Search results

1 – 10 of over 10000
Article
Publication date: 25 February 2019

Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew and Mariati Norhashim

The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security

2207

Abstract

Purpose

The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring.

Design/methodology/approach

Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, information security policy, self-efficacy and perceived inconvenience, were identified as significant in determining employees’ security assurance behaviour (SAB). The influence of these constructs on SAB could be explained by social cognitive theory and is empirically supported by past studies. An online questionnaire survey as the main research instrument is adopted to elicit information on the six constructs tested in this study. Opinion from industry and academic expert panels on the relevance and face validity of the questionnaire were obtained prior to the survey administration.

Findings

Findings from this research indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. This study also demonstrates that employees tend to abandon security behaviour when the behaviour is perceived as inconvenient. Hence, organisations must find ways to reduce the perceived inconvenience using various security automation methods and specialised security training. Reducing perceived inconvenience is a challenge to information security practitioners.

Research limitations/implications

There are some limitations in the existing work that could be addressed in future studies. One of them is the possible social desirability bias due to the self-reported measure adopted in the study. Even though the authors have made every effort possible to collect representative responses via anonymous survey, it is still possible that the respondents may not reveal true behaviour as good conduct is generally desired. This may lead to a bias towards favourable behaviour.

Practical implications

In general, the present research provides a number of significant insights and valuable information related to security assurance behaviour among employees. The major findings could assist security experts and organisations to develop better strategies and policies for information security protection. Findings of this research also indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy.

Social implications

In this research, the social cognitive learning theory is used to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour; the finding implies that monitoring emphases expected behaviours and helps to reinforce organisational norms. Monitoring may also accelerate learning when employees become strongly mindful of their behaviours. Hence, it is important for organisations to communicate the monitoring practices implemented, even more imperative whenever security monitoring employed is unobtrusive in nature. Nonetheless, care must be taken in this communication to avoid resentment and mistrust among employees.

Originality/value

This study is significant in a number of ways. First, this study highlights significant antecedents of security assurance behaviour, which helps organisations to assess their current practices, which may nurture or suppress information security. Second, using users’ perspective, this study provides recommendations pertaining to monitoring as a form of information security measure. Third, this study provides theoretical contribution to the existing information security literature via the application of the social cognitive learning theory.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 July 2017

Hao Chen and Wenli Li

Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and…

1810

Abstract

Purpose

Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software.

Design/methodology/approach

A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model.

Findings

Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool.

Practical implications

This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior.

Originality/value

This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 June 2020

Rika Butler

There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats…

Abstract

Purpose

There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats. This study aims to identify the human factors that affect smartphone users’ threat avoidance behaviour.

Design/methodology/approach

A structured literature review (SLR) was applied to answer the research question. A total of 27 sources were analysed, from which 16 codes emerged. After synthesis, six themes transpired.

Findings

Six factors were identified as drivers and/or challenges of smartphone users’ threat avoidance behaviour, namely, knowledge and awareness, misconceptions and trust, cost and benefit considerations, carelessness, perceived measure effectiveness and the user’s perceived skills and efficacy.

Research limitations/implications

The results can encourage and provide a starting point for further research on human behaviour to improve smartphone user behaviour.

Practical implications

The mobile industry should focus on eradicating common misconceptions and undue trust in mobile security that is prevalent among smartphone users and make cost effective and usable interventions available. Training and awareness programs should be updated to include the factors that were identified in this study to affect smartphone users’ threat avoidance behaviour. In addition to improving users’ declarative knowledge concerning available smartphone measures and tools, procedural knowledge should also be improved to ensure proper use of available protective measures. Users should realise the importance of staying updated with evolving smartphone technology and associated threats.

Originality/value

This study acknowledges and supports the notion that addressing human behaviour is crucial in the fight against mobile threats. It addresses the need for behavioural research to analyse the factors that drive smartphone user behaviour. Furthermore, it uses and documents the use of a SLR, a research technique often unfamiliar among information security researchers.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 28 September 2020

Rocco Agrifoglio, Paola Briganti, Luisa Varriale, Concetta Metallo and Maria Ferrara

Building upon the practice-based framework, this paper aims to focus on working practices for understanding how knowledge is transferred among health-care professionals within…

3029

Abstract

Purpose

Building upon the practice-based framework, this paper aims to focus on working practices for understanding how knowledge is transferred among health-care professionals within hospitals.

Design/methodology/approach

Using an ethnographic and interpretative approach, the authors conducted preliminary research based on a quali-quantitative methodology within one of the largest hospitals in Southern Italy.

