Search results
1 – 10 of 346Jinnan Wu, Mengmeng Song, Pablo Zoghbi-Manrique-de-Lara, Hemin Jiang, Shanshan Guo and Wenpei Zhang
This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory…
Abstract
Purpose
This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory, the authors developed a model to explain the role of employees' perceived certainty of formal and informal sanctions in understanding the effect of coworkers' cyberloafing behavior on employees' cyberloafing behavior.
Design/methodology/approach
The authors conducted a survey that involved a two-stage data collection process (including 293 respondents) to test our developed model. Mplus 7.0 was used to analyze the data.
Findings
The results revealed that employees' cyberloafing was positively affected by their coworkers' cyberloafing both directly and indirectly. The indirect effect of coworkers' cyberloafing on employees' cyberloafing was mediated by the employees' perceived certainty of formal and informal sanctions on cyberloafing. Employees' perceived certainty of formal and informal sanctions were found to mediate the relationship both separately (each type of sanctions mediates the relationship individually) and in combination (the two types of sanctions form a serial mediation effect).
Originality/value
The study reveals an important mechanism – employees’ perceived certainty of formal and informal sanctions – that underlies the relationship between coworkers' cyberloafing and employees' cyberloafing, thus, contributing to the cyberloafing literature. It also demonstrates the importance of negative reinforcement (perceived sanctions) in the social learning process, which contributes to the literature on social learning theory because previous studies have primarily focused on the role of positive reinforcement. Lastly, the study reveals a positive relationship between employees' perceived certainty of formal sanctions and informal sanctions, which has important implications for deterrence theory.
Details
Keywords
Yavuz Idug, Suman Niranjan, Ila Manuj, David Gligor and Jeffrey Ogden
The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy…
Abstract
Purpose
The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy, general deterrence theory and protection motivation theory this research investigates the behavioral factors impacting ride-hailing drivers' operational performance.
Design/methodology/approach
The authors empirically test the antecedents impacting a ride-hailing driver's operational performance using an online survey dataset comprising 513 ride-hailing drivers working for Uber and Lyft in the United States.
Findings
Ride-hailing drivers' intention to comply with the ride-hailing company guidelines results in better operational performance for the driver. Moreover, drivers believe that ride-hailing companies have effective penalties to deter drivers from violating company guidelines. However, drivers also believe that the chances of being caught while ignoring the company guidelines are low.
Practical implications
The results of this research support the decision-making processes of ride-hailing company managers and offer insights on how managers can enhance the operational performance of their drivers.
Originality/value
This study provides unique contributions to emerging research at the intersection of peer-to-peer asset sharing, behavioral studies and technology management. This research is one of the first to explore the role of behavioral factors such as coping mechanisms on the operational performance of sharing economy workers.
Details
Keywords
Rachael Wheatley, Sara Henley and Frank Farnham
This paper aims to present issues of deterrence related to stalking.
Abstract
Purpose
This paper aims to present issues of deterrence related to stalking.
Design/methodology/approach
The authors have combined recent mixed method research findings and existing general deterrence literature with their practitioner experiences of working with this population, to provide a novel viewpoint paper intending to influence advancements in knowledge in this area.
Findings
Recent qualitative research investigating the function of stalking in a small sample (see Wheatley et al., 2020a) noted the participants’ focus on the lack of deterrence. For example, participants described feeling emotionally stuck in their pursuits, experiencing poor access to help and support, being ignorant of the potential custodial consequences of their offending and even stating that imprisonment provided a harsh yet necessary moment of reality.
Originality/value
This novel discussion paper reviews these findings in relation to both the available research based on deterrence generally and deterrence related to stalking and the experience of working with stalking cases in clinical practice. This paper explores what we know about the motivations that underlie stalking behaviour and how that relates to the effectiveness of deterrence, including the role of traditional criminal justice approaches to this type of offending.
Details
Keywords
This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the…
Abstract
Purpose
This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the nuclear challenge between Iran and Israel and Iran's expanding activities in the region.
Design/methodology/approach
To prove the central argument, the study uses a conceptual framework that centers on deterrence as the main approach used by states to consolidate their influence in the Middle East region.
Findings
Iran's nuclear progress and influence in the region has strengthened Israel’s security and fostered an unprecedented open rapprochement led by USA efforts with the Gulf regimes.
Originality/value
The paper draws particular attention to the Iran–Israel nuclear competency, and the Israeli preferred policy options regarding Iranian activities in the region amid turbulent Middle East. In addition, the paper offers insight to the regional dynamics that further consolidated Israel’s national security in the region while maintaining a status of Arab vulnerability and backwardness.
Details
Keywords
Today, digital piracy remains a growing challenge for legislators and businesses operating in the entertainment industry. For these reasons, policymakers place significant efforts…
Abstract
Purpose
Today, digital piracy remains a growing challenge for legislators and businesses operating in the entertainment industry. For these reasons, policymakers place significant efforts in reducing piracy activities through copyright enforcement policies. Yet, the effectiveness of these frameworks remains questionable since empirical evidence offers countervailing insights. For these reasons, this study adopts a demand-side approach to investigate how users' emotional reactions to the copyright enforcement policy influence their digital piracy-related judgments and intention.
Design/methodology/approach
The author used a scenario-based approach to test the hypotheses and surveyed 262 users who actively stream movies and TV shows.
Findings
By drawing on the appraisal tendency framework, the author finds that among individuals experiencing fear due to the copyright enforcement policy, there is a decreasing intention to continue using illegal streaming services. On the contrary, individuals experiencing indignation are more likely to have increased intention to use illegal streaming services. On top of this, we reveal indirect effects by mediating individuals' vulnerability to sanctions (fear path) and subjective norms (indignation path) as judgments cues.
