Search results

1 – 4 of 4
Content available
Article
Publication date: 30 September 2013

730

Abstract

Details

The TQM Journal, vol. 25 no. 6
Type: Research Article
ISSN: 1754-2731

Open Access
Article
Publication date: 17 December 2021

Alexandre Cappellozza, Gustavo Hermínio Salati Marcondes de Moraes, Gilberto Perez and Alessandra Lourenço Simões

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established…

Abstract

Purpose

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules.

Design/methodology/approach

The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems.

Findings

The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention.

Research limitations/implications

This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches.

Practical implications

The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior.

Social implications

Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies.

Originality/value

The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.

Open Access
Article
Publication date: 28 April 2022

Lívia Veiga de Oliveira Bispo and Marluce Dantas de Freitas Lodi

The study aims to investigate how the action research contributes to the collective construction of a discipline in management. This issue was the motivation for the present…

Abstract

Purpose

The study aims to investigate how the action research contributes to the collective construction of a discipline in management. This issue was the motivation for the present study, which was developed from the experience of master's degree students attending the post-graduate program in management of an institution in the State of Bahia, Brazil.

Design/methodology/approach

The overall objective of this study is to understand the method's effectiveness for this aim, whereas the specific objectives are to identify the commitment of the subjects in the activities proposed and to assess the effectiveness of the use of active methods in the discipline construction. The theoretical background is regarding digital education transformation, active teaching methods and action research. As for the qualitative perspective, the methodological approach of choice was that of participant observation (for data collection) and content analysis.

Findings

It was possible to highlight the awakening of critical sense and the effectiveness of action research in enhancing the protagonism of the master's degree students in the construction of their own knowledge.

Originality/value

This study not only contributes to the field of applied social sciences but also opens a precedent for the experience of collective construction of a discipline in another area of knowledge by means of action research. Another factor demonstrating the relevance of this study is the production of essays and articles by master's degree students in which active methodologies were related to themes of interest.

Details

Revista de Gestão, vol. 29 no. 4
Type: Research Article
ISSN: 1809-2276

Keywords

Open Access
Article
Publication date: 12 July 2023

Nicola Cobelli and Emanuele Blasioli

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management…

1052

Abstract

Purpose

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management. Furthermore, this study aims to provide an overview of the existing resources in healthcare management and education and other developing interdisciplinary fields.

Design/methodology/approach

This work uses bibliometric analysis to conduct a comprehensive review to map the use of the unified theory of acceptance and use of technology (UTAUT) and the unified theory of acceptance and use of technology 2 (UTAUT2) research models in healthcare academic studies. Bibliometric studies are considered an important tool to evaluate research studies and to gain a comprehensive view of the state of the art.

Findings

Although UTAUT dates to 2003, our bibliometric analysis reveals that only since 2016 has the model, together with UTAUT2 (2012), had relevant application in the literature. Nonetheless, studies have shown that UTAUT and UTAUT2 are particularly suitable for understanding the reasons that underlie the adoption and non-adoption choices of eHealth services. Further, this study highlights the lack of a multidisciplinary approach in the implementation of eHealth services. Equally significant is the fact that many studies have focused on the acceptance and the adoption of eHealth services by end users, whereas very few have focused on the level of acceptance of healthcare professionals.

Originality/value

To the best of the authors’ knowledge, this is the first study to conduct a bibliometric analysis of technology acceptance and adoption by using advanced tools that were conceived specifically for this purpose. In addition, the examination was not limited to a certain era and aimed to give a worldwide overview of eHealth service acceptance and adoption.

Details

The TQM Journal, vol. 35 no. 9
Type: Research Article
ISSN: 1754-2731

Keywords

Access

Only content I have access to

Year

Content type

1 – 4 of 4