Search results
1 – 10 of 20Sigi Goode and Amir Riaz
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…
Abstract
Purpose
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.
Design/methodology/approach
This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.
Findings
Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.
Originality/value
To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
Details
Keywords
Stefano De Paoli and Jason Johnstone
This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…
Abstract
Purpose
This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.
Design/methodology/approach
The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.
Findings
The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.
Originality/value
This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.
Details
Keywords
Karen M. DSouza and Aaron M. French
Purveyors of fake news perpetuate information that can harm society, including businesses. Social media's reach quickly amplifies distortions of fake news. Research has not yet…
Abstract
Purpose
Purveyors of fake news perpetuate information that can harm society, including businesses. Social media's reach quickly amplifies distortions of fake news. Research has not yet fully explored the mechanisms of such adversarial behavior or the adversarial techniques of machine learning that might be deployed to detect fake news. Debiasing techniques are also explored to combat against the generation of fake news using adversarial data. The purpose of this paper is to present the challenges and opportunities in fake news detection.
Design/methodology/approach
First, this paper provides an overview of adversarial behaviors and current machine learning techniques. Next, it describes the use of long short-term memory (LSTM) to identify fake news in a corpus of articles. Finally, it presents the novel adversarial behavior approach to protect targeted business datasets from attacks.
Findings
This research highlights the need for a corpus of fake news that can be used to evaluate classification methods. Adversarial debiasing using IBM's Artificial Intelligence Fairness 360 (AIF360) toolkit can improve the disparate impact of unfavorable characteristics of a dataset. Debiasing also demonstrates significant potential to reduce fake news generation based on the inherent bias in the data. These findings provide avenues for further research on adversarial collaboration and robust information systems.
Originality/value
Adversarial debiasing of datasets demonstrates that by reducing bias related to protected attributes, such as sex, race and age, businesses can reduce the potential of exploitation to generate fake news through adversarial data.
Details
Keywords
This study aims to highlight the dimensions of the rivalry over the regional role between two regional powers in the Middle East, and the impact of local, regional and…
Abstract
Purpose
This study aims to highlight the dimensions of the rivalry over the regional role between two regional powers in the Middle East, and the impact of local, regional and international pressures of the Syrian crisis on the role performance of the competing forces.
Design/methodology/approach
The study is based on using “the role approach” as an analytical frame to benefit by the application of the theory of role. This approach allows the possibility of linking various analytical levels, both in clarifying the relationship between internal and external factors and showing the interaction between elements of perception, abilities and behavior.
Findings
The international pressures shall remain governing the frame of competition among the roles of the regional powers, through determining the course of competition and its direct impact on its results.
Originality/value
This study examines the phenomenon of regional rivalry between two distinct and competing regional powers, in a turbulent environment in the wake of the Arab Spring crises, which created opportunities and challenges for regional powers, especially in Syria, where it intersected with the interests and policies of major and regional powers.
Details
Keywords
Tim Wright, Zainab Ruhwanya and Jacques Ophoff
The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…
Abstract
Purpose
The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.
Design/methodology/approach
A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.
Findings
The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.
Practical implications
The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).
Originality/value
This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.
Details
Keywords
David Hedberg, Martin Lundgren and Marcus Nohlberg
This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.
Abstract
Purpose
This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.
Design/methodology/approach
This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness.
Findings
Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues.
Research limitations/implications
Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges.
Practical implications
The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues.
Originality/value
As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era.
Details
Keywords
Ferdinando Paolo Santarpia, Valentina Sommovigo, Sara Brecciaroli, Chiara Consiglio and Laura Borgogni
By integrating the conservation of resources and the emotion-as-social-information theories, this study aims to question whether the leader’s effort to calm down when team members…
Abstract
Purpose
By integrating the conservation of resources and the emotion-as-social-information theories, this study aims to question whether the leader’s effort to calm down when team members perceive intra-team conflict (ITC) may have a counterproductive effect on their interpersonal functioning. Specifically, the authors investigated whether team members with higher individual perceptions of ITC would be more likely to experience interpersonal strain (ISW) when their team leaders downregulate or suppress their emotional responses (i.e. high interpersonal modulation of emotional responses [MER]). A further objective of the study was to examine whether this exacerbating effect would be conditional on the leader’s sex.
Design/methodology/approach
Data were collected from 236 white collars nested in 48 teams (Msize = 6.23; SDsize = 2.69) and their respective team leaders (56.7% men) of a large organization providing financial services.
Findings
Multilevel model results showed that team members confronted with higher ITC experienced higher ISW levels, especially when the leader’s interpersonal modulation of team members’ emotional responses was high (vs low). This effect was stronger when the interpersonal modulation was enacted by women (vs men) team leaders.
Originality/value
This study moves an important step forward in the conflict and ISW literature, as it is the first to identify a leader’s MER and sex as key boundary conditions under which ITC is related to team members’ ISW. The implications of these findings for theory and practice are discussed.
Details
Keywords
Rima M. Bizri and Sevag K. Kertechian
This study aims to explore the impact of psychosocial entitlement on workplace deviance, particularly in contexts marked by increased job autonomy. Additionally, this study delves…
Abstract
Purpose
This study aims to explore the impact of psychosocial entitlement on workplace deviance, particularly in contexts marked by increased job autonomy. Additionally, this study delves into the organizational factors, including perceived support and justice, which play a crucial role in this dynamic.
