Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 11 November 2022

Allen C. Johnston

In identifying both the topics of interest and key limitations of the extant organizational security research, both opportunities for future research as well as some underlying…

1339

Abstract

Purpose

In identifying both the topics of interest and key limitations of the extant organizational security research, both opportunities for future research as well as some underlying challenges for conducting this research may be revealed.

Design/methodology/approach

To identify the leading organizational cybersecurity research topics of interest and their key limitations, the author conducted a topic modeling analysis of the organizational level studies published in the Association for Information Systems (AIS) senior scholars' “basket of eight journals” (Association for Information Systems, 2022) over the past five years.

Findings

Leading topics include (1) organizational security research concerns governance and strategic level decision-making and their role in shaping organizational security successes and failures, (2) cybercriminals and organizations' ability to monitor and detect them from both within and outside the firm; (3) cost, liability and security negligence, (4) organizations' innovation dispositions for security products and services and (5) organizational breach response efficacy; while key limitations of this study include the following: (1) scholars' ability to propose and assess strategic and operational level threat response recommendations, (2) their understanding how influence is formed and maintained among employees and groups and (3) their measurement instruments and models.

Originality/value

Organizations remained plagued by an ever-emerging set of threats to the security of their digital and informational assets. New threats are regularly discovered and remedies to existing threats are continually proven ineffective against these new threats. Providing an orientation to the current research on organizational security can help advance their security efforts.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 27 February 2023

Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…

6087

Abstract

Purpose

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.

Design/methodology/approach

Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.

Findings

The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.

Originality/value

This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 18 July 2008

Qingxiong Ma, Allen C. Johnston and J. Michael Pearson

As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and…

3888

Abstract

Purpose

As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and developed many different information security standards and guidelines. Building on these previous efforts, the purpose of this study is to put forth a framework for ISM.

Design/methodology/approach

This framework is derived from the development of an a priori set of objectives and practices as suggested by literature, standards, and reports found in academia and practice; the refinement of these objectives and practices based on survey data obtained from 354 certified information security professionals; and the examination of interrelationships between the objectives and practices.

Findings

The empirical analysis suggests: four factors (information integrity, confidentiality, accountability, and availability) serve as critical information security objectives; most of the security areas and items covered under ISO 17799 are valid with one new area – “external” or “inter‐organizational information security”; and for moderately information‐sensitive organizations, “confidentiality” has the highest correlation with ISM practices; for highly information‐sensitive organizations, “confidentiality”, “accountability”, and “integrity” are the major ISM objectives. The most important contributor to information security objectives is “access control”.

Research limitations/implications

This study contributes to the domain of information security research by developing a parsimonious set of security objectives and practices grounded in the findings of previous works in academia and practical literature.

Practical implications

These findings provide insights for business managers and information security professionals attempting to implement ISM programs within their respective organizational settings.

Originality/value

This paper fulfills a need in the information security community for a parsimonious set of objectives and practices based on the many guidelines and standards available in both academia and practice.

Details

Information Management & Computer Security, vol. 16 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 22 March 2010

John Taylor and William Lindsay

De‐institutionalisation and resettlement have had a significant impact on offenders with learning disabilities (LD) who are now more visible in the wider community than before…

Abstract

De‐institutionalisation and resettlement have had a significant impact on offenders with learning disabilities (LD) who are now more visible in the wider community than before. Perhaps because of the challenges presented by people who were previously contained in institutions, there has been a growth of interest in their characteristics, the services and clinical interventions required to support them.This narrative review presents and discusses recent developments concerning offenders with LD. It looks at the historical association between crime and low intelligence, and then examines the evidence concerning the prevalence of offending by people with LD and recidivism rates. Recent research concerning service pathways for this population is summarised and progress in the development of actuarial, dynamic and clinical assessments of the future risk of offending is outlined.The second half of the paper focuses on a review of the evidence for and recent developments in the treatment of offending behaviour (anger/aggression, sexual offending and fire‐setting), utilising broadly cognitive behaviourally‐based approaches. Finally, future directions for research and practice innovation are proposed.

Details

Journal of Learning Disabilities and Offending Behaviour, vol. 1 no. 1
Type: Research Article
ISSN: 2042-0927

Keywords

Article
Publication date: 21 March 2008

Allen C. Johnston and Merrill Warkentin

The Health Insurance Portability and Accountability Act (HIPAA) is US legislation aimed at protecting patient information privacy, but it imposes a significant burden on…

2558

Abstract

Purpose

The Health Insurance Portability and Accountability Act (HIPAA) is US legislation aimed at protecting patient information privacy, but it imposes a significant burden on healthcare employees, especially since the privacy provisions are still evolving and healthcare organizations are still struggling to meet compliance criteria. This study seeks to illuminate characteristics of both the environment (organization) and the individual (healthcare professional) and their relevant influence on compliance intentions by leveraging theories from the domains of social psychology, management, and information systems.

Design/methodology/approach

A study of 208 healthcare professionals located at healthcare facilities throughout the USA were surveyed as to their perceptions regarding HIPAA compliance and the underlying organizational and individual factors that influence said compliance.

Findings

The findings indicate that perceptions of organizational support and self‐efficacy (SE) leading to HIPAA compliance vary based on organizational and occupational characteristics. Furthermore, these perceptions of organizational support and SE explain some of the differences in their intent to comply with this legislation.

Research limitations/implications

For healthcare managers, the findings of this research may serve to validate HIPAA compliance initiatives. Through increased attention and resources dedicated to providing a supportive environment for HIPAA compliance, healthcare managers can increase the likelihood of compliance success by improving employee SE.

