Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 183
To view the access options for this content please click here
Article
Publication date: 3 December 2018

Examining employee security violations: moral disengagement and its environmental influences

Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam and H.R. Rao

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security…

HTML
PDF (430 KB)

Abstract

Purpose

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have used neutralization and moral disengagement (MD) perspectives to examine employee rationalizations of noncompliant security behaviors. Extending this prior work, the purpose of this paper is to identify mechanisms of security education, training, and awareness (SETA) programs and deterrence as well as employees’ organizational commitment in influencing MD of security policy violations and develop a theoretical model to test the proposed relationships.

Design/methodology/approach

The authors validate and test the model using the data collected from six large multinational organizations in Korea using survey-based methodology. The model was empirically analyzed by structural equation modeling.

Findings

The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence. The findings also suggest that SETA programs are an important mechanism in creating security PA.

Originality/value

The paper expands the literature in IS security that has examined the role of moral evaluations. Drawing upon MD theory and social cognitive theory, the paper points to the central role of SETA and security PA in reducing MD of security policy violations, and ultimately the likelihood of this behavior. The paper not only contributes to theory but also provides important insights for practice.

Details

Information Technology & People, vol. 31 no. 6
Type: Research Article
DOI: https://doi.org/10.1108/ITP-10-2017-0322
ISSN: 0959-3845

Keywords

  • Information security behaviours
  • Information systems security
  • Moral disengagement
  • Social cognitive theory
  • SETA
  • Deterrence
  • Organizational commitment

To view the access options for this content please click here
Article
Publication date: 1 April 2019

Panel report: the dark side of the digitization of the individual

Ofir Turel, Christian Matt, Manuel Trenz, Christy M.K. Cheung, John D’Arcy*, Hamed Qahri-Saremi* and Monideepa Tarafdar*

Digital technologies have diffused into many personal life domains. This has created many new phenomena that require systematic theorizing, testing and understanding. Such…

HTML
PDF (190 KB)

Abstract

Purpose

Digital technologies have diffused into many personal life domains. This has created many new phenomena that require systematic theorizing, testing and understanding. Such phenomena have been studied under the Digitization of the Individual (DOTI) umbrella and have been discussed in the DOTI pre-International Conference on Information Systems workshop for the last three years (from 2015 to 2017). While prior years have focused on a variety of issues, this year (2018) we decided to put special emphasis on negative effects of the DOTI, i.e., “the dark side” of the DOTI.

Design/methodology/approach

This manuscript reports on a panel of three experts (in alphabetical order: John D’Arcy, Hamed Qahri-Saremi and Monideepa Tarafdar) who presented their past research in this domain, as well as their outlook for future research and methodologies in research on the DOTI.

Findings

The authors introduce the topic, chronicle the responses of the panelists to the questions the authors posed, and summarize and discuss their response, such that readers can develop a good idea regarding next steps in research on the dark side of the DOTI.

Originality/value

The authors introduce the topic of the dark sides of DOTI and point readers to promising research directions and methodologies for further exploring this relatively uncharted field of research.

Details

Internet Research, vol. 29 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/INTR-04-2019-541
ISSN: 1066-2243

Keywords

  • Digitalization of the Individual (DOTI)
  • Digital technologies
  • Dark side
  • Panel

To view the access options for this content please click here
Article
Publication date: 1 January 1968

BIBLIOGRAPHIC DESCRIPTION, ARRANGEMENT, AND RETRIEVAL

B.C. VICKERY

The design of bibliographic records for computer input is explored. The elements of a record provide bibliographic description, serve as retrieval keys, facilitate ordered…

HTML
PDF (620 KB)

Abstract

The design of bibliographic records for computer input is explored. The elements of a record provide bibliographic description, serve as retrieval keys, facilitate ordered filing, and indicate locations. The effect of each of these functions on the form of the record is discussed. Problems are raised that must be resolved before an optimal record can be designed.

