Search results

1 – 10 of 440
Article
Publication date: 1 April 1990

B. Kirwan, B. Martin, H. Rycraft and A. Smith

Human error data in the form of human error probabilities should ideally form the corner‐stone of human reliability theory and practice. In the history of human reliability…

Abstract

Human error data in the form of human error probabilities should ideally form the corner‐stone of human reliability theory and practice. In the history of human reliability assessment, however, the collection and generation of valid and usable data have been remarkably elusive. In part the problem appears to extend from the requirement for a technique to assemble the data into meaningful assessments. There have been attempts to achieve this, THERP being one workable example of a (quasi) database which enables the data to be used meaningfully. However, in recent years more attention has been focused on the PerformanceShaping Factors (PSF) associated with human reliability. A “database for today” should therefore be developed in terms of PSF, as well as task/ behavioural descriptors, and possibly even psychological error mechanisms. However, this presumes that data on incidents and accidents are collected and categorised in terms of the PSF contributing to the incident, and such classification systems in practice are rare. The collection and generation of a small working database, based on incident records are outlined. This has been possible because the incident‐recording system at BNFL Sellafield does give information on PSF. Furthermore, the data have been integrated into the Human Reliability Management System which is a PSF‐based human reliability assessment system. Some of the data generated are presented, as well as the PSF associated with them, and an outline of the incident collection system is given. Lastly, aspects of human common mode failure or human dependent failures, particularly at the lower human error probability range, are discussed, as these are unlikely to be elicited from data collection studies, yet are important in human reliability assessment. One possible approach to the treatment of human dependent failures, the utilisation of human performance‐limiting values, is described.

Details

International Journal of Quality & Reliability Management, vol. 7 no. 4
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 1 June 1992

I. Wilson and B. Kirwan

While training is seen to be of high importance in ensuring adequate human reliability, both in human reliability theory and practice, the question of what “adequate training”…

Abstract

While training is seen to be of high importance in ensuring adequate human reliability, both in human reliability theory and practice, the question of what “adequate training” actually entails is rarely addressed in this field. Many techniques of human reliability assessment, for example, utilize a “performance‐shaping factor” called “training” to help to quantify human error probabilities. However, these techniques do not specify in a useful way how it is decided whether training is good or poor. Similarly, the training analyst working within what are termed “mission‐critical applications” also utilizes quantitative techniques to assist in the definition of training dimensions which contribute to training effectiveness. Such dimensions are essential to ensure that the performance shaping factor of training is effective when the cognitive and motor skills are transferred to the operational environment. Explores the approaches which are commonly used both by the training analyst and by the human reliability practitioner, and indicates where the sharing of approaches and data may provide valuable insights into the relationship between effective training and human reliability.

Details

International Journal of Quality & Reliability Management, vol. 9 no. 6
Type: Research Article
ISSN: 0265-671X

Keywords

Book part
Publication date: 11 June 2021

Forough Nasirpouri Shadbad and David Biros

Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…

Abstract

Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.

Details

Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress
Type: Book
ISBN: 978-1-83909-812-3

Keywords

Book part
Publication date: 29 September 2016

Nicole A. Graves

A small-scale study was conducted to qualitatively explore the “lived experiences” of persons who remarried between the ages of 55 and 75. Improved life expectancy, high divorce…

Abstract

Purpose

A small-scale study was conducted to qualitatively explore the “lived experiences” of persons who remarried between the ages of 55 and 75. Improved life expectancy, high divorce rates, increased odds of being widowed over time, and the need for intimate relationships across the lifespan are some of the factors associated with a recent increase in remarriage rates of older adults. While demographic trends indicate that repartnering in the later years will likely become more common, little is known about remarriage in the “young-old” years.

Methodology/approach

The study included in-depth, semistructured interviews with 11 newlyweds (seven females, four males) who had remarried between the ages of 55 and 75. Word-for-word transcripts were qualitatively analyzed through a process of open coding and constant comparison to identify salient themes related to the original research question “What is the transition to remarriage experience like for adults aged 55–75?”

