Search results

1 – 10 of 59
Open Access
Article
Publication date: 5 September 2024

Marcus Gerdin

The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Abstract

Purpose

The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Design/methodology/approach

To be able to compare the results of this study and those reported by Moody et al. (2018) (and followers), the same quantitative data collection method (questionnaire) and variable measurement instruments were used. Specifically, questionnaire data were collected from a department within a Swedish governmental organization comprising 150 employees. Of these, 90 answered the questionnaire which rendered a response rate of 60%. Following Moody et al. (2018), the collected data were analyzed by means of structural equation modeling.

Findings

This study generally provides empirical support for the original UMISPC as a large majority of the findings are in line with those reported by Moody et al. (2018). However, it also suggests important differences and boundary conditions.

Originality/value

This study extends the original study of Moody et al. (2018) and subsequent replication studies by testing it in a new national/organizational context. Based on their call for future research, it also develops and empirically tests the effects of a new, socially visible information system security violation scenario. Related to this, this study also revisits the role of the variable subjective norms for better understanding employee non-/compliance to information security policies by suggesting that their effects may be indirect (i.e. running through other variables in the UMISPC) rather than direct.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 July 2024

Petter Gottschalk and Christopher Hamerton

This paper aims to make a contribution to the offender-based perspective when researching white-collar and corporate crime. Previously, the offender-based perspective has…

Abstract

Purpose

This paper aims to make a contribution to the offender-based perspective when researching white-collar and corporate crime. Previously, the offender-based perspective has emphasized general characteristics of actors such as social and occupational status, respectability and power.

Design/methodology/approach

This paper presents categories of offender types in their roles when offending.

Findings

Based on the theory of convenience with 14 convenience propositions along three dimensions, it is possible to identify eight offender categories.

Research limitations/implications

Alternative theories for identification of offender categories might be applied in future research to compare with categories presented in this paper based on convenience theory.

Practical implications

These offender categories are labeled opportunist, illusionist, manipulator, ignorer, defender, reactionist, rescuer and controller.

Social implications

The offender-bases rather than the offence-based perspective is needed to increase law enforcement understanding of white-collar and corporate crime.

Originality/value

When researchers study the extent of seriousness of white-collar and corporate crime in the future, it is suggested that they use such labels to distinguish between serious and less serious offenders.

Details

The Journal of Forensic Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 21 November 2023

Chander Mohan Gupta, Petter Gottschalk and Maryam Kamaei

This paper aims to understand the involvement of women in white-collar crime (WCC) also referred to as pink-collar crimes. WCC is present around the globe and has created a word…

Abstract

Purpose

This paper aims to understand the involvement of women in white-collar crime (WCC) also referred to as pink-collar crimes. WCC is present around the globe and has created a word for itself.

Design/methodology/approach

The paper is designed by studying the WCC in the area of Iran, Portugal, Norway, India and the USA.

Findings

The paper attempts to move beyond the traditional perspectives of emancipation versus focal concern, which argue that less inequality will increase women involvement in WCC versus women socializing into accepting responsibilities for social concerns by caring for others.

Research limitations/implications

As the data is restricted, this study is based on the limited data available on the internet.

Originality/value

This paper is an original work of the authors.

Book part
Publication date: 1 July 2024

Irina B. Teslenko and Daria O. Maslakova

The research aims to analyze the priority areas for developing the digital financial literacy (DFL) of the population. During the research, the authors applied comparative…

Abstract

The research aims to analyze the priority areas for developing the digital financial literacy (DFL) of the population. During the research, the authors applied comparative analysis, synthesis, a systemic approach to data evaluation, and the dialectical method. The research found that the main components of DFL include the level of digital financial knowledge, the level of digital financial attitudes, and the level of digital financial behavior. There are also scientifically based theses about the importance of digital transformation of society due to the new global requirements for the level of basic knowledge and skills to use digital financial technologies effectively. Based on the analysis, the authors defined DFL as a basic digital process of forming financial concepts based on the ability of people to make informed decisions in dealing with financial services and their awareness of the risks arising in the digital environment, as well as the possibility of their neutralization. The research identifies and analyzes the most promising areas that make it possible to develop trends in the field of DFL.

