Search results

1 – 10 of over 6000
Open Access
Article
Publication date: 4 December 2020

Špela Orehek and Gregor Petrič

The concept of information security culture, which recently gained increased attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on…

3754

Abstract

Purpose

The concept of information security culture, which recently gained increased attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on organizational security. Different measurement instruments have been developed to measure and assess information security culture using survey-based tools. However, the content, breadth and face validity of these scales vary greatly. This study aims to identify and provide an overview of the scales that are used to measure information security culture and to evaluate the rigor of reported scale development and validation procedures.

Design/methodology/approach

Papers that introduce a new or adapt an existing scale of information security culture were systematically reviewed to evaluate scales of information security culture. A standard search strategy was applied to identify 19 relevant scales, which were evaluated based on the framework of 16 criteria pertaining to the rigor of reported operationalization and the reported validity and reliability of the identified scales.

Findings

The results show that the rigor with which scales of information security culture are validated varies greatly and that none of the scales meet all the evaluation criteria. Moreover, most of the studies provide somewhat limited evidence of the validation of scales, indicating room for further improvement. Particularly, critical issues seem to be the lack of evidence regarding discriminant and criterion validity and incomplete documentation of the operationalization process.

Research limitations/implications

Researchers focusing on the human factor in information security need to reach a certain level of agreement on the essential elements of the concept of information security culture. Future studies need to build on existing scales, address their limitations and gain further evidence regarding the validity of scales of information security culture. Further research should also investigate the quality of definitions and make expert assessments of the content fit between concepts and items.

Practical implications

Organizations that aim to assess the level of information security culture among employees can use the results of this systematic review to support the selection of an adequate measurement scale. However, caution is needed for scales that provide limited evidence of validation.

Originality/value

This is the first study that offers a critical evaluation of existing scales of information security culture. The results have decision-making value for researchers who intend to conduct survey-based examinations of information security culture.

Open Access
Article
Publication date: 8 October 2019

Joseph F. Hair, Marcelo L.D.S. Gabriel, Dirceu da Silva and Sergio Braga Junior

This paper aims to present the fundamental aspects for the development and validation (D&V) of attitudes’ measurement scale, as well as its practical aspects that are not deeply…

18644

Abstract

Purpose

This paper aims to present the fundamental aspects for the development and validation (D&V) of attitudes’ measurement scale, as well as its practical aspects that are not deeply explored in books and manuals. These aspects are the results of a long experience of the authors and arduous learning with errors and mistakes.

Design/methodology/approach

The nature of this paper is methodological and can be very useful for an initial reading on the theme that it rests. This paper presents four D&V stages: literature review or interviews with experts; theoretical or face validation; semantic validation or validation with possible respondents; and statistical validation.

Findings

This is a methodological paper, and its main finding is the usefulness for researchers.

Research limitations/implications

The main implication of this paper is to support researchers on the process of D&V of measurement scales.

Practical implications

Became a step-by-step guide to researchers on the D&V of measurement scales.

Social implications

Support researchers on their data collection and analysis.

Originality/value

This is a practical guide, with tips from seasoned scholars to help researchers on the D&V of measurement scales.

Details

RAUSP Management Journal, vol. 54 no. 4
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 4 May 2022

Patrick Dallasega, Manuel Woschank, Joseph Sarkis and Korrakot Yaibuathet Tippayawong

This study aims to provide a measurement model, and the underlying constructs and items, for Logistics 4.0 in manufacturing companies. Industry 4.0 technology for logistics…

3267

Abstract

Purpose

This study aims to provide a measurement model, and the underlying constructs and items, for Logistics 4.0 in manufacturing companies. Industry 4.0 technology for logistics processes has been termed Logistics 4.0. Logistics 4.0 and its elements have seen varied conceptualizations in the literature. The literature has mainly focused on conceptual and theoretical studies, which supports the notion that Logistics 4.0 is a relatively young area of research. Refinement of constructs and building consensus perspectives and definitions is necessary for practical and theoretical advances in this area.

Design/methodology/approach

Based on a detailed literature review and practitioner focus group interviews, items of Logistics 4.0 for manufacturing enterprises were further validated by using a large-scale survey with practicing experts from organizations located in Central Europe, the Northeastern United States of America and Northern Thailand. Exploratory and confirmatory factor analyses were used to define a measurement model for Logistics 4.0.

