Search results

1 – 7 of 7

Abstract

Details

Business and Management Doctorates World-Wide: Developing the Next Generation
Type: Book
ISBN: 978-1-78973-500-0

Content available
Article
Publication date: 20 December 2023

Ian Davis

The interview documents early days in the field of disaster risk reduction.

Abstract

Purpose

The interview documents early days in the field of disaster risk reduction.

Design/methodology/approach

The transcript and video were developed in the context of a United Nations Office for Disaster Risk Reduction (UNDRR) project on the History of DRR.

Findings

The transcript presents important developments during the 1980s with valuable lessons about risk reduction.

Originality/value

It takes the readers on a history of the journey of DRR over three decades.

Details

Disaster Prevention and Management: An International Journal, vol. 33 no. 1
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Abstract

Details

Business and Management Doctorates World-Wide: Developing the Next Generation
Type: Book
ISBN: 978-1-78973-500-0

Article
Publication date: 19 March 2024

Jake Rom Cadag

This paper is a critique of Western modernity and the problems and promises of postmodernism in (re)liberating disaster studies. It criticizes metanarratives and grand theories of…

Abstract

Purpose

This paper is a critique of Western modernity and the problems and promises of postmodernism in (re)liberating disaster studies. It criticizes metanarratives and grand theories of Western discourses to advance postmodern discourses in disaster studies.

Design/methodology/approach

This paper outlines a conceptual domain through which approaches of postmodernism can be employed to (re)liberate disaster studies.

Findings

Metanarratives and grand theories frame the scope and focus of disaster studies. But the increasing number and the aggravated impacts of disasters and environmental challenges in the late 20th and early 21st centuries are proofs that our current “frames” do not capture the complexities of disasters. Postmodernism, in its diversity and various meanings, offers critical and complementary perspectives and approaches to capture the previously neglected dimensions of disasters.

Research limitations/implications

Postmodernism offers ways forward to (re)liberate disaster studies through ontological pluralism, epistemological diversity and hybridity of knowledge.

Originality/value

The agenda of postmodernism in disaster studies is proposed in terms of the focus of inquiry, ontological and epistemological positionalities, research paradigm, methodologies and societal goals.

Details

Disaster Prevention and Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 7 of 7