Search results
1 – 9 of 9Abdullah Oguz, Nikhil Mehta and Prashant Palvia
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…
Abstract
Purpose
This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.
Design/methodology/approach
The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.
Findings
A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.
Originality/value
As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.
Details
Keywords
Carlo Gabriel Porto Bellini, Prashant Palvia, Valter Moreno, Tim Jacks and Alexandre Graeml
The purpose of this paper is to discuss two important behaviors related to job mobility in the IT profession, namely, changing jobs to move to another organization (turnover) and…
Abstract
Purpose
The purpose of this paper is to discuss two important behaviors related to job mobility in the IT profession, namely, changing jobs to move to another organization (turnover) and changing the profession entirely (turnaway), during a national crisis. Based on the theoretical foundation of the push–pull–mooring perspective, a research model is developed that includes professional self-efficacy (PSE), job insecurity (JI) and job satisfaction (JS) as important antecedents.
Design/methodology/approach
Using a positivist approach and a survey method, the authors analyzed data from IT professionals from different economic segments in Brazil. Data collection occurred in two distinctive moments of the largest crisis in modern Brazilian history – a pre-awareness moment (first half of year 2015) and a crisis-conscious moment (first half of year 2016).
Findings
The findings reveal that PSE negatively influences JI and positively influences JS, JI positively influences turnaway intention, and JS negatively influences both turnover intention and turnaway intention. The effect of the national crisis was observed in that it further accentuated the intention of IT professionals to leave the profession. Another effect was related to age, as older professionals are less willing to turn over but more willing to turn away.
Research limitations/implications
Besides developing a parsimonious model to study both the intention to leave the organization and the intention to leave the profession, the study sheds light on how IT professionals react to economic crises and how the reaction varies by age.
Practical implications
The study puts to question the common belief that IT professionals are secure in the job market due to high demand for their skills and investments made by organizations to keep them on the job. Employers must pay attention to JI and turnover/turnaway intentions.
Originality/value
This study is among the few to study JI and aspects of the theory of human migration in IT. It is also possibly the first to discuss the effects of a national crisis on the mobility patterns of IT professionals.
Details
Keywords
Jocelyn Cranefield, Mary Ellen Gordon, Prashant Palvia, Alexander Serenko and Tim Jacks
The study aims to explore whether there is diversity of occupational culture among IT workers. Prior work conceptualizes IT occupational culture (ITOC) as based around six…
Abstract
Purpose
The study aims to explore whether there is diversity of occupational culture among IT workers. Prior work conceptualizes IT occupational culture (ITOC) as based around six distinctive values (ASPIRE) but has not explored whether there is variation in ITOC.
Design/methodology/approach
Survey data from 496 New Zealand IT workers was used to create factors representing IT occupational values based on the ASPIRE tool. Hierarchical cluster analysis and discriminant analysis were applied to identify distinctive segments of ITOC.
Findings
Four ITOC segments were identified: fun-lovers, innovators, independents and institutionalists. These differed in the relative emphasis ascribed to the ITOC values with each segment being distinguished by 1–2 dominant values. Segment membership varied according to level of responsibility and birth country. Institutionalists and innovators had higher concern about organizational and IT issues than fun-lovers and independents. Job satisfaction was lowest among innovators and highest along institutionalists.
Research limitations/implications
This study challenges the concept of a unified ITOC, suggesting that ITOC is pluralistic. It also theorizes about interactions between ITOC, individual motivation and values and national culture.
Practical implications
Management needs to be cognizant of the fact that IT occupational culture is not homogeneous and different IT occupational segments require unique management approaches, and that their own values may not match those of others in IT work. By understanding ITOC segments, managers can tailor support, assign tasks appropriately and design teams to optimize synergies and avoid conflict.
Originality/value
This study reveals the existence of ITOC segments and theorizes about the relationship of these to innovation-orientation, job satisfaction, individual motivation, work styles and national culture. The combination of cluster and discriminant analysis is a valuable replicable inductive method that is underrepresented in Information Systems (IS) research.
Details
Keywords
Jeffrey D. Wall and Prashant Palvia
The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors…
Abstract
Purpose
The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities.
