Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 192
To view the access options for this content please click here
Article
Publication date: 3 December 2018

Examining employee security violations: moral disengagement and its environmental influences

Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam and H.R. Rao

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security…

HTML
PDF (430 KB)

Abstract

Purpose

Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have used neutralization and moral disengagement (MD) perspectives to examine employee rationalizations of noncompliant security behaviors. Extending this prior work, the purpose of this paper is to identify mechanisms of security education, training, and awareness (SETA) programs and deterrence as well as employees’ organizational commitment in influencing MD of security policy violations and develop a theoretical model to test the proposed relationships.

Design/methodology/approach

The authors validate and test the model using the data collected from six large multinational organizations in Korea using survey-based methodology. The model was empirically analyzed by structural equation modeling.

Findings

The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence. The findings also suggest that SETA programs are an important mechanism in creating security PA.

Originality/value

The paper expands the literature in IS security that has examined the role of moral evaluations. Drawing upon MD theory and social cognitive theory, the paper points to the central role of SETA and security PA in reducing MD of security policy violations, and ultimately the likelihood of this behavior. The paper not only contributes to theory but also provides important insights for practice.

Details

Information Technology & People, vol. 31 no. 6
Type: Research Article
DOI: https://doi.org/10.1108/ITP-10-2017-0322
ISSN: 0959-3845

Keywords

  • Information security behaviours
  • Information systems security
  • Moral disengagement
  • Social cognitive theory
  • SETA
  • Deterrence
  • Organizational commitment

To view the access options for this content please click here
Article
Publication date: 27 May 2014

Modeling of technology adoption in Botswana

Cheddi Kiravu, Moses T. Oladiran and Kamen Yanev

The conceptualisation of technology adoption has largely been based on the Bass or some Bass-derived model – notably, the logistic model. Logistic-type models offer…

HTML
PDF (1.8 MB)

Abstract

Purpose

The conceptualisation of technology adoption has largely been based on the Bass or some Bass-derived model – notably, the logistic model. Logistic-type models offer limited insights regarding the adoption process dynamics or the utility value of their results. The purpose of this paper is to outline an alternative technology adoption framework based on complex adaptive networks.

Design/methodology/approach

An agent-based methodological approach is proposed. In it the actors, factors, goals, and adaptive learning influences driving solar energy technology adoption (SETA) process are first substantiated by empirical evidence gathered using field questionnaires and then incorporated in the simulation of a dynamic complex adaptive network of SETA. The complex adaptive network model is based on simple heuristic rules applied using a modified preferential attachment scheme within a NetLogo simulation environment.

Findings

The interim results suggest an emergent network where prominent hub “driver” agents underlining the robustness of the model are statistically discernible.

Research limitations/implications

The research is limited to solar photovoltaic and solar water heating technology adoption in Botswana households; however, its results are far-reaching.

Practical implications

These results can be related to sustainable energy policy design. There, targeted incentive mechanisms can be formulated against the backdrop of the identified environmental factors and actors; the aim being to accelerate and cascade SETA.

Social implications

The results could also be cascaded to other sectors and other non-solar technologies, thus providing a general alternative framework for enabling the widespread adoption of technologies.

Originality/value

This research therefore represents a novel way of utilizing the new science of networks to accelerate SETA.

Details

International Journal of Energy Sector Management, vol. 8 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/IJESM-02-2013-0004
ISSN: 1750-6220

Keywords

  • Simulation
  • Modelling
  • Policy
  • Solar
  • Renewable energies
  • Technology management
  • Agent-based model modelling
  • Complex networks
  • Households

To view the access options for this content please click here
Article
Publication date: 12 July 2013

Challenges and perspectives facing the development of entrepreneurship education and training in South Africa

Alain A. Ndedi

The study aims to investigate some of the interventions which have been introduced by the South African Government through its various agencies (Sector Education Training…

HTML
PDF (66 KB)

Abstract

Purpose

The study aims to investigate some of the interventions which have been introduced by the South African Government through its various agencies (Sector Education Training Authorities or SETA, for example) to support youth entrepreneurship and explore the challenges these agencies face, namely policy development, operational and pedagogic impediments.

Design/methodology/approach

The approach used to collect data was twofold; first, desk research was conducted on selected work in the area of entrepreneurial education and training. The second source of information was from empirical investigations on the impact made by the various Sector Education Training Authorities (SETAs) in supporting small, medium and micro enterprises (SME) levy payers in skills development. In addition to the information from SETAs, data are also used from impact assessment studies conducted for the South African Department of Trade and Industry and the Department of Science and Technology.

Findings

The study found that there are no inter‐disciplinary approaches in entrepreneurship training that make entrepreneurship education accessible to all students, and where appropriate, create teams for the development and exploitation of business ideas. Another finding is the fact that business/engineering students with different backgrounds are not connected.

Originality/value

This study has explored the nature of youth entrepreneurial education development through well‐designed entrepreneurial development efforts. An appropriate scheme in terms of cultivating an entrepreneurial spirit around training and concentrating efforts on supporting the growth of new ventures is suggested.

