Search results

1 – 9 of 9
Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Article
Publication date: 18 March 2019

Carlo Gabriel Porto Bellini, Prashant Palvia, Valter Moreno, Tim Jacks and Alexandre Graeml

The purpose of this paper is to discuss two important behaviors related to job mobility in the IT profession, namely, changing jobs to move to another organization (turnover) and…

1102

Abstract

Purpose

The purpose of this paper is to discuss two important behaviors related to job mobility in the IT profession, namely, changing jobs to move to another organization (turnover) and changing the profession entirely (turnaway), during a national crisis. Based on the theoretical foundation of the push–pull–mooring perspective, a research model is developed that includes professional self-efficacy (PSE), job insecurity (JI) and job satisfaction (JS) as important antecedents.

Design/methodology/approach

Using a positivist approach and a survey method, the authors analyzed data from IT professionals from different economic segments in Brazil. Data collection occurred in two distinctive moments of the largest crisis in modern Brazilian history – a pre-awareness moment (first half of year 2015) and a crisis-conscious moment (first half of year 2016).

Findings

The findings reveal that PSE negatively influences JI and positively influences JS, JI positively influences turnaway intention, and JS negatively influences both turnover intention and turnaway intention. The effect of the national crisis was observed in that it further accentuated the intention of IT professionals to leave the profession. Another effect was related to age, as older professionals are less willing to turn over but more willing to turn away.

Research limitations/implications

Besides developing a parsimonious model to study both the intention to leave the organization and the intention to leave the profession, the study sheds light on how IT professionals react to economic crises and how the reaction varies by age.

Practical implications

The study puts to question the common belief that IT professionals are secure in the job market due to high demand for their skills and investments made by organizations to keep them on the job. Employers must pay attention to JI and turnover/turnaway intentions.

Originality/value

This study is among the few to study JI and aspects of the theory of human migration in IT. It is also possibly the first to discuss the effects of a national crisis on the mobility patterns of IT professionals.

Article
Publication date: 30 March 2021

Jocelyn Cranefield, Mary Ellen Gordon, Prashant Palvia, Alexander Serenko and Tim Jacks

The study aims to explore whether there is diversity of occupational culture among IT workers. Prior work conceptualizes IT occupational culture (ITOC) as based around six…

Abstract

Purpose

The study aims to explore whether there is diversity of occupational culture among IT workers. Prior work conceptualizes IT occupational culture (ITOC) as based around six distinctive values (ASPIRE) but has not explored whether there is variation in ITOC.

Design/methodology/approach

Survey data from 496 New Zealand IT workers was used to create factors representing IT occupational values based on the ASPIRE tool. Hierarchical cluster analysis and discriminant analysis were applied to identify distinctive segments of ITOC.

Findings

Four ITOC segments were identified: fun-lovers, innovators, independents and institutionalists. These differed in the relative emphasis ascribed to the ITOC values with each segment being distinguished by 1–2 dominant values. Segment membership varied according to level of responsibility and birth country. Institutionalists and innovators had higher concern about organizational and IT issues than fun-lovers and independents. Job satisfaction was lowest among innovators and highest along institutionalists.

Research limitations/implications

This study challenges the concept of a unified ITOC, suggesting that ITOC is pluralistic. It also theorizes about interactions between ITOC, individual motivation and values and national culture.

Practical implications

Management needs to be cognizant of the fact that IT occupational culture is not homogeneous and different IT occupational segments require unique management approaches, and that their own values may not match those of others in IT work. By understanding ITOC segments, managers can tailor support, assign tasks appropriately and design teams to optimize synergies and avoid conflict.

Originality/value

This study reveals the existence of ITOC segments and theorizes about the relationship of these to innovation-orientation, job satisfaction, individual motivation, work styles and national culture. The combination of cluster and discriminant analysis is a valuable replicable inductive method that is underrepresented in Information Systems (IS) research.

Details

Information Technology & People, vol. 35 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 February 2021

Jeffrey D. Wall and Prashant Palvia

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors…

Abstract

Purpose

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities.

Design/methodology/approach

Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings.

Findings

Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed.

Research limitations/implications

The authors’ narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully.

Practical implications

The authors’ study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues.

Originality/value

The authors’ narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.

