Search results

1 – 10 of 66
Open Access
Article
Publication date: 5 September 2024

Marcus Gerdin

The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Abstract

Purpose

The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Design/methodology/approach

To be able to compare the results of this study and those reported by Moody et al. (2018) (and followers), the same quantitative data collection method (questionnaire) and variable measurement instruments were used. Specifically, questionnaire data were collected from a department within a Swedish governmental organization comprising 150 employees. Of these, 90 answered the questionnaire which rendered a response rate of 60%. Following Moody et al. (2018), the collected data were analyzed by means of structural equation modeling.

Findings

This study generally provides empirical support for the original UMISPC as a large majority of the findings are in line with those reported by Moody et al. (2018). However, it also suggests important differences and boundary conditions.

Originality/value

This study extends the original study of Moody et al. (2018) and subsequent replication studies by testing it in a new national/organizational context. Based on their call for future research, it also develops and empirically tests the effects of a new, socially visible information system security violation scenario. Related to this, this study also revisits the role of the variable subjective norms for better understanding employee non-/compliance to information security policies by suggesting that their effects may be indirect (i.e. running through other variables in the UMISPC) rather than direct.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 July 2024

Petter Gottschalk and Christopher Hamerton

This paper aims to make a contribution to the offender-based perspective when researching white-collar and corporate crime. Previously, the offender-based perspective has…

Abstract

Purpose

This paper aims to make a contribution to the offender-based perspective when researching white-collar and corporate crime. Previously, the offender-based perspective has emphasized general characteristics of actors such as social and occupational status, respectability and power.

Design/methodology/approach

This paper presents categories of offender types in their roles when offending.

Findings

Based on the theory of convenience with 14 convenience propositions along three dimensions, it is possible to identify eight offender categories.

Research limitations/implications

Alternative theories for identification of offender categories might be applied in future research to compare with categories presented in this paper based on convenience theory.

Practical implications

These offender categories are labeled opportunist, illusionist, manipulator, ignorer, defender, reactionist, rescuer and controller.

Social implications

The offender-bases rather than the offence-based perspective is needed to increase law enforcement understanding of white-collar and corporate crime.

Originality/value

When researchers study the extent of seriousness of white-collar and corporate crime in the future, it is suggested that they use such labels to distinguish between serious and less serious offenders.

Details

The Journal of Forensic Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 16 April 2024

Yi-Hui Ho

This study aims to investigate the association between cognitive moral development (CMD) and unethical pro-organizational behaviour (UPB) by taking purchasing employees as…

Abstract

Purpose

This study aims to investigate the association between cognitive moral development (CMD) and unethical pro-organizational behaviour (UPB) by taking purchasing employees as research subjects. The moderating effect of perceived leader’s UPB is also explored.

Design/methodology/approach

Data were collected through a two-stage questionnaire survey on purchasing employees in companies across a spectrum of industries in Taiwan, and 492 purchasing employees were analysed in the study.

Findings

Research findings reveal that employees at the conventional level of CMD are more likely to conduct UPB than those at the pre-conventional and post-conventional levels. Perceived leader’s UPB will moderate the association between CMD and UPB. Employees’ UPB is strongly associated with their CMD when they perceive their leaders as being likely to perform UPB.

Originality/value

Although a variety of factors influencing UPB have been proposed in the literature, none of them have analysed the association between CMD and UPB. However, CMD is one important factor affecting ethical decision-making. The present study can promote further understanding of the role of CMD in UPB and contribute to a growing body of research on CMD and UPB.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 30 August 2024

Zihao Jiang, Jiarong Shi and Zhiying Liu

Firms in emerging economies are generally at a disadvantage in terms of resources, which may limit their digital transformation. The Chinese government has designed and…

Abstract

Purpose

Firms in emerging economies are generally at a disadvantage in terms of resources, which may limit their digital transformation. The Chinese government has designed and promulgated a series of wind power policies from the perspectives of support and regulation. The former provides scarce resources for enterprises and thus alleviating financial constraints. While the latter increases the demands for advanced technologies, thereby triggering resource bricolages. This study aims to clarify the impact of industrial policy on the digital transformation of the Chinese wind power industry, and the role of financing constraint and resource bricolage in the above relationship.

