Search results

1 – 10 of 20
Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 11 October 2023

Karen M. DSouza and Aaron M. French

Purveyors of fake news perpetuate information that can harm society, including businesses. Social media's reach quickly amplifies distortions of fake news. Research has not yet…

Abstract

Purpose

Purveyors of fake news perpetuate information that can harm society, including businesses. Social media's reach quickly amplifies distortions of fake news. Research has not yet fully explored the mechanisms of such adversarial behavior or the adversarial techniques of machine learning that might be deployed to detect fake news. Debiasing techniques are also explored to combat against the generation of fake news using adversarial data. The purpose of this paper is to present the challenges and opportunities in fake news detection.

Design/methodology/approach

First, this paper provides an overview of adversarial behaviors and current machine learning techniques. Next, it describes the use of long short-term memory (LSTM) to identify fake news in a corpus of articles. Finally, it presents the novel adversarial behavior approach to protect targeted business datasets from attacks.

Findings

This research highlights the need for a corpus of fake news that can be used to evaluate classification methods. Adversarial debiasing using IBM's Artificial Intelligence Fairness 360 (AIF360) toolkit can improve the disparate impact of unfavorable characteristics of a dataset. Debiasing also demonstrates significant potential to reduce fake news generation based on the inherent bias in the data. These findings provide avenues for further research on adversarial collaboration and robust information systems.

Originality/value

Adversarial debiasing of datasets demonstrates that by reducing bias related to protected attributes, such as sex, race and age, businesses can reduce the potential of exploitation to generate fake news through adversarial data.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Open Access
Article
Publication date: 23 May 2020

Aboubakr Fathy Awaad

This study aims to highlight the dimensions of the rivalry over the regional role between two regional powers in the Middle East, and the impact of local, regional and…

3152

Abstract

Purpose

This study aims to highlight the dimensions of the rivalry over the regional role between two regional powers in the Middle East, and the impact of local, regional and international pressures of the Syrian crisis on the role performance of the competing forces.

Design/methodology/approach

The study is based on using “the role approach” as an analytical frame to benefit by the application of the theory of role. This approach allows the possibility of linking various analytical levels, both in clarifying the relationship between internal and external factors and showing the interaction between elements of perception, abilities and behavior.

Findings

The international pressures shall remain governing the frame of competition among the roles of the regional powers, through determining the course of competition and its direct impact on its results.

Originality/value

This study examines the phenomenon of regional rivalry between two distinct and competing regional powers, in a turbulent environment in the wake of the Arab Spring crises, which created opportunities and challenges for regional powers, especially in Syria, where it intersected with the interests and policies of major and regional powers.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 1 February 2024

David Hedberg, Martin Lundgren and Marcus Nohlberg

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Abstract

Purpose

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Design/methodology/approach

This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness.

Findings

Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues.

Research limitations/implications

Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges.

Practical implications

The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues.

Originality/value

As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 January 2024

Ferdinando Paolo Santarpia, Valentina Sommovigo, Sara Brecciaroli, Chiara Consiglio and Laura Borgogni

By integrating the conservation of resources and the emotion-as-social-information theories, this study aims to question whether the leader’s effort to calm down when team members…

Abstract

Purpose

By integrating the conservation of resources and the emotion-as-social-information theories, this study aims to question whether the leader’s effort to calm down when team members perceive intra-team conflict (ITC) may have a counterproductive effect on their interpersonal functioning. Specifically, the authors investigated whether team members with higher individual perceptions of ITC would be more likely to experience interpersonal strain (ISW) when their team leaders downregulate or suppress their emotional responses (i.e. high interpersonal modulation of emotional responses [MER]). A further objective of the study was to examine whether this exacerbating effect would be conditional on the leader’s sex.

Design/methodology/approach

Data were collected from 236 white collars nested in 48 teams (Msize = 6.23; SDsize = 2.69) and their respective team leaders (56.7% men) of a large organization providing financial services.

Findings

Multilevel model results showed that team members confronted with higher ITC experienced higher ISW levels, especially when the leader’s interpersonal modulation of team members’ emotional responses was high (vs low). This effect was stronger when the interpersonal modulation was enacted by women (vs men) team leaders.

Originality/value

This study moves an important step forward in the conflict and ISW literature, as it is the first to identify a leader’s MER and sex as key boundary conditions under which ITC is related to team members’ ISW. The implications of these findings for theory and practice are discussed.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 18 January 2024

Rima M. Bizri and Sevag K. Kertechian

This study aims to explore the impact of psychosocial entitlement on workplace deviance, particularly in contexts marked by increased job autonomy. Additionally, this study delves…

Abstract

Purpose

This study aims to explore the impact of psychosocial entitlement on workplace deviance, particularly in contexts marked by increased job autonomy. Additionally, this study delves into the organizational factors, including perceived support and justice, which play a crucial role in this dynamic.

