Search results
1 – 10 of over 6000Jinnan Wu, Mengmeng Song, Pablo Zoghbi-Manrique-de-Lara, Hemin Jiang, Shanshan Guo and Wenpei Zhang
This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory…
Abstract
Purpose
This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory, the authors developed a model to explain the role of employees' perceived certainty of formal and informal sanctions in understanding the effect of coworkers' cyberloafing behavior on employees' cyberloafing behavior.
Design/methodology/approach
The authors conducted a survey that involved a two-stage data collection process (including 293 respondents) to test our developed model. Mplus 7.0 was used to analyze the data.
Findings
The results revealed that employees' cyberloafing was positively affected by their coworkers' cyberloafing both directly and indirectly. The indirect effect of coworkers' cyberloafing on employees' cyberloafing was mediated by the employees' perceived certainty of formal and informal sanctions on cyberloafing. Employees' perceived certainty of formal and informal sanctions were found to mediate the relationship both separately (each type of sanctions mediates the relationship individually) and in combination (the two types of sanctions form a serial mediation effect).
Originality/value
The study reveals an important mechanism – employees’ perceived certainty of formal and informal sanctions – that underlies the relationship between coworkers' cyberloafing and employees' cyberloafing, thus, contributing to the cyberloafing literature. It also demonstrates the importance of negative reinforcement (perceived sanctions) in the social learning process, which contributes to the literature on social learning theory because previous studies have primarily focused on the role of positive reinforcement. Lastly, the study reveals a positive relationship between employees' perceived certainty of formal sanctions and informal sanctions, which has important implications for deterrence theory.
Details
Keywords
Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam and H.R. Rao
Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have…
Abstract
Purpose
Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have used neutralization and moral disengagement (MD) perspectives to examine employee rationalizations of noncompliant security behaviors. Extending this prior work, the purpose of this paper is to identify mechanisms of security education, training, and awareness (SETA) programs and deterrence as well as employees’ organizational commitment in influencing MD of security policy violations and develop a theoretical model to test the proposed relationships.
Design/methodology/approach
The authors validate and test the model using the data collected from six large multinational organizations in Korea using survey-based methodology. The model was empirically analyzed by structural equation modeling.
Findings
The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence. The findings also suggest that SETA programs are an important mechanism in creating security PA.
Originality/value
The paper expands the literature in IS security that has examined the role of moral evaluations. Drawing upon MD theory and social cognitive theory, the paper points to the central role of SETA and security PA in reducing MD of security policy violations, and ultimately the likelihood of this behavior. The paper not only contributes to theory but also provides important insights for practice.
Details
Keywords
Lori Anderson Snyder, Peter Y. Chen, Paula L. Grubb, Rashaun K. Roberts, Steven L. Sauter and Naomi G. Swanson
This chapter examines aggression at work perpetrated by individual insiders by bringing together streams of research that have often been examined separately. A comparison of the…
Abstract
This chapter examines aggression at work perpetrated by individual insiders by bringing together streams of research that have often been examined separately. A comparison of the similarities and differences of aggression toward individuals, such as verbal abuse or physical attack, and aggression toward organizations, such as embezzlement or work slowdowns, is shown to provide important insights about the causes and consequences of workplace aggression. We propose a comprehensive model based on the integration of prior theoretical treatments and empirical findings. The model attempts to offer a framework to systematically examine psychological and organizational mechanisms underlying workplace aggression, and to explain the reasons why workplace violence policies and procedures sometimes fail. A set of research propositions is also suggested to assist in achieving this end in future research.
This study aims to examine whether officers' perceptions of the probability of suffering informal sanctions mediate the relationship between formal sanction threats and attitudes…
Abstract
Purpose
This study aims to examine whether officers' perceptions of the probability of suffering informal sanctions mediate the relationship between formal sanction threats and attitudes toward misconduct. Most importantly, the study examines whether the potential mediating effect of informal sanction threats varies by the type of rank.
Design/methodology/approach
The current study utilizes data collected from a mail survey of 480 police officers over a period of six weeks from 20 police stations across two cities in South Korea.
