Search results

1 – 10 of 869
Article
Publication date: 12 March 2021

Chenhui Liu, Huigang Liang, Nengmin Wang and Yajiong Xue

Employees’ information security policy (ISP) compliance exerts a significant strain on information security management. Drawing upon the compliance theory and control theory, this…

1362

Abstract

Purpose

Employees’ information security policy (ISP) compliance exerts a significant strain on information security management. Drawing upon the compliance theory and control theory, this study attempts to examine the moderating roles of organizational commitment and gender in the relationships between reward/punishment expectancy and employees' ISP compliance.

Design/methodology/approach

Using survey data collected from 310 employees in Chinese organizations that have formally adopted information security policies, the authors applied the partial least square method to test hypotheses.

Findings

Punishment expectancy positively affects ISP compliance, but reward expectancy has no significant impact on ISP compliance. Compared with committed employees, both reward expectancy and punishment expectancy have stronger impacts on low-commitment employees' ISP compliance. As for gender differences, punishment expectancy exerts a stronger effect on females' ISP compliance than it does on males.

Originality/value

By investigating the moderating roles of organizational commitment and gender, this paper offers a deeper understanding of reward and punishment in the context of ISP compliance. The findings reveal that efforts in building organizational commitment will reduce the reliance on reward and punishment, and further controls rather than the carrot and stick should be applied to ensure male employees' ISP compliance.

Details

Information Technology & People, vol. 35 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 1998

Steven H. Appelbaum, Michael Bregman and Peter Moroz

The use of reinforcement and punishment have been studied extensively in laboratory and organizational settings. It has been found that positive reinforcement is the most…

5159

Abstract

The use of reinforcement and punishment have been studied extensively in laboratory and organizational settings. It has been found that positive reinforcement is the most effective way to achieve the required behavior. Many theories and models have been developed in order to explain the relationship between punishment and fear and it has been found that these are correlated. The use of punishment and fear in the organizational setting has proved to be ineffective and undesirable. Managers must try to create an environment and climate where employees can express their full potential and respond to difficult challenges by letting go of fear of failure, fear of change, or fear of risk taking. Human resource management offers some alternatives and programs to assist in executing this task.

Details

Journal of European Industrial Training, vol. 22 no. 3
Type: Research Article
ISSN: 0309-0590

Keywords

Article
Publication date: 6 April 2020

Gaurav Bansal, Steven Muzatko and Soo Il Shin

This study examines how neutralization strategies affect the efficacy of information system security policies. This paper proposes that neutralization strategies used to…

1040

Abstract

Purpose

This study examines how neutralization strategies affect the efficacy of information system security policies. This paper proposes that neutralization strategies used to rationalize security policy noncompliance range across ethical orientations, extending from those helping the greatest number of people (ethics of care) to those damaging the fewest (ethics of justice). The results show how noncompliance differs between genders based on those ethical orientations.

Design/methodology/approach

A survey was used to measure information system security policy noncompliance intentions across six different hypothetical scenarios involving neutralization techniques used to justify noncompliance. Data was gathered from students at a mid-western, comprehensive university in the United States.

Findings

The empirical analysis suggests that gender does play a role in information system security policy noncompliance. However, its significance is dependent upon the underlying neutralization method used to justify noncompliance. The role of reward and punishment is contingent on the situation-specific ethical orientation (SSEO) which in turn is a combination of internal ethical positioning based on one's gender and external ethical reasoning based on neutralization technique.

Originality/value

This study extends ethical decision-making theory by examining how the use of punishments and rewards might be more effective in security policy compliance based upon gender. Importantly, the study emphasizes the interplay between ethics, gender and neutralization techniques, as different ethical perspectives appeal differently based on gender.

Details

Information Technology & People, vol. 34 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 11 July 2006

Danielle E. Warren

Ethics initiatives are commonly used by organizations to influence members’ behavior with the expressed goal of aligning the behavior exhibited in the organization with the…

Abstract

Ethics initiatives are commonly used by organizations to influence members’ behavior with the expressed goal of aligning the behavior exhibited in the organization with the organization's stated rules and values (Laufer & Robertson, 1997; Schwartz, 2002; Tenbrunsel, Smith-Crowe, & Umphress, 2003; Trevino, Weaver, Gibson, & Toffler, 1999; Weaver, Trevino, & Cochran, 1999a, 1999b, 1999c). It is hoped that by emphasizing the organization's values and rules, organization members will be more thoughtful about their work behavior and consider these values and rules when making decisions at work.

Details

Ethics in Groups
Type: Book
ISBN: 978-1-84950-405-8

Article
Publication date: 6 July 2012

S.V. Raghavan and V. Balasubramaniyan

The purpose of this paper is to study the financial facilitators who provide financial muscle to terrorists.

4783

Abstract

Purpose

The purpose of this paper is to study the financial facilitators who provide financial muscle to terrorists.

