Search results

1 – 10 of 346
Article
Publication date: 12 July 2022

Jinnan Wu, Mengmeng Song, Pablo Zoghbi-Manrique-de-Lara, Hemin Jiang, Shanshan Guo and Wenpei Zhang

This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory…

1038

Abstract

Purpose

This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory, the authors developed a model to explain the role of employees' perceived certainty of formal and informal sanctions in understanding the effect of coworkers' cyberloafing behavior on employees' cyberloafing behavior.

Design/methodology/approach

The authors conducted a survey that involved a two-stage data collection process (including 293 respondents) to test our developed model. Mplus 7.0 was used to analyze the data.

Findings

The results revealed that employees' cyberloafing was positively affected by their coworkers' cyberloafing both directly and indirectly. The indirect effect of coworkers' cyberloafing on employees' cyberloafing was mediated by the employees' perceived certainty of formal and informal sanctions on cyberloafing. Employees' perceived certainty of formal and informal sanctions were found to mediate the relationship both separately (each type of sanctions mediates the relationship individually) and in combination (the two types of sanctions form a serial mediation effect).

Originality/value

The study reveals an important mechanism – employees’ perceived certainty of formal and informal sanctions – that underlies the relationship between coworkers' cyberloafing and employees' cyberloafing, thus, contributing to the cyberloafing literature. It also demonstrates the importance of negative reinforcement (perceived sanctions) in the social learning process, which contributes to the literature on social learning theory because previous studies have primarily focused on the role of positive reinforcement. Lastly, the study reveals a positive relationship between employees' perceived certainty of formal sanctions and informal sanctions, which has important implications for deterrence theory.

Details

Information Technology & People, vol. 36 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 April 2023

Yavuz Idug, Suman Niranjan, Ila Manuj, David Gligor and Jeffrey Ogden

The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy…

Abstract

Purpose

The proliferation of ride-hailing businesses brings significant considerations for improving the driver's operational performance. Informed by the literature on sharing economy, general deterrence theory and protection motivation theory this research investigates the behavioral factors impacting ride-hailing drivers' operational performance.

Design/methodology/approach

The authors empirically test the antecedents impacting a ride-hailing driver's operational performance using an online survey dataset comprising 513 ride-hailing drivers working for Uber and Lyft in the United States.

Findings

Ride-hailing drivers' intention to comply with the ride-hailing company guidelines results in better operational performance for the driver. Moreover, drivers believe that ride-hailing companies have effective penalties to deter drivers from violating company guidelines. However, drivers also believe that the chances of being caught while ignoring the company guidelines are low.

Practical implications

The results of this research support the decision-making processes of ride-hailing company managers and offer insights on how managers can enhance the operational performance of their drivers.

Originality/value

This study provides unique contributions to emerging research at the intersection of peer-to-peer asset sharing, behavioral studies and technology management. This research is one of the first to explore the role of behavioral factors such as coping mechanisms on the operational performance of sharing economy workers.

Details

International Journal of Operations & Production Management, vol. 43 no. 12
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 17 February 2023

Rachael Wheatley, Sara Henley and Frank Farnham

This paper aims to present issues of deterrence related to stalking.

Abstract

Purpose

This paper aims to present issues of deterrence related to stalking.

Design/methodology/approach

The authors have combined recent mixed method research findings and existing general deterrence literature with their practitioner experiences of working with this population, to provide a novel viewpoint paper intending to influence advancements in knowledge in this area.

Findings

Recent qualitative research investigating the function of stalking in a small sample (see Wheatley et al., 2020a) noted the participants’ focus on the lack of deterrence. For example, participants described feeling emotionally stuck in their pursuits, experiencing poor access to help and support, being ignorant of the potential custodial consequences of their offending and even stating that imprisonment provided a harsh yet necessary moment of reality.

