Search results
1 – 10 of 22David A. Jaud, Olivier Gergaud and Renaud Lunardo
This study aims to examine within-family and peer communication (type and frequency) and subsequent wine consumption of young adults. Specifically, this research investigates…
Abstract
Purpose
This study aims to examine within-family and peer communication (type and frequency) and subsequent wine consumption of young adults. Specifically, this research investigates whether the distinct types of technical, prohibition and moderation-based communication affect wine knowledge, responsible drinking practices, and ultimately, wine consumption.
Design/methodology/approach
The authors adopted an econometric approach based on a cross-sectional study with data collected from a large sample of 1,466 students in France.
Findings
The authors show that wine technical-based messages from parents help young adults acquire knowledge about wine, which in turn increases consumption. Also, moderation-based messages make young adults both, more knowledgeable about wine and, as expected, more responsible in terms of drinking practices, subsequently limiting their consumption. Finally, prohibition-based messages marginally decrease wine knowledge and have no impact on responsible drinking practices.
Social implications
This article provides relevant recommendations for public policymakers and brands, who should target parents and peers as part of their responsible drinking communication or advertising campaigns.
Originality/value
To fill a gap in the literature on young consumer behavior and food marketing, this research primarily investigates the relationship between family (and peer) communication and young adults' wine consumption, particularly whether and how, which type(s) of parental communication influences young adults' wine knowledge and adoption of responsible drinking practices.
Details
Keywords
Pok Man Tang, Anthony C. Klotz, Joel Koopman, Elijah X. M. Wee and Yizhen Lu
Professional touching behavior (PTB), defined as intentional touching behavior that occurs between organizational members and that falls within the boundaries of appropriateness…
Abstract
Professional touching behavior (PTB), defined as intentional touching behavior that occurs between organizational members and that falls within the boundaries of appropriateness and professionalism in the workplace, is prevalent in organizations. Scholars from multiple disciplines, including human resources researchers, have acknowledged the importance of physical contact for facilitating interpersonal communication and relationship-building. However, PTB may not only elicit positive reactions from those who receive it but also negative reactions as well, with implications for social dynamics in organizations. PTB can, on the one hand, fulfill employees’ desires for interpersonal connection; at the same time, such physical contact at work can represent a threat to employees’ health. To explain the nature and implications of these divergent effects of receiving PTB, the authors draw upon sociometer theory and behavioral immune system (BIS) theory to model the emotional, cognitive, and physiological processes via which, and the conditions under which, receiving such behavior will result in socially functional responses and prompt subsequent prosocial behavior, and when PTB will be perceived as a health risk and prompt withdrawal behavior. The theoretical framework of this chapter expands our conceptual understanding of the consequences of interpersonal physical contact at work and has important human resources management (HRM) implications for organizational managers.
Details
Keywords
Cristina Fernandes, João Ferreira and Pedro Mota Veiga
The purpose of this study is use a bibliometric analysis to explore the relational nature of knowledge creation in WFM in operations. Companies live under constant pressure to…
Abstract
Purpose
The purpose of this study is use a bibliometric analysis to explore the relational nature of knowledge creation in WFM in operations. Companies live under constant pressure to find the best ways to plan their workforce, and the workforce emangement (WFM) is one of the biggest challenges faced by managers. Relevant research on WFM in operations has been published in a several range of journals that vary in their scope and readership, and thus the academic contribution to the topic remains largely fragmented.
Design/methodology/approach
To address this gap, this review aims to map research on WFM in operations to understand where it comes from and where it is going and, therefore, provides opportunities for future work. This study combined two bibliometric approaches with manual document coding to examine the literature corpus of WFM in operations to draw a holistic picture of its different aspects.
Findings
Content and thematic analysis of the seminal studies resulted in the extraction of three key research themes: workforce cross-training, planning workforce mixed methods and individual workforce characteristics. The findings of this study further highlight the gaps in the WFM in operations literature and raise some research questions that warrant further academic investigation in the future.
Originality/value
Likewise, this study has important implications for practitioners who are likely to benefit from a holistic understanding of the different aspects of WFM in operations.
Details
Keywords
Anusha Bhana and Jacques Ophoff
Organisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on compliance and…
Abstract
Purpose
Organisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on compliance and constantly challenges employees to manage security-related risks. The purpose of this research is to explore the homeostatic mechanism proposed by risk homeostasis theory (RHT), as well as security fatigue, in an organisational context.
Design/methodology/approach
A case study approach was used to investigate the topic, focusing on data specialists who regularly work with sensitive information assets. Primary data was collected through semi-structured interviews with 12 data specialists in a large financial services company.
Findings
A thematic analysis of the data revealed risk perceptions, behavioural adjustments and indicators of security fatigue. The findings provide examples of how these concepts manifest in practice and confirm the relevance of RHT in the security domain.
Originality/value
This research illuminates homeostatic mechanisms in an organisational security context. It also illustrates links with security fatigue and how this could further impact risk. Examples and indicators of security fatigue can assist organisations with risk management, creating “employee-friendly” policies and procedures, choosing appropriate technical security solutions and tailoring security education, training and awareness activities.
Details
Keywords
The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…
Abstract
Purpose
The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design.
Design/methodology/approach
The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses.
Findings
The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness.
Research limitations/implications
The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study.
Practical implications
This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups.
Originality/value
To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.