Details

Development of International Entrepreneurship Based on Corporate Accounting and Reporting According to IFRS
Type: Book
ISBN: 978-1-83797-669-0

Keywords

Article
Publication date: 30 August 2024

Zihao Jiang, Jiarong Shi and Zhiying Liu

Firms in emerging economies are generally at a disadvantage in terms of resources, which may limit their digital transformation. The Chinese government has designed and…

Abstract

Purpose

Firms in emerging economies are generally at a disadvantage in terms of resources, which may limit their digital transformation. The Chinese government has designed and promulgated a series of wind power policies from the perspectives of support and regulation. The former provides scarce resources for enterprises and thus alleviating financial constraints. While the latter increases the demands for advanced technologies, thereby triggering resource bricolages. This study aims to clarify the impact of industrial policy on the digital transformation of the Chinese wind power industry, and the role of financing constraint and resource bricolage in the above relationship.

Design/methodology/approach

Based on the data of listed companies in the Chinese wind power industry from 2006 to 2021, this study clarifies the impact and mechanism of industrial policy on firm digital transformation with fixed effect regression models.

Findings

Empirical results indicate that both supportive and regulatory policies are the cornerstone of the digital transformation of the Chinese wind power industry. Financial constraint and resource bricolage, respectively, mediate the impact of supportive and regulatory policies. However, the mix of supportive and regulatory policies inhibits digital transformation. Moreover, industrial policies are more effective for the digital transformation of state-owned enterprises, as well as enterprises in economically underdeveloped regions.

Research limitations/implications

This study investigates the path of government intervention driving firm digital transformation from the resource-related perspective (i.e. financial constraint and resource bricolage), and its analytical framework can be extended based on other theories. The combined effects of cross-sectoral policies (e.g. wind power policy and digital infrastructure policy) can be further assessed. The marginal net benefit of government intervention can be calculated to determine whether it is worthwhile.

Practical implications

This study emphasizes the necessity of government intervention in the digital transformation of enterprises in emerging economies. The governments should align the policy targets, clarify policy recipients and modify policy process of different categories of industrial policies to optimize the effectiveness of policy mix. Given that the effectiveness of government intervention varies among different categories of enterprises, the competent agencies should design and promulgate differentiated industrial policies based on the heterogeneity of firms to improve the effectiveness and efficiency of industrial policies.

Originality/value

This is one of the earliest explorations of industrial policies’ effect on the digital transformation of the renewable energy sector in emerging economies, providing new evidence for institutional theory. Meanwhile, this study introduces financial constraint and resource bricolage into the research framework and attempts to uncover the mechanism of industrial policy driving the digital transformation of enterprises in emerging economies. Besides, to expand the understanding of the complex industrial policy system, this study assesses the effectiveness of the industrial policy mix.

Details

International Journal of Emerging Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 16 July 2024

Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…

Abstract

Purpose

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.

Design/methodology/approach

This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.

Findings

The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.

Practical implications

The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.

Social implications

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.

Originality/value

The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 July 2024

Karolina Lendák-Kabók, Stéphanie Mignot-Gerard and Marc Vanholsbeeck

The paper’s aim is to explore female academics’ publication aspirations and constraints in a less researched area of Central and Eastern Europe (CEE).

Abstract

Purpose

The paper’s aim is to explore female academics’ publication aspirations and constraints in a less researched area of Central and Eastern Europe (CEE).

Design/methodology/approach

The research data presented in this paper is part of a larger cross-European project involving semi-structured interviews conducted with Early Career Researchers (ECR) (PhD+ 8 years) from Social Sciences and Humanities (SSH) from seventeen European countries.

Findings

The findings show how ECR women from the CEE region in SSH encounter difficulties when trying to publish, which obstacles add to a strong economic and geopolitical dependence. Findings reveal that female ECRs use various publications strategies to enhance their scientific career and engage in the neoliberal model of academia, but mostly stay in their local scientific communities, without building internationally recognized scientific careers. Thus, they do wish for a global recognition, but they opt for a safer and more accessible choice of publishing in their local scientific communities.

Originality/value

Knowledge which academic women from the CEE region produce (mostly in their local languages) stays in their local and isolated enviroments, creating an imbalanced knowledge advancement in a international academic arena which recognizes only publications written in English and in renowed journals.

