Search results

1 – 9 of 9
Article
Publication date: 13 March 2020

Tim Schürmann, Nina Gerber and Paul Gerber

Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users'…

Abstract

Purpose

Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users' stated preferences. This article investigates the level of modeling that contemporary approaches rely on to explain said inconsistencies and whether drawn conclusions are justified by the applied modeling methodology. Additionally, it provides resources for researchers interested in using computational modeling.

Design/methodology/approach

The article uses data from a pre-existing literature review on the privacy paradox (N = 179 articles) to identify three characteristics of prior research: (1) the frequency of references to computational-level theories of human decision-making and perception in the literature, (2) the frequency of interpretations of human decision-making based on computational-level theories, and (3) the frequency of actual computational-level modeling implementations.

Findings

After excluding unrelated articles, 44.1 percent of investigated articles reference at least one theory that has been traditionally interpreted on a computational level. 33.1 percent of all relevant articles make statements regarding computational properties of human cognition in online privacy scenarios. Meanwhile, 5.1 percent of all relevant articles apply formalized computational-level modeling to substantiate their claims.

Originality/value

The findings highlight the importance of formal, computational-level modeling in online privacy research, which has so far drawn computational-level conclusions without utilizing appropriate modeling techniques. Furthermore, this article provides an overview of said modeling techniques and their benefits to researchers, as well as references for model theories and resources for practical implementation.

Details

Journal of Intellectual Capital, vol. 21 no. 3
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 20 June 2019

Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen and Konstantin Schmidt

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative…

Abstract

Purpose

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative outperforming the text password on every criterion, the framework can support decision makers in finding suitable solutions for specific authentication contexts. The purpose of this paper is to extend and update the database, thereby discussing benefits, limitations and suggestions for continuing the development of the framework.

Design/methodology/approach

This paper revisits the rating process and describes the application of an extended version of the original framework to an additional 40 authentication schemes identified in a literature review. All schemes were rated in terms of 25 objective features assigned to the three main criteria: usability, deployability and security.

Findings

The rating process and results are presented along with a discussion of the benefits and pitfalls of the rating process.

Research limitations/implications

While the extended framework, in general, proves suitable for rating and comparing authentication schemes, ambiguities in the rating could be solved by providing clearer definitions and cut-off values. Further, the extension of the framework with subjective user perceptions that sometimes differ from objective ratings could be beneficial.

Originality/value

The results of the rating are made publicly available in an authentication choice support system named ACCESS to support decision makers and researchers and to foster the further extension of the knowledge base and future development of the extended rating framework.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 June 2017

Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer and Joachim Vogt

This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.

Abstract

Purpose

This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.

Design/methodology/approach

This paper describes the results of a survey with 200 German employees regarding the effects of goal setting on employees’ security compliance. Based on the survey results, a concept for setting information security goals in organizations building on actionable behavioral recommendations from information security awareness materials is developed. This concept was evaluated in three small- to medium-sized organizations (SMEs) with overall 90 employees.

Findings

The survey results revealed that the presence of rewards for productivity goal achievement is strongly associated with a decrease in security compliance. The evaluation of the goal setting concept indicates that setting their own information security goals is welcomed by employees.

Research limitations/implications

Both studies rely on self-reported data and are, therefore, likely to contain some kind of bias.

Practical implications

Goal setting in organizations has to accommodate for situations, where productivity goals constrain security policy compliance. Introducing the proposed goal setting concept based on relevant actionable behavioral recommendations can help mitigate issues in such situations.

Originality/value

This work furthers the understanding of the factors affecting employee security compliance. Furthermore, the proposed concept can help maximizing the positive effects of goal setting in organizations by mitigating the negative effects through the introduction of meaningful and actionable information security goals.

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 May 2020

Sergio Cabrales, Jesus Solano, Carlos Valencia and Rafael Bautista

In the equatorial Pacific, rainfall is affected by global climate phenomena, such as El Niño Southern Oscillation (ENSO). However, current publicly available methodologies for…

Abstract

Purpose

In the equatorial Pacific, rainfall is affected by global climate phenomena, such as El Niño Southern Oscillation (ENSO). However, current publicly available methodologies for valuing weather derivatives do not account for the influence of ENSO. The purpose of this paper is to develop a complete framework suitable for valuing rainfall derivatives in the equatorial Pacific.

