Search results

1 – 10 of 22
Article
Publication date: 24 October 2022

David A. Jaud, Olivier Gergaud and Renaud Lunardo

This study aims to examine within-family and peer communication (type and frequency) and subsequent wine consumption of young adults. Specifically, this research investigates…

Abstract

Purpose

This study aims to examine within-family and peer communication (type and frequency) and subsequent wine consumption of young adults. Specifically, this research investigates whether the distinct types of technical, prohibition and moderation-based communication affect wine knowledge, responsible drinking practices, and ultimately, wine consumption.

Design/methodology/approach

The authors adopted an econometric approach based on a cross-sectional study with data collected from a large sample of 1,466 students in France.

Findings

The authors show that wine technical-based messages from parents help young adults acquire knowledge about wine, which in turn increases consumption. Also, moderation-based messages make young adults both, more knowledgeable about wine and, as expected, more responsible in terms of drinking practices, subsequently limiting their consumption. Finally, prohibition-based messages marginally decrease wine knowledge and have no impact on responsible drinking practices.

Social implications

This article provides relevant recommendations for public policymakers and brands, who should target parents and peers as part of their responsible drinking communication or advertising campaigns.

Originality/value

To fill a gap in the literature on young consumer behavior and food marketing, this research primarily investigates the relationship between family (and peer) communication and young adults' wine consumption, particularly whether and how, which type(s) of parental communication influences young adults' wine knowledge and adoption of responsible drinking practices.

Details

British Food Journal, vol. 125 no. 6
Type: Research Article
ISSN: 0007-070X

Keywords

Book part
Publication date: 7 September 2023

Pok Man Tang, Anthony C. Klotz, Joel Koopman, Elijah X. M. Wee and Yizhen Lu

Professional touching behavior (PTB), defined as intentional touching behavior that occurs between organizational members and that falls within the boundaries of appropriateness

Abstract

Professional touching behavior (PTB), defined as intentional touching behavior that occurs between organizational members and that falls within the boundaries of appropriateness and professionalism in the workplace, is prevalent in organizations. Scholars from multiple disciplines, including human resources researchers, have acknowledged the importance of physical contact for facilitating interpersonal communication and relationship-building. However, PTB may not only elicit positive reactions from those who receive it but also negative reactions as well, with implications for social dynamics in organizations. PTB can, on the one hand, fulfill employees’ desires for interpersonal connection; at the same time, such physical contact at work can represent a threat to employees’ health. To explain the nature and implications of these divergent effects of receiving PTB, the authors draw upon sociometer theory and behavioral immune system (BIS) theory to model the emotional, cognitive, and physiological processes via which, and the conditions under which, receiving such behavior will result in socially functional responses and prompt subsequent prosocial behavior, and when PTB will be perceived as a health risk and prompt withdrawal behavior. The theoretical framework of this chapter expands our conceptual understanding of the consequences of interpersonal physical contact at work and has important human resources management (HRM) implications for organizational managers.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-83753-389-3

Keywords

Article
Publication date: 20 February 2023

Cristina Fernandes, João Ferreira and Pedro Mota Veiga

The purpose of this study is use a bibliometric analysis to explore the relational nature of knowledge creation in WFM in operations. Companies live under constant pressure to…

Abstract

Purpose

The purpose of this study is use a bibliometric analysis to explore the relational nature of knowledge creation in WFM in operations. Companies live under constant pressure to find the best ways to plan their workforce, and the workforce emangement (WFM) is one of the biggest challenges faced by managers. Relevant research on WFM in operations has been published in a several range of journals that vary in their scope and readership, and thus the academic contribution to the topic remains largely fragmented.

Design/methodology/approach

To address this gap, this review aims to map research on WFM in operations to understand where it comes from and where it is going and, therefore, provides opportunities for future work. This study combined two bibliometric approaches with manual document coding to examine the literature corpus of WFM in operations to draw a holistic picture of its different aspects.

Findings

Content and thematic analysis of the seminal studies resulted in the extraction of three key research themes: workforce cross-training, planning workforce mixed methods and individual workforce characteristics. The findings of this study further highlight the gaps in the WFM in operations literature and raise some research questions that warrant further academic investigation in the future.

Originality/value

Likewise, this study has important implications for practitioners who are likely to benefit from a holistic understanding of the different aspects of WFM in operations.

Article
Publication date: 9 February 2023

Anusha Bhana and Jacques Ophoff

Organisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on compliance and…

Abstract

Purpose

Organisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on compliance and constantly challenges employees to manage security-related risks. The purpose of this research is to explore the homeostatic mechanism proposed by risk homeostasis theory (RHT), as well as security fatigue, in an organisational context.

Design/methodology/approach

A case study approach was used to investigate the topic, focusing on data specialists who regularly work with sensitive information assets. Primary data was collected through semi-structured interviews with 12 data specialists in a large financial services company.

Findings

A thematic analysis of the data revealed risk perceptions, behavioural adjustments and indicators of security fatigue. The findings provide examples of how these concepts manifest in practice and confirm the relevance of RHT in the security domain.

Originality/value

This research illuminates homeostatic mechanisms in an organisational security context. It also illustrates links with security fatigue and how this could further impact risk. Examples and indicators of security fatigue can assist organisations with risk management, creating “employee-friendly” policies and procedures, choosing appropriate technical security solutions and tailoring security education, training and awareness activities.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 6 November 2023

Abstract

Details

Higher Education in Emergencies: International Case Studies
Type: Book
ISBN: 978-1-83797-345-3

Article
Publication date: 12 June 2023

Pintu Shah and Anuja Agarwal

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…

Abstract

Purpose

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design.

Design/methodology/approach

The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses.

Findings

The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness.

Research limitations/implications

The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study.

Practical implications

This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups.