Design/methodology/approach

Based on the data of listed companies in the Chinese wind power industry from 2006 to 2021, this study clarifies the impact and mechanism of industrial policy on firm digital transformation with fixed effect regression models.

Findings

Empirical results indicate that both supportive and regulatory policies are the cornerstone of the digital transformation of the Chinese wind power industry. Financial constraint and resource bricolage, respectively, mediate the impact of supportive and regulatory policies. However, the mix of supportive and regulatory policies inhibits digital transformation. Moreover, industrial policies are more effective for the digital transformation of state-owned enterprises, as well as enterprises in economically underdeveloped regions.

Research limitations/implications

This study investigates the path of government intervention driving firm digital transformation from the resource-related perspective (i.e. financial constraint and resource bricolage), and its analytical framework can be extended based on other theories. The combined effects of cross-sectoral policies (e.g. wind power policy and digital infrastructure policy) can be further assessed. The marginal net benefit of government intervention can be calculated to determine whether it is worthwhile.

Practical implications

This study emphasizes the necessity of government intervention in the digital transformation of enterprises in emerging economies. The governments should align the policy targets, clarify policy recipients and modify policy process of different categories of industrial policies to optimize the effectiveness of policy mix. Given that the effectiveness of government intervention varies among different categories of enterprises, the competent agencies should design and promulgate differentiated industrial policies based on the heterogeneity of firms to improve the effectiveness and efficiency of industrial policies.

Originality/value

This is one of the earliest explorations of industrial policies’ effect on the digital transformation of the renewable energy sector in emerging economies, providing new evidence for institutional theory. Meanwhile, this study introduces financial constraint and resource bricolage into the research framework and attempts to uncover the mechanism of industrial policy driving the digital transformation of enterprises in emerging economies. Besides, to expand the understanding of the complex industrial policy system, this study assesses the effectiveness of the industrial policy mix.

Details

International Journal of Emerging Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 16 July 2024

Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…

Abstract

Purpose

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.

Design/methodology/approach

This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.

Findings

The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.

Practical implications

The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.

Social implications

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.

Originality/value

The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 July 2024

Karolina Lendák-Kabók, Stéphanie Mignot-Gerard and Marc Vanholsbeeck

The paper’s aim is to explore female academics’ publication aspirations and constraints in a less researched area of Central and Eastern Europe (CEE).

Abstract

Purpose

The paper’s aim is to explore female academics’ publication aspirations and constraints in a less researched area of Central and Eastern Europe (CEE).

Design/methodology/approach

The research data presented in this paper is part of a larger cross-European project involving semi-structured interviews conducted with Early Career Researchers (ECR) (PhD+ 8 years) from Social Sciences and Humanities (SSH) from seventeen European countries.

Findings

The findings show how ECR women from the CEE region in SSH encounter difficulties when trying to publish, which obstacles add to a strong economic and geopolitical dependence. Findings reveal that female ECRs use various publications strategies to enhance their scientific career and engage in the neoliberal model of academia, but mostly stay in their local scientific communities, without building internationally recognized scientific careers. Thus, they do wish for a global recognition, but they opt for a safer and more accessible choice of publishing in their local scientific communities.

Originality/value

Knowledge which academic women from the CEE region produce (mostly in their local languages) stays in their local and isolated enviroments, creating an imbalanced knowledge advancement in a international academic arena which recognizes only publications written in English and in renowed journals.

Details

Equality, Diversity and Inclusion: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7149

Keywords

Article
Publication date: 17 July 2024

K.S. Nivedhitha, Gayathri Giri and Palvi Pasricha

Gamification has been constantly demonstrated as an effective mechanism for employee engagement. However, little is known about how gamification reduces cyberloafing and the…

Abstract

Purpose

Gamification has been constantly demonstrated as an effective mechanism for employee engagement. However, little is known about how gamification reduces cyberloafing and the mechanism by which it affects cyberloafing in the workplace. This study draws inspiration from self-determination and social bonding theories to explain how game dynamics, namely, personalised challenges, social interactivity and progression status, enhance tacit knowledge sharing behaviour, which, in turn, reduces cyberloafing. In addition, the study also examines the negative moderating effect of fear of failure on the positive relationship between game dynamics and tacit knowledge sharing.