Findings

This study allowed to achieve several results that could be significant and relevant within the health-care sector. First, this paper identified some of the main working practices and their associated activities in health care. Moreover, this paper identified the main organizational forms and/or tools enabling hospital personnel to share and learn the various types of knowledge for each of the prior identified practices.

Practical implications

Hospital managers should develop strategies and policies that take into account the nature and typology of knowledge-sharing processes among health-care professionals in terms of practices.

Originality/value

The paper contributes to practice-based studies identifying identified some of the main working practices, as well as the main tools for sharing and learning of the various types of knowledge.

Details

International Journal of Organizational Analysis, vol. 29 no. 4
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 10 April 2024

Tze Yin Khaw, Azlan Amran and Ai Ping Teoh

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…

Abstract

Purpose

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.

Design/methodology/approach

This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.

Findings

This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.

Originality/value

This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 22 March 2023

Nor Zaimah Che-Ghani, Nik Elyna Myeda and Azlan Shah Ali

To achieve efficient operation and maintenance (O&M) management, this study seeks to identify critical success factors (CSFs) affecting service delivery factors of O&M services at…

Abstract

Purpose

To achieve efficient operation and maintenance (O&M) management, this study seeks to identify critical success factors (CSFs) affecting service delivery factors of O&M services at stratified residential buildings. The purpose of this study is to yield measurable data for developing an effective O&M framework to enhancing its performance. In future research, this study will further investigate the relationship between the CSF and service performance factors.

Design/methodology/approach

This study adopts a combination of qualitative and quantitative techniques that yields conclusive study findings while improving the research’s validity and dependability. Two series of instruments were conducted in an effort to refine the efficient O&M framework variables. Instruments used in addressing the research gap were a questionnaire survey and focus group discussion (FGD). Analysis of data was completed via the Statistical Package for the Social Sciences (SPSS) programme for quantitative data and thematic analysis for qualitative data.

Findings

This study concludes that the CSFs directly affect the performance of O&M. Questionnaire survey and FGD findings have refined the CSF into three main categories, namely, building characteristics, O&M management and community participation. FGD experts further suggested that service performance factors can be measured against SERVQUAL service qualities such as reliability, tangible, responsiveness, assurance and empathy.

Research limitations/implications

Future research may consider the inclusion of financial elements in the O&M service delivery.

Originality/value

This study presents a fresh insight into the CSFs that construct an efficient O&M framework through rigorous steps of data collection and analysis. This study proposes impactful guidance for policymakers, practitioners and residents on the significance of all parties’ involvement to support the management of residential buildings, where the current practice of O&M constantly faces complex issues. This study derives novice strategies that should correspond to the growing issues and challenges in managing residential buildings. The deeper insight into the role of O&M represents a direction for the future development of facilities management progress and stratified residential building sectors.

Article
Publication date: 27 November 2023

WeiLee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew, Mei-Wei Leong and Liu Yang

This study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security

Abstract

Purpose

This study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security (PS). Additional emphasis is placed on the degree of necessity of risk and security conditions driving the continuance intention to use e-wallets.

Design/methodology/approach

This quantitative study used a sample of 281 respondents. Partial least-squares structural equation modelling (PLS-SEM) was used to test the associations, while necessary condition analysis (NCA) was performed to uncover the factors’ necessity level.

Findings

PU is the primary facilitator for the continuance intention of e-wallet usage, followed by PS, PR and PEU. However, none were necessary for usage. E-wallet providers must emphasise enhancing PU, prioritise data security and improve the PEU to foster sustained e-wallet usage, while prudent risk management is a nice-to-have.

Practical implications

To maintain the survival of e-wallets, service providers must focus on prioritising PEU, PU and PS for positive user experiences, including contentment, utility, convenience, comfort and safety. Compliance with user authorisation, real-time transaction monitoring and comprehensive security protocols is a must for security concerns.

Originality/value

This study represents the limited empirical research focusing on risk and security in the continuance intention of e-wallet usage. Furthermore, an NCA was performed to determine the essential circumstances of risk and security for the continuance intention of e-wallets.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 15 June 2021

Sheshadri Chatterjee, Ranjan Chaudhuri, Demetris Vrontis and Evangelia Siachou

The purpose of this study is to explore the negative consequences of human resource analytics applications using the privacy calculus approach.

2080

Abstract

Purpose

The purpose of this study is to explore the negative consequences of human resource analytics applications using the privacy calculus approach.