Findings

Based on 239 responses the exploratory and confirmatory factor analyses resulted in nine items and three factors for the final Logistics 4.0 measurement model. It combines “the leveraging of increased organizational capabilities” (factor 1) with “the rise of interconnection and material flow transparency” (factor 2) and “the setting up of autonomization in logistics processes” (factor 3).

Practical implications

Practitioners can use the proposed measurement model to assess their current level of maturity regarding the implementation of Logistics 4.0 practices. They can map the current state and derive appropriate implementation plans as well as benchmark against best practices across or between industries based on these metrics.

Originality/value

Logistics 4.0 is a relatively young research area, which necessitates greater development through empirical validation. To the best of the authors knowledge, an empirically validated multidimensional construct to measure Logistics 4.0 in manufacturing companies does not exist.

Details

Industrial Management & Data Systems, vol. 122 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Content available
Article
Publication date: 23 June 2020

Victoria Crittenden, Marko Sarstedt, Claudia Astrachan, Joe Hair and Carlos Eduardo Lourenco

1761

Abstract

Details

Journal of Product & Brand Management, vol. 29 no. 4
Type: Research Article
ISSN: 1061-0421

Open Access
Article
Publication date: 9 January 2017

Andreas Kuckertz, Tobias Kollmann, Patrick Krell and Christoph Stöckmann

Opportunity recognition and opportunity exploitation are two central concepts in the entrepreneurial process. However, there is a lack of both a clear specification of the content…

34381

Abstract

Purpose

Opportunity recognition and opportunity exploitation are two central concepts in the entrepreneurial process. However, there is a lack of both a clear specification of the content domains of the constructs and valid and reliable multi-item scales for their measurement. The paper aims to discuss these issues.

Design/methodology/approach

This paper first reveals existing issues around the definitions and measures relating to the concepts, then defines their content domains, and also proposes scale items to measure the concepts. Four samples are used to develop the measurement instruments.

Findings

Two scales are suggested, one to measure opportunity recognition, and other to measure opportunity exploitation. The scales demonstrate reliability and construct, discriminant, and nomological validity.

Originality/value

The resulting instruments provide tools for research and practice that could prove valuable when examining the antecedents and consequences of both opportunity recognition and opportunity exploitation.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 23 no. 1
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 20 July 2020

Zengxian Liang, Hui Luo and Chenxi Liu

The subject of “well-being” has attracted attention from tourism scholars, but differences and misuses in approach have meant that academic contributions and knowledge…

7920

Abstract

Purpose

The subject of “well-being” has attracted attention from tourism scholars, but differences and misuses in approach have meant that academic contributions and knowledge accumulation to the tourism literature remain relatively little. This paper attempts to clarify the theoretical source of subjective well-being, and critically reflect on the problems existing in the study of well-being when applied to tourism. It is suggested that subjective well-being belongs to the category of “quality of life” and has multiple philosophical foundations and theoretical sources including theories of hedonism, expectation, happiness and various itemised lists of emotions. A hybrid research method is suggested when applying the concept to tourism.

Details

Tourism Critiques: Practice and Theory, vol. 2 no. 1
Type: Research Article
ISSN: 2633-1225

Keywords

Open Access
Article
Publication date: 10 August 2020

Maryam Ahmed Ekaabi, Khalizani Khalid, Ross Davidson, Ahmad Haifeez Kamarudin and Christopher Preece

This study evaluates a multidimensional hierarchical scale of smart policing service quality.

3384

Abstract

Purpose

This study evaluates a multidimensional hierarchical scale of smart policing service quality.

Design/methodology/approach

Qualitative and quantitative analysis tools were used to develop a smart policing service quality scale based on the integrative psychometric scale development methodology. A multidimensional hierarchical structure was proposed for smart policing service quality; a group of preliminary items selected from literature was used for the qualitative analysis. For data collection, users of smart policing services were selected through the United Arab Emirates (UAE) research centre. Several statistical methods were employed to verify reliability and validity of the construct and nomological validity of the proposed scale.

