Search results

1 – 10 of over 83000
Book part
Publication date: 13 December 2023

Divya Singh and Ujjwal Kanti Paul

Despite efforts to reduce environmental pollution and wasteful fossil fuel use, electric vehicles (EVs) are still rare on the road. Why is it so challenging to get widespread EV…

Abstract

Despite efforts to reduce environmental pollution and wasteful fossil fuel use, electric vehicles (EVs) are still rare on the road. Why is it so challenging to get widespread EV adoption? One significant factor on which it heavily depends is one's awareness and understanding of EVs. However, due to an absolute lack of knowledge on the part of the populace, this factor becomes a huge impediment to the uptake of EVs. A systematic review of the electronic database Scopus for the years 2003–2022 was carried out on ‘EV awareness and adoption of EV’ while considering the ‘Preferred Reporting Items for Systematic Reviews and Meta-analysis’ (PRISMA) standards. A three-step identification process resulted in the ultimate detection of 41 papers, which were then thoroughly examined. A conceptual framework that encompasses the three key awareness aspects that influence EV adoption is developed. To encourage greater uniformity among EV researchers, this study's conclusions serve as a foundation for operationalising upcoming research efforts within a predetermined framework. The authors must therefore be optimistic that lingering technological, legislative, cultural, behavioural and business-model barriers may be overcome over time through widespread dissemination of knowledge and awareness related to EVs, making it possible for everyone to switch to greener, more economical and more efficient transportation solutions.

Details

Fostering Sustainable Development in the Age of Technologies
Type: Book
ISBN: 978-1-83753-060-1

Keywords

Article
Publication date: 13 July 2015

Adelle Bish, Cameron Newton and Kim Johnston

This paper utilizes diffusion of innovation theory in order to investigate and understand the relationships between human resource (HR) policies on employee change-related…

4085

Abstract

Purpose

This paper utilizes diffusion of innovation theory in order to investigate and understand the relationships between human resource (HR) policies on employee change-related outcomes. In addition, the purpose of this paper is to explore the role of leader vision at different hierarchical levels in the organization in terms of the relationship of HR policy with employee change-related outcomes.

Design/methodology/approach

This quantitative study was conducted in one large Australian government department undergoing major restructuring and cultural change. Data from 624 employees were analyzed in relation to knowledge of HR policies (awareness and clarity), leader vision (organizational and divisional), and change-related outcomes.

Findings

Policy knowledge (awareness and clarity) does not have a direct impact on employee change-related outcomes. It is the implementation of policies through the divisional leader that begins to enable favorable employee outcomes.

Research limitations/implications

Future research should employ a longitudinal design to investigate relationships over time, and also examine the importance of communication medium and individual preferences in relation to leader vision.

Originality/value

This research extends the application of diffusion of innovation theory and leader vision theory to investigate the relationship between HR policy, leader vision, and employees’ change-related outcomes.

Details

Journal of Organizational Change Management, vol. 28 no. 4
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 14 August 2018

Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam and H.R. Rao

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have…

1314

Abstract

Purpose

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have used neutralization and moral disengagement (MD) perspectives to examine employee rationalizations of noncompliant security behaviors. Extending this prior work, the purpose of this paper is to identify mechanisms of security education, training, and awareness (SETA) programs and deterrence as well as employees’ organizational commitment in influencing MD of security policy violations and develop a theoretical model to test the proposed relationships.

Design/methodology/approach

The authors validate and test the model using the data collected from six large multinational organizations in Korea using survey-based methodology. The model was empirically analyzed by structural equation modeling.

Findings

The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence. The findings also suggest that SETA programs are an important mechanism in creating security PA.

Originality/value

The paper expands the literature in IS security that has examined the role of moral evaluations. Drawing upon MD theory and social cognitive theory, the paper points to the central role of SETA and security PA in reducing MD of security policy violations, and ultimately the likelihood of this behavior. The paper not only contributes to theory but also provides important insights for practice.

Article
Publication date: 14 December 2023

Wahyudin Darmalaksana

This study aims to explore small and medium enterprises (SMEs) acceptance of the halal certification policy in Indonesia, aiming to understand their perspectives and…

Abstract

Purpose

This study aims to explore small and medium enterprises (SMEs) acceptance of the halal certification policy in Indonesia, aiming to understand their perspectives and characteristics, as well as the primary considerations of business actors in implementing the policy. This study seeks to provide a comprehensive understanding of SME actors’ views toward halal certification policies, which is crucial for strengthening the government’s efforts in building a robust halal system and creating awareness in the community.