Details

Equality, Diversity and Inclusion: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7149

Keywords

Article
Publication date: 28 December 2023

Nimrah Ishfaq and Anila Kamal

This study aims to differentiate crime-related characteristics (such as the number of cases filed against current convictions and criminal history) based on the criminal thinking…

Abstract

Purpose

This study aims to differentiate crime-related characteristics (such as the number of cases filed against current convictions and criminal history) based on the criminal thinking prevailing among convicts. However, because of the low reliability of subscales and poor structural validity of indigenous and translated versions of international instruments, a new instrument criminal attitude measure (CAM) was extracted to measure criminal thinking patterns among convicts incarcerated in central prisons of Punjab.

Design/methodology/approach

A cross-sectional research design was used. Data was collected from 1,949 male convicts (extracting mutually exclusive data from 649 respondents for EFA and 1,300 respondents for confirmatory factor analysis [CFA]). Both data samples were collected from convicts incarcerated in the nine (all) central jails of Punjab, Pakistan.

Findings

The results of this study showed poor model fit for both the indigenous criminal thinking scale and the translated version of criminogenic cognition scale. CAM was extracted through principal component analysis and proposed as a 15-item questionnaire with five factors extracted through varimax rotation. Those five factors are power orientation, mollification, entitlement, mistrust toward authorities and short-term orientation. The results of CFA for CAM confirmed the proposed five-factor structure for the construct. Findings based on MANOVA further found that CAM differentiates between the thinking patterns of recidivists, convicts with multiple charges filed against them in current convictions and convicts with a familial criminal record. The findings of this study showed that CAM is a practical, valid and reliable instrument for measuring criminal thinking among convicts.

Research limitations/implications

In this study, using the survey method was inevitable because of the restrictions imposed by the granted permission. However, this time duration was extended because of the courtesy of the Superintendent and Deputy Superintendent of each jail. This study is focused on a male sample only, and the findings cannot be generalized to females. The phenomena proposed (based on large data sets) in this study can further be elaborated using qualitative research designs and methods (using a small sample with an in-depth study). So, it is also suggested to test this new instrument on a comparative study between prisoners and non-prisoners to explore whether scale can differentiate between these two groups.

Practical implications

A short-scale and easy-to-administer instrument was developed for assessing major criminogenic needs among convicts for prison management, i.e. assigning barracks, allocating treatment and also detecting changes in attitude after imprisonment.

Originality/value

To the best of the authors’ knowledge, this study is the first study to explore and validate the construct of criminal attitudes among convicts using both the EFA and CFA. A small and valid instrument facilitates the measurement of criminogenic needs among prisoners. Data was collected from all central jails in Punjab. This study explored comparatively less researched crime characteristics in a relatively large sample.

Details

Journal of Criminal Psychology, vol. 14 no. 3
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 17 July 2024

K.S. Nivedhitha, Gayathri Giri and Palvi Pasricha

Gamification has been constantly demonstrated as an effective mechanism for employee engagement. However, little is known about how gamification reduces cyberloafing and the…

Abstract

Purpose

Gamification has been constantly demonstrated as an effective mechanism for employee engagement. However, little is known about how gamification reduces cyberloafing and the mechanism by which it affects cyberloafing in the workplace. This study draws inspiration from self-determination and social bonding theories to explain how game dynamics, namely, personalised challenges, social interactivity and progression status, enhance tacit knowledge sharing behaviour, which, in turn, reduces cyberloafing. In addition, the study also examines the negative moderating effect of fear of failure on the positive relationship between game dynamics and tacit knowledge sharing.

Design/methodology/approach

Using a sample of 250 employees from information technology organisations, the study employed a 3-wave study to examine the conditional indirect effects.

Findings

The results ascertain that tacit knowledge sharing plays a central role in the relationship between gamification and cyberloafing. Further, game dynamics positively influenced tacit knowledge sharing, which in turn reduced cyberloafing. Especially, social interactivity and progression status greatly reduced cyberloafing behaviour when the fear of failure was low.

Originality/value

This study is one of the initial studies that suggest gamification as a progressive tool to reduce workplace cyberloafing behaviours. It utilises a problematisation approach to analyse and criticise the in-house assumptions regarding cyberloafing prevention measures. Further, the study proposes a conceptual model explaining the link between gamification and cyberloafing through alternate assumptions.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 10 July 2024

Denis Tolkach

This paper is part of Horizon 2050 series of papers. This paper aims to highlight the importance of stronger engagement with ethical philosophy in tourism. A number of potential…

Abstract

Purpose

This paper is part of Horizon 2050 series of papers. This paper aims to highlight the importance of stronger engagement with ethical philosophy in tourism. A number of potential research streams are identified.