Design/methodology/approach

The methodology adopted is based on the available materials on two major terrorists groups: Al Qaeda and LTTE, who have terrorized the global community in the last two decades.

Findings

The key findings are that most financial facilitators are knowledgeable, literate and suave and who are kin of the top leadership or part of the clan/sect. Kinship is an important factor for trust worthiness, which leads to their association with the top level leadership for a decade or so, to handle aspects related to a terror group. Also, illegal fund raising/moving aspects are controlled by financial/operational heads of groups, while legal fund raising methods are handled by sympathizers.

Research limitations/implications

The methodology is based on descriptive analysis of existing materials gathered from different writings of different persons in different places, as none of the traditional approaches to the study is possible. The only possible method for analysis is a behavioural approach, and that too on a selective basis, not in total.

Practical implications

Government intelligence agencies need to strive to identify such facilitators, who in turn may lead them to the top leadership, as happened in the cases of Osama bin laden and Hambali.

Originality/value

There is no previous systematic approach which has attempted to study the financial facilitators who provide financial muscle to terrorists. The value of this paper lies in its originality of presentation of facts in a systematic fashion.

Details

Journal of Money Laundering Control, vol. 15 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 11 June 2021

Forough Nasirpouri Shadbad and David Biros

Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…

Abstract

Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.

Details

Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress
Type: Book
ISBN: 978-1-83909-812-3

Keywords

Article
Publication date: 1 April 1990

Luis R. Gomez‐Mejia

This study suggests that while gender differencesin work values exist (as measured by task‐oriented,contextual and job involvement scales),the magnitude and significance of the…

Abstract

This study suggests that while gender differences in work values exist (as measured by task‐oriented, contextual and job involvement scales), the magnitude and significance of the observed differences between men and women decrease as occupation and length of socialisation are partialled out.

Details

International Journal of Manpower, vol. 11 no. 4
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 1 June 1990

Marketing for women in management This is the title of an article by M. Domsch and A. Hadler in Vol. 7 No. 4 of the European Management Journal.

64

Abstract

Marketing for women in management This is the title of an article by M. Domsch and A. Hadler in Vol. 7 No. 4 of the European Management Journal.

Details

Equal Opportunities International, vol. 9 no. 6
Type: Research Article
ISSN: 0261-0159

Article
Publication date: 20 August 2018

Whitney Botsford Morgan, Johnathan Nelson, Eden B. King and Victor S. Mancini

The purpose of this paper is to clarify the nature of counterproductive work behavior (CWB) gender stereotypicality, and to consider whether despite efforts to systematically…

Abstract

Purpose

The purpose of this paper is to clarify the nature of counterproductive work behavior (CWB) gender stereotypicality, and to consider whether despite efforts to systematically evaluate employees through formalized performance appraisal processes, gender-stereotypic bias is likely to enter into performance management systems.

Design/methodology/approach

Study 1 used archival data from 197 federal employees to explore actual punishment recommendations allocated to men and women who engaged in a variety of CWBs. Study 2 tested the causal effect of gender stereotypicality on punishment recommendations with 47 EMBA students who participated in a laboratory study.

Findings

Study 1 revealed an interaction between appellant gender and CWB stereotypicality with regard to termination decisions suggesting that women who engage in stereotypical (i.e. feminine) CWBs and men who engage in stereotypical (i.e. masculine) CWBs are more likely to be terminated than women and men who engage in gender counter-stereotypic CWB. Study 2 revealed that women (not men) tended to receive harsher punishment recommendations for stereotypical (i.e. feminine) CWB than for counter-stereotypical (i.e. masculine) CWB.

Practical implications

Findings illustrate that punishments are not universally extreme, as men and women are denigrated differentially depending on the stereotypicality of their behavior. The current research affirms that there are social constructions for evaluating performance that may continue to confound evaluations of performance.

Originality/value

This is one of the first studies to explore the gendered nature of CWB and supports the argument that prescriptive gender stereotypes shape reactions to CWBs.

Details

Equality, Diversity and Inclusion: An International Journal, vol. 37 no. 6
Type: Research Article
ISSN: 2040-7149

Keywords

Book part
Publication date: 4 August 2008

Stefan Linder

The literature on post-completion reviews (PCRs) either does not deal with the tying of PCRs to extrinsic rewards or provides scant theoretical reasoning or empirical analysis to…

Abstract

The literature on post-completion reviews (PCRs) either does not deal with the tying of PCRs to extrinsic rewards or provides scant theoretical reasoning or empirical analysis to back up its recommendations.

Based on research from psychology and empirical studies, the present chapter proposes that several effects of a PCR, which must be deemed rather dysfunctional, will increase when extrinsic rewards are linked to such a review. At the same time some possibly functional effects, however, are likely to remain constant. The propositions, therefore, call the usefulness of tying PCRs to rewards into question and call for further investigation.

Details

Performance Measurement and Management Control: Measuring and Rewarding Performance
Type: Book
ISBN: 978-1-84950-571-0

1 – 10 of 869