Design/methodology/approach
Applying social exchange theory (SET), this study contends that fostering a fair and supportive workplace can deter entitled employees from workplace deviance. This study used time-lagged, multi-source data to analyse the interplay between psychological entitlement and workplace deviance in the presence of job autonomy and to assess the influence of perceived organizational justice and support. This study’s analysis uses SmartPLS for partial least square-structural equation modelling.
Findings
The study’s results indicate an elevated sense of entitlement among employees working autonomously and a heightened propensity for deviant behaviour when psychological entitlement increases. Yet, the data revealed moderating effects of perceived organizational support on the relationship between psychological entitlement and workplace deviance. A post hoc analysis found full mediation effects by psychological entitlement on the relationship between perceived organizational justice and workplace deviance.
Research limitations/implications
To enhance organizational dynamics, management should prioritize promoting employee perceptions of organizational justice and support through impartial human resource policies, consistent policy implementation, initiatives such as virtual learning, improved mental health benefits and measurement tools for feedback on justice and support measures.
Originality/value
An essential theoretical contribution of this research resides in its extension beyond the conventional application of SET, traditionally associated with reciprocity in the workplace. This study showcases its effectiveness in elucidating the impact of psychosocial factors on reciprocity in organizational dynamics.
Details
Keywords
Dirk De Clercq and Renato Pereira
Drawing on conservation of resources theory, this study aims to examine how employees’ experiences of excessive workloads may direct them away from efforts to share knowledge with…
Abstract
Purpose
Drawing on conservation of resources theory, this study aims to examine how employees’ experiences of excessive workloads may direct them away from efforts to share knowledge with other organizational members, as well as the circumstances in which this process is more or less likely. To untangle the process, the authors predict a mediating role of job dissatisfaction and moderating roles of two complementary resources that help employees cope with failure: resilience as a personal resource and organizational forgiveness as an organizational resource.
Design/methodology/approach
Survey data were gathered from employees of an organization that operates in the construction retail sector. The Process macro provides an empirical test of the moderated mediation dynamic that underpins the proposed conceptual framework.
Findings
The statistical findings affirm that an important channel through which employees’ perceptions that their work demands are unreasonable escalate into a diminished propensity to share knowledge is their lack of enthusiasm about their jobs. Their ability to recover from challenging work situations and their beliefs that the organization does not hold grudges against people who commit mistakes both mitigate this harmful effect.
Practical implications
For organizational practitioners, this research shows that when employees feel frustrated about extreme work pressures, the resource-draining situation may escalate into diminished knowledge sharing, which might inadvertently undermine their ability to receive valuable feedback for dealing with the challenges. From a positive perspective, individual resilience and organizational forgiveness represent resources that can protect employees against this negative spiral.
Originality/value
This study explicates an unexplored harmful effect of strenuous workloads on knowledge sharing, which is explained by employees’ beliefs that their organization fails to provide satisfactory job experiences. This effect also is mitigated to the extent that employees can draw from valuable personal and organizational resources.
Details
Keywords
Scholarship on America’s K-12 economics curriculum reveals an inattention to many harmful economic realities, specifically wealth inequality. Critics of the present curriculum…
Abstract
Purpose
Scholarship on America’s K-12 economics curriculum reveals an inattention to many harmful economic realities, specifically wealth inequality. Critics of the present curriculum posit that its emphasis on out-dated concepts and models ignores crucial elements of reality that impact economic interaction and identities. In response to the dominant economic paradigm and methods, this practitioner-focused paper discusses an economically pluralist, pedagogically critical approach to interrogating destructive economic realities. It details how three social studies classroom simulations based on the board game Monopoly may be integrated with certain informational texts to explore economic factors that contribute to America’s unique form of wealth inequality.
Design/methodology/approach
This paper describes wealth inequality in America and rationalizes the need to make this social problem a focus of study in the secondary social studies classroom. First, I survey the present curricular apparatus of K-12 economics education and then argue for a pluralist approach that expands the curriculum’s dominant neoclassical paradigm. Connecting economic pluralism to critical citizen education, I draw upon emerging critical economic citizen education scholarship to explain attendant pedagogical and instructional approaches. The described lesson builds upon a tradition of Monopoly simulations, is rooted in critical citizen education pedagogy and aligns with Soroko’s (2023) critical economic literacy framework.
Findings
This paper progresses the curricular movement of economic pluralism through its critique of America’s current K-12 economics curriculum that does not focus on immediate, lived social problems. It further defines critical economics, citizenship and pedagogy, then details an instructional practice that employs critical disciplinary tools to investigate contributing factors of American wealth inequality.
Originality/value
This paper contributes to the growing field of pluralist economic perspectives and pedagogies. Specifically, it enriches understanding of critical economics citizenship education by further defining attendant pedagogy and explaining Monopoly as an instructional tool for critical economics citizen education. Previous works have discussed Monopoly’s utility for teaching various concepts within the social studies disciplines. This simulation lesson is unique in its instructional approach that merges simulation experiences with certain informational texts to cultivate critical economic knowledge of American wealth inequality and critical economic skills for critiquing and transforming oppressive economic realities.
Details