF model toward adoption of e-wallet service and hence contributes to information system literature. To practice this, research has suggested that factors such as pandemic risk, perceived severity and compatibility are most influential factors and hence need policy makers' attention to boost e-wallet adoption.
Originality/value
This study is original as the study develops an integrative research model to investigate e-banking user behavior to adopt of e-wallet service. Moreover, pandemic risk is tested as moderating factor between adoption and use of e-wallet which, in turn, enhance the value of this study and directs how to deal with existing and future pandemic crisis.
Details
Keywords
Moza Tahnoon Al Nahyan, Jawaher Majdi Al Ahbabi, Mesheal Abdulmohsen Alabdulrahman, Ibrahim Alhosani, Fauzia Jabeen and Sherine Farouk
Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19…
Abstract
Purpose
Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19 pandemic. It also examines the moderating effects of perceived organizational support and psychological capital on well-being and performance.
Design/methodology/approach
Using a two-wave time-lagged design, data were collected from 279 frontline employees in public service organizations in Saudi Arabia.
Findings
The study’s results show that perceived job security significantly affects job performance. Employee well-being significantly and positively influences job performance and partially mediates the relationship between perceived job security and job performance. Additionally, perceived organizational support and psychological capital positively moderated the relationship between employee well-being and job performance during the pandemic.
Practical implications
This study suggests that policymakers and practitioners need to prioritize addressing the job security concerns and well-being of frontline employees during a pandemic to enhance employee performance.
Originality/value
Our findings present significant implications for policymakers in the context of job security and performance within public organizations in emerging countries.
研究目的
本研究以社會認知生涯理論為基礎,去探討在2019冠狀病毒病疫情期間,僱員對職業保障和福祉的看法如何影響他們的工作績效; 研究亦擬探討感知組織支持和心理資本對福祉和工作績效所起的調節作用。
研究方法
研究人員使用雙波時間遞延設計收集數據; 數據取自於沙特阿拉伯的公共服務組織內工作的279名一線員工。
研究結果
研究結果顯示,僱員的感知職業保障會對他們的工作績效有顯著的影響; 另外,僱員的福祉會正面和顯著地影響他們的工作績效; 而且,僱員的福祉也會局部地調節感知職業保障與工作績效之間的關係。再者,研究人員發現,在大流行期間,感知組織支持和心理資本正面調節了僱員福祉與工作績效之間的關係。
研究的啟示
研究結果建議政策制定者和從業人員必須於大流行肆虐期間,優先處理有關職業保障的關注和一線員工的福祉,俾能提升僱員的工作績效。
研究的原創性
本研究的結果為政策制定者提供了重要的啟示,幫助他們於公共組織的環境內,能更有效地處理關於職業保障和僱員工作績效的事宜。
Details
Keywords
Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to soar…
Abstract
Purpose
Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to soar. To improve this situation, researchers have employed fear appeals that are based on protection motivation theory (PMT) to induce compliance behavior. However, extant research on fear appeals has yielded mixed findings. To help explain these mixed findings, the authors contend that efficacy formation is a cognitive process that is impacted by the cognitive load exerted by the design of fear appeal messages.
Design/methodology/approach
The study draws on cognitive load theory (CLT) to examine the effects of intrinsic cognitive load, extraneous cognitive load and germane cognitive load on stimulating an individual’s efficacy and coping appraisals. The authors designed a survey to collect data from 359 respondents and tested the model using partial least squares.
Findings
The analysis showed significant relationships between cognitive load (intrinsic, extraneous, and germane) and fear, maladaptive rewards, response costs, self-efficacy and response efficacy.
Originality/value
This provides support for the assertion that fear appeals impact the cognitive processes of individuals that then in turn can potentially affect the efficacy of fear and coping appraisals. These findings demonstrate the need to further investigate how individual cognition is impacted by fear appeal design and the resulting effects on compliance intention and behavior.
Details
Keywords
Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis
Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…
Abstract
Purpose
Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.
Design/methodology/approach
This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.
Findings
The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.
Research limitations/implications
Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.
Practical implications
The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.
Social implications
This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.
Originality/value
This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le and Sam Thi Ngoc Nguyen
This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to…
Abstract
Purpose
This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to explore the complex correlation between the level of awareness about cybersecurity measures and attitudes towards compliance with these measures. Additionally, it looks at how these factors collectively impact employees’ behaviour to protect organisational assets and information.
Design/methodology/approach
This study uses a quantitative research methodology in which primary data are gathered using a survey questionnaire distributed to personnel employed at Vietnamese organisations. The data are analysed, and the validity of the measurement and structural equation model is assessed using a partial least squares–structural equation model approach after the collection of all the survey responses.
Findings
The provision of policies and security education, training and awareness programmes are strongly and positively associated with cybersecurity awareness. Moreover, cybersecurity awareness plays an important role in shaping attitudes and intentions towards information security policy compliance (ISPC). Attitude is positively associated with intention towards ISPC and employee protective behaviour. Finally, the intention towards ISPC is significant in shaping employee protective behaviour.
Originality/value
This study contributes to the understanding of the antecedents of cybersecurity in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding intention and protective behaviour through cybersecurity awareness and compliance attitudes. By combining the theory of planned behaviour and protection motivation theory with institutional governance, this study extends previous research on the effects of these variables on employee protective behaviour.
Details