Search results

1 – 10 of over 5000
Article
Publication date: 28 February 2022

Ebrahim Vatan, Gholam Ali Raissi Ardali and Arash Shahin

This study aims to investigate the effects of organizational culture factors on the selection of software process development models and develops a conceptual model for selecting…

Abstract

Purpose

This study aims to investigate the effects of organizational culture factors on the selection of software process development models and develops a conceptual model for selecting and adopting process development models with an organizational culture approach, using 12 criteria and their sub-criteria defined in Fey and Denison’s model (12 criteria).

Design/methodology/approach

The research hypotheses were investigated using statistical analysis, and then the criteria and sub-criteria were selected based on Fey and Denison’s model and the experts’ viewpoints. Afterward, the organizational culture of the selected company was measured using the data from 2016 and 2017, based on Fey and Denison’s questionnaire. Due to the correlation between the criteria, using the decision-making trial and evaluation technique, the correlation between sub-criteria were determined, and by analytical network process method and using Super-Decision software, the process development model was preferred to the 12 common models in information systems development.

Findings

Results indicated a significant and positive effect of organizational culture factors (except the core values factor) on the selection of development models. Also, by changing the value of organizational culture, the selected process development model changed either. Sensitivity analysis performed on the sub-criteria implied that by changing and improving some sub-criteria, the organization will be ready and willing to use the agile or risk-based models such as spiral and win-win models. Concerning units where the mentioned indicators were at moderate and low limits, models such as waterfall, V-shaped and incremental worked more appropriately.

Originality/value

While many studies were performed in comparing development models and investigating their strengths and weaknesses, and the impact of organizational culture on the success of information technology projects, literature indicated that the impact of organizational sub-culture prevailing in the selection of development process models has not been investigated. In this study, new factors and indicators were addressed affecting the selection of development models with a focus on organizational culture. Correlation among the factors and indicators was also investigated and, finally, a conceptual model was proposed for proper adoption of the models and methodologies of system development.

Article
Publication date: 26 April 2024

Rebecca Dei Mensah, Stephen Tetteh, Jacinta Martina Annan, Raphael Papa Kweku Andoh and Elijah Osafo Amoako

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management…

Abstract

Purpose

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management culture and HR records privacy control in organisations in Ghana.

Design/methodology/approach

Structural equation modelling was used in analysing the data. Following the specification of the model, three main types of analyses were carried out. They were reflective measurement model analyses to test reliability and validity; formative measurement model analyses to test redundancy, collinearity, significance and relevance of the lower-order constructs; and structural model analyses to ascertain the explanatory and predictive powers of the model, significance of the hypotheses and their effect sizes.

Findings

The study confirmed that communication, privacy awareness and training and risk assessment are dimensions of HR records management culture. Concerning the hypotheses, it was established that HR records management culture is related to HR records privacy control. Also, the study showed that employee experience positively moderated the relationship HR records management culture has with HR records privacy control. However, top management commitment negatively moderated the relationship HR records management culture has with HR records privacy control.

Practical implications

Organisations committed to the privacy control of HR records need to ensure the retention of their employees, as the longer they stay with the organisation, the more they embody the HR records management culture which improves the privacy control of HR records. For top management commitment, it should be restricted to providing strategic direction for HR records privacy control, as the day-to-day influence of top management commitment on the HR records management culture does not improve the privacy control of HR records.

Originality/value

This study demonstrates that communication, privacy awareness and training and risk assessment are dimensions of HR record management culture. Also, the extent of employee experience and top management commitment required in the relationship between HR records management culture and HR records privacy control is revealed.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 9 April 2024

Florence Lunkuse, John C. Munene, Joseph M. Ntayi, Arthur Sserwanga and James Kagaari

This study aims to examine the relationship between tool adoption and information literacy within smallholder farmers (SHFs).

Abstract

Purpose

This study aims to examine the relationship between tool adoption and information literacy within smallholder farmers (SHFs).

Design/methodology/approach

A structured questionnaire was used to gather data for this quantitative study from 225 SHFs. Structural equation modelling was done to test the hypotheses.

Findings

The findings established that tool adoption dimensions (Information and communication technologies (ICT) acceptance, language use and information culture) positively and significantly influenced information literacy. Information culture had the strongest impact.

Research limitations/implications

The study enriches the situated learning theory (SLT) literature by introducing tool adoption as a predictor of information literacy in a new context of SHFs. Use of tools as independent variables is a positive deviation from previous studies that have used them as mediating variables. Despite the contributions, the cross-sectional design study undermines the ability to solicit more detailed perspectives from the lived in experience of the respondents.

Practical implications

Managers should promote usage of context-specific tools like local radio stations and mobile phones, but also use language tailored to farmer contexts when disseminating information. Policymakers should leverage on social and cultural settings when designing information interventions.

