Search results

1 – 10 of 12
Article
Publication date: 13 March 2020

Tim Schürmann, Nina Gerber and Paul Gerber

Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users'…

Abstract

Purpose

Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users' stated preferences. This article investigates the level of modeling that contemporary approaches rely on to explain said inconsistencies and whether drawn conclusions are justified by the applied modeling methodology. Additionally, it provides resources for researchers interested in using computational modeling.

Design/methodology/approach

The article uses data from a pre-existing literature review on the privacy paradox (N = 179 articles) to identify three characteristics of prior research: (1) the frequency of references to computational-level theories of human decision-making and perception in the literature, (2) the frequency of interpretations of human decision-making based on computational-level theories, and (3) the frequency of actual computational-level modeling implementations.

Findings

After excluding unrelated articles, 44.1 percent of investigated articles reference at least one theory that has been traditionally interpreted on a computational level. 33.1 percent of all relevant articles make statements regarding computational properties of human cognition in online privacy scenarios. Meanwhile, 5.1 percent of all relevant articles apply formalized computational-level modeling to substantiate their claims.

Originality/value

The findings highlight the importance of formal, computational-level modeling in online privacy research, which has so far drawn computational-level conclusions without utilizing appropriate modeling techniques. Furthermore, this article provides an overview of said modeling techniques and their benefits to researchers, as well as references for model theories and resources for practical implementation.

Details

Journal of Intellectual Capital, vol. 21 no. 3
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 20 June 2019

Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen and Konstantin Schmidt

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative…

Abstract

Purpose

Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative outperforming the text password on every criterion, the framework can support decision makers in finding suitable solutions for specific authentication contexts. The purpose of this paper is to extend and update the database, thereby discussing benefits, limitations and suggestions for continuing the development of the framework.

Design/methodology/approach

This paper revisits the rating process and describes the application of an extended version of the original framework to an additional 40 authentication schemes identified in a literature review. All schemes were rated in terms of 25 objective features assigned to the three main criteria: usability, deployability and security.

Findings

The rating process and results are presented along with a discussion of the benefits and pitfalls of the rating process.

Research limitations/implications

While the extended framework, in general, proves suitable for rating and comparing authentication schemes, ambiguities in the rating could be solved by providing clearer definitions and cut-off values. Further, the extension of the framework with subjective user perceptions that sometimes differ from objective ratings could be beneficial.

Originality/value

The results of the rating are made publicly available in an authentication choice support system named ACCESS to support decision makers and researchers and to foster the further extension of the knowledge base and future development of the extended rating framework.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 June 2017

Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer and Joachim Vogt

This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.

Abstract

Purpose

This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.

Design/methodology/approach

This paper describes the results of a survey with 200 German employees regarding the effects of goal setting on employees’ security compliance. Based on the survey results, a concept for setting information security goals in organizations building on actionable behavioral recommendations from information security awareness materials is developed. This concept was evaluated in three small- to medium-sized organizations (SMEs) with overall 90 employees.

Findings

The survey results revealed that the presence of rewards for productivity goal achievement is strongly associated with a decrease in security compliance. The evaluation of the goal setting concept indicates that setting their own information security goals is welcomed by employees.

Research limitations/implications

Both studies rely on self-reported data and are, therefore, likely to contain some kind of bias.

Practical implications

Goal setting in organizations has to accommodate for situations, where productivity goals constrain security policy compliance. Introducing the proposed goal setting concept based on relevant actionable behavioral recommendations can help mitigate issues in such situations.

Originality/value

This work furthers the understanding of the factors affecting employee security compliance. Furthermore, the proposed concept can help maximizing the positive effects of goal setting in organizations by mitigating the negative effects through the introduction of meaningful and actionable information security goals.

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 May 2020

Sergio Cabrales, Jesus Solano, Carlos Valencia and Rafael Bautista

In the equatorial Pacific, rainfall is affected by global climate phenomena, such as El Niño Southern Oscillation (ENSO). However, current publicly available methodologies for…

Abstract

Purpose

In the equatorial Pacific, rainfall is affected by global climate phenomena, such as El Niño Southern Oscillation (ENSO). However, current publicly available methodologies for valuing weather derivatives do not account for the influence of ENSO. The purpose of this paper is to develop a complete framework suitable for valuing rainfall derivatives in the equatorial Pacific.

Design/methodology/approach

In this paper, we implement a Markov chain for the occurrence of rain and a gamma model for the conditional quantities using vector generalized linear models (VGLM). The ENSO forecast probabilities reported by the International Research Institute for Climate and Society (IRI) are included as independent variables using different alternatives. We then employ the Esscher transform to price rainfall derivatives.

Findings

The methodology is applied and calibrated using the historical rainfall data collected at the El Dorado airport weather station in Bogotá. All the estimated coefficients turn out to be significant. The results prove more accurate than those of Markovian gamma models based on purely statistical descriptions of the daily rainfall probabilities.

Originality/value

This procedure introduces the novelty of incorporating variables related to the climatic phenomena, which are the forecast probabilities regularly published for the occurrence of El Niño and La Niña.