Originality/value

This paper represents the first empirical study to account for environmental factors and their influence on individual intentions to comply with HIPAA.

Details

Information Management & Computer Security, vol. 16 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 31 May 2013

Allen C. Johnston, James L. Worrell, Paul M. Di Gangi and Molly Wasko

The purpose of this paper is to examine how participation in an online health community provides for direct benefits in the form of information utility and social support and an…

3980

Abstract

Purpose

The purpose of this paper is to examine how participation in an online health community provides for direct benefits in the form of information utility and social support and an indirect influence on perceptions of patient empowerment.

Design/methodology/approach

A multi‐method approach was conducted involving interviews with moderators of 18 online health communities and a field survey of 153 online health community participants.

Findings

Online health community participation leads to direct benefits in the form of information utility and social support and that information utility also helps to shape perceptions of patient empowerment among community participants.

Research limitations/implications

This research calls into question the role of online health communities as a support mechanism to empower patients to take ownership over their healthcare treatment. Online health communities support the development of patient empowerment by creating and disseminating information that can be used to gain an understanding of a patient's health condition.

Practical implications

Purveyors of online health communities must be able to ensure a high level of engagement among community participants that allows for each member to elicit outcomes such as information utility, while simultaneously guarding against undesirable circumstances that may prohibit a positive experience.

Social implications

Medical professionals can utilize the results of this study to develop strategies for incorporating online health communities into patient care. Specifically, medical professionals can use these results to identify relevant communities and engage in information sharing to ensure relevant and accurate information is disseminated to patients as they seek out information concerning their health conditions.

Originality/value

As an ever growing segment of the population looks to online health communities for health information seeking and emotional support, we still know very little as to the type of support that is provided by these forums and how benefits obtained from participation help to shape patient empowerment outcomes. This study determined that information utility and social support are two benefits obtained by online health community participants and that information utility also helps to shape perceptions of patient empowerment among community participants.

Details

Information Technology & People, vol. 26 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 2010

Jon Taylor

People with learning disabilities have traditionally been denied access to a range of psychological therapies. Similarly, offenders with learning disabilities, particularly in…

Abstract

People with learning disabilities have traditionally been denied access to a range of psychological therapies. Similarly, offenders with learning disabilities, particularly in prison settings, have largely been unable to access treatment strategies that are provided for offenders who do not have such disabilities. As a consequence these individuals are denied the opportunity to address their criminogenic needs and/or attend to their psychological welfare. This paper provides a brief exploration of the reasons and evidence for such practice, alongside the evidence that people with learning disabilities can successfully engage in psychotherapy. It is concluded that there is no evidence that would support the exclusion of people with disabilities from treatment options.

Details

Journal of Learning Disabilities and Offending Behaviour, vol. 1 no. 3
Type: Research Article
ISSN: 2042-0927

Keywords

Article
Publication date: 16 November 2012

Dave Hearn, David Ndegwa, Philip Norman, Natalie Hammond and Eddie Chaplin

Leave is an important part of life for both patients and clinicians in secure mental health and learning disability settings. Patients breaching leave conditions (i.e. absconding…

994

Abstract

Purpose

Leave is an important part of life for both patients and clinicians in secure mental health and learning disability settings. Patients breaching leave conditions (i.e. absconding or failing to return) represent a small percentage of leave episodes; however when incidents occur there can be far reaching negative outcomes for potential victims, the patient and the service. The purpose of this paper is to devise a risk assessment specifically for leave decision making based on the literature available.

Design/methodology/approach

Using the approach followed in the violence risk assessment field, a literature review was carried out of papers relating to absconding. The results were used to develop the leave/abscond risk assessment (LARA).

Findings

There are a number of problems with the available literature: there is a dearth of research, definitions for absconding are varied (often including escape) making comparisons difficult and much of the literature focuses on psychiatric acute wards making it difficult to translate into secure environments. Characteristics of absconders vary and are not idiosyncratic enough from which to develop a risk assessment. Socio‐environmental factors are perhaps more important and so the LARA was devised around assessment of these.

Research limitations/implications

The limitations of this paper are clear: a risk assessment tool is proposed that has not been evaluated or validated in any way. The authors feel that the process warrants publication and invite readers to use the tool for clinical and/or research purposes.

Originality/value

The LARA is proposed as a specific leave‐decision‐making risk assessment tool for teams working in secure environments.

Details

Advances in Mental Health and Intellectual Disabilities, vol. 6 no. 6
Type: Research Article
ISSN: 2044-1282

Keywords

Book part
Publication date: 13 August 2018

Robert L. Dipboye

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Article
Publication date: 22 October 2012

Jon Taylor, Catrin Morrissey, Sarah Trout and Charlene Bennett

The purpose of this paper is to describe the profile of community members admitted to the first high secure Therapeutic Community (TC) for males with learning disability and…

931

Abstract

Purpose

The purpose of this paper is to describe the profile of community members admitted to the first high secure Therapeutic Community (TC) for males with learning disability and personality disorder.

Design/methodology/approach

This paper presents descriptive data.

Findings

The characteristics of the men admitted to a TC in the National High Secure Learning Disability Service are likely to present considerable challenges to the development and delivery of the service.

Originality/value

There is very little literature describing interventions for offenders with learning disability and personality disorder. This paper is one of a series that will describe the effectiveness of a TC for men with such difficulties.

Details

Therapeutic Communities: The International Journal of Therapeutic Communities, vol. 33 no. 4
Type: Research Article
ISSN: 0964-1866

Keywords

1 – 10 of over 1000