Originality/value

This novel discussion paper reviews these findings in relation to both the available research based on deterrence generally and deterrence related to stalking and the experience of working with stalking cases in clinical practice. This paper explores what we know about the motivations that underlie stalking behaviour and how that relates to the effectiveness of deterrence, including the role of traditional criminal justice approaches to this type of offending.

Details

Journal of Criminal Psychology, vol. 13 no. 2
Type: Research Article
ISSN: 2009-3829

Keywords

Open Access
Article
Publication date: 14 March 2020

Nora Maher

This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the…

7784

Abstract

Purpose

This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the nuclear challenge between Iran and Israel and Iran's expanding activities in the region.

Design/methodology/approach

To prove the central argument, the study uses a conceptual framework that centers on deterrence as the main approach used by states to consolidate their influence in the Middle East region.

Findings

Iran's nuclear progress and influence in the region has strengthened Israel’s security and fostered an unprecedented open rapprochement led by USA efforts with the Gulf regimes.

Originality/value

The paper draws particular attention to the Iran–Israel nuclear competency, and the Israeli preferred policy options regarding Iranian activities in the region amid turbulent Middle East. In addition, the paper offers insight to the regional dynamics that further consolidated Israel’s national security in the region while maintaining a status of Arab vulnerability and backwardness.

Details

Review of Economics and Political Science, vol. 8 no. 3
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 27 May 2022

Dario Miocevic

Today, digital piracy remains a growing challenge for legislators and businesses operating in the entertainment industry. For these reasons, policymakers place significant efforts…

Abstract

Purpose

Today, digital piracy remains a growing challenge for legislators and businesses operating in the entertainment industry. For these reasons, policymakers place significant efforts in reducing piracy activities through copyright enforcement policies. Yet, the effectiveness of these frameworks remains questionable since empirical evidence offers countervailing insights. For these reasons, this study adopts a demand-side approach to investigate how users' emotional reactions to the copyright enforcement policy influence their digital piracy-related judgments and intention.

Design/methodology/approach

The author used a scenario-based approach to test the hypotheses and surveyed 262 users who actively stream movies and TV shows.

Findings

By drawing on the appraisal tendency framework, the author finds that among individuals experiencing fear due to the copyright enforcement policy, there is a decreasing intention to continue using illegal streaming services. On the contrary, individuals experiencing indignation are more likely to have increased intention to use illegal streaming services. On top of this, we reveal indirect effects by mediating individuals' vulnerability to sanctions (fear path) and subjective norms (indignation path) as judgments cues.

Originality/value

The author contributes to digital piracy literature in two ways with the study. First, the author unfolds the affective background that explains the emergence of deterrence or defiance effects when users respond to the copyright enforcement policy. Thus, the author shows that fear is a trigger for decreasing while indignation increases the usage of illegal streaming services. Second, through the appraisal tendency framework, the author enriches the literature by theorizing and providing empirical evidence on how previously established vulnerability to sanctions and subjective norms reinforce affective influences on encouraging or discouraging digital piracy intentions. Overall, the findings also provide policymakers with original insights on designing their copyright enforcement tools to combat digital piracy further.

Open Access
Article
Publication date: 6 January 2023

Richmond Kumi and Richard Kwasi Bannor

The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.

1440

Abstract

Purpose

The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.

Design/methodology/approach

Primary data were collected from 92 respondents using structured questionnaires. A multistage sampling technique was employed and used in selecting respondents.. Descriptive statistics, factor analysis and quantile regression analysis were used to analyse data obtained via the questionnaires.

Findings

The study found tax reporting knowledge, tax calculating knowledge and tax payment knowledge to be the keen factors influencing agrochemical traders’ tax knowledge. It was also revealed that age, religion and marriage positively influence the tax morale of traders. Inversely, gender, high level of education and monthly sales were found to affect tax morale negatively. Moreover, trust (respect, trustworthiness and expertise knowledge) negatively influenced tax morale. Authorities’ tax knowledge and power (sanction and lockdown) were revealed to impact tax morale positively. However, tax morale decreases amongst agrochemical traders with higher tax morale when sanction increases.