Design/methodology/approach
Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings.
Findings
Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed.
Research limitations/implications
The authors’ narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully.
Practical implications
The authors’ study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues.
Originality/value
The authors’ narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.
Details
Keywords
Anil Kumar and Prashant Palvia
Information technology plays a significant role in a global organization. Senior executives of these organizations need constant and timely access to global information for making…
Abstract
Information technology plays a significant role in a global organization. Senior executives of these organizations need constant and timely access to global information for making decisions. This information originates in different places worldwide for a global organization and needs to be organized before it can be used for decision‐making. The organization and management of global corporate data presents unique challenges. This paper discusses the data organization and management related issues for developing a global executive information systems (EIS) for senior executives of global companies. The objective of a global EIS is to provide executives with a consistent, integrated and summarized view of operational data from subsidiaries worldwide. The global EIS also provides access to external data that is captured from different sources. The system facilitates integrating the internal and external data for effective decision‐making.
Details
Keywords
Zhenyu Huang and Prashant Palvia
There is an increasing need to implement a total business solution which supports major functionalities of a business. Enterprise resource planning (ERP) software is designed to…
Abstract
There is an increasing need to implement a total business solution which supports major functionalities of a business. Enterprise resource planning (ERP) software is designed to meet this need, and has been widely adopted by organizations in developed countries. Meanwhile, ERP is beginning to appear in many organizations of developing countries. Little research has been conducted to compare the implementation practices of ERP in developed vs developing countries. Our research shows that ERP technology faces additional challenges in developing countries related to economic, cultural, and basic infrastructure issues. This article identifies a range of issues concerning ERP implementation by making a comparison of advanced and developing countries.
Details
Keywords
Tim Jacks, Prashant Palvia, Richard Schilhavy and Lei Wang
Despite the constant stream of research investigating information technology (IT) business value, IT capabilities, and competitive advantage, researchers are calling for a more…
Abstract
Purpose
Despite the constant stream of research investigating information technology (IT) business value, IT capabilities, and competitive advantage, researchers are calling for a more coherent understanding of the firm‐level impacts of IT, and how those firm‐level impacts can be measured. The purpose of this study is to investigate the multitude of organization‐level studies of the impact of IT.
Design/methodology/approach
Meta‐analysis of IS literature from 2001‐2009.
Findings
The findings are synthesized into an overarching framework of the impact of IT at the organization level. The framework categorizes measures of the impact of IT into productivity, profitability, and intangible benefits, while the antecedents of IT impact are categorized into IT resources, IT capabilities, IT/business alignment and external factors.
Originality/value
The research framework proposed provides a comprehensive snapshot of IS studies on organizational performance.
Details
Keywords
Ernesto Tavoletti and Vas Taras
This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).
Abstract
Purpose
This study aims to offer a bibliometric analysis of the already substantial and growing literature on global virtual teams (GVTs).
Design/methodology/approach
Using a systematic literature review approach, it identifies all articles in the Web of Science from 1999 to 2021 that include the term GVTs (in the title, the abstract or keywords) and finds 175 articles. The VOSviewer software was applied to analyze the bibliometric data.
Findings
The analysis revealed three dialogizing research clusters in the GVTs literature: a pioneering management information systems and organizational cluster, a general management cluster and a growing international management and behavioural studies cluster. Furthermore, it highlights the most cited articles, authors, journals and nations, and the network of strong and weak links regarding co-authorships and co-citations. Additionally, this study shows a change in research patterns regarding topics, journals and disciplinary approaches from 1999 to 2021. Finally, the analysis illustrates the position and centrality in the network of the most relevant actors.
Practical implications
The findings can guide management practitioners, educators and researchers to the most meaningful clusters of publications on GVTs, and help navigate and make sense of the vast body of the available literature. The importance of GVTs has been growing in the past two decades, and Covid-19 has accelerated the trend.
Originality/value
This study provides an updated and comprehensive systematic literature review on GVTs. To the best of the authors’ knowledge, it is also the first systematic literature review and bibliometry on GVTs. It concludes by suggesting future research paths.
Details