Search results

1 – 10 of over 6000
Article
Publication date: 12 July 2022

Jinnan Wu, Mengmeng Song, Pablo Zoghbi-Manrique-de-Lara, Hemin Jiang, Shanshan Guo and Wenpei Zhang

This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory…

1037

Abstract

Purpose

This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory, the authors developed a model to explain the role of employees' perceived certainty of formal and informal sanctions in understanding the effect of coworkers' cyberloafing behavior on employees' cyberloafing behavior.

Design/methodology/approach

The authors conducted a survey that involved a two-stage data collection process (including 293 respondents) to test our developed model. Mplus 7.0 was used to analyze the data.

Findings

The results revealed that employees' cyberloafing was positively affected by their coworkers' cyberloafing both directly and indirectly. The indirect effect of coworkers' cyberloafing on employees' cyberloafing was mediated by the employees' perceived certainty of formal and informal sanctions on cyberloafing. Employees' perceived certainty of formal and informal sanctions were found to mediate the relationship both separately (each type of sanctions mediates the relationship individually) and in combination (the two types of sanctions form a serial mediation effect).

Originality/value

The study reveals an important mechanism – employees’ perceived certainty of formal and informal sanctions – that underlies the relationship between coworkers' cyberloafing and employees' cyberloafing, thus, contributing to the cyberloafing literature. It also demonstrates the importance of negative reinforcement (perceived sanctions) in the social learning process, which contributes to the literature on social learning theory because previous studies have primarily focused on the role of positive reinforcement. Lastly, the study reveals a positive relationship between employees' perceived certainty of formal sanctions and informal sanctions, which has important implications for deterrence theory.

Details

Information Technology & People, vol. 36 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 August 2018

Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam and H.R. Rao

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have…

1314

Abstract

Purpose

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have used neutralization and moral disengagement (MD) perspectives to examine employee rationalizations of noncompliant security behaviors. Extending this prior work, the purpose of this paper is to identify mechanisms of security education, training, and awareness (SETA) programs and deterrence as well as employees’ organizational commitment in influencing MD of security policy violations and develop a theoretical model to test the proposed relationships.

Design/methodology/approach

The authors validate and test the model using the data collected from six large multinational organizations in Korea using survey-based methodology. The model was empirically analyzed by structural equation modeling.

Findings

The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence. The findings also suggest that SETA programs are an important mechanism in creating security PA.

Originality/value

The paper expands the literature in IS security that has examined the role of moral evaluations. Drawing upon MD theory and social cognitive theory, the paper points to the central role of SETA and security PA in reducing MD of security policy violations, and ultimately the likelihood of this behavior. The paper not only contributes to theory but also provides important insights for practice.

Book part
Publication date: 30 December 2004

Lori Anderson Snyder, Peter Y. Chen, Paula L. Grubb, Rashaun K. Roberts, Steven L. Sauter and Naomi G. Swanson

This chapter examines aggression at work perpetrated by individual insiders by bringing together streams of research that have often been examined separately. A comparison of the…

Abstract

This chapter examines aggression at work perpetrated by individual insiders by bringing together streams of research that have often been examined separately. A comparison of the similarities and differences of aggression toward individuals, such as verbal abuse or physical attack, and aggression toward organizations, such as embezzlement or work slowdowns, is shown to provide important insights about the causes and consequences of workplace aggression. We propose a comprehensive model based on the integration of prior theoretical treatments and empirical findings. The model attempts to offer a framework to systematically examine psychological and organizational mechanisms underlying workplace aggression, and to explain the reasons why workplace violence policies and procedures sometimes fail. A set of research propositions is also suggested to assist in achieving this end in future research.

Details

Exploring Interpersonal Dynamics
Type: Book
ISBN: 978-0-76231-153-8

Article
Publication date: 17 October 2022

Yongjae Nam

This study aims to examine whether officers' perceptions of the probability of suffering informal sanctions mediate the relationship between formal sanction threats and attitudes…

Abstract

Purpose

This study aims to examine whether officers' perceptions of the probability of suffering informal sanctions mediate the relationship between formal sanction threats and attitudes toward misconduct. Most importantly, the study examines whether the potential mediating effect of informal sanction threats varies by the type of rank.