Originality/value
The author contributes to digital piracy literature in two ways with the study. First, the author unfolds the affective background that explains the emergence of deterrence or defiance effects when users respond to the copyright enforcement policy. Thus, the author shows that fear is a trigger for decreasing while indignation increases the usage of illegal streaming services. Second, through the appraisal tendency framework, the author enriches the literature by theorizing and providing empirical evidence on how previously established vulnerability to sanctions and subjective norms reinforce affective influences on encouraging or discouraging digital piracy intentions. Overall, the findings also provide policymakers with original insights on designing their copyright enforcement tools to combat digital piracy further.
Details
Keywords
Richmond Kumi and Richard Kwasi Bannor
The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.
Abstract
Purpose
The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.
Design/methodology/approach
Primary data were collected from 92 respondents using structured questionnaires. A multistage sampling technique was employed and used in selecting respondents.. Descriptive statistics, factor analysis and quantile regression analysis were used to analyse data obtained via the questionnaires.
Findings
The study found tax reporting knowledge, tax calculating knowledge and tax payment knowledge to be the keen factors influencing agrochemical traders’ tax knowledge. It was also revealed that age, religion and marriage positively influence the tax morale of traders. Inversely, gender, high level of education and monthly sales were found to affect tax morale negatively. Moreover, trust (respect, trustworthiness and expertise knowledge) negatively influenced tax morale. Authorities’ tax knowledge and power (sanction and lockdown) were revealed to impact tax morale positively. However, tax morale decreases amongst agrochemical traders with higher tax morale when sanction increases.
Originality/value
Unlike previous studies which focussed on tax morale amongst individuals and firms outside the agribusiness sector, this study examined the tax morale within the informal agrochemical trading sector, which has recently attracted colossal patronage due to the high usage of agrochemicals amongst farmers in Africa and Ghana. This study also assumed tax morale to be at different levels; hence the factors that affect the morale at different levels differ. Therefore, the study examined the factors influencing tax morale amongst agrochemical traders by segregating tax morale into quartiles. Relating to theory, the economic deterrence theory was used to ground the study, which is not usually used in most tax morale studies.
Details
Keywords
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…
Abstract
Purpose
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.
Design/methodology/approach
An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.
Findings
The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.
Originality/value
This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
Details
Keywords
Hector Martin, Ashlee Miller, Amrita Milling and Marie Martin
Business-to-government corruption has destroyed many businesses and debilitated numerous countries. The paradox of plenty, or the curse of resources, is exacerbated in emerging…
Abstract
Purpose
Business-to-government corruption has destroyed many businesses and debilitated numerous countries. The paradox of plenty, or the curse of resources, is exacerbated in emerging oil and gas economies, where corruption is rampant. Corruption most frequently occurs within the tendering stage of construction projects and the current debate fails to arrest this ubiquitous boundless construct in small island developing states (SIDSs). The purpose of this study is to explain how the unique features of SIDS contributes to an understanding of B2G corruption during construction tendering.
Design/methodology/approach
This study elucidates corruption in the tendering process through the lens of collective action and principal–agent theories. Interviews with three experts and a questionnaire survey with 115 practitioners evaluated corruption in Trinidad’s construction industry. Principal component analysis reduced 33 corruption variables to 5 primary causes. In addition, the relative importance of potential solutions for curtailing corruption was assessed.
Findings
The derived factors highlight that governance within SID oil and gas economies, inadequate tender procedures and practices, reprehensible business growth strategies, unethical misconduct and the social networking context characterise public infrastructure tendering. The recommendations for minimising corruption in tendering are grounded in behaviour and deterrence theories and infused with technological advances.
Research limitations/implications
Using surveys and interviews circumvents the limitation of the inability to measure corruption because of the confines of respondents’ recall triggers. However, corruption is mediated by cultural norms, which limits the generalisation of the findings.
Originality/value
The study concludes that corruption results from a lack of transparency in the construction supply chain. It leads to an awareness gap between project stakeholders, which is a major risk factor and source of mistrust. The result is a lack of traceable processes and coordination among stakeholders. Consequently, the study fills the gap in responsible socio-economic consumption in SIDSs.
Details
Keywords
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…
Abstract
Purpose
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.
Design/methodology/approach
A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.
Research limitations/implications
This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.
Originality/value
The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.
Details
Keywords
Raiswa Saha, Sakshi Ahlawat, Umair Akram, Uttara Jangbahadur, Amol S. Dhaigude, Pooja Sharma and Sarika Kumar
The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators…
Abstract
Purpose
The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators, outcomes and moderators of OA and future research opportunities. Two research questions are addressed. How have the past studies on OA progressed regarding theories, context, characteristics and methodology? What future research opportunities can be done in this area?
Design/methodology/approach
This study systematically reviews, synthesizes and integrates OA literature using the well-recommended preferred reporting items for systematic reviews and meta-analyses (PRISMA) rules. The literature on OA was synthesized based on the Theory–Context–Characteristics–Methodologies (TCCM) framework given by Paul and Rosado-Serrano.
Findings
Through an examination of TCCM used in OA research, the review presents an all-inclusive and up-to-date overview of the research in this arena and sets a future research agenda to spur scholarly research. This systematic literature review has analyzed top-quality sample papers, published in the past decade. As a result, it contributes to a better understanding of this relationship by analyzing the different types of use and the value added to the shopping experience.
Originality/value
This study provides groundwork for researchers and promotes a deeper understanding of OA.
Details