Search results
1 – 10 of 440B. Kirwan, B. Martin, H. Rycraft and A. Smith
Human error data in the form of human error probabilities should ideally form the corner‐stone of human reliability theory and practice. In the history of human reliability…
Abstract
Human error data in the form of human error probabilities should ideally form the corner‐stone of human reliability theory and practice. In the history of human reliability assessment, however, the collection and generation of valid and usable data have been remarkably elusive. In part the problem appears to extend from the requirement for a technique to assemble the data into meaningful assessments. There have been attempts to achieve this, THERP being one workable example of a (quasi) database which enables the data to be used meaningfully. However, in recent years more attention has been focused on the PerformanceShaping Factors (PSF) associated with human reliability. A “database for today” should therefore be developed in terms of PSF, as well as task/ behavioural descriptors, and possibly even psychological error mechanisms. However, this presumes that data on incidents and accidents are collected and categorised in terms of the PSF contributing to the incident, and such classification systems in practice are rare. The collection and generation of a small working database, based on incident records are outlined. This has been possible because the incident‐recording system at BNFL Sellafield does give information on PSF. Furthermore, the data have been integrated into the Human Reliability Management System which is a PSF‐based human reliability assessment system. Some of the data generated are presented, as well as the PSF associated with them, and an outline of the incident collection system is given. Lastly, aspects of human common mode failure or human dependent failures, particularly at the lower human error probability range, are discussed, as these are unlikely to be elicited from data collection studies, yet are important in human reliability assessment. One possible approach to the treatment of human dependent failures, the utilisation of human performance‐limiting values, is described.
Details
Keywords
While training is seen to be of high importance in ensuring adequate human reliability, both in human reliability theory and practice, the question of what “adequate training”…
Abstract
While training is seen to be of high importance in ensuring adequate human reliability, both in human reliability theory and practice, the question of what “adequate training” actually entails is rarely addressed in this field. Many techniques of human reliability assessment, for example, utilize a “performance‐shaping factor” called “training” to help to quantify human error probabilities. However, these techniques do not specify in a useful way how it is decided whether training is good or poor. Similarly, the training analyst working within what are termed “mission‐critical applications” also utilizes quantitative techniques to assist in the definition of training dimensions which contribute to training effectiveness. Such dimensions are essential to ensure that the performance shaping factor of training is effective when the cognitive and motor skills are transferred to the operational environment. Explores the approaches which are commonly used both by the training analyst and by the human reliability practitioner, and indicates where the sharing of approaches and data may provide valuable insights into the relationship between effective training and human reliability.
Details
Keywords
Forough Nasirpouri Shadbad and David Biros
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…
Abstract
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.
Details
Keywords
A small-scale study was conducted to qualitatively explore the “lived experiences” of persons who remarried between the ages of 55 and 75. Improved life expectancy, high divorce…
Abstract
Purpose
A small-scale study was conducted to qualitatively explore the “lived experiences” of persons who remarried between the ages of 55 and 75. Improved life expectancy, high divorce rates, increased odds of being widowed over time, and the need for intimate relationships across the lifespan are some of the factors associated with a recent increase in remarriage rates of older adults. While demographic trends indicate that repartnering in the later years will likely become more common, little is known about remarriage in the “young-old” years.
Methodology/approach
The study included in-depth, semistructured interviews with 11 newlyweds (seven females, four males) who had remarried between the ages of 55 and 75. Word-for-word transcripts were qualitatively analyzed through a process of open coding and constant comparison to identify salient themes related to the original research question “What is the transition to remarriage experience like for adults aged 55–75?”
Findings
Five themes emerged from the analysis of participant interviews: positive orientation toward remarriage, practical/pragmatic view of the union, desire for companionship, recognition of others’ feelings, and willingness to adapt.
Research limitations/implications
The findings were salient to a small group of “young-old,” white, middle-class males and females from the Midwest and are not meant to be generalizable. The results can serve as a basis for further research and understanding of romantic relationships and repartnering across the life course.
Originality/value
This study helps to fill the gap that exists in the current literature related to romantic relationships and remarriage in the “young-old” years of life.
Details
Keywords
Paraskevas C. Argouslidis and Fiona McLean
Despite the importance of the ability of service firms to rationalise their service ranges in today's competitive environment, the area of service elimination decision‐making is…
Abstract
Despite the importance of the ability of service firms to rationalise their service ranges in today's competitive environment, the area of service elimination decision‐making is one of the least researched in the literature on services marketing. Responding to this knowledge gap, this paper reports part of the findings of a broader exploratory investigation into the service elimination process in the British financial services sector. In detail, the paper presents qualitative and quantitative empirical evidence on the way in which British financial institutions audit their service range in order to identify financial services as candidates for elimination. The evidence showed that the British financial institutions studied follow a periodically conducted service range auditing process, which is often documented and computer‐aided. The audit is operationalised by a set of financial and non‐financial audit criteria (performance dimensions). The evidence also showed that the service range auditing process is not static but dynamic. As such, the relative importance of the audit criteria used varies in relation to service‐specific, organisational and environmental variables, such as type of financial service, business strategy pursued overall, degree of market orientation, intensity of competition, intensity of legislation and rhythm of technological change.
Details
Keywords
Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms
The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…
Abstract
Purpose
The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.
Design/methodology/approach
Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.