Details

World Journal of Entrepreneurship, Management and Sustainable Development, vol. 9 no. 2/3
Type: Research Article
DOI: https://doi.org/10.1108/WJEMSD-01-2013-0009
ISSN: 2042-5961

Keywords

  • Youth
  • Entrepreneurship education
  • Employment
  • South Africa

To view the access options for this content please click here
Article
Publication date: 31 August 2004

An ontological approach to interactive navigation for problem solving oriented learning processes

Kazuhisa Seta, Kei Tachibana, Ikuyo Fujisawa and Motohide Umano

Our research aim is to propose a support model for problem‐solving oriented learning (PSOL) and implement a humancentric system that supports learners and thereby develops…

HTML
PDF (495 KB)

Abstract

Our research aim is to propose a support model for problem‐solving oriented learning (PSOL) and implement a humancentric system that supports learners and thereby develops their ability. We propose a human‐centric interactive framework for PSOL by employing the research results in the educational psychology field. The characteristic of our research is that our system understands the principle knowledge to support users through human‐computer interactions. It is very important to clarify the principle knowledge of the target application domain and develop the system based on it. We call the principle knowledge as ontology. By embedding ontology into the basis of a system, we can implement a more positive navigation function. In this paper, we analyze the learners’ cognitive activities in PSOL, propose a support model that encourages self‐regulated planning processes, and illustrate an interactive environment for making effective problem‐solving and learning processes based on the ontology.

Details

Interactive Technology and Smart Education, vol. 1 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/17415650480000022
ISSN: 1741-5659

Keywords

  • Ontology
  • Meta‐cognition
  • Ontology‐based HCI
  • Problem‐solving oriented learning

To view the access options for this content please click here
Article
Publication date: 14 October 2020

Antecedents for enhanced level of cyber-security in organisations

Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia and Manoj Dora

The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human…

HTML
PDF (397 KB)

Abstract

Purpose

The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human resource perspective using human–organisation–technology (HOT) theory.

Design/methodology/approach

The study has been conducted on 151 professionals who have expertise in dealing with cyber-security in organisations in sectors such as retail, education, healthcare, etc. in India. The analysis of the data is carried out using partial least squares based structural equation modelling technique (PLS-SEM).

Findings

The results from the study suggest that “legal consequences” and “technical measures” adopted for securing cyber-security in organisations are the most important antecedents for enhanced cyber-security levels in the organisations. The other significant antecedents for enhanced cyber-security in organisations include “role of senior management” and “proactive information security”.

Research limitations/implications

This empirical study has significant implications for organisations as they can take pre-emptive measures by focussing on important antecedents and work towards enhancing the level of cyber-security.

Originality/value

The originality of this research is combining both technical and human resource perspective in identifying the determinants of enhanced level of cyber-security in the organisations.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/JEIM-06-2020-0240
ISSN: 1741-0398

Keywords

  • Cyber-security
  • Organisation
  • Antecedents
  • Structural equation modelling

Content available
Article
Publication date: 1 February 2001

Stanhope-Seta instruments available from Merck

HTML

Abstract

Details

Pigment & Resin Technology, vol. 30 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/prt.2001.12930aad.010
ISSN: 0369-9420

Keywords

  • Merck
  • Testing
  • Flammable liquids
  • Viscosity

To view the access options for this content please click here
Article
Publication date: 19 December 2019

Understanding online shopping behaviours and purchase intentions amongst millennials

Maria Dharmesti, Theresia Rasika Seta Dharmesti, Sarah Kuhne and Park Thaichon

The purpose of this paper is to examine online purchase behaviours amongst young consumers in Australia and the USA. It also aims to develop and test a theoretical…

HTML
PDF (290 KB)

Abstract

Purpose

The purpose of this paper is to examine online purchase behaviours amongst young consumers in Australia and the USA. It also aims to develop and test a theoretical framework of young consumers’ online purchase behaviour.

Design/methodology/approach

Data were collected through online surveys targeting young online shoppers in Australia and the USA. A multi-group structural equation modelling was used to test the proposed structural model and hypotheses.

Findings

The model shows a good fit with the data. Young consumers in Australia and the USA have positive attitude towards online shopping that significantly affects their online purchase intentions. Social motive negatively impacts online purchase intentions in the Australian sample. Escapism and value motives positively affect Australian and American young shoppers’ online purchase intentions. Young consumers in Australia and the USA are very familiar with the online shopping process. The familiarity strongly triggers their information search behaviour that leads to online purchase intentions.

Practical implications

The results of this paper assist the marketers and policy makers to target and appeal to this young segment, based on their unique motivations, values and characteristics.

Originality/value

Using the generational cohort theory, this paper contributes to the extant literature by providing insights on the Australian and American young generation’s unique values and characteristics that influence their online purchase behaviours. This research also contributes insights for the marketers and policy makers to improve their marketing efforts and services and appeal to this young segment, based on their unique values and characteristics.