Findings

Five themes emerged from the analysis of participant interviews: positive orientation toward remarriage, practical/pragmatic view of the union, desire for companionship, recognition of others’ feelings, and willingness to adapt.

Research limitations/implications

The findings were salient to a small group of “young-old,” white, middle-class males and females from the Midwest and are not meant to be generalizable. The results can serve as a basis for further research and understanding of romantic relationships and repartnering across the life course.

Originality/value

This study helps to fill the gap that exists in the current literature related to romantic relationships and remarriage in the “young-old” years of life.

Details

Divorce, Separation, and Remarriage: The Transformation of Family
Type: Book
ISBN: 978-1-78635-229-3

Keywords

Article
Publication date: 1 November 2004

Paraskevas C. Argouslidis and Fiona McLean

Despite the importance of the ability of service firms to rationalise their service ranges in today's competitive environment, the area of service elimination decision‐making is…

1563

Abstract

Despite the importance of the ability of service firms to rationalise their service ranges in today's competitive environment, the area of service elimination decision‐making is one of the least researched in the literature on services marketing. Responding to this knowledge gap, this paper reports part of the findings of a broader exploratory investigation into the service elimination process in the British financial services sector. In detail, the paper presents qualitative and quantitative empirical evidence on the way in which British financial institutions audit their service range in order to identify financial services as candidates for elimination. The evidence showed that the British financial institutions studied follow a periodically conducted service range auditing process, which is often documented and computer‐aided. The audit is operationalised by a set of financial and non‐financial audit criteria (performance dimensions). The evidence also showed that the service range auditing process is not static but dynamic. As such, the relative importance of the audit criteria used varies in relation to service‐specific, organisational and environmental variables, such as type of financial service, business strategy pursued overall, degree of market orientation, intensity of competition, intensity of legislation and rhythm of technological change.

Details

European Journal of Marketing, vol. 38 no. 11/12
Type: Research Article
ISSN: 0309-0566

Keywords

Open Access
Article
Publication date: 27 February 2023

Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…

5248

Abstract

Purpose

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.

Design/methodology/approach

Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.

Findings

The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.

Originality/value

This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 14 July 2021

Molly Cooper, Yair Levy, Ling Wang and Laurie Dringus

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

1545

Abstract

Purpose

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

Design/methodology/approach

This study has three phases. The first phase included 32 subject matter experts that provided feedback toward a phishing alert and warning system. The second phase included development and a pilot study to validate a phishing alert and warning system prototype. The third phase included delivery of the Phishing Alert and Warning System (PAWSTM mobile app) to 205 participants. This study designed, developed, as well as empirically tested the PAWSTM mobile app that alerted and warned participants to the signs of phishing in emails on mobile devices.

Findings

The results of this study indicated audio alerts and visual warnings potentially lower phishing susceptibility in emails. Audiovisual warnings appeared to assist study participants in noticing phishing emails more easily and in less time than without audiovisual warnings.

Practical implications

This study's implications to mitigation of phishing emails are key, as it appears that alerts and warnings added to email applications may play a significant role in the reduction of phishing susceptibility.

Originality/value

This study extends the existing information security body of knowledge on phishing prevention and awareness by using audiovisual alerts and warnings to email recipients tested in real-life applications.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 16 June 2023

Yunyu Qian and Hemin Jiang

Employees' personal Internet usage (PIU) has become increasingly common at work. It is important for both researchers and managers to understand how PIU affects employee creative…

Abstract

Purpose

Employees' personal Internet usage (PIU) has become increasingly common at work. It is important for both researchers and managers to understand how PIU affects employee creative performance. This study aims to examine what kind of PIU is likely to increase or decrease employee creative performance and why. The authors also examine a potential boundary condition for the effect of PIU on employee creative performance.