Findings
The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.
Originality/value
This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.
Details
Keywords
Molly Cooper, Yair Levy, Ling Wang and Laurie Dringus
This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.
Abstract
Purpose
This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.
Design/methodology/approach
This study has three phases. The first phase included 32 subject matter experts that provided feedback toward a phishing alert and warning system. The second phase included development and a pilot study to validate a phishing alert and warning system prototype. The third phase included delivery of the Phishing Alert and Warning System (PAWSTM mobile app) to 205 participants. This study designed, developed, as well as empirically tested the PAWSTM mobile app that alerted and warned participants to the signs of phishing in emails on mobile devices.
Findings
The results of this study indicated audio alerts and visual warnings potentially lower phishing susceptibility in emails. Audiovisual warnings appeared to assist study participants in noticing phishing emails more easily and in less time than without audiovisual warnings.
Practical implications
This study's implications to mitigation of phishing emails are key, as it appears that alerts and warnings added to email applications may play a significant role in the reduction of phishing susceptibility.
Originality/value
This study extends the existing information security body of knowledge on phishing prevention and awareness by using audiovisual alerts and warnings to email recipients tested in real-life applications.
Details
Keywords
Employees' personal Internet usage (PIU) has become increasingly common at work. It is important for both researchers and managers to understand how PIU affects employee creative…
Abstract
Purpose
Employees' personal Internet usage (PIU) has become increasingly common at work. It is important for both researchers and managers to understand how PIU affects employee creative performance. This study aims to examine what kind of PIU is likely to increase or decrease employee creative performance and why. The authors also examine a potential boundary condition for the effect of PIU on employee creative performance.
Design/methodology/approach
Based on conservation of resource (COR) theory and broaden and build theory, the authors investigated the impact of two types of PIU, namely within-task PIU and between-task PIU, on the creative performance of knowledge workers. The authors conducted a daily diary study and surveyed 107 knowledge workers in China over 10 consecutive working days (n = 1,070) to test the model.
Findings
The authors find that within-task PIU reduces knowledge workers' creative performance by decreasing the workers' positive emotion, whereas between-task PIU promotes the performance by increasing positive emotion. The above relationships become stronger when knowledge workers perceive a higher level of organisational support.
Originality/value
The authors' study makes theoretical contributions by advancing researchers' understanding of the situations in which PIU may decrease or increase employee creative performance. The findings are also useful for developing organisational policies to take advantage of the positive side of PIU whilst avoiding PIU's negative side.
Details
Keywords
Puzant Balozian, Dorothy Leidner and Botong Xue
Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory…
Abstract
Purpose
Intellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory building, this study proposes a theory of ICCS drawing upon tested empirical data of information systems security (ISS) theory in Lebanon.
Design/methodology/approach
After a pilot test, the authors tested the newly developed ISS theory using a field study consisting of 187 respondents, representing many industries, thus contributing to generalizability. ISS theory is used as a proxy for the development of ICCS theory.
Findings
Based on a review of the literature from the past three decades in the information systems (IS) discipline and a discovery of the partial yet significant relevance of ISS literature to ICCS, this study succinctly summarized the antecedents and independent variables impacting security compliance behavior, putting the variables into one comprehensive yet parsimonious theoretical model. This study shows the theoretical and practical relevancy of ISS theory to ICCS theory building.
Practical implications
This paper highlights the importance of ISS compliance in the context of ICCS, especially in the area of spoken knowledge in environments containing Internet-based security devices.
Originality/value
This research article is original, as it presents the theory of ICCS, which was developed by drawing upon a comprehensive literature review of the IS discipline and finding the bridges between the security of both IS and IC.
Details
Keywords
Kerry Tudor, Aslihan Spaulding, Kayla D. Roy and Randy Winter
The purpose of this paper is to investigate the relationships among choice of risk management tools, perceived effectiveness of risk management tools, self-reported risk attitude…
Abstract
Purpose
The purpose of this paper is to investigate the relationships among choice of risk management tools, perceived effectiveness of risk management tools, self-reported risk attitude, and farm and farmer characteristics.
Design/methodology/approach
A mail survey was used to collect information about utilization of risk management tools, perceived effectiveness of risk management tools, and factors that could influence choice of risk management tools by Illinois farmers. Cluster analysis, one-way ANOVA, χ2 tests of independence, and multinomial logistic regression were utilized to detect possible relationships among choice of risk management tools, perceived effectiveness of risk management tools, self-reported risk attitude, and farm and farmer characteristics.
Findings
Multinomial logistic regression analysis revealed that age and gross farm income (GFI) were the strongest predictors of the risk management tool utilization group to which an individual would be assigned. The number of risk management tools utilized decreased with age but increased with GFI. Neither self-reported risk attitude nor education was a significant independent variable in the multinomial logistic regression model, but both were strongly impacted by age. Younger farmers with higher GFI were the most likely users of hedging.
Research limitations/implications
The results of this study provide support for the idea that farmers who are better able to generate revenue are better able to manage risk, but the direction of causality was not investigated.
Practical implications
Risk management service providers could benefit from this study as a benchmark for understanding their current and potential farmer clients’ risk management strategies.
Originality/value
This study used cluster analysis and multinomial logistic regression to address the complexity of decisions regarding multiple risk management tools. The number of tools utilized by individuals was investigated.
Details