Details

Journal of Documentation, vol. 24 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/eb026440
ISSN: 0022-0418

To view the access options for this content please click here
Article
Publication date: 10 November 2014

Security culture and the employment relationship as drivers of employees’ security compliance

John D'Arcy and Gwen Greene

The purpose of this paper is to examine the influence of security-related and employment relationship factors on employees’ security compliance decisions. A major…

HTML
PDF (173 KB)

Abstract

Purpose

The purpose of this paper is to examine the influence of security-related and employment relationship factors on employees’ security compliance decisions. A major challenge for organizations is encouraging employee compliance with security policies, procedures and guidelines. Specifically, we predict that security culture, job satisfaction and perceived organizational support have a positive effect on employees’ security compliance intentions.

Design/methodology/approach

This study used a survey approach for data collection. Data were collected using two online surveys that were administered at separate points in time.

Findings

Our results provide empirical support for security culture as a driver of employees’ security compliance in the workplace. Another finding is that an employee’s feeling of job satisfaction influences his/her security compliance intention, although this relationship appears to be contingent on the employee’s position, tenure and industry. Surprisingly, we also found a negative relationship between perceived organizational support and security compliance intention.

Originality/value

Our results provide one of the few empirical validations of security culture, and we recognize its multidimensional nature as conceptualized through top management commitment to security (TMCS), security communication and computer monitoring. We also extend security compliance research by considering the influence of employment relationship factors drawn from the organizational behavior literature.

Details

Information Management & Computer Security, vol. 22 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/IMCS-08-2013-0057
ISSN: 0968-5227

Keywords

  • Employees
  • End-user computing

To view the access options for this content please click here
Book part
Publication date: 28 September 2018

Doping, Genes, and Gender

Helen Jefferson Lenskyj

HTML
PDF (206 KB)
EPUB (89 KB)

Abstract

Details

Gender, Athletes’ Rights, and the Court of Arbitration for Sport
Type: Book
DOI: https://doi.org/10.1108/978-1-78743-753-120181005
ISBN: 978-1-78743-753-1

To view the access options for this content please click here
Book part
Publication date: 27 October 2016

Ranking Accounting Scholars Publishing Ethics Research in Accounting and Business Ethics Journals

Alexandra L. Ferrentino, Meghan L. Maliga, Richard A. Bernardi and Susan M. Bosco

This research provides accounting-ethics authors and administrators with a benchmark for accounting-ethics research. While Bernardi and Bean (2010) considered publications…

HTML
PDF (560 KB)
EPUB (5.5 MB)

Abstract

This research provides accounting-ethics authors and administrators with a benchmark for accounting-ethics research. While Bernardi and Bean (2010) considered publications in business-ethics and accounting’s top-40 journals this study considers research in eight accounting-ethics and public-interest journals, as well as, 34 business-ethics journals. We analyzed the contents of our 42 journals for the 25-year period between 1991 through 2015. This research documents the continued growth (Bernardi & Bean, 2007) of accounting-ethics research in both accounting-ethics and business-ethics journals. We provide data on the top-10 ethics authors in each doctoral year group, the top-50 ethics authors over the most recent 10, 20, and 25 years, and a distribution among ethics scholars for these periods. For the 25-year timeframe, our data indicate that only 665 (274) of the 5,125 accounting PhDs/DBAs (13.0% and 5.4% respectively) in Canada and the United States had authored or co-authored one (more than one) ethics article.

Details

Research on Professional Responsibility and Ethics in Accounting
Type: Book
DOI: https://doi.org/10.1108/S1574-076520160000020007
ISBN: 978-1-78560-973-2

Keywords

  • Ranking ethics authors
  • accounting-ethics and business-ethics journals

To view the access options for this content please click here
Article
Publication date: 1 March 1985

International Journal of Manpower

Through a survey of 200 employees working in five of the thirty establishments analysed in previous research about the microeconomic effects of reducing the working time…

HTML
PDF (6 MB)

Abstract

Through a survey of 200 employees working in five of the thirty establishments analysed in previous research about the microeconomic effects of reducing the working time (Cahier 25), the consequences on employees of such a reduction can be assessed; and relevant attitudes and aspirations better known.