Design/methodology/approach

In this paper, we implement a Markov chain for the occurrence of rain and a gamma model for the conditional quantities using vector generalized linear models (VGLM). The ENSO forecast probabilities reported by the International Research Institute for Climate and Society (IRI) are included as independent variables using different alternatives. We then employ the Esscher transform to price rainfall derivatives.

Findings

The methodology is applied and calibrated using the historical rainfall data collected at the El Dorado airport weather station in Bogotá. All the estimated coefficients turn out to be significant. The results prove more accurate than those of Markovian gamma models based on purely statistical descriptions of the daily rainfall probabilities.

Originality/value

This procedure introduces the novelty of incorporating variables related to the climatic phenomena, which are the forecast probabilities regularly published for the occurrence of El Niño and La Niña.

Details

Agricultural Finance Review, vol. 80 no. 4
Type: Research Article
ISSN: 0002-1466

Keywords

Content available
Article
Publication date: 4 January 2008

Tauno Kekäle and Sara Cervai

404

Abstract

Details

Journal of Workplace Learning, vol. 20 no. 1
Type: Research Article
ISSN: 1366-5626

Article
Publication date: 18 September 2017

Nagaletchimee Annamalai

This study aims to explore how the Community of Inquiry (CoI) model (2000) is used to categorize students’ and teachers’ interactions in an asynchronous discussion and how these…

Abstract

Purpose

This study aims to explore how the Community of Inquiry (CoI) model (2000) is used to categorize students’ and teachers’ interactions in an asynchronous discussion and how these interactions are able to help students add quality to their narrative writing.

Design/methodology/approach

The interactions were categorized based on teaching, social and cognitive presences suggested by the CoI model. Data collection included online archives and students’ narrative essays. Content analysis was performed based on the presences suggested by the CoI model. Scores for the narrative essays were based on Tribble’s (1996) assessment scale.

Findings

The findings indicated that the interactions were significantly related to the cognitive, teaching and social presences. However, the cognitive presence indicated a distinctive pattern. As this was a qualitative study, there were emerging themes. The study found that critical thinking was minimal, as the writing task was related to creative thinking.

Research limitations/implications

It is suggested that writing in the online environment should also consider different types of writing.

Originality/value

The emerging themes can be used to enhance and complement the CoI model when used in the Malaysian setting.

Details

Interactive Technology and Smart Education, vol. 14 no. 3
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 31 October 2022

Yangyang Fan, Erbolat Tulepbayev, Hyun Jung Lee and Xiaojun Lyu

Work from home has become as regular as the traditional commuting system after the outbreak of the COVID-19 pandemic. Previous studies have discussed the influence of working at…

Abstract

Purpose

Work from home has become as regular as the traditional commuting system after the outbreak of the COVID-19 pandemic. Previous studies have discussed the influence of working at home on the work–family interface. However, there is limited understanding of how diverse workforces manage their work–family issues with various family-friendly policies. This study aims to bridge this research gap by examining the collective influence of work conditions and family-friendly policies on work–family balance.

Design/methodology/approach

A survey experiment featuring two working conditions (work from home or commuting) × four family-friendly policies (household subsidy, family-friendly supervisor, financial profit, paid leave vs no policy) was approached based on 703 valid responses in China.

Findings

The results indicate that family-friendly policies are more effective under the work-from-home condition than the commuting condition, household subsidies and financial profits are considered more helpful for work–family balance under the work-from-home condition and employees’ policy preferences depend on personal identity and work conditions, which help them maintain work and family issues concurrently.

Originality/value

This study explores the joint impact of work conditions and family-friendly policies from a situational perspective. This study indicated that professional organizations need to perform delicacy management considering policy preferences. Moreover, changing working arrangements help employees facilitate their work–family balance.