Social implications

The study highlights critical factors that significantly promote information use for improved productivity for SHFs, cumulatively increasing the country’s gross domestic product (GDP). Socially, findings may reduce on their poverty levels of farmers.

Originality/value

This study offers a novel perspective in information literacy domain by using the SLT to delineate contextual tools that are paramount in predicting of information literacy in an under research informal context of SHFs.

Details

The Bottom Line, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0888-045X

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1044

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 6 June 2023

Hamid Yeganeh

This paper aims to analyze the implications of orality for management practices in a developing country such as Iran.

Abstract

Purpose

This paper aims to analyze the implications of orality for management practices in a developing country such as Iran.

Design/methodology/approach

This paper relies on the seminal theory of Walter Ong (1982) and a leading line of anthropological research to analyze the implications of orality/literacy for management practices in Iran. The authors first define orality and literacy as distinct modes of communication and examine their conceptual properties. Then, the authors draw on the existing literature to analyze the five main management functions impacted by orality.

Findings

The analyses suggest that the predominance of orality in Iran is associated with a wide range of management practices, including short-term or unstructured planning, spontaneous decision-making, fluid organizational structure, the prevalence of interpersonal relations, authoritarian and traditional leadership and behavior-based controlling mechanisms.

Originality/value

While most studies have focused on the impacts of cultural dimensions and economic variables, this paper offers a novel approach to analyzing management practices. More specifically, the paper suggests that in addition to the implications of cultural dimensions and economic variables, the mode of communication, namely, orality/literacy, could have significant implications for management practices.

Details

International Journal of Organizational Analysis, vol. 32 no. 4
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 9 April 2024

Alexander O. Smith, Jeff Hemsley and Zhasmina Y. Tacheva

Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts…

Abstract

Purpose

Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts conversations about “information flow,” the connections between “form” and “content,” as well as many other topics. As information is involved in cultural activity, its clarification could focus memetic theories and applications.

Design/methodology/approach

Our design captures theoretical nuance in memetics by considering a long standing conceptual issue in memetics: information. A systematic review of memetics is provided by making use of the term information across literature. We additionally provide a citation analysis and close readings of what “information” means within the corpus.

Findings

Our initial corpus is narrowed to 128 pivotal memetic publications. From these publications, we provide a citation analysis of memetic studies. Theoretical directions of memetics in the informational context are outlined and developed. We outline two main discussion spaces, survey theoretical interests and describe where and when information is important to memetic discussion. We also find that there are continuities in goals which connect Dawkins’s meme with internet meme studies.

Originality/value

To our knowledge, this is the broadest, most inclusive review of memetics conducted, making use of a unique approach to studying information-oriented discourse across a corpus. In doing so, we provide information researchers areas in which they might contribute theoretical clarity in diverse memetic approaches. Additionally, we borrow the notion of “conceptual troublemakers” to contribute a corpus collection strategy which might be valuable for future literature reviews with conceptual difficulties arising from interdisciplinary study.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Open Access
Article
Publication date: 20 July 2023

Martina Neri, Federico Niccolini and Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

2131

Abstract

Purpose

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.

Design/methodology/approach

This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.

Findings

Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.

Originality/value

Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.

Article
Publication date: 26 February 2024

Sirous Alidousti and Farzane Sahli

The public sector (PS) has extensively utilized information technology (IT); however, research reveals that the failure rate remains high, particularly for national and sectoral…

Abstract

Purpose

The public sector (PS) has extensively utilized information technology (IT); however, research reveals that the failure rate remains high, particularly for national and sectoral IT (NaSIT) applications. To this end, numerous studies have been conducted to gauge the success of IT applications, where a significant number have demonstrated the importance of planning in this regard. Consequently, the current study aims to investigate the factors that influence the success of NaSIT planning and implementation within this sector.

Design/methodology/approach

A qualitative methodology and a systematic literature review encompassing papers indexed in seven databases until November 2022 were utilized.

Findings

The review of 92 selected papers revealed that the success of NaSIT planning and implementation is influenced by a number of factors divided into nine main categories. These include vision, goals and objectives; alignment; interoperability; infrastructure; involvement; equity and digital divide; privacy, security and trust; administration; and culture. Human, social, economic and organizational factors comprise the vast majority of these factors. By addressing these factors, the failure rate of IT plans can be reduced. Governments will be able to effectively employ this technology to accomplish their missions if these factors are considered in order to decrease the failure rate of IT plans.

Originality/value

By examining the factors that influence the success of NaSIT planning and implementation in the PS, this study attempts to provide a comprehensive view of various types of research. Furthermore, policymakers can employ this perspective to improve the efficiency and effectiveness of the PS.

Details

International Journal of Public Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3558

Keywords

1 – 10 of over 5000