Design/methodology/approach

The current study utilizes data collected from a mail survey of 480 police officers over a period of six weeks from 20 police stations across two cities in South Korea.

Findings

Officers' fear of legal sanctions on the attitudes toward misconduct was entirely mediated by the fear of extralegal forms of punishment. However, this mediation effect was held only for the officers in supervisory positions.

Originality/value

Probing a moderated mediation between the type of rank and sanction threats on police integrity advances the literature by moving beyond simply exploring the additive effects of sanction threats and adds clarity to existing concerns about exactly how rank-related cultural differences matter.

Details

Policing: An International Journal, vol. 46 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 February 2022

Chao-Min Chiu, Chiew Mei Tan, Jack Shih-Chieh Hsu and Hsiang-Lan Cheng

Employees may see technostress, that is, the stress experienced by individuals as a result of the use of Information and Communication Technology (ICT), as a threat to their jobs…

1149

Abstract

Purpose

Employees may see technostress, that is, the stress experienced by individuals as a result of the use of Information and Communication Technology (ICT), as a threat to their jobs. In other words, employees may have a strong sense of job insecurity because of the ICT. This study aims to examine why and when employees might respond to technology-induced job insecurity (techno-insecurity) by engaging in workplace deviance – an activity that is costly for organizations.

Design/methodology/approach

The authors apply partial least squares structural equation modeling to test the hypotheses, using a sample of 354 valid responses.

Findings

The authors found that job-related technostress creators and technology-related technostress creators are positively associated with techno-insecurity. Techno-insecurity affects deviant behavior by increasing employees' moral disengagement. The authors also found that informal sanctions moderated the relationship between techno-insecurity and moral disengagement, while formal sanctions moderated the relationship between moral disengagement and deviance.

Originality/value

This study contributes to a better understanding of employee techno-insecurity and deviance by expanding the technostress literature and applying moral disengagement theory.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 23 August 2022

Shiladitya Dey, Piyush Kumar Singh and Megha Deepak Mhaskar

The study assesses the relationship between institutional credit access and farmer satisfaction using contextual mediating and moderating variables. This study identifies various…

Abstract

Purpose

The study assesses the relationship between institutional credit access and farmer satisfaction using contextual mediating and moderating variables. This study identifies various socioeconomic, service features and service quality determinants impacting institutional credit access.

Design/methodology/approach

The authors used the stratified random sampling method and selected 512 farmers from 40 villages in Maharashtra, India. Initially, the study employed probit regression analysis to identify the credit adoption determinants. Subsequently, the relationship between institutional credit and farmer satisfaction is identified through moderated-mediation analysis using the Statistical Package for the Social Sciences and Analysis of a Moment Structures (SPSS - AMOS model).

Findings

Probit model's results suggest that socioeconomic variables like education and bank distance; service quality variables like prompt service and employee behavior; and service characteristics variables like the interest rate, loan sanction time, repayment period, and documents for loan application significantly affect institutional credit adoption across the smallholders. Subsequently, the results of the moderating-mediation analysis show that working capital, perceived value and risk perception partially mediate the association between credit adoption and farmer satisfaction. The mediated effects are further moderated by farm advisory services and financial knowledge and skills.

Research limitations/implications

The study is restricted in opportunity due to primary data, and it considers only farmers' perspectives to measure service quality and service features as constraints for institutional credit access.

Practical implications

The government, nongovernment organizations, civil societies and private institutions should provide sufficient financial knowledge and training to the farmers via extension services to utilize the borrowed capital effectively to bring economic welfare and mental satisfaction.

Originality/value

The existing literature rarely considered banking service quality and service features (demand side) variables as determinants of credit access. Further, the study brings novelty in examining how the capital management cognitive factors of the formal credit adopters influence the relationship between credit access and satisfaction.

Article
Publication date: 6 May 2020

Bowen Guan and Carol Hsu

The purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on…

1405

Abstract

Purpose

The purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on affective commitment, normative commitment and continuance commitment. The study also examines the moderating effect of perceived certainty and severity of sanctions on the relationship between the three dimensions of organizational commitment and ISP noncompliance intention.