Findings
Officers' fear of legal sanctions on the attitudes toward misconduct was entirely mediated by the fear of extralegal forms of punishment. However, this mediation effect was held only for the officers in supervisory positions.
Originality/value
Probing a moderated mediation between the type of rank and sanction threats on police integrity advances the literature by moving beyond simply exploring the additive effects of sanction threats and adds clarity to existing concerns about exactly how rank-related cultural differences matter.
Details
Keywords
Chao-Min Chiu, Chiew Mei Tan, Jack Shih-Chieh Hsu and Hsiang-Lan Cheng
Employees may see technostress, that is, the stress experienced by individuals as a result of the use of Information and Communication Technology (ICT), as a threat to their jobs…
Abstract
Purpose
Employees may see technostress, that is, the stress experienced by individuals as a result of the use of Information and Communication Technology (ICT), as a threat to their jobs. In other words, employees may have a strong sense of job insecurity because of the ICT. This study aims to examine why and when employees might respond to technology-induced job insecurity (techno-insecurity) by engaging in workplace deviance – an activity that is costly for organizations.
Design/methodology/approach
The authors apply partial least squares structural equation modeling to test the hypotheses, using a sample of 354 valid responses.
Findings
The authors found that job-related technostress creators and technology-related technostress creators are positively associated with techno-insecurity. Techno-insecurity affects deviant behavior by increasing employees' moral disengagement. The authors also found that informal sanctions moderated the relationship between techno-insecurity and moral disengagement, while formal sanctions moderated the relationship between moral disengagement and deviance.
Originality/value
This study contributes to a better understanding of employee techno-insecurity and deviance by expanding the technostress literature and applying moral disengagement theory.
Details
Keywords
Shiladitya Dey, Piyush Kumar Singh and Megha Deepak Mhaskar
The study assesses the relationship between institutional credit access and farmer satisfaction using contextual mediating and moderating variables. This study identifies various…
Abstract
Purpose
The study assesses the relationship between institutional credit access and farmer satisfaction using contextual mediating and moderating variables. This study identifies various socioeconomic, service features and service quality determinants impacting institutional credit access.
Design/methodology/approach
The authors used the stratified random sampling method and selected 512 farmers from 40 villages in Maharashtra, India. Initially, the study employed probit regression analysis to identify the credit adoption determinants. Subsequently, the relationship between institutional credit and farmer satisfaction is identified through moderated-mediation analysis using the Statistical Package for the Social Sciences and Analysis of a Moment Structures (SPSS - AMOS model).
Findings
Probit model's results suggest that socioeconomic variables like education and bank distance; service quality variables like prompt service and employee behavior; and service characteristics variables like the interest rate, loan sanction time, repayment period, and documents for loan application significantly affect institutional credit adoption across the smallholders. Subsequently, the results of the moderating-mediation analysis show that working capital, perceived value and risk perception partially mediate the association between credit adoption and farmer satisfaction. The mediated effects are further moderated by farm advisory services and financial knowledge and skills.
Research limitations/implications
The study is restricted in opportunity due to primary data, and it considers only farmers' perspectives to measure service quality and service features as constraints for institutional credit access.
Practical implications
The government, nongovernment organizations, civil societies and private institutions should provide sufficient financial knowledge and training to the farmers via extension services to utilize the borrowed capital effectively to bring economic welfare and mental satisfaction.
Originality/value
The existing literature rarely considered banking service quality and service features (demand side) variables as determinants of credit access. Further, the study brings novelty in examining how the capital management cognitive factors of the formal credit adopters influence the relationship between credit access and satisfaction.
Details
Keywords
Bowen Guan and Carol Hsu
The purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on…
Abstract
Purpose
The purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on affective commitment, normative commitment and continuance commitment. The study also examines the moderating effect of perceived certainty and severity of sanctions on the relationship between the three dimensions of organizational commitment and ISP noncompliance intention.
Design/methodology/approach
Survey methodology was used for data collection through a well-designed online questionnaire. Data was analyzed using the structural equation model with Amos v. 22.0 software.