Design/methodology/approach

Applying social exchange theory (SET), this study contends that fostering a fair and supportive workplace can deter entitled employees from workplace deviance. This study used time-lagged, multi-source data to analyse the interplay between psychological entitlement and workplace deviance in the presence of job autonomy and to assess the influence of perceived organizational justice and support. This study’s analysis uses SmartPLS for partial least square-structural equation modelling.

Findings

The study’s results indicate an elevated sense of entitlement among employees working autonomously and a heightened propensity for deviant behaviour when psychological entitlement increases. Yet, the data revealed moderating effects of perceived organizational support on the relationship between psychological entitlement and workplace deviance. A post hoc analysis found full mediation effects by psychological entitlement on the relationship between perceived organizational justice and workplace deviance.

Research limitations/implications

To enhance organizational dynamics, management should prioritize promoting employee perceptions of organizational justice and support through impartial human resource policies, consistent policy implementation, initiatives such as virtual learning, improved mental health benefits and measurement tools for feedback on justice and support measures.

Originality/value

An essential theoretical contribution of this research resides in its extension beyond the conventional application of SET, traditionally associated with reciprocity in the workplace. This study showcases its effectiveness in elucidating the impact of psychosocial factors on reciprocity in organizational dynamics.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 30 April 2024

Dirk De Clercq and Renato Pereira

Drawing on conservation of resources theory, this study aims to examine how employees’ experiences of excessive workloads may direct them away from efforts to share knowledge with…

Abstract

Purpose

Drawing on conservation of resources theory, this study aims to examine how employees’ experiences of excessive workloads may direct them away from efforts to share knowledge with other organizational members, as well as the circumstances in which this process is more or less likely. To untangle the process, the authors predict a mediating role of job dissatisfaction and moderating roles of two complementary resources that help employees cope with failure: resilience as a personal resource and organizational forgiveness as an organizational resource.

Design/methodology/approach

Survey data were gathered from employees of an organization that operates in the construction retail sector. The Process macro provides an empirical test of the moderated mediation dynamic that underpins the proposed conceptual framework.

Findings

The statistical findings affirm that an important channel through which employees’ perceptions that their work demands are unreasonable escalate into a diminished propensity to share knowledge is their lack of enthusiasm about their jobs. Their ability to recover from challenging work situations and their beliefs that the organization does not hold grudges against people who commit mistakes both mitigate this harmful effect.

Practical implications

For organizational practitioners, this research shows that when employees feel frustrated about extreme work pressures, the resource-draining situation may escalate into diminished knowledge sharing, which might inadvertently undermine their ability to receive valuable feedback for dealing with the challenges. From a positive perspective, individual resilience and organizational forgiveness represent resources that can protect employees against this negative spiral.

Originality/value

This study explicates an unexplored harmful effect of strenuous workloads on knowledge sharing, which is explained by employees’ beliefs that their organization fails to provide satisfactory job experiences. This effect also is mitigated to the extent that employees can draw from valuable personal and organizational resources.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 3 May 2024

Matt Dingler

Scholarship on America’s K-12 economics curriculum reveals an inattention to many harmful economic realities, specifically wealth inequality. Critics of the present curriculum…

Abstract

Purpose

Scholarship on America’s K-12 economics curriculum reveals an inattention to many harmful economic realities, specifically wealth inequality. Critics of the present curriculum posit that its emphasis on out-dated concepts and models ignores crucial elements of reality that impact economic interaction and identities. In response to the dominant economic paradigm and methods, this practitioner-focused paper discusses an economically pluralist, pedagogically critical approach to interrogating destructive economic realities. It details how three social studies classroom simulations based on the board game Monopoly may be integrated with certain informational texts to explore economic factors that contribute to America’s unique form of wealth inequality.

Design/methodology/approach

This paper describes wealth inequality in America and rationalizes the need to make this social problem a focus of study in the secondary social studies classroom. First, I survey the present curricular apparatus of K-12 economics education and then argue for a pluralist approach that expands the curriculum’s dominant neoclassical paradigm. Connecting economic pluralism to critical citizen education, I draw upon emerging critical economic citizen education scholarship to explain attendant pedagogical and instructional approaches. The described lesson builds upon a tradition of Monopoly simulations, is rooted in critical citizen education pedagogy and aligns with Soroko’s (2023) critical economic literacy framework.

Findings

This paper progresses the curricular movement of economic pluralism through its critique of America’s current K-12 economics curriculum that does not focus on immediate, lived social problems. It further defines critical economics, citizenship and pedagogy, then details an instructional practice that employs critical disciplinary tools to investigate contributing factors of American wealth inequality.

Originality/value

This paper contributes to the growing field of pluralist economic perspectives and pedagogies. Specifically, it enriches understanding of critical economics citizenship education by further defining attendant pedagogy and explaining Monopoly as an instructional tool for critical economics citizen education. Previous works have discussed Monopoly’s utility for teaching various concepts within the social studies disciplines. This simulation lesson is unique in its instructional approach that merges simulation experiences with certain informational texts to cultivate critical economic knowledge of American wealth inequality and critical economic skills for critiquing and transforming oppressive economic realities.

Details

Social Studies Research and Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1933-5415

Keywords

1 – 10 of 20