Search results

1 – 3 of 3
Article
Publication date: 26 May 2023

Hadziroh Ibrahim, Md. Lazim Mohd Zin, Attia Aman-Ullah and Mohd Razif Mohd Ghazi

This research aimed to determine the relationship between technostress and information technology support (IT) and HRIS-related user satisfaction. The study also investigated the…

Abstract

Purpose

This research aimed to determine the relationship between technostress and information technology support (IT) and HRIS-related user satisfaction. The study also investigated the moderating influence of technological self-efficacy on the links between technostress, IT support, and HRIS user satisfaction.

Design/methodology/approach

This quantitative study used the deductive research approach. The study's population was HRIS users from 37 Malaysian public sector organizations. The judgmental sampling technique was employed, and the sample size was 490. Data analysis was conducted through SPSS and PLS-SEM.

Findings

The study showed that technostress is significantly associated with HRIS user satisfaction. While IT support, results show that literacy support, technological support, and technological involvement facilities significantly correlate with HRIS user satisfaction. In contrast, innovation support had an insignificant relationship with HRIS user satisfaction. The study also tested the moderation effect of technology self-efficacy in the relationships and found that technology self-efficacy only moderated the association of technostress and HRIS user satisfaction.

Practical implications

HR departments of government agencies can use the study's findings to understand to what extent HRIS system users are satisfied and what needs to be done to improve the HRIS system. The study also sheds light on the technological pressures that employees encounter.

Originality/value

Present study contributed to the literature by developing a study model of technostress, information technology support, technology self-efficacy, and HRIS user satisfaction. Further, the relationship of technostress with HRIS user satisfaction and the moderating effect of technology self-efficacy was explored for the first time, representing the study's novelty. The study also contributed to social cognitive theory and the theory of reasoned action by exploring attitudinal and behavioral aspects along with the cognitive aspects of users.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 January 2024

Valerie A. Chambers, Matthew J. Hayes and Philip M.J. Reckers

Counterproductive work behavior (CWB) imposes significant costs on organizations, thus antecedents of CWB are of particular interest to both practitioners and academics. The…

Abstract

Purpose

Counterproductive work behavior (CWB) imposes significant costs on organizations, thus antecedents of CWB are of particular interest to both practitioners and academics. The authors examine how one’s own narcissism interacts with co-worker narcissism to influence willingness to engage in retaliatory CWB against a co-worker.

Design/methodology/approach

The data for this study were obtained from Amazon Mechanical Turk participants and Master of Business Administration students, representing a cross-section of employee representatives.

Findings

The authors find that employees expect narcissistic co-workers to engage in continuing future CWB and this, in turn, increases employees' willingness to engage in retaliatory CWB. That is, non-narcissistic employees are provoked to engage in organizationally-destructive behaviors by peers perceived as narcissists. This affect is attenuated by the employee’s own narcissism. Relative to non-narcissists, narcissistic employees find a narcissistic co-worker more likeable, which reduces their willingness to engage in retaliatory CWB against the co-worker.

Practical implications

For corporations and HR managers, this study demonstrates the caution necessary when considering hiring and operational practices. Specifically, non-narcissists demonstrate increased willingness to engage in organizationally-destructive behaviors after interpersonal conflict with a narcissistic co-worker.

Originality/value

The authors extend prior research about interpersonal drivers of CWB, which primarily considered superior-subordinate dyad, by examining the joint effects of individual and co-worker narcissism in peer-to-peer relationships.

Details

Journal of Organizational Effectiveness: People and Performance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2051-6614

Keywords

Open Access
Article
Publication date: 31 July 2023

Christiaan Ernst (Riaan) Heyman

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing…

1565

Abstract

Purpose

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing material for Mirror Trading International (MTI). The red flag checklist test seeks to establish if MTI’s marketing material posted on YouTube® (in the form of a live video presentation) exhibits any of the red flags from the checklist.

Design/methodology/approach

The study uses a structured literature review and qualitative analysis of red flags for Ponzi and cryptocurrency Ponzi schemes.

Findings

A research lacuna was discovered with regard to cryptocurrency Ponzi scheme red flags. By means of a structured literature review, journal papers were identified that listed and discussed Ponzi scheme red flags. The red flags from the identified journal papers were subsequently used in a qualitative analysis. The analyses and syntheses resulted in the development of a red flag checklist for cryptocurrency Ponzi schemes, with five red flag categories, containing 18 associated red flags. The red flag checklist was then tested against MTI’s marketing material (a transcription of a live YouTube presentation). The test resulted in MTI’s marketing material exhibiting 88% of the red flags contained within the checklist.

Research limitations/implications

The inherent limitations in the design of using a structured literature review and the lack of research regarding the cryptocurrency Ponzi scheme red flags.

Practical implications

The study provides a red flag checklist for cryptocurrency Ponzi schemes. The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Social implications

The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Originality/value

The study provides a red flag checklist for cryptocurrency Ponzi schemes.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 3 of 3