Details

Chinese Management Studies, vol. 17 no. 6
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 29 October 2021

José Luis Camarena, Francisco Javier Osorio Vera, Hector Heraldo Rojas Jimenez, Ernesto Borda Medina, Juan Camilo Esteban Torregroza and Jesús David Tabares-Valencia

This paper aims to propose future public policy guidelines (FPPG) in sustainable regional development for Guaviare (Colombia) – a territory affected by environmental and social…

Abstract

Purpose

This paper aims to propose future public policy guidelines (FPPG) in sustainable regional development for Guaviare (Colombia) – a territory affected by environmental and social distress – for the year 2035.

Design/methodology/approach

Following collective action theory and sustainable regional development literature, a foresight exercise was conducted using site focus groups and semi-structured interviews with local participants to identify future strategic change drivers and the most relevant social actors for the attainment of economic, social and environmental development in the Guaviare through FPPG.

Findings

The findings suggest that the development of public policies regarding building consensus around Guaviare’s economic, environmental and social issues, reducing conflict between the region’s cultural and environmental ways, decreasing isolation from the centers of decision-making, increasing the transparency of public institutions and reducing insecurity to attract investments are all crucial to attaining sustainable regional development.

Originality/value

Interdisciplinarity is implicit in the local perspectives on the problem that impedes sustainable development in San José del Guaviare. The paper’s main contribution is the long-term vision that breaks away from the traditional short-termism in public policy guidelines in a Latin American context. Methodologically, the significant contribution is the convergent alignment of specific foresight methods toward public policy guidelines’ analysis and design processes.

Details

foresight, vol. 24 no. 2
Type: Research Article
ISSN: 1463-6689

Keywords

Open Access
Article
Publication date: 3 June 2020

Mhamed Biygautane, Stewart Clegg and Khalid Al-Yahya

Existing public–private partnership (PPP) literature that explicitly adopts neo-institutional theory, tends to elucidate the impact of isomorphic pressures and organizational…

3348

Abstract

Purpose

Existing public–private partnership (PPP) literature that explicitly adopts neo-institutional theory, tends to elucidate the impact of isomorphic pressures and organizational fields and structuration on PPP projects. This paper advances this literature by presenting the institutional work and micro-level dynamics through which actors initiate and implement a new form of project delivery. The authors show how actors enact responses to institutional structuration in the expansion and transformation of an airport from a public entity into a PPP in Saudi Arabia.

Design/methodology/approach

The authors use a single case study design that offers an empirically rich and thick description of events such as the dynamic processes, practices and types of institutional work carried out by actors and organizations to deliver the project under investigation.

Findings

Religious symbolic work as social integration triggered system integration work, which expanded the power capabilities of individual actors leading the project. Repair work then followed to alleviate the negative effects of disempowering the agency of actors negatively affected by the PPP model and to streamline the project implementation process.

Practical implications

This research offers several practical implications. For PPPs to operate successfully in contexts similar to the Gulf region, policymakers should provide strong political support and be willing to bear a considerable risk of losses or minimal outcomes during the early phases of experimentation with PPPs. Also, policymakers should not only focus their attention on technical requirements of PPPs but also associate new meanings with the normative and cultural-cognitive elements that are integral to the success of PPP implementation. In order to design strategies for change that are designed to fit the unique cultural and sociopolitical settings of each country, policymakers should empower capable individual actors and provide them with resources and access to power, which will enable them to enforce changes that diverge from institutionalized practices.

Social implications

This research connected the PPP literature with theoretical frameworks drawn from neo-institutional theory and power. It would be valuable for further research, however, to connect ideas from the PPP literature with other disciplines such as psychology and social entrepreneurship. PPP research examines a recent phenomenon that can potentially be combined with non-traditional streams of research in analyzing projects. Expanding the realm of PPP research beyond traditional theoretical boundaries could potentially yield exciting insights into how the overall institutional and psychological environments surrounding projects affect their initiation and implementation.

Originality/value

The paper contributes new insights regarding the roles of religious symbolic work, allied with social and system integration of power relations in implementing PPP projects. It suggests a theoretical shift from structures and organizational fields – macro- and meso-levels of analysis – to individuals – micro-level – as triggers of new forms of project delivery that break with the status quo.

Details

Accounting, Auditing & Accountability Journal, vol. 33 no. 5
Type: Research Article
ISSN: 0951-3574

Keywords

1 – 9 of 9