Search results
1 – 10 of over 10000Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew and Mariati Norhashim
The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security…
Abstract
Purpose
The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring.
Design/methodology/approach
Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, information security policy, self-efficacy and perceived inconvenience, were identified as significant in determining employees’ security assurance behaviour (SAB). The influence of these constructs on SAB could be explained by social cognitive theory and is empirically supported by past studies. An online questionnaire survey as the main research instrument is adopted to elicit information on the six constructs tested in this study. Opinion from industry and academic expert panels on the relevance and face validity of the questionnaire were obtained prior to the survey administration.
Findings
Findings from this research indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. This study also demonstrates that employees tend to abandon security behaviour when the behaviour is perceived as inconvenient. Hence, organisations must find ways to reduce the perceived inconvenience using various security automation methods and specialised security training. Reducing perceived inconvenience is a challenge to information security practitioners.
Research limitations/implications
There are some limitations in the existing work that could be addressed in future studies. One of them is the possible social desirability bias due to the self-reported measure adopted in the study. Even though the authors have made every effort possible to collect representative responses via anonymous survey, it is still possible that the respondents may not reveal true behaviour as good conduct is generally desired. This may lead to a bias towards favourable behaviour.
Practical implications
In general, the present research provides a number of significant insights and valuable information related to security assurance behaviour among employees. The major findings could assist security experts and organisations to develop better strategies and policies for information security protection. Findings of this research also indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy.
Social implications
In this research, the social cognitive learning theory is used to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour; the finding implies that monitoring emphases expected behaviours and helps to reinforce organisational norms. Monitoring may also accelerate learning when employees become strongly mindful of their behaviours. Hence, it is important for organisations to communicate the monitoring practices implemented, even more imperative whenever security monitoring employed is unobtrusive in nature. Nonetheless, care must be taken in this communication to avoid resentment and mistrust among employees.
Originality/value
This study is significant in a number of ways. First, this study highlights significant antecedents of security assurance behaviour, which helps organisations to assess their current practices, which may nurture or suppress information security. Second, using users’ perspective, this study provides recommendations pertaining to monitoring as a form of information security measure. Third, this study provides theoretical contribution to the existing information security literature via the application of the social cognitive learning theory.
Details
Keywords
Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and…
Abstract
Purpose
Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software.
Design/methodology/approach
A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model.
Findings
Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool.
Practical implications
This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior.
Originality/value
This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
Details
Keywords
There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats…
Abstract
Purpose
There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats. This study aims to identify the human factors that affect smartphone users’ threat avoidance behaviour.
Design/methodology/approach
A structured literature review (SLR) was applied to answer the research question. A total of 27 sources were analysed, from which 16 codes emerged. After synthesis, six themes transpired.
Findings
Six factors were identified as drivers and/or challenges of smartphone users’ threat avoidance behaviour, namely, knowledge and awareness, misconceptions and trust, cost and benefit considerations, carelessness, perceived measure effectiveness and the user’s perceived skills and efficacy.
Research limitations/implications
The results can encourage and provide a starting point for further research on human behaviour to improve smartphone user behaviour.
Practical implications
The mobile industry should focus on eradicating common misconceptions and undue trust in mobile security that is prevalent among smartphone users and make cost effective and usable interventions available. Training and awareness programs should be updated to include the factors that were identified in this study to affect smartphone users’ threat avoidance behaviour. In addition to improving users’ declarative knowledge concerning available smartphone measures and tools, procedural knowledge should also be improved to ensure proper use of available protective measures. Users should realise the importance of staying updated with evolving smartphone technology and associated threats.
Originality/value
This study acknowledges and supports the notion that addressing human behaviour is crucial in the fight against mobile threats. It addresses the need for behavioural research to analyse the factors that drive smartphone user behaviour. Furthermore, it uses and documents the use of a SLR, a research technique often unfamiliar among information security researchers.
Details
Keywords
Rocco Agrifoglio, Paola Briganti, Luisa Varriale, Concetta Metallo and Maria Ferrara
Building upon the practice-based framework, this paper aims to focus on working practices for understanding how knowledge is transferred among health-care professionals within…
Abstract
Purpose
Building upon the practice-based framework, this paper aims to focus on working practices for understanding how knowledge is transferred among health-care professionals within hospitals.
Design/methodology/approach
Using an ethnographic and interpretative approach, the authors conducted preliminary research based on a quali-quantitative methodology within one of the largest hospitals in Southern Italy.