Findings

A smart policing service quality scale of 23 items was developed based on a hierarchical factor model structure. Nomological testing indicated that overall smart policing service quality is positive and significant, thus contributing to user satisfaction, intention to continue using the system and enhanced quality of life.

Practical implications

This study enables managers to evaluate types of policing quality and effectively implement strategies to address security and sustainability issues that exist currently in smart services.

Originality/value

Previous studies on policing service quality have not sufficiently addressed the role of smart policing service quality; the nature of discussion in this area is primarily based around concepts. The development of the smart policing service quality scale provides a measurement tool for researchers to use to enhance the understanding of smart policing service quality.

Details

Policing: An International Journal, vol. 43 no. 5
Type: Research Article
ISSN: 1363-951X

Keywords

Open Access
Article
Publication date: 20 April 2023

Kristian Kannelønning and Sokratis K. Katsikas

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this…

5733

Abstract

Purpose

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naïve-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization’s members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.

Design/methodology/approach

Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.

Findings

The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.

Research limitations/implications

Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.

Originality/value

To the best of the authors’ knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 15 August 2023

Anna Baj-Rogowska

This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of…

1825

Abstract

Purpose

This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED).

Design/methodology/approach

Through an online structured questionnaire, empirical data were gathered to verify the research model, based on the stressor-strain-outcome (SSO) framework. The SEM technique was employed for assessing the hypothesized relationships.

Findings

The findings show that privacy concerns and time cost are strong antecedents of SMF and contribute significantly to its occurrence; while FoMO and self-disclosure do not exhibit any significant influence. Moreover, SMF positively and significantly affects DoU and IED.

Practical implications

This study enhances the existing body of knowledge on SMF and it can help: (1) individuals to be aware of risks and adjust their activities in balance with their well-being, and (2) social media (SM) managers to develop unique strategies to address the specific needs of SM users.

Originality/value

This research contributes to the limited literature on SMF by (1) introducing the concept of IED – as a consequence of SMF, and (2) creating measurement scales for IED.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 2 September 2019

Pedro Albuquerque, Gisela Demo, Solange Alfinito and Kesia Rozzett

Factor analysis is the most used tool in organizational research and its widespread use in scale validations contribute to decision-making in management. However, standard factor…

1753

Abstract

Purpose

Factor analysis is the most used tool in organizational research and its widespread use in scale validations contribute to decision-making in management. However, standard factor analysis is not always applied correctly mainly due to the misuse of ordinal data as interval data and the inadequacy of the former for classical factor analysis. The purpose of this paper is to present and apply the Bayesian factor analysis for mixed data (BFAMD) in the context of empirical using the Bayesian paradigm for the construction of scales.

Design/methodology/approach

Ignoring the categorical nature of some variables often used in management studies, as the popular Likert scale, may result in a model with false accuracy and possibly biased estimates. To address this issue, Quinn (2004) proposed a Bayesian factor analysis model for mixed data, which is capable of modeling ordinal (qualitative measure) and continuous data (quantitative measure) jointly and allows the inclusion of qualitative information through prior distributions for the parameters’ model. This model, adopted here, presents considering advantages and allows the estimation of the posterior distribution for the latent variables estimated, making the process of inference easier.

Findings

The results show that BFAMD is an effective approach for scale validation in management studies making both exploratory and confirmatory analyses possible for the estimated factors and also allowing the analysts to insert a priori information regardless of the sample size, either by using the credible intervals for Factor Loadings or by conducting specific hypotheses tests. The flexibility of the Bayesian approach presented is counterbalanced by the fact that the main estimates used in factor analysis as uniqueness and communalities commonly lose their usual interpretation due to the choice of using prior distributions.

Originality/value

Considering that the development of scales through factor analysis aims to contribute to appropriate decision-making in management and the increasing misuse of ordinal scales as interval in organizational studies, this proposal seems to be effective for mixed data analyses. The findings found here are not intended to be conclusive or limiting but offer a useful starting point from which further theoretical and empirical research of Bayesian factor analysis can be built.

Details

RAUSP Management Journal, vol. 54 no. 4
Type: Research Article
ISSN: 2531-0488

Keywords

1 – 10 of over 6000