Design/methodology/approach

The paper first introduces several theories of ethics. It then reviews the history of tourism’s engagement with ethics, especially within academia. Subsequently, several themes for the future of research on tourism ethics are discussed according to four scales: the tourist, tourism business, tourism destination and the tourism system.

Findings

At the individual tourist level, future research should focus on better understanding tourist (un)ethical behaviour by considering the hedonic and cross-cultural nature of tourism. At business level, motivations to be ethical, ethical corporate models should be studied. Endurance of tourist products that are deemed unethical needs further analysis. At destination level, further understanding of stakeholder relations, stakeholder values and dissemination of those values is required. Fair and just options to sustainably manage visitation merit further discussion. At tourism system level, a stronger engagement with political philosophies and more creative alternatives for the current global tourism system require exploration.

Originality/value

While several reviews of ethics of tourism research exist, this paper is oriented towards opportunities for future research. The paper does not intend to cover all current ethical debates; however, it provides a number of topics within the tourism ethics field that merit further exploration in hope to inspire new research.

目的

本文是地平线 2050 系列论文的一部分。 它强调了在旅游业中加强参与道德哲学的重要性。 确定了许多潜在的研究方向。

设计

文章首先介绍了伦理学的几种理论。 然后回顾了旅游业与道德的接触历史, 特别是在学术界。 随后, 从游客、旅游企业、旅游目的地和旅游系统四个层面讨论了旅游伦理研究未来的几个主题。

发现

在个体游客层面, 未来的研究应侧重于考虑旅游的享乐性和跨文化性质, 更好地理解游客的(不)道德行为。 在商业层面, 应该研究道德的动机、道德的企业模式。 被认为不道德的旅游产品的耐久性需要进一步分析。 在目的地层面, 需要进一步了解利益相关者关系、利益相关者价值观以及这些价值观的传播。 可持续管理访问的公平公正的选择值得进一步讨论。 在旅游系统层面, 需要探索更深入地参与政治哲学, 并为当前的全球旅游系统提供更具创意的替代方案。

独创性

虽然存在一些关于旅游研究伦理的评论, 但本文面向未来研究的机会。 本文并不打算涵盖当前所有的伦理辩论, 但它提供了旅游伦理领域内的一些值得进一步探索的主题, 以期激发新的研究。

Propósito

Este artículo forma parte de la serie de artículos Horizonte 2050. El estudio destaca la importancia de un mayor compromiso con la filosofía ética en el ámbito turístico. Se identifican una serie de posibles líneas de investigación.

Diseño

En primer lugar, el artículo presenta varias teorías de la ética. Luego revisa la historia del compromiso del turismo con la ética, especialmente dentro del mundo académico. Posteriormente, se discuten varios temas para el futuro de la investigación sobre la ética turística según cuatro escalas: el turista, la empresa turística, el destino turístico y el sistema turístico.

Conclusiones

A nivel de turista individual, las investigaciones futuras deberían centrarse en comprender mejor el comportamiento (no)ético de los turistas considerando la fundamentación hedónica e intercultural del turismo. A nivel empresarial se deben estudiar tanto las motivaciones para ser éticos, como los modelos corporativos éticos. Además, la perdurabilidad de productos turísticos que se consideran poco éticos necesita un análisis más profundo. A nivel de destino, se requiere una mayor comprensión de las relaciones con las partes interesadas, sus valores y la difusión de esos valores. Las opciones justas y equitativas para gestionar de forma sostenible las visitas merecen un debate más profundo. A nivel del sistema turístico, es necesario explorar un compromiso más fuerte con las filosofías políticas y alternativas más creativas para el actual sistema turístico global.

Originalidad

Si bien existen varias revisiones de la ética de la investigación en turismo, este artículo está orientado hacia oportunidades para futuras investigaciones. El artículo no pretende cubrir todos los debates éticos actuales, sin embargo, proporciona una serie de temas dentro del campo de la ética del turismo que merecen una mayor exploración con la esperanza de inspirar nuevas investigaciones.

1 – 10 of 59