Originality/value

Unlike previous studies which focussed on tax morale amongst individuals and firms outside the agribusiness sector, this study examined the tax morale within the informal agrochemical trading sector, which has recently attracted colossal patronage due to the high usage of agrochemicals amongst farmers in Africa and Ghana. This study also assumed tax morale to be at different levels; hence the factors that affect the morale at different levels differ. Therefore, the study examined the factors influencing tax morale amongst agrochemical traders by segregating tax morale into quartiles. Relating to theory, the economic deterrence theory was used to ground the study, which is not usually used in most tax morale studies.

Details

Arab Gulf Journal of Scientific Research, vol. 41 no. 3
Type: Research Article
ISSN: 1985-9899

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 8 February 2022

Hector Martin, Ashlee Miller, Amrita Milling and Marie Martin

Business-to-government corruption has destroyed many businesses and debilitated numerous countries. The paradox of plenty, or the curse of resources, is exacerbated in emerging…

Abstract

Purpose

Business-to-government corruption has destroyed many businesses and debilitated numerous countries. The paradox of plenty, or the curse of resources, is exacerbated in emerging oil and gas economies, where corruption is rampant. Corruption most frequently occurs within the tendering stage of construction projects and the current debate fails to arrest this ubiquitous boundless construct in small island developing states (SIDSs). The purpose of this study is to explain how the unique features of SIDS contributes to an understanding of B2G corruption during construction tendering.

Design/methodology/approach

This study elucidates corruption in the tendering process through the lens of collective action and principal–agent theories. Interviews with three experts and a questionnaire survey with 115 practitioners evaluated corruption in Trinidad’s construction industry. Principal component analysis reduced 33 corruption variables to 5 primary causes. In addition, the relative importance of potential solutions for curtailing corruption was assessed.

Findings

The derived factors highlight that governance within SID oil and gas economies, inadequate tender procedures and practices, reprehensible business growth strategies, unethical misconduct and the social networking context characterise public infrastructure tendering. The recommendations for minimising corruption in tendering are grounded in behaviour and deterrence theories and infused with technological advances.

Research limitations/implications

Using surveys and interviews circumvents the limitation of the inability to measure corruption because of the confines of respondents’ recall triggers. However, corruption is mediated by cultural norms, which limits the generalisation of the findings.

Originality/value

The study concludes that corruption results from a lack of transparency in the construction supply chain. It leads to an awareness gap between project stakeholders, which is a major risk factor and source of mistrust. The result is a lack of traceable processes and coordination among stakeholders. Consequently, the study fills the gap in responsible socio-economic consumption in SIDSs.

Details

Journal of Facilities Management , vol. 21 no. 3
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1043

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 17 January 2024

Raiswa Saha, Sakshi Ahlawat, Umair Akram, Uttara Jangbahadur, Amol S. Dhaigude, Pooja Sharma and Sarika Kumar

The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators…

Abstract

Purpose

The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators, outcomes and moderators of OA and future research opportunities. Two research questions are addressed. How have the past studies on OA progressed regarding theories, context, characteristics and methodology? What future research opportunities can be done in this area?

Design/methodology/approach

This study systematically reviews, synthesizes and integrates OA literature using the well-recommended preferred reporting items for systematic reviews and meta-analyses (PRISMA) rules. The literature on OA was synthesized based on the Theory–Context–Characteristics–Methodologies (TCCM) framework given by Paul and Rosado-Serrano.

Findings

Through an examination of TCCM used in OA research, the review presents an all-inclusive and up-to-date overview of the research in this arena and sets a future research agenda to spur scholarly research. This systematic literature review has analyzed top-quality sample papers, published in the past decade. As a result, it contributes to a better understanding of this relationship by analyzing the different types of use and the value added to the shopping experience.

Originality/value

This study provides groundwork for researchers and promotes a deeper understanding of OA.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

1 – 10 of 346