Originality/value

To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 April 2023

Alireza Shojaifar and Samuel A. Fricker

This paper aims to present the evaluation of a self-paced tool, CyberSecurity Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability improvement in small…

Abstract

Purpose

This paper aims to present the evaluation of a self-paced tool, CyberSecurity Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability improvement in small- and medium-sized enterprises (SMEs). Cybersecurity is increasingly a concern for SMEs. Previous literature has explored the role of tools for awareness raising. However, few studies validated the effectiveness and usefulness of cybersecurity tools for SMEs in real-world practices.

Design/methodology/approach

This study is built on a qualitative approach to investigating how CYSEC is used in SMEs to support awareness raising and capability improvement. CYSEC was placed in operation in 12 SMEs. This study first conducted a survey study and then nine structured interviews with chief executive officers (CEOs) and chief information security officers (CISO).

Findings

The results emphasise that SMEs are heterogeneous. Thus, one cybersecurity solution may not suit all SMEs. The findings specify that the tool’s adoption varied quite widely. Four factors are primary determinants influencing the adoption of CYSEC: personalisation features, CEOs’ or CISOs’ awareness level, CEOs’ or CISOs’ cybersecurity and IT knowledge and skill and connection to cybersecurity expertise.

Originality/value

This empirical study provides new insights into how a self-paced tool has been used in SMEs. This study advances the understanding of cybersecurity activities in SMEs by studying the adoption of CYSEC. Moreover, this study proposes significant dimensions for future research.

Details

Information & Computer Security, vol. 31 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 December 2022

Johanna Innerhofer, Luigi Nasta and Anita Zehrer

Although the role of human capital in the hospitality sector is critical, the industry faces challenges in attracting workers with a poor industry image frequently mentioned…

4798

Abstract

Purpose

Although the role of human capital in the hospitality sector is critical, the industry faces challenges in attracting workers with a poor industry image frequently mentioned regarding labor shortages. This research paper attempts to investigate the factors influencing labor shortages by presenting the perspectives of employees and employers.

Design/methodology/approach

Precisely 232 rural hospitality industry employees (n = 128) and employers (n = 104) in Northern Italy were surveyed using a written close-ended online survey and a quantitative research design as part of a convenience sampling approach. For hypotheses testing, Spearman's rho was used.

Findings

A relationship between the shortage of professional workers and a variety of factors was found, including professional, digital, social and green skills, industry-intrinsic characteristics and symbolic image attributes of the industry. The findings show that some factors are more important for employees, while others are more significant for employers.

Practical implications

This study demonstrates several practical implications for the hospitality sector by addressing the under-researched stakeholder group of existing hospitality employees, e.g. improving working conditions, reduction of manual operations through digital technologies, realistic career planning, employer branding, identification of skill deficiencies and provision of specialized trainings.

Originality/value

Most research on labor shortages in the hospitality industry has focused on the perspective of either employees or employers. This study compares both perspectives, including the industry image, to gain a realistic picture of the relevant factors for a rural tourism destination in Northern Italy.

Details

Journal of Hospitality and Tourism Insights, vol. 7 no. 1
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 2 January 2023

Le-Vinh-Lam Doan and Alasdair Rae

With access to the large-scale search data from Rightmove plc, the paper firstly indicated the possibility of using user-generated data from online property portals to predict…

Abstract

Purpose

With access to the large-scale search data from Rightmove plc, the paper firstly indicated the possibility of using user-generated data from online property portals to predict housing market activities and secondly embraced a GIS approach to explore what people search for housing and what they chose and investigated the issue of mismatch between search patterns and revealed patterns. Based on the analysis, the paper contributes a visual GIS-based approach which may help planners and designers to make more informed decisions related to new housing supply, particularly where to build, what to build and how many to build.

Design/methodology/approach

The paper used the 2013 housing search data from Rightmove and the 2013 price data from Land Registry with transactions made after the search period and embraced a GIS approach to explore the potential housing demand patterns and the mismatch between searches and sales. In the analysis, the paper employed the K-means approach to group prices into five levels and used GIS software to draw maps based on these price levels. The paper also employed a simple analysis of linear regression based on the coefficient of determination to investigate the relationship between online property views and values of house sales.

Findings

The result indicated the strong relationship between online property views and the values of house sales, implying the possibility of using search data from online property portals to predict housing market activities. It then explore the spatial housing demand patterns based on searches and showed a mismatch between the spatial patterns of housing search and actual moves across submarkets. The findings may not be very surprising but the main objective of the paper is to open up a potentially useful methodological approach which could be extended in future research.

Research limitations/implications

It is important to identify search patterns from people who search with the intention to buy houses and from people who search with no intention to purchase properties. Rightmove data do not adequately represent housing search activity, and therefore more attention should be paid to this issue. The analysis of housing search helps us have a better understanding of households' preferences to better estimate housing demand and develop search-based prediction models. It also helps us identify spatial and structural submarkets and examine the mismatches between current housing stock and housing demand in submarkets.

Social implications

The GIS approach in this paper may help planners and designers better allocate land resources for new housing supply based on households' spatial and structural preferences by identifying high and low demand areas with high searches relative to low housing stocks. Furthermore, the analysis of housing search patterns helps identify areas with latent demand, and when combined with the analysis of transaction patterns, it is possible to realise the areas with a lack of housing supply relative to excess demand or a lack of latent demand relative to the housing stock.

Originality/value

The paper proves the usefulness of a GIS approach to investigate households' preferences and aspirations through search data from online property portals. The contribution of the paper is the visual GIS-based approach, and based on this approach the paper fills the international knowledge gap in exploring effective approaches to analysing user-generated search data and market outcome data in combination.

Details

Open House International, vol. 48 no. 4
Type: Research Article
ISSN: 0168-2601

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of 22