Details

Information Technology & People, vol. 35 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 June 2001

Anil Kumar and Prashant Palvia

Information technology plays a significant role in a global organization. Senior executives of these organizations need constant and timely access to global information for making…

3467

Abstract

Information technology plays a significant role in a global organization. Senior executives of these organizations need constant and timely access to global information for making decisions. This information originates in different places worldwide for a global organization and needs to be organized before it can be used for decision‐making. The organization and management of global corporate data presents unique challenges. This paper discusses the data organization and management related issues for developing a global executive information systems (EIS) for senior executives of global companies. The objective of a global EIS is to provide executives with a consistent, integrated and summarized view of operational data from subsidiaries worldwide. The global EIS also provides access to external data that is captured from different sources. The system facilitates integrating the internal and external data for effective decision‐making.

Details

Industrial Management & Data Systems, vol. 101 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 August 2001

Zhenyu Huang and Prashant Palvia

There is an increasing need to implement a total business solution which supports major functionalities of a business. Enterprise resource planning (ERP) software is designed to…

15372

Abstract

There is an increasing need to implement a total business solution which supports major functionalities of a business. Enterprise resource planning (ERP) software is designed to meet this need, and has been widely adopted by organizations in developed countries. Meanwhile, ERP is beginning to appear in many organizations of developing countries. Little research has been conducted to compare the implementation practices of ERP in developed vs developing countries. Our research shows that ERP technology faces additional challenges in developing countries related to economic, cultural, and basic infrastructure issues. This article identifies a range of issues concerning ERP implementation by making a comparison of advanced and developing countries.

Details

Business Process Management Journal, vol. 7 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 13 September 2011

Tim Jacks, Prashant Palvia, Richard Schilhavy and Lei Wang

Despite the constant stream of research investigating information technology (IT) business value, IT capabilities, and competitive advantage, researchers are calling for a more…

3154

Abstract

Purpose

Despite the constant stream of research investigating information technology (IT) business value, IT capabilities, and competitive advantage, researchers are calling for a more coherent understanding of the firm‐level impacts of IT, and how those firm‐level impacts can be measured. The purpose of this study is to investigate the multitude of organization‐level studies of the impact of IT.

Design/methodology/approach

Meta‐analysis of IS literature from 2001‐2009.

Findings

The findings are synthesized into an overarching framework of the impact of IT at the organization level. The framework categorizes measures of the impact of IT into productivity, profitability, and intangible benefits, while the antecedents of IT impact are categorized into IT resources, IT capabilities, IT/business alignment and external factors.

Originality/value

The research framework proposed provides a comprehensive snapshot of IS studies on organizational performance.

Details

Business Process Management Journal, vol. 17 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Content available
Article
Publication date: 13 September 2011

Stefan Smolnik, Nils Urbach and Jerry L. Fjermestad

575

Abstract

Details

Business Process Management Journal, vol. 17 no. 5
Type: Research Article
ISSN: 1463-7154

Article
Publication date: 8 November 2022

Ernesto Tavoletti and Vas Taras

This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).

Abstract

Purpose

This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).

Design/methodology/approach

Using a systematic literature review approach, it identifies all articles in the Web of Science from 1999 to 2021 that include the term GVTs (in the title, the abstract or keywords) and finds 175 articles. The VOSviewer software was applied to analyze the bibliometric data.

Findings

The analysis revealed three dialogizing research clusters in the GVTs literature: a pioneering management information systems and organizational cluster, a general management cluster and a growing international management and behavioural studies cluster. Furthermore, it highlights the most cited articles, authors, journals and nations, and the network of strong and weak links regarding co-authorships and co-citations. Additionally, this study shows a change in research patterns regarding topics, journals and disciplinary approaches from 1999 to 2021. Finally, the analysis illustrates the position and centrality in the network of the most relevant actors.

Practical implications

The findings can guide management practitioners, educators and researchers to the most meaningful clusters of publications on GVTs, and help navigate and make sense of the vast body of the available literature. The importance of GVTs has been growing in the past two decades, and Covid-19 has accelerated the trend.

Originality/value

This study provides an updated and comprehensive systematic literature review on GVTs. To the best of the authors’ knowledge, it is also the first systematic literature review and bibliometry on GVTs. It concludes by suggesting future research paths.

Details

Management Research Review, vol. 46 no. 8
Type: Research Article
ISSN: 2040-8269

Keywords

Access

Year

All dates (9)

Content type

1 – 9 of 9