Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 2 of 2
To view the access options for this content please click here
Article
Publication date: 11 June 2018

Escalation of commitment as an antecedent to noncompliance with information security policy

Miranda Kajtazi, Hasan Cavusoglu, Izak Benbasat and Darek Haftor

This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a task  

HTML
PDF (274 KB)

Abstract

Purpose

This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a task – referred to as a task unlikely to be completed without violating the organization’s information security policy (ISP).

Design/methodology/approach

An empirical test of the suggested relationships in the proposed model was conducted through a field study using the survey method for data collection. Pre-tests, pre-study, main study and a follow-up study compose the frame of our methodology where more than 500 respondents are involved across different organizations.

Findings

The results confirm that the antecedents that explain the escalation of commitment behavior in terms of the effect of lost assets, such as time, effort and other resources, give us a new lens to understand noncompliance behavior; employees seem to escalate their commitments to the completion of their tasks at the expense of becoming noncompliant with ISP.

Research limitations/implications

One of the key areas that requires further attention from this study is to better understand the role of risk perceptions on employee behavior when dealing with value conflicts. Depending on how risk-averse or risk seeking an employee is, the model showed no significant support in either case to influence their noncompliance behavior. The authors therefore argue that employees' noncompliance may be influenced by more powerful beliefs, such as self-justification and sunk costs.

Practical implications

The results show that when employees are caught in tasks undergoing difficulties, they are more likely to increase noncompliance behavior. By understanding better how project obstacles result in such tasks, security managers can define new mechanisms to counter employees’ shift from compliance to noncompliance.

Social implications

Apart from encouraging compliance with enforcement mechanisms (using direct behavioral controls like sanctions or rewards), indirect behavior controls may also encourage compliance. The authors suggest that the ISPs should state that the organization would take positive actions toward task completion and help their employees to resolve their problems quickly.

Originality/value

This study is the first to tackle escalation of commitment theories and use antecedents that explain the effect of lost assets, such as time, effort and other resources can also explain noncompliance with ISP in terms of the value conflicts, where employees would often choose to forego compliance at the expense of finishing their tasks.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/ICS-09-2017-0066
ISSN: 2056-4961

Keywords

  • Prospect theory
  • Information security policy
  • Approach avoidance theory
  • Employee’s noncompliance behaviour
  • Escalation of commitment behaviour
  • Self-justification theory

Content available
Article
Publication date: 2 July 2018

RFID and ERP systems in supply chain management

Pejvak Oghazi, Fakhreddin Fakhrai Rad, Stefan Karlsson and Darek Haftor

The purpose of this paper is to identify the impact of enterprise systems (ESs), in particular radio frequency identification (RFID) and enterprise resource planning (ERP…

Open Access
HTML
PDF (199 KB)

Abstract

Purpose

The purpose of this paper is to identify the impact of enterprise systems (ESs), in particular radio frequency identification (RFID) and enterprise resource planning (ERP) systems, on supply chain management (SCM). The results of this conceptual paper demonstrate that ERP and RFID systems contribute to SCM by improving supply chain integration. Supply chain integration occurs to facilitate the flow of financing, products, and information throughout the chain. In this regard, ERP and RFID contribute to integration by enhancing the information flow across the supply chain.

Design/methodology/approach

This paper proposes a conceptual model developed from the findings of literature review within the research domains of SCM, ESs, and supply chain integration.

Findings

This conceptual study contributes to the existing theory by linking the concept of information technology, ESs to SCM. The conceptual model in this paper may provide insights for executives who wish to implement ERP or RFID systems in their businesses in order to achieve higher integration, both within internal sectors and also with supply chain partners.

Originality/value

The findings in this study contribute to the theory base by linking the concept of information technologies, ESs to SCM. The conceptual model presented in this paper can provide insights for executives who wish to implement ERP or RFID systems in their businesses in order to achieve higher integration within internal sectors and with supply chain partners. This study offers new understandings by investigating the impact of ERP and RFID together on SCM.

Details

European Journal of Management and Business Economics, vol. 27 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/EJMBE-02-2018-0031
ISSN: 2444-8451

Keywords

  • Enterprise resource planning (ERP)
  • Supply chain management
  • Information technology
  • Supply chain integration
  • Enterprise systems
  • Radio frequency identification (RFID)

Access
Only content I have access to
Only Open Access
Year
  • All dates (2)
Content type
  • Article (2)
1 – 2 of 2
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here