Design/methodology/approach

Using a sample of 250 employees from information technology organisations, the study employed a 3-wave study to examine the conditional indirect effects.

Findings

The results ascertain that tacit knowledge sharing plays a central role in the relationship between gamification and cyberloafing. Further, game dynamics positively influenced tacit knowledge sharing, which in turn reduced cyberloafing. Especially, social interactivity and progression status greatly reduced cyberloafing behaviour when the fear of failure was low.

Originality/value

This study is one of the initial studies that suggest gamification as a progressive tool to reduce workplace cyberloafing behaviours. It utilises a problematisation approach to analyse and criticise the in-house assumptions regarding cyberloafing prevention measures. Further, the study proposes a conceptual model explaining the link between gamification and cyberloafing through alternate assumptions.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 10 July 2024

Denis Tolkach

This paper is part of Horizon 2050 series of papers. This paper aims to highlight the importance of stronger engagement with ethical philosophy in tourism. A number of potential…

Abstract

Purpose

This paper is part of Horizon 2050 series of papers. This paper aims to highlight the importance of stronger engagement with ethical philosophy in tourism. A number of potential research streams are identified.

Design/methodology/approach

The paper first introduces several theories of ethics. It then reviews the history of tourism’s engagement with ethics, especially within academia. Subsequently, several themes for the future of research on tourism ethics are discussed according to four scales: the tourist, tourism business, tourism destination and the tourism system.

Findings

At the individual tourist level, future research should focus on better understanding tourist (un)ethical behaviour by considering the hedonic and cross-cultural nature of tourism. At business level, motivations to be ethical, ethical corporate models should be studied. Endurance of tourist products that are deemed unethical needs further analysis. At destination level, further understanding of stakeholder relations, stakeholder values and dissemination of those values is required. Fair and just options to sustainably manage visitation merit further discussion. At tourism system level, a stronger engagement with political philosophies and more creative alternatives for the current global tourism system require exploration.

Originality/value

While several reviews of ethics of tourism research exist, this paper is oriented towards opportunities for future research. The paper does not intend to cover all current ethical debates; however, it provides a number of topics within the tourism ethics field that merit further exploration in hope to inspire new research.

目的

本文是地平线 2050 系列论文的一部分。 它强调了在旅游业中加强参与道德哲学的重要性。 确定了许多潜在的研究方向。

设计

文章首先介绍了伦理学的几种理论。 然后回顾了旅游业与道德的接触历史, 特别是在学术界。 随后, 从游客、旅游企业、旅游目的地和旅游系统四个层面讨论了旅游伦理研究未来的几个主题。

发现

在个体游客层面, 未来的研究应侧重于考虑旅游的享乐性和跨文化性质, 更好地理解游客的(不)道德行为。 在商业层面, 应该研究道德的动机、道德的企业模式。 被认为不道德的旅游产品的耐久性需要进一步分析。 在目的地层面, 需要进一步了解利益相关者关系、利益相关者价值观以及这些价值观的传播。 可持续管理访问的公平公正的选择值得进一步讨论。 在旅游系统层面, 需要探索更深入地参与政治哲学, 并为当前的全球旅游系统提供更具创意的替代方案。

独创性

虽然存在一些关于旅游研究伦理的评论, 但本文面向未来研究的机会。 本文并不打算涵盖当前所有的伦理辩论, 但它提供了旅游伦理领域内的一些值得进一步探索的主题, 以期激发新的研究。

Propósito

Este artículo forma parte de la serie de artículos Horizonte 2050. El estudio destaca la importancia de un mayor compromiso con la filosofía ética en el ámbito turístico. Se identifican una serie de posibles líneas de investigación.