Design/methodology/approach

This study uses a mixed method. This study uses a random sampling technique on SMEs in Bandung, Indonesia. A total of 400 respondents participated in filling out the study questionnaire. Meanwhile, five SME actors were interviewed to gain deeper insight into the topic of this study. The data analysis technique used descriptive analysis and verification with confirmatory factor analysis.

Findings

The results of the study indicate that the halal certification policy is generally accepted by business actors, but there are criticisms regarding knowledge and information about halal certification. Halal awareness and perceived effectivity have the highest acceptance scores, while halal knowledge and information, religious behavior, individual background, and personal and social aims have the lowest scores. All acceptance indicators meet the criteria of a good fit model, with system indicators having a greater impact. Acceptance is based not only on theological–religious considerations but also on pragmatic considerations related to business operations.

Research limitations/implications

This study has several limitations that should be considered. First, the topics and variables studied are focused only on the dimensions of acceptance of the halal certification policy. It would be more comprehensive if integrated with other variables in correlational and implicative studies. Second, the measurement model used in this study is modified from the policy acceptance model, which focuses on normative and systemic aspects of the policy without considering theological values of the halal certification policy. A more complex model is required to measure the acceptance of a comprehensive halal certification policy that considers both normative and theological aspects.

Practical implications

The implications of this study are as follows: First, the implementation of the halal certification policy must take into account the various indicators of policy acceptance, particularly from the business actors who are responsible for implementing the policy. Second, the implementation of the halal certification policy must also take into account the heterogeneous characteristics of the business actors. Third, the certification policy should focus on two critical indicators, namely, halal awareness and the perceived effectivity of policy implementation, which can be reinforced by other indicators.

Social implications

The results of this study confirm that the government must take into account the response of business actors to ensure the effectiveness of implementing the halal certification policy. The government can take an important step in this regard by conducting a survey of business actors who have participated in the halal certification program to understand the benefits and satisfaction they receive from the policy and identify the factors that hinder them from accepting the halal certification policy.

Originality/value

This study highlights the response of SME actors regarding the acceptance of the halal certification policy. This study provides a new perspective regarding the acceptance of SMEs toward halal certification policies that are important for future implementation.

Details

Journal of Islamic Accounting and Business Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0817

Keywords

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 12 June 2017

Lena Yuryna Connolly, Michael Lang, John Gathegi and Doug J. Tygar

This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security…

2180

Abstract

Purpose

This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical issues.

Design/methodology/approach

This paper builds on general deterrence theory and prior organisational culture literature. The methodology adapted for this study draws on the analytical grounded theory approach employing a constant comparative method.

Findings

This paper demonstrates that procedural security countermeasures and organisational culture tend to affect security behaviour in organisational settings.

Research limitations/implications

This paper fills the void in information security research and takes its place among the very few studies that focus on behavioural as opposed to technical issues.

Practical implications

This paper highlights the important role of procedural security countermeasures, information security awareness and organisational culture in managing illicit behaviour of employees.

Originality/value

This study extends general deterrence theory in a novel way by including information security awareness in the research model and by investigating both negative and positive behaviours.

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 February 2005

Charles B. Foltz, Timothy Paul Cronan and Thomas W. Jones

This paper aims to examine the effectiveness of computer usage policies in university settings.

1527

Abstract

Purpose

This paper aims to examine the effectiveness of computer usage policies in university settings.

Design/methodology/approach

Students enrolled in business courses at three midwestern universities were divided, by class, into control and experimental groups. All subjects were asked to complete a survey regarding their awareness of university computer usage policies, consequences of misuse, and methods of policy distribution. The experimental group was exposed to sample computer usage policies. Two weeks later, all subjects were asked to complete the same survey again.

Findings

Results suggest that most students have not read their university computer usage policies. However, the presence of a computer usage policy does influence students who have read those policies, but a single exposure is insufficient to influence all subjects.

Research limitations/implications

The sample is limited to students from three universities.

Practical implications

Written policy statements alone cannot serve as a cornerstone of security; multiple factors must be used to communicate the content of the deterrents.

Originality/value

This study notes that the existence of computer usage policies within a university (or organization) does not ensure that all users are familiar with the content of those policies and the penalties imposed for their violation. Providing a copy of computer usage policies to students (or employees) and verbally highlighting major points are not sufficient exposure to eliminate indifference about computer misuse.

Details

Industrial Management & Data Systems, vol. 105 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 23 March 2023

Ahmet Meti Tmava and Sara Ryza

The number of open access repositories (OARs) has been growing globally, but faculty members have been reluctant to embrace OAR and submit their work. While there are studies that…

Abstract

Purpose

The number of open access repositories (OARs) has been growing globally, but faculty members have been reluctant to embrace OAR and submit their work. While there are studies that looked at sociotechnical factors that affect faculty participation in OARs, this study aims to explore how the individual characteristics of faculty might impact faculty willingness to deposit their work in an OAR.