Details

International Journal of Manpower, vol. 6 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/eb045021
ISSN: 0143-7720

To view the access options for this content please click here
Article
Publication date: 1 January 1928

The Library World Volume 30 Issue 7

We learn with interest and pleasure that, by the unanimous vote of the Council, the position of Executive Officer to the Library Association has been given to Mr. Guy…

HTML
PDF (1.4 MB)

Abstract

We learn with interest and pleasure that, by the unanimous vote of the Council, the position of Executive Officer to the Library Association has been given to Mr. Guy Keeling, B.A. We understand that over one hundred applicants were considered for the post, and that it was felt that by education and experience Mr. Keeling was eminently qualified for the work which lies ahead of the Association. Mr. Keeling is a Cambridge man, Still on the sunny side of forty, whose pleasing personality is known to many librarians who have met him at conferences of “Aslib” or at meetings of the London and Home Counties Branch. As for his work as secretary of Aslib, it has proved him to be a man of most efficient organizing capacity. We offer him a welcome to the larger sphere of librarianship and we feel sure that all our readers will do the same, and, what is better, will support him in all his efforts in it.

Details

New Library World, vol. 30 no. 7
Type: Research Article
DOI: https://doi.org/10.1108/eb009120
ISSN: 0307-4803

To view the access options for this content please click here
Article
Publication date: 1 December 2001

Trade union‐based workplace learning: a case study in workplace reorganization and worker knowledge production

Peter H. Sawchuk

Presents a case study on union‐based research and education activity generated in response to restructuring in the Canadian telecommunications industry and workplace…

HTML
PDF (73 KB)

Abstract

Presents a case study on union‐based research and education activity generated in response to restructuring in the Canadian telecommunications industry and workplace reorganization. Findings suggest that an education/research/policy dynamic rooted in the union local helps to build the potential for workplace democracy and organizational capacity in the labour movement.

Details

Journal of Workplace Learning, vol. 13 no. 7/8
Type: Research Article
DOI: https://doi.org/10.1108/EUM0000000006122
ISSN: 1366-5626

Keywords

  • Workplace learning
  • Trade unions
  • Case studies
  • Telecommunications

To view the access options for this content please click here
Article
Publication date: 12 June 2017

Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study

Lena Yuryna Connolly, Michael Lang, John Gathegi and Doug J. Tygar

This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security…

HTML
PDF (254 KB)

Abstract

Purpose

This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical issues.

Design/methodology/approach

This paper builds on general deterrence theory and prior organisational culture literature. The methodology adapted for this study draws on the analytical grounded theory approach employing a constant comparative method.

Findings

This paper demonstrates that procedural security countermeasures and organisational culture tend to affect security behaviour in organisational settings.

Research limitations/implications

This paper fills the void in information security research and takes its place among the very few studies that focus on behavioural as opposed to technical issues.

Practical implications

This paper highlights the important role of procedural security countermeasures, information security awareness and organisational culture in managing illicit behaviour of employees.

Originality/value

This study extends general deterrence theory in a novel way by including information security awareness in the research model and by investigating both negative and positive behaviours.

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/ICS-03-2017-0013
ISSN: 2056-4961

Keywords

  • Organisational culture
  • Security education
  • Employee security behaviour
  • Information security awareness
  • Information security policy

Access
Only content I have access to
Only Open Access
Year
  • Last month (2)
  • Last 3 months (4)
  • Last 6 months (9)
  • Last 12 months (17)
  • All dates (183)
Content type
  • Article (150)
  • Book part (20)
  • Earlycite article (12)
  • Case study (1)
1 – 10 of 183
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here