Diseño

En primer lugar, el artículo presenta varias teorías de la ética. Luego revisa la historia del compromiso del turismo con la ética, especialmente dentro del mundo académico. Posteriormente, se discuten varios temas para el futuro de la investigación sobre la ética turística según cuatro escalas: el turista, la empresa turística, el destino turístico y el sistema turístico.

Conclusiones

A nivel de turista individual, las investigaciones futuras deberían centrarse en comprender mejor el comportamiento (no)ético de los turistas considerando la fundamentación hedónica e intercultural del turismo. A nivel empresarial se deben estudiar tanto las motivaciones para ser éticos, como los modelos corporativos éticos. Además, la perdurabilidad de productos turísticos que se consideran poco éticos necesita un análisis más profundo. A nivel de destino, se requiere una mayor comprensión de las relaciones con las partes interesadas, sus valores y la difusión de esos valores. Las opciones justas y equitativas para gestionar de forma sostenible las visitas merecen un debate más profundo. A nivel del sistema turístico, es necesario explorar un compromiso más fuerte con las filosofías políticas y alternativas más creativas para el actual sistema turístico global.

Originalidad

Si bien existen varias revisiones de la ética de la investigación en turismo, este artículo está orientado hacia oportunidades para futuras investigaciones. El artículo no pretende cubrir todos los debates éticos actuales, sin embargo, proporciona una serie de temas dentro del campo de la ética del turismo que merecen una mayor exploración con la esperanza de inspirar nuevas investigaciones.

Article
Publication date: 18 August 2023

Hiranmoy Roy, Soumen Rej and Jayaraj Rajaiah

This study investigates the asymmetric influence of renewable energy consumption (REC) and trade openness (TO) in the pathway of decarbonizing of Indian economy.

Abstract

Purpose

This study investigates the asymmetric influence of renewable energy consumption (REC) and trade openness (TO) in the pathway of decarbonizing of Indian economy.

Design/methodology/approach

By exploiting fifty years of annual time series data spanning from 1970 to 2019 with the augmentation of nonlinear autoregressive distributed lag technique with the consideration of GDP and industry value added (IVA) as control variables.

Findings

Our This research not only demonstrates the asymmetric association among the employed variables but also shows that negative shock to REC stimulates emissions, where as positive shock on the same policy variable promotes environmental quality improvement. Negative shock to TO is found to be associated with the corresponding increase of environmental quality, but the positive shock on the same intensifies environmental pollution. IVA is also found to be associated with intensifying environmental squalor. In addition, the research provides the empirical evidence of existence of “EKC” hypothesis in India as long-run coefficient associated with GDP looks smaller than short-run coefficient of GDP.

Research limitations/implications

It was difficult to include may other causal variables due to nonavailability of data pertaining to those variables.

Practical implications

Moreover, some policy guidelines have also been recommended for India at the end that may aid India to achieve net zero emissions by 2070.

Originality/value

This is an original research paper carried out by the authors and has not yet been submitted elsewhere.

Details

Management of Environmental Quality: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1477-7835

Keywords

Article
Publication date: 11 July 2024

Sally Raouf Ragheb Garas

The study aims to better understand the impact of susceptibility to social influence (normative and informational) on perceived risk and the consequent impacts on attitudes…

Abstract

Purpose

The study aims to better understand the impact of susceptibility to social influence (normative and informational) on perceived risk and the consequent impacts on attitudes towards counterfeiting and intention to purchase counterfeit brands.

Design/methodology/approach

A single cross-sectional descriptive research was employed, and questionnaires were used to collect data from 361 counterfeit buyers. Structural equation modelling (SEM) based on partial least squares (PLS-SEM) was applied to analyse data and test the research hypotheses.

Findings

Results showed that normative susceptibility to social influence significantly increased attitudes towards counterfeiting but not purchase intention; its impact on intention was mediated by perceived risk and attitudes. Although information susceptibility to social influence increased purchase intention, it had no significant impact on attitudes and perceived risk.

Originality/value

The current study empirically explores the relationship between susceptibility to social influence and perceived risk in the context of non-deceptive counterfeit consumption, by integrating the foundations of the theory of planned behaviour (TPB) and social cognitive theory (SCT).

1 – 10 of 66