Findings
This study demonstrates that abusive supervision has a significant, negative impact on affective, normative and continuance commitment, and the three dimensions of organizational commitment are negatively associated with employees' ISP noncompliance intention. Results also indicate that the moderating effect of perceived severity of sanctions is significant, and perceived certainty of sanctions plays a positive moderating role in the relationship between affective commitment and employees' ISP noncompliance intention.
Practical implications
Findings of this research are beneficial for organizational management in the relationships between supervisors and employees. These results provide significant evidence that avoiding abusive supervision is important in controlling employees' ISP noncompliance behavior.
Originality/value
This research fills an important gap in examining employees' ISP noncompliance intentions from the perspective of abusive supervision and the impact of affective, normative and continuance commitment on ISP noncompliance. The study is also of great value for information systems research to examine the moderating role of perceived certainty and severity of sanctions.
Details
Keywords
Kari Einarsen, Denise Salin, Ståle Valvatne Einarsen, Anders Skogstad and Reidar Johan Mykletun
Drawing on the resource-based view, the purpose of this paper is to examine the extent to which the level of the organization’s human resource management (HRM) practices…
Abstract
Purpose
Drawing on the resource-based view, the purpose of this paper is to examine the extent to which the level of the organization’s human resource management (HRM) practices, perceived financial resources and organizational size predict the existence of a well-developed ethical infrastructure against workplace bullying.
Design/methodology/approach
The human resource (HR) managers or the main health and safety representatives (HSRs) in 216 Norwegian municipalities responded to an electronic survey, representing some 50 percent of the municipalities.
Findings
The level of high-quality HRM practice predicted the existence of an ethical infrastructure against workplace bullying, particularly informal systems represented by a strong conflict management climate. Perceived financial resources did not predict the existence of such ethical infrastructure. Organizational size predicted the existence of policies and having training against bullying.
Practical implications
This study informs practitioners about organizational resources associated with organization having a well-developed ethical infrastructure against workplace bullying. A high level of high-quality HRM practices seems to be more important for the existence of a well-developed ethical infrastructure against workplace bullying compared to financial resources and organizational size, at least as perceived by HR managers and HSRs.
Originality/value
This study provides empirical evidence for the importance of having a high level of high-quality HRM practices as predictors of the existence of ethical infrastructure to tackle workplace bullying. An essential finding is that the existence of such an infrastructure is not dependent on distal resources, such as organizational size and perceived financial resources.
Details
Keywords
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…
Abstract
Purpose
Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.
Design/methodology/approach
An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.
Findings
The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.
Originality/value
This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
Details
Keywords
The blockchain technology is based on distributed ledger. Many stakeholders, such as developers, entrepreneurs and technology lovers, consider the blockchain as an economic and…
Abstract
Purpose
The blockchain technology is based on distributed ledger. Many stakeholders, such as developers, entrepreneurs and technology lovers, consider the blockchain as an economic and business re-creation that is faced with numerous challenges in its application. Blockchain technology is the backbone of many digital currencies, i.e. Bitcoin and Ethereum. Although presently digital currencies are recognized as payment and exchange instruments in many countries, the economic sanctions imposed on some countries have restricted the possibility of the trading. So, this study seeks to evaluate the adoption of blockchain for digital currency use in Iran in the shadow of economic sanctions.
Design/methodology/approach
The developed value-based technology adoption model and smart PLS software have been used in this research. The statistical population of the study was people active in the Iranian stock market; the purpose for this selection was their familiarity with financial and digital currency issues.
Findings
The results show that the terms of sanctions, usage and facilitating conditions are directly related to users' perceived value of digital currency and its use; As a result, in a sanctioned country like Iran, the use of digital currencies is being accepted as a way of rolling out economic sanctions and thus making commercial payments.
Originality/value
As well as the fact that evaluating the adoption of the blockchain technology in a sanctioned country like Iran is considered as the originality aspect of the research, applying an extended model in the technology adoption is also the research innovation.
Details