Design/methodology/approach

By using the existing literature and privacy calculus theory, a theoretical model has been developed. This model helps to examine the benefits and risks associated with HR analytics applications. The theoretical model was validated using the partial least square structural equation modeling (PLS-SEM) technique with 315 respondents from different organizations.

Findings

HR analytics provides multiple benefits to employees and organizations. But employee privacy may be compromised due to unauthorized access to employee data. There are also security concerns about the uncontrolled use of these applications. Tracking employees without their consent increases the risk. The study suggests that appropriate regulation is necessary for using HR analytics.

Research limitations/implications

This study is based on cross-sectional data from a specific region. A longitudinal study would have provided more comprehensive results. This study considers five predictors, including other boundary conditions that could enhance the model’s explanative power. Also, data from other countries could improve the proposed model.

Practical implications

The proposed model is useful for HR practitioners and other policymakers in organizations. Appropriate regulations are important for HR analytics applications. The study also highlights various employee privacy and security-related issues emerging from HR analytics applications. The study also discusses the role of leadership support for the appropriate usage of HR analytics.

Originality/value

Only a few research studies have explored the issues of HR analytics and its consequences. The proposed theoretical model is the first to consider the negative consequence of HR analytics through privacy calculus theory. In this perspective, the research is considered to be novel.

Details

International Journal of Manpower, vol. 43 no. 1
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 22 March 2022

Haiping Zhao, Shengli Deng, Yong Liu, Sudi Xia, Eric Tze Kuan Lim and Chee-Wee Tan

Drawing on the Health Belief Model (HBM), this study aims to investigate the roles of health beliefs (i.e. perceived susceptibility, perceived severity, perceived benefits…

Abstract

Purpose

Drawing on the Health Belief Model (HBM), this study aims to investigate the roles of health beliefs (i.e. perceived susceptibility, perceived severity, perceived benefits, perceived barriers, health self-efficacy and cues to action) in promoting college students’ smartphone avoidance intention.

Design/methodology/approach

Empirical data were collected through a cross-sectional survey questionnaire administered to 4,670 student smartphone users at a large university located in Central China. Further, a two-step Structural Equation Modeling was conducted using AMOS 22.0 software to test the hypothesized relationships in the research model.

Findings

Analytical results indicate that (1) perceived susceptibility, perceived severity, perceived benefits and health self-efficacy positively influence users’ smartphone avoidance intention; (2) perceived barriers negatively influence smartphone avoidance intention, while (3) cues to action reinforce the relationships between perceived susceptibility/perceived benefits and smartphone avoidance intention, but attenuate the relationships between perceived barriers/health self-efficacy and smartphone avoidance intention.

Research limitations/implications

This study demonstrates that HBM is invaluable in explaining and promoting users’ smartphone avoidance intention, thereby extending extant literature on both HBM and smartphone avoidance.

Originality/value

Research on smartphone avoidance is still in a nascent stage. This study contributes to the field by offering a fresh theoretical lens for pursuing this line of inquiry together with robust empirical evidence.

Details

Industrial Management & Data Systems, vol. 122 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 16 January 2023

Rawa Hijazi, Ajayeb Abu Daabes and Mohammed Iqbal Al-Ajlouni

This paper assesses the continuance intention (CI) for mobile-based payment (M-payment) services following the COVID-19 pandemic by combining the self-efficacy construct with the…

Abstract

Purpose

This paper assesses the continuance intention (CI) for mobile-based payment (M-payment) services following the COVID-19 pandemic by combining the self-efficacy construct with the electronic service quality model.

Design/methodology/approach

This exploratory, cross-sectional research employs qualitative and quantitative research methods; specifically, a questionnaire and interviews. A total of 403 Jordanian participants completed valid questionnaires. Mediation and moderation evaluations assessed the M-payment service quality (MPSQ), self-efficacy and health concerns (HC) to determine CI.

Findings

The results verify the significance of MPSQ and self-efficacy in developing CI and show the mediating influence of self-efficacy between MPSQ and CI. Moreover, HC negatively impact the self-efficacy/CI link.

Practical implications

This research benefits M-payment service providers seeking to secure customer loyalty via improved M-payment services. The behavioral intention investigation will provide rich information about potential customers' CI and illuminate areas for development.

Originality/value

This research makes an original contribution to the existing M-payment literature by investigating the impact of customers' perception of service quality on their CI to utilize M-payment services, balanced with self-efficacy and HC.

Details

International Journal of Quality & Reliability Management, vol. 40 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

1 – 10 of over 10000