Search results

1 – 10 of 168
Open Access
Article
Publication date: 6 March 2020

Aqdas Malik, Amandeep Dhir, Puneet Kaur and Aditya Johri

The current study aims to investigate if different measures related to online psychosocial well-being and online behavior correlate with social media fatigue.

26822

Abstract

Purpose

The current study aims to investigate if different measures related to online psychosocial well-being and online behavior correlate with social media fatigue.

Design/methodology/approach

To understand the antecedents and consequences of social media fatigue, the stressor-strain-outcome (SSO) framework is applied. The study consists of two cross-sectional surveys that were organized with young-adult students. Study A was conducted with 1,398 WhatsApp users (aged 19 to 27 years), while Study B was organized with 472 WhatsApp users (aged 18 to 23 years).

Findings

Intensity of social media use was the strongest predictor of social media fatigue. Online social comparison and self-disclosure were also significant predictors of social media fatigue. The findings also suggest that social media fatigue further contributes to a decrease in academic performance.

Originality/value

This study builds upon the limited yet growing body of literature on a theme highly relevant for scholars, practitioners as well as social media users. The current study focuses on examining different causes of social media fatigue induced through the use of a highly popular mobile instant messaging app, WhatsApp. The SSO framework is applied to explore and establish empirical links between stressors and social media fatigue.

Details

Information Technology & People, vol. 34 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 27 February 2023

Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…

3671

Abstract

Purpose

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.

Design/methodology/approach

Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.

Findings

The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.

Originality/value

This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3006

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 16 August 2019

Xueyan Yang, Changxi Ma, Changfeng Zhu, Bo Qi, Fuquan Pan and Chengming Zhu

For the purpose of reducing the incidence of hazardous materials transport accident, eliminating the potential threats and ensuring their safety, aiming at the shortcomings in the…

2676

Abstract

Purpose

For the purpose of reducing the incidence of hazardous materials transport accident, eliminating the potential threats and ensuring their safety, aiming at the shortcomings in the process of current hazardous materials transportation management, this paper aims to construct the framework of hazardous materials transportation safety management system under the vehicle-infrastructure connected environment.

Design/methodology/approach

The system takes the intelligent connected vehicle as the main supporter, integrating GIS, GPS, eye location, GSM, networks and database technology.

Findings

By analyzing the transportation characteristics of hazardous materials, this system consists of five subsystems, which are vehicle and driver management subsystem, dangerous sources and hazardous materials management subsystem, route analysis and optimization subsystem, early warning and emergency rescue management subsystem, and basic information query subsystem.

Originality/value

Hazardous materials transportation safety management system includes omnibearing real-time monitoring, timely updating of system database, real-time generation and optimization of emergency rescue route. The system can reduce the transportation cost and improve the ability of accident prevention and emergency rescue of hazardous materials.

Details

Journal of Intelligent and Connected Vehicles, vol. 2 no. 1
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 23 February 2024

Teresa Fernandes and Rodrigo Oliveira

Social media has become an inescapable part of our lives. However, recent research suggests that excessive use of social media may lead to fatigue and users’ disengagement. This…

Abstract

Purpose

Social media has become an inescapable part of our lives. However, recent research suggests that excessive use of social media may lead to fatigue and users’ disengagement. This study aims to examine which brand-related factors contribute to social media fatigue (SMF) and its subsequent role on driving lurking behaviors, particularly among young consumers.

Design/methodology/approach

Based on survey data from 282 young users of social media, a holistic model of brand-related drivers and outcomes of SMF was tested, emphasizing the contribution of brands’ social media presence to users’ disengagement.

Findings

Research shows that branded content overload and irrelevance, as well as branded ads intrusiveness significantly impact SMF, which in turn plays a mediating role between brand-related drivers and lurking behaviors. The authors further conclude that the impact of SMF on lurking is stronger for users who follow a larger set of brands.

Originality/value

The study contributes to social media research by addressing its “dark side” and empirically validating the role of brands’ social media presence in developing young users’ fatigue and disengagement. The study further adds to the scant literature on SMF, which was mostly developed outside the branding field. Research also provides valuable insights to brands on how to improve their social media performance.