Details

Agricultural Finance Review, vol. 80 no. 4
Type: Research Article
ISSN: 0002-1466

Keywords

Book part
Publication date: 11 June 2021

Hanlie Smuts and Alet Smith

Significant advances in digital technologies impact both organisations and knowledge workers alike. Organisations are now able to effectively analyse significant amounts of data…

Abstract

Significant advances in digital technologies impact both organisations and knowledge workers alike. Organisations are now able to effectively analyse significant amounts of data, while accomplishing actionable insight and data-driven decision-making through knowledge workers that understand and manage greater complexity. For decision-makers to be in a position where sufficient information and data-driven insights enable them to make informed decisions, they need to better understand fundamental constructs that lead to the understanding of deep knowledge and wisdom. In an attempt to guide organisations in such a process of understanding, this research study focuses on the design of an organisational transformation framework for data-driven decision-making (OTxDD) based on the collaboration of human and machine for knowledge work. The OTxDD framework was designed through a design science research approach and consists of 4 major enablers (data analytics, data management, data platform, data-driven organisation ethos) and 12 sub-enablers. The OTxDD framework was evaluated in a real-world scenario, where after, based on the evaluation feedback, the OTxDD framework was improved and an organisational measurement tool developed. By considering such an OTxDD framework and measurement tool, organisations will be able to create a clear transformation path to data-driven decision-making, while applying the insight from both knowledge workers and intelligent machines.

Details

Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress
Type: Book
ISBN: 978-1-83909-812-3

Keywords

Book part
Publication date: 19 May 2009

Sarah Busse Spencer

Purpose – This chapter examines how the kollektiv, a form of workplace organization established in the Soviet Union, continues to shape cultural expectations of work in…

Abstract

Purpose – This chapter examines how the kollektiv, a form of workplace organization established in the Soviet Union, continues to shape cultural expectations of work in post-Soviet Russia.

Methodology/Approach – This chapter describes a workplace ethnography conducted in a college department in Novosibirsk, Russia in 1999–2000 and 2002, with follow-up trips in 2005–2006. Participant observation is combined with interviews of teachers and students in the department.

Findings – The kollektiv established in the Soviet Union has persisted in modified form in post-Soviet Russia. Instead of a means of Party control, the kollektiv became popularly associated with the group cohesion that arises from frequent social interaction. This sense of cohesion, accompanied by attendant habits of sharing holidays with work colleagues, has persisted to varying degrees among adults in Russia today. Furthermore, the structure of the kollektiv has been maintained for students in schools and colleges, so that new generations of Russian youth are raised to expect to work in cohesive small groups. Their behaviors and expectations contribute to the persistence of the kollektiv in Russian society in the present and near future.

Originality/Value of the paper – This chapter makes two unique contributions: (1) it adds a focus on white-collar work to the predominantly blue-collar and service occupations studied in Russia to date and (2) it presents workplace ethnography of academics, a group rarely studied ethnographically.

Details

Economic Sociology of Work
Type: Book
ISBN: 978-1-84855-368-2

Content available
Article
Publication date: 4 January 2008

Tauno Kekäle and Sara Cervai

404

Abstract

Details

Journal of Workplace Learning, vol. 20 no. 1
Type: Research Article
ISSN: 1366-5626

Content available
Book part
Publication date: 28 September 2022

Jacqueline Joslyn

Abstract

Details

Conceptualizing and Modeling Relational Processes in Sociology
Type: Book
ISBN: 978-1-80382-827-5

Article
Publication date: 18 September 2017

Nagaletchimee Annamalai

This study aims to explore how the Community of Inquiry (CoI) model (2000) is used to categorize students’ and teachers’ interactions in an asynchronous discussion and how these…

Abstract

Purpose

This study aims to explore how the Community of Inquiry (CoI) model (2000) is used to categorize students’ and teachers’ interactions in an asynchronous discussion and how these interactions are able to help students add quality to their narrative writing.

Design/methodology/approach

The interactions were categorized based on teaching, social and cognitive presences suggested by the CoI model. Data collection included online archives and students’ narrative essays. Content analysis was performed based on the presences suggested by the CoI model. Scores for the narrative essays were based on Tribble’s (1996) assessment scale.

Findings

The findings indicated that the interactions were significantly related to the cognitive, teaching and social presences. However, the cognitive presence indicated a distinctive pattern. As this was a qualitative study, there were emerging themes. The study found that critical thinking was minimal, as the writing task was related to creative thinking.

Research limitations/implications

It is suggested that writing in the online environment should also consider different types of writing.

Originality/value

The emerging themes can be used to enhance and complement the CoI model when used in the Malaysian setting.

Details

Interactive Technology and Smart Education, vol. 14 no. 3
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 31 October 2022

Yangyang Fan, Erbolat Tulepbayev, Hyun Jung Lee and Xiaojun Lyu

Work from home has become as regular as the traditional commuting system after the outbreak of the COVID-19 pandemic. Previous studies have discussed the influence of working at…

Abstract

Purpose

Work from home has become as regular as the traditional commuting system after the outbreak of the COVID-19 pandemic. Previous studies have discussed the influence of working at home on the work–family interface. However, there is limited understanding of how diverse workforces manage their work–family issues with various family-friendly policies. This study aims to bridge this research gap by examining the collective influence of work conditions and family-friendly policies on work–family balance.

Design/methodology/approach

A survey experiment featuring two working conditions (work from home or commuting) × four family-friendly policies (household subsidy, family-friendly supervisor, financial profit, paid leave vs no policy) was approached based on 703 valid responses in China.

Findings

The results indicate that family-friendly policies are more effective under the work-from-home condition than the commuting condition, household subsidies and financial profits are considered more helpful for work–family balance under the work-from-home condition and employees’ policy preferences depend on personal identity and work conditions, which help them maintain work and family issues concurrently.

Originality/value

This study explores the joint impact of work conditions and family-friendly policies from a situational perspective. This study indicated that professional organizations need to perform delicacy management considering policy preferences. Moreover, changing working arrangements help employees facilitate their work–family balance.

Details

Chinese Management Studies, vol. 17 no. 6
Type: Research Article
ISSN: 1750-614X

Keywords

1 – 10 of 12