Details

Young Consumers, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/YC-12-2018-0922
ISSN: 1747-3616

Keywords

  • Attitudes
  • Motives
  • Millennials
  • Information search
  • Generation theory
  • Online purchase behavior

To view the access options for this content please click here
Article
Publication date: 1 January 2003

Training Utility and Levy‐Grant Incentives

GREGORY JOHN LEE

Decision theoretic utility analysis has long been proposed as a method for analyzing the monetary impact of training. Increasing complexity in the training environment…

HTML
PDF (816 KB)

Abstract

Decision theoretic utility analysis has long been proposed as a method for analyzing the monetary impact of training. Increasing complexity in the training environment requires, however, that additions be made to the basic algebraic assessment formulas. One such addition may include the effect of levy‐grant systems that stem from legislation and are designed to incentivize employer provided training EPT). The impact of such incentive systems on the bottom‐line of a company is a vital consideration in what training to apply and whether to participate in the grant incentive activities. Interest in the range of evaluation techniques is increasing. This article accordingly adjusts the basic decision theoretic utility analysis techniques for the special case of a levy‐grant incentive, using South Africa as a case study. It is hoped that the principles used here can thus be extrapolated to other skills development systems, allowing both organizations and policy makers to make optimal decisions.

Details

Journal of Human Resource Costing & Accounting, vol. 7 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/eb029078
ISSN: 1401-338X

To view the access options for this content please click here
Article
Publication date: 8 July 2019

From theory to practice: guidelines for enhancing information security management

Ioanna Topa and Maria Karyda

This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with…

HTML
PDF (204 KB)

Abstract

Purpose

This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely adopted information security standards ISO 27001, 27002, 27003 and 27005.

Design/methodology/approach

Based on an exhaustive analysis of related literature, the authors identify critical factors influencing employee security behaviour and ISP compliance. The authors use these factors to perform a gap analysis of widely adopted information security standards ISO 27001, 27002, 27003 and 27005 and identify issues not covered or only partially addressed. Drawing on the implications of security behaviour determinants and the identified gaps, the authors provide guidelines which can enhance security management practices.

Findings

The authors uncover the factors shaping security behaviour barely or partly considered in the ISO information security standards ISO 27001, 27002, 27003 and 27005, including top management participation, accommodating individual characteristics, embracing the cultural context, encouraging employees to comply out of habit and considering the cost of compliance. Furthermore, the authors provide guidelines to security managers on enhancing their security management practices when implementing the above ISO Standards.

Practical implications

This study offers guidelines on how to create and design security management practices whilst implementing ISO standards (ISO 27001, ISO 27002, ISO 27003, ISO 27005) so as to enhance ISP compliance.

Originality/value

This study analyses the role and implications of security behaviour determinants, discusses discrepancies and conflicting findings in related literature, provides a gap analysis of commonly used information security standards (ISO 27001, 27002, 27003 and 27005) and proposes guidelines on enhancing security management practices towards improving ISP compliance.

Details

Information & Computer Security, vol. 27 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/ICS-09-2018-0108
ISSN: 2056-4961

Keywords

  • Information security
  • Individual behaviour
  • Organisational policy
  • International standards
  • Security
  • IT management

To view the access options for this content please click here
Article
Publication date: 8 July 2019

A conceptual model and empirical assessment of HR security risk management

Peace Kumah, Winfred Yaokumah and Eric Saviour Aryee Okai

This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage…

HTML
PDF (555 KB)

Abstract

Purpose

This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage information security risks.

Design/methodology/approach

The conceptual model is developed based on the agency theory and the review of theoretical, empirical and practitioner literature. Following, empirical data are collected through a survey from 134 IT professionals, internal audit personnel and HR managers working within five major industry sectors in a developing country to test the organizational differences in pre-, during- and post-employment HR security measures.

Findings

Using analysis of variance, the findings reveal significant differences among the organizations. Financial institutions perform better in employee background checks, terms and conditions of employment, management responsibilities, security education, training and awareness and disciplinary process. Conversely, healthcare institutions outperform other organizations in post-employment security management. The government public institutions perform the worst among all the organizations.

Originality/value

An integration of a conceptual model with HR security controls is an area that is under-researched and under-reported in information security and human resource management literature. Accordingly, this research on HR security management contributes to reducing such a gap and adds to the existing HR security risk management literature. It, thereby, provides an opportunity for researchers to conduct comparative studies between developed and developing nations or to benchmark a specific organization’s HR security management.

Details

Information & Computer Security, vol. 27 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/ICS-05-2018-0057
ISSN: 2056-4961

Keywords

  • Information security
  • Agency theory
  • Security education
  • Background check
  • Computer training
  • HR security risk management
  • Personnel security
  • Human resource security
  • Conditions of employment
  • Management responsibilities
  • Training and awareness
  • Disciplinary process

Access
Only content I have access to
Only Open Access
Year
  • Last week (1)
  • Last month (2)
  • Last 3 months (10)
  • Last 6 months (17)
  • Last 12 months (22)
  • All dates (192)
Content type
  • Article (135)
  • Book part (37)
  • Earlycite article (15)
  • Case study (3)
  • Expert briefing (2)
1 – 10 of 192
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here