Details

Young Consumers, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-3616

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1471

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 May 2022

Bennet Simon von Skarczinski, Arne Dreißigacker and Frank Teuteberg

Literature repeatedly complains about the lack of empirical data on the costs of cyber incidents within organizations. Simultaneously, managers urgently require transparent and…

Abstract

Purpose

Literature repeatedly complains about the lack of empirical data on the costs of cyber incidents within organizations. Simultaneously, managers urgently require transparent and reliable data in order to make well-informed and cost-benefit optimized decisions. The purpose of this paper is to (1) provide managers with differentiated empirical data on costs, and (2) derive an activity plan for organizations, the government and academia to improve the information base on the costs of cyber incidents.

Design/methodology/approach

The authors analyze the benchmark potential of costs within existing literature and conduct a large-scale interview survey with 5,000 German organizations. These costs are directly assignable to the most severe incident within the last 12 months, further categorized into attack types, cost items, employee classes and industry types. Based on previous literature, expert interviews and the empirical results, the authors draft an activity plan containing further research questions and action items.

Findings

The findings indicate that the majority of organizations suffer little to no costs, whereas only a small proportion suffers high costs. However, organizations are not affected equally since prevalence rates and costs according to attack types, employee classes, and other variables tend to vary. Moreover, the findings indicate that board members and IS/IT-managers show partly different response behaviors.

Originality/value

The authors present differentiated insights into the direct costs of cyber incidents, based on the authors' knowledge, this is the largest empirical survey in continental Europe and one of the first surveys providing in-depth cost information on German organizations.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 15 August 2023

Anna Baj-Rogowska

This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of…

1632

Abstract

Purpose

This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED).

Design/methodology/approach

Through an online structured questionnaire, empirical data were gathered to verify the research model, based on the stressor-strain-outcome (SSO) framework. The SEM technique was employed for assessing the hypothesized relationships.

Findings

The findings show that privacy concerns and time cost are strong antecedents of SMF and contribute significantly to its occurrence; while FoMO and self-disclosure do not exhibit any significant influence. Moreover, SMF positively and significantly affects DoU and IED.

Practical implications

This study enhances the existing body of knowledge on SMF and it can help: (1) individuals to be aware of risks and adjust their activities in balance with their well-being, and (2) social media (SM) managers to develop unique strategies to address the specific needs of SM users.

Originality/value

This research contributes to the limited literature on SMF by (1) introducing the concept of IED – as a consequence of SMF, and (2) creating measurement scales for IED.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 4 August 2021

Marewa Glover, Robin Shepherd, Kyro Selket and Saravana Kumar Paramanathen

A large increase in robberies of convenience stores in New Zealand (NZ) in 2016 and 2017 was anecdotally attributed to persistent and substantial increases in excise tax on…

1648

Abstract

Purpose

A large increase in robberies of convenience stores in New Zealand (NZ) in 2016 and 2017 was anecdotally attributed to persistent and substantial increases in excise tax on tobacco products. This study aims to explore the validity of that claim by examining the characteristics of the robberies through the lens of online news coverage.

Design/methodology/approach

Google, Bing and main online NZ news outlets were searched for news reports between 2009 and 2018 of tobacco-related store robberies. Content analysis was used to extract characteristics such as date of robbery, type of store, items targeted or stolen and demographic profile of offenders. The prevalence of reported robberies by socioeconomic level of the surrounding community was assessed using nearest primary school decile rating. Descriptive statistics and statistical analysis were used to discuss trends and key findings in the data.

Findings

Reports on 572 robberies were unevenly distributed across the years with a large increase in 2016 and 2017, followed by a substantial decrease in 2018. Local community convenience stores were primarily hit – more so in lower socioeconomic communities. Robberies occurred nationwide and disproportionately so during colder months in lower socioeconomic communities. Many robberies were aggravated resulting in serious injury to shopkeepers. Tobacco and cash were predominantly targeted.

Social implications

The large increase in robberies that occurred in 2016–2017 likely resulted from tax-driven tobacco price hikes combined with reduced duty-free tobacco coming into NZ with travellers. Installation of security in stores, news fatigue and other explanations are potential reasons for the 2018 decrease in reported robberies despite tobacco prices increasing. Frequent robberies of local stores, many including violence, should be a public health concern as destruction of community well-being can be a determinant of other health problems. The negative consequences for communities, particularly lower socioeconomic communities, need to be factored into the cost benefit analysis of raising the tax on tobacco.

Originality/value

This study provides much needed detail on the negative health and social consequences of tobacco-related store robberies.

Details

Safer Communities, vol. 20 no. 3
Type: Research Article
ISSN: 1757-8043

Keywords

1 – 10 of 168