Design/methodology/approach

Based on conservation of resource (COR) theory and broaden and build theory, the authors investigated the impact of two types of PIU, namely within-task PIU and between-task PIU, on the creative performance of knowledge workers. The authors conducted a daily diary study and surveyed 107 knowledge workers in China over 10 consecutive working days (n = 1,070) to test the model.

Findings

The authors find that within-task PIU reduces knowledge workers' creative performance by decreasing the workers' positive emotion, whereas between-task PIU promotes the performance by increasing positive emotion. The above relationships become stronger when knowledge workers perceive a higher level of organisational support.

Originality/value

The authors' study makes theoretical contributions by advancing researchers' understanding of the situations in which PIU may decrease or increase employee creative performance. The findings are also useful for developing organisational policies to take advantage of the positive side of PIU whilst avoiding PIU's negative side.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 30 August 2021

Puzant Balozian, Dorothy Leidner and Botong Xue

Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory…

Abstract

Purpose

Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory building, this study proposes a theory of ICCS drawing upon tested empirical data of information systems security (ISS) theory in Lebanon.

Design/methodology/approach

After a pilot test, the authors tested the newly developed ISS theory using a field study consisting of 187 respondents, representing many industries, thus contributing to generalizability. ISS theory is used as a proxy for the development of ICCS theory.

Findings

Based on a review of the literature from the past three decades in the information systems (IS) discipline and a discovery of the partial yet significant relevance of ISS literature to ICCS, this study succinctly summarized the antecedents and independent variables impacting security compliance behavior, putting the variables into one comprehensive yet parsimonious theoretical model. This study shows the theoretical and practical relevancy of ISS theory to ICCS theory building.

Practical implications

This paper highlights the importance of ISS compliance in the context of ICCS, especially in the area of spoken knowledge in environments containing Internet-based security devices.

Originality/value

This research article is original, as it presents the theory of ICCS, which was developed by drawing upon a comprehensive literature review of the IS discipline and finding the bridges between the security of both IS and IC.

Details

Journal of Intellectual Capital, vol. 23 no. 6
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 29 April 2014

Kerry Tudor, Aslihan Spaulding, Kayla D. Roy and Randy Winter

The purpose of this paper is to investigate the relationships among choice of risk management tools, perceived effectiveness of risk management tools, self-reported risk attitude…

Abstract

Purpose

The purpose of this paper is to investigate the relationships among choice of risk management tools, perceived effectiveness of risk management tools, self-reported risk attitude, and farm and farmer characteristics.

Design/methodology/approach

A mail survey was used to collect information about utilization of risk management tools, perceived effectiveness of risk management tools, and factors that could influence choice of risk management tools by Illinois farmers. Cluster analysis, one-way ANOVA, χ2 tests of independence, and multinomial logistic regression were utilized to detect possible relationships among choice of risk management tools, perceived effectiveness of risk management tools, self-reported risk attitude, and farm and farmer characteristics.

Findings

Multinomial logistic regression analysis revealed that age and gross farm income (GFI) were the strongest predictors of the risk management tool utilization group to which an individual would be assigned. The number of risk management tools utilized decreased with age but increased with GFI. Neither self-reported risk attitude nor education was a significant independent variable in the multinomial logistic regression model, but both were strongly impacted by age. Younger farmers with higher GFI were the most likely users of hedging.

Research limitations/implications

The results of this study provide support for the idea that farmers who are better able to generate revenue are better able to manage risk, but the direction of causality was not investigated.

Practical implications

Risk management service providers could benefit from this study as a benchmark for understanding their current and potential farmer clients’ risk management strategies.

Originality/value

This study used cluster analysis and multinomial logistic regression to address the complexity of decisions regarding multiple risk management tools. The number of tools utilized by individuals was investigated.

Details

Agricultural Finance Review, vol. 74 no. 1
Type: Research Article
ISSN: 0002-1466

Keywords

1 – 10 of 440