Design/methodology/approach

The survey was distributed to all faculty at a large public university in the USA who were identified as having their primary job responsibilities in teaching and research. This study used a correlational analysis between faculty individual characteristics (i.e. age, rank, status and academic discipline) and their willingness to deposit their work.

Findings

The findings show that there is a difference in faculty familiarity with open access (OA) principles and faculty awareness of OA policy based on individual characteristics. Furthermore, these individual characteristics have a significant impact on faculty willingness to participate in OARs. While this study reveals a significant correlation between the faculty intent to deposit and the respondent’s academic discipline, rank and status, there are other factors that affect faculty intent to participate in OAR, such as familiarity with OA principles and awareness of institution’s OA Policy.

Research limitations/implications

There were no significant responses from the Colleges of Science or Health and Public Service and, therefore, did not yield any statistically significant results. Measuring the university’s promotion system was outside the scope of this research.

Practical implications

Results of this research can provide insight on how individual characteristics of faculty might impact their willingness to embrace OA publishing in general and OARs in particular.

Social implications

The findings from this research will be a valuable source of information for librarians and OA staff in developing more effective outreach programs to increase faculty participation in OA and OARs.

Originality/value

This study reveals that individual faculty traits do have an impact on faculty willingness to participate in OARs. The academic discipline was found to make the most significant difference in faculty intent to deposit their work in an OAR. However, due to the ever-changing landscape of OA publishing and the ongoing outreach efforts by librarians, the faculty members’ perception and participation in OARs is likely to evolve.

Details

Digital Library Perspectives, vol. 39 no. 3
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 10 January 2020

Alex Koohang, Jonathan Anderson, Jeretta Horn Nord and Joanna Paliszkiewicz

The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that…

1368

Abstract

Purpose

The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that awareness depends upon several variables that influence successful ISP compliance.

Design/methodology/approach

The authors built a model with seven constructs, i.e., leadership, trusting beliefs, information security issues awareness (ISIA), ISP awareness, understanding resource vulnerability, self-efficacy (SE) and intention to comply. Seven hypotheses were stated. A sample of 285 non-management employees was used from various organizations in the USA. The authors used path modeling to analyze the data.

Findings

The findings indicated that IS awareness depends on effective organizational leadership and elevated employees’ trusting beliefs. The understanding of resource vulnerability (URV) and SE are influenced by IS awareness resulting from effective leadership and elevated employees’ trusting beliefs which guide employees to comply with ISP requirements.

Practical implications

Practical implications were aimed at organizations embracing an awareness-centered information security compliance program to secure organizations’ assets against threats by implementing various security education and training awareness programs.

Originality/value

This paper asserts that awareness is central to ISP compliance. Leadership and trusting beliefs variables play significant roles in the information security awareness which in turn positively affect employees’ URV and SE variables leading employees to comply with the ISP requirements.

Details

Industrial Management & Data Systems, vol. 120 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 26 February 2024

Muhammad Ali, Mirit K. Grabarski and Marzena Baker

In the wake of labor shortages in the retail industry, there is value in highlighting a business case for employing neurodivergent individuals. Drawing on signaling theory, this…

Abstract

Purpose

In the wake of labor shortages in the retail industry, there is value in highlighting a business case for employing neurodivergent individuals. Drawing on signaling theory, this study explores whether perceived neurodiversity management (neurodiversity policies and adjustments) helps enhance neurodiversity awareness and affective commitment and whether affective commitment leads to lower turnover intention.

Design/methodology/approach

A cursory content analysis of publicly available documents of randomly selected four retail organizations was undertaken, which was followed by an online survey of the Australian retail workforce, leading to 502 responses from supervisors and employees.

Findings

The content analysis shows that retail organizations barely acknowledge neurodiversity. The findings of the main study indicate that neurodiversity policies are positively associated with both neurodiversity awareness and affective commitment, while adjustments were positively linked to affective commitment. Moreover, affective commitment was negatively associated with turnover intention. Affective commitment also mediated the negative effects of neurodiversity policies and adjustments on turnover intention.

Originality/value

This study supports, extends and refines signaling theory and social exchange theory. It addresses knowledge gaps about the perceptions of co-workers and supervisors in regard to neurodiversity management. It provides unprecedented evidence for a business case for the positive attitudinal outcomes of neurodiversity policies and adjustments. The findings can help managers manage neurodiversity for positive attitudinal outcomes.

Details

Employee Relations: The International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0142-5455

Keywords

1 – 10 of over 83000