Findings
This study allowed to achieve several results that could be significant and relevant within the health-care sector. First, this paper identified some of the main working practices and their associated activities in health care. Moreover, this paper identified the main organizational forms and/or tools enabling hospital personnel to share and learn the various types of knowledge for each of the prior identified practices.
Practical implications
Hospital managers should develop strategies and policies that take into account the nature and typology of knowledge-sharing processes among health-care professionals in terms of practices.
Originality/value
The paper contributes to practice-based studies identifying identified some of the main working practices, as well as the main tools for sharing and learning of the various types of knowledge.
Details
Keywords
Tze Yin Khaw, Azlan Amran and Ai Ping Teoh
This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…
Abstract
Purpose
This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.
Design/methodology/approach
This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.
Findings
This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.
Originality/value
This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.
Details
Keywords
Nor Zaimah Che-Ghani, Nik Elyna Myeda and Azlan Shah Ali
To achieve efficient operation and maintenance (O&M) management, this study seeks to identify critical success factors (CSFs) affecting service delivery factors of O&M services at…
Abstract
Purpose
To achieve efficient operation and maintenance (O&M) management, this study seeks to identify critical success factors (CSFs) affecting service delivery factors of O&M services at stratified residential buildings. The purpose of this study is to yield measurable data for developing an effective O&M framework to enhancing its performance. In future research, this study will further investigate the relationship between the CSF and service performance factors.
Design/methodology/approach
This study adopts a combination of qualitative and quantitative techniques that yields conclusive study findings while improving the research’s validity and dependability. Two series of instruments were conducted in an effort to refine the efficient O&M framework variables. Instruments used in addressing the research gap were a questionnaire survey and focus group discussion (FGD). Analysis of data was completed via the Statistical Package for the Social Sciences (SPSS) programme for quantitative data and thematic analysis for qualitative data.
Findings
This study concludes that the CSFs directly affect the performance of O&M. Questionnaire survey and FGD findings have refined the CSF into three main categories, namely, building characteristics, O&M management and community participation. FGD experts further suggested that service performance factors can be measured against SERVQUAL service qualities such as reliability, tangible, responsiveness, assurance and empathy.
Research limitations/implications
Future research may consider the inclusion of financial elements in the O&M service delivery.
Originality/value
This study presents a fresh insight into the CSFs that construct an efficient O&M framework through rigorous steps of data collection and analysis. This study proposes impactful guidance for policymakers, practitioners and residents on the significance of all parties’ involvement to support the management of residential buildings, where the current practice of O&M constantly faces complex issues. This study derives novice strategies that should correspond to the growing issues and challenges in managing residential buildings. The deeper insight into the role of O&M represents a direction for the future development of facilities management progress and stratified residential building sectors.
Details
Keywords
WeiLee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew, Mei-Wei Leong and Liu Yang
This study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security…
Abstract
Purpose
This study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security (PS). Additional emphasis is placed on the degree of necessity of risk and security conditions driving the continuance intention to use e-wallets.
Design/methodology/approach
This quantitative study used a sample of 281 respondents. Partial least-squares structural equation modelling (PLS-SEM) was used to test the associations, while necessary condition analysis (NCA) was performed to uncover the factors’ necessity level.
Findings
PU is the primary facilitator for the continuance intention of e-wallet usage, followed by PS, PR and PEU. However, none were necessary for usage. E-wallet providers must emphasise enhancing PU, prioritise data security and improve the PEU to foster sustained e-wallet usage, while prudent risk management is a nice-to-have.
Practical implications
To maintain the survival of e-wallets, service providers must focus on prioritising PEU, PU and PS for positive user experiences, including contentment, utility, convenience, comfort and safety. Compliance with user authorisation, real-time transaction monitoring and comprehensive security protocols is a must for security concerns.
Originality/value
This study represents the limited empirical research focusing on risk and security in the continuance intention of e-wallet usage. Furthermore, an NCA was performed to determine the essential circumstances of risk and security for the continuance intention of e-wallets.
Details
Keywords
Sheshadri Chatterjee, Ranjan Chaudhuri, Demetris Vrontis and Evangelia Siachou
The purpose of this study is to explore the negative consequences of human resource analytics applications using the privacy calculus approach.
Abstract
Purpose
The purpose of this study is to explore the negative consequences of human resource analytics applications using the privacy calculus approach.