Design/methodology/approach

Survey methodology was used for data collection through a well-designed online questionnaire. Data was analyzed using the structural equation model with Amos v. 22.0 software.

Findings

This study demonstrates that abusive supervision has a significant, negative impact on affective, normative and continuance commitment, and the three dimensions of organizational commitment are negatively associated with employees' ISP noncompliance intention. Results also indicate that the moderating effect of perceived severity of sanctions is significant, and perceived certainty of sanctions plays a positive moderating role in the relationship between affective commitment and employees' ISP noncompliance intention.

Practical implications

Findings of this research are beneficial for organizational management in the relationships between supervisors and employees. These results provide significant evidence that avoiding abusive supervision is important in controlling employees' ISP noncompliance behavior.

Originality/value

This research fills an important gap in examining employees' ISP noncompliance intentions from the perspective of abusive supervision and the impact of affective, normative and continuance commitment on ISP noncompliance. The study is also of great value for information systems research to examine the moderating role of perceived certainty and severity of sanctions.

Article
Publication date: 14 March 2019

Kari Einarsen, Denise Salin, Ståle Valvatne Einarsen, Anders Skogstad and Reidar Johan Mykletun

Drawing on the resource-based view, the purpose of this paper is to examine the extent to which the level of the organization’s human resource management (HRM) practices…

1894

Abstract

Purpose

Drawing on the resource-based view, the purpose of this paper is to examine the extent to which the level of the organization’s human resource management (HRM) practices, perceived financial resources and organizational size predict the existence of a well-developed ethical infrastructure against workplace bullying.

Design/methodology/approach

The human resource (HR) managers or the main health and safety representatives (HSRs) in 216 Norwegian municipalities responded to an electronic survey, representing some 50 percent of the municipalities.

Findings

The level of high-quality HRM practice predicted the existence of an ethical infrastructure against workplace bullying, particularly informal systems represented by a strong conflict management climate. Perceived financial resources did not predict the existence of such ethical infrastructure. Organizational size predicted the existence of policies and having training against bullying.

Practical implications

This study informs practitioners about organizational resources associated with organization having a well-developed ethical infrastructure against workplace bullying. A high level of high-quality HRM practices seems to be more important for the existence of a well-developed ethical infrastructure against workplace bullying compared to financial resources and organizational size, at least as perceived by HR managers and HSRs.

Originality/value

This study provides empirical evidence for the importance of having a high level of high-quality HRM practices as predictors of the existence of ethical infrastructure to tackle workplace bullying. An essential finding is that the existence of such an infrastructure is not dependent on distal resources, such as organizational size and perceived financial resources.

Details

Personnel Review, vol. 48 no. 3
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 22 November 2022

Mohammad Hossein Ronaghi

The blockchain technology is based on distributed ledger. Many stakeholders, such as developers, entrepreneurs and technology lovers, consider the blockchain as an economic and…

Abstract

Purpose

The blockchain technology is based on distributed ledger. Many stakeholders, such as developers, entrepreneurs and technology lovers, consider the blockchain as an economic and business re-creation that is faced with numerous challenges in its application. Blockchain technology is the backbone of many digital currencies, i.e. Bitcoin and Ethereum. Although presently digital currencies are recognized as payment and exchange instruments in many countries, the economic sanctions imposed on some countries have restricted the possibility of the trading. So, this study seeks to evaluate the adoption of blockchain for digital currency use in Iran in the shadow of economic sanctions.

Design/methodology/approach

The developed value-based technology adoption model and smart PLS software have been used in this research. The statistical population of the study was people active in the Iranian stock market; the purpose for this selection was their familiarity with financial and digital currency issues.

Findings

The results show that the terms of sanctions, usage and facilitating conditions are directly related to users' perceived value of digital currency and its use; As a result, in a sanctioned country like Iran, the use of digital currencies is being accepted as a way of rolling out economic sanctions and thus making commercial payments.

Originality/value

As well as the fact that evaluating the adoption of the blockchain technology in a sanctioned country like Iran is considered as the originality aspect of the research, applying an extended model in the technology adoption is also the research innovation.

Details

Management Decision, vol. 61 no. 5
Type: Research Article
ISSN: 0025-1747

Keywords

1 – 10 of over 6000