Details
Keywords
Alireza Shojaifar and Samuel A. Fricker
This paper aims to present the evaluation of a self-paced tool, CyberSecurity Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability improvement in small…
Abstract
Purpose
This paper aims to present the evaluation of a self-paced tool, CyberSecurity Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability improvement in small- and medium-sized enterprises (SMEs). Cybersecurity is increasingly a concern for SMEs. Previous literature has explored the role of tools for awareness raising. However, few studies validated the effectiveness and usefulness of cybersecurity tools for SMEs in real-world practices.
Design/methodology/approach
This study is built on a qualitative approach to investigating how CYSEC is used in SMEs to support awareness raising and capability improvement. CYSEC was placed in operation in 12 SMEs. This study first conducted a survey study and then nine structured interviews with chief executive officers (CEOs) and chief information security officers (CISO).
Findings
The results emphasise that SMEs are heterogeneous. Thus, one cybersecurity solution may not suit all SMEs. The findings specify that the tool’s adoption varied quite widely. Four factors are primary determinants influencing the adoption of CYSEC: personalisation features, CEOs’ or CISOs’ awareness level, CEOs’ or CISOs’ cybersecurity and IT knowledge and skill and connection to cybersecurity expertise.
Originality/value
This empirical study provides new insights into how a self-paced tool has been used in SMEs. This study advances the understanding of cybersecurity activities in SMEs by studying the adoption of CYSEC. Moreover, this study proposes significant dimensions for future research.
Details
Keywords
Johanna Innerhofer, Luigi Nasta and Anita Zehrer
Although the role of human capital in the hospitality sector is critical, the industry faces challenges in attracting workers with a poor industry image frequently mentioned…
Abstract
Purpose
Although the role of human capital in the hospitality sector is critical, the industry faces challenges in attracting workers with a poor industry image frequently mentioned regarding labor shortages. This research paper attempts to investigate the factors influencing labor shortages by presenting the perspectives of employees and employers.
Design/methodology/approach
Precisely 232 rural hospitality industry employees (n = 128) and employers (n = 104) in Northern Italy were surveyed using a written close-ended online survey and a quantitative research design as part of a convenience sampling approach. For hypotheses testing, Spearman's rho was used.
Findings
A relationship between the shortage of professional workers and a variety of factors was found, including professional, digital, social and green skills, industry-intrinsic characteristics and symbolic image attributes of the industry. The findings show that some factors are more important for employees, while others are more significant for employers.
Practical implications
This study demonstrates several practical implications for the hospitality sector by addressing the under-researched stakeholder group of existing hospitality employees, e.g. improving working conditions, reduction of manual operations through digital technologies, realistic career planning, employer branding, identification of skill deficiencies and provision of specialized trainings.
Originality/value
Most research on labor shortages in the hospitality industry has focused on the perspective of either employees or employers. This study compares both perspectives, including the industry image, to gain a realistic picture of the relevant factors for a rural tourism destination in Northern Italy.
Details
Keywords
Le-Vinh-Lam Doan and Alasdair Rae
With access to the large-scale search data from Rightmove plc, the paper firstly indicated the possibility of using user-generated data from online property portals to predict…
Abstract
Purpose
With access to the large-scale search data from Rightmove plc, the paper firstly indicated the possibility of using user-generated data from online property portals to predict housing market activities and secondly embraced a GIS approach to explore what people search for housing and what they chose and investigated the issue of mismatch between search patterns and revealed patterns. Based on the analysis, the paper contributes a visual GIS-based approach which may help planners and designers to make more informed decisions related to new housing supply, particularly where to build, what to build and how many to build.
Design/methodology/approach
The paper used the 2013 housing search data from Rightmove and the 2013 price data from Land Registry with transactions made after the search period and embraced a GIS approach to explore the potential housing demand patterns and the mismatch between searches and sales. In the analysis, the paper employed the K-means approach to group prices into five levels and used GIS software to draw maps based on these price levels. The paper also employed a simple analysis of linear regression based on the coefficient of determination to investigate the relationship between online property views and values of house sales.
Findings
The result indicated the strong relationship between online property views and the values of house sales, implying the possibility of using search data from online property portals to predict housing market activities. It then explore the spatial housing demand patterns based on searches and showed a mismatch between the spatial patterns of housing search and actual moves across submarkets. The findings may not be very surprising but the main objective of the paper is to open up a potentially useful methodological approach which could be extended in future research.
Research limitations/implications
It is important to identify search patterns from people who search with the intention to buy houses and from people who search with no intention to purchase properties. Rightmove data do not adequately represent housing search activity, and therefore more attention should be paid to this issue. The analysis of housing search helps us have a better understanding of households' preferences to better estimate housing demand and develop search-based prediction models. It also helps us identify spatial and structural submarkets and examine the mismatches between current housing stock and housing demand in submarkets.
Social implications
The GIS approach in this paper may help planners and designers better allocate land resources for new housing supply based on households' spatial and structural preferences by identifying high and low demand areas with high searches relative to low housing stocks. Furthermore, the analysis of housing search patterns helps identify areas with latent demand, and when combined with the analysis of transaction patterns, it is possible to realise the areas with a lack of housing supply relative to excess demand or a lack of latent demand relative to the housing stock.
Originality/value
The paper proves the usefulness of a GIS approach to investigate households' preferences and aspirations through search data from online property portals. The contribution of the paper is the visual GIS-based approach, and based on this approach the paper fills the international knowledge gap in exploring effective approaches to analysing user-generated search data and market outcome data in combination.
Details
Keywords
The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…
Abstract
Purpose
The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.
Design/methodology/approach
This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.
Findings
The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.
Originality/value
This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.
Details