Design/methodology/approach
By using the existing literature and privacy calculus theory, a theoretical model has been developed. This model helps to examine the benefits and risks associated with HR analytics applications. The theoretical model was validated using the partial least square structural equation modeling (PLS-SEM) technique with 315 respondents from different organizations.
Findings
HR analytics provides multiple benefits to employees and organizations. But employee privacy may be compromised due to unauthorized access to employee data. There are also security concerns about the uncontrolled use of these applications. Tracking employees without their consent increases the risk. The study suggests that appropriate regulation is necessary for using HR analytics.
Research limitations/implications
This study is based on cross-sectional data from a specific region. A longitudinal study would have provided more comprehensive results. This study considers five predictors, including other boundary conditions that could enhance the model’s explanative power. Also, data from other countries could improve the proposed model.
Practical implications
The proposed model is useful for HR practitioners and other policymakers in organizations. Appropriate regulations are important for HR analytics applications. The study also highlights various employee privacy and security-related issues emerging from HR analytics applications. The study also discusses the role of leadership support for the appropriate usage of HR analytics.
Originality/value
Only a few research studies have explored the issues of HR analytics and its consequences. The proposed theoretical model is the first to consider the negative consequence of HR analytics through privacy calculus theory. In this perspective, the research is considered to be novel.
Details
Keywords
Haiping Zhao, Shengli Deng, Yong Liu, Sudi Xia, Eric Tze Kuan Lim and Chee-Wee Tan
Drawing on the Health Belief Model (HBM), this study aims to investigate the roles of health beliefs (i.e. perceived susceptibility, perceived severity, perceived benefits…
Abstract
Purpose
Drawing on the Health Belief Model (HBM), this study aims to investigate the roles of health beliefs (i.e. perceived susceptibility, perceived severity, perceived benefits, perceived barriers, health self-efficacy and cues to action) in promoting college students’ smartphone avoidance intention.
Design/methodology/approach
Empirical data were collected through a cross-sectional survey questionnaire administered to 4,670 student smartphone users at a large university located in Central China. Further, a two-step Structural Equation Modeling was conducted using AMOS 22.0 software to test the hypothesized relationships in the research model.
Findings
Analytical results indicate that (1) perceived susceptibility, perceived severity, perceived benefits and health self-efficacy positively influence users’ smartphone avoidance intention; (2) perceived barriers negatively influence smartphone avoidance intention, while (3) cues to action reinforce the relationships between perceived susceptibility/perceived benefits and smartphone avoidance intention, but attenuate the relationships between perceived barriers/health self-efficacy and smartphone avoidance intention.
Research limitations/implications
This study demonstrates that HBM is invaluable in explaining and promoting users’ smartphone avoidance intention, thereby extending extant literature on both HBM and smartphone avoidance.
Originality/value
Research on smartphone avoidance is still in a nascent stage. This study contributes to the field by offering a fresh theoretical lens for pursuing this line of inquiry together with robust empirical evidence.
Details
Keywords
Rawa Hijazi, Ajayeb Abu Daabes and Mohammed Iqbal Al-Ajlouni
This paper assesses the continuance intention (CI) for mobile-based payment (M-payment) services following the COVID-19 pandemic by combining the self-efficacy construct with the…
Abstract
Purpose
This paper assesses the continuance intention (CI) for mobile-based payment (M-payment) services following the COVID-19 pandemic by combining the self-efficacy construct with the electronic service quality model.
Design/methodology/approach
This exploratory, cross-sectional research employs qualitative and quantitative research methods; specifically, a questionnaire and interviews. A total of 403 Jordanian participants completed valid questionnaires. Mediation and moderation evaluations assessed the M-payment service quality (MPSQ), self-efficacy and health concerns (HC) to determine CI.
Findings
The results verify the significance of MPSQ and self-efficacy in developing CI and show the mediating influence of self-efficacy between MPSQ and CI. Moreover, HC negatively impact the self-efficacy/CI link.
Practical implications
This research benefits M-payment service providers seeking to secure customer loyalty via improved M-payment services. The behavioral intention investigation will provide rich information about potential customers' CI and illuminate areas for development.
Originality/value
This research makes an original contribution to the existing M-payment literature by investigating the impact of customers' perception of service quality on their CI to utilize M-payment services, balanced with self-efficacy and HC.
Details