Search results
1 – 3 of 3Hadziroh Ibrahim, Md. Lazim Mohd Zin, Attia Aman-Ullah and Mohd Razif Mohd Ghazi
This research aimed to determine the relationship between technostress and information technology support (IT) and HRIS-related user satisfaction. The study also investigated the…
Abstract
Purpose
This research aimed to determine the relationship between technostress and information technology support (IT) and HRIS-related user satisfaction. The study also investigated the moderating influence of technological self-efficacy on the links between technostress, IT support, and HRIS user satisfaction.
Design/methodology/approach
This quantitative study used the deductive research approach. The study's population was HRIS users from 37 Malaysian public sector organizations. The judgmental sampling technique was employed, and the sample size was 490. Data analysis was conducted through SPSS and PLS-SEM.
Findings
The study showed that technostress is significantly associated with HRIS user satisfaction. While IT support, results show that literacy support, technological support, and technological involvement facilities significantly correlate with HRIS user satisfaction. In contrast, innovation support had an insignificant relationship with HRIS user satisfaction. The study also tested the moderation effect of technology self-efficacy in the relationships and found that technology self-efficacy only moderated the association of technostress and HRIS user satisfaction.
Practical implications
HR departments of government agencies can use the study's findings to understand to what extent HRIS system users are satisfied and what needs to be done to improve the HRIS system. The study also sheds light on the technological pressures that employees encounter.
Originality/value
Present study contributed to the literature by developing a study model of technostress, information technology support, technology self-efficacy, and HRIS user satisfaction. Further, the relationship of technostress with HRIS user satisfaction and the moderating effect of technology self-efficacy was explored for the first time, representing the study's novelty. The study also contributed to social cognitive theory and the theory of reasoned action by exploring attitudinal and behavioral aspects along with the cognitive aspects of users.
Details
Keywords
Valerie A. Chambers, Matthew J. Hayes and Philip M.J. Reckers
Counterproductive work behavior (CWB) imposes significant costs on organizations, thus antecedents of CWB are of particular interest to both practitioners and academics. The…
Abstract
Purpose
Counterproductive work behavior (CWB) imposes significant costs on organizations, thus antecedents of CWB are of particular interest to both practitioners and academics. The authors examine how one’s own narcissism interacts with co-worker narcissism to influence willingness to engage in retaliatory CWB against a co-worker.
Design/methodology/approach
The data for this study were obtained from Amazon Mechanical Turk participants and Master of Business Administration students, representing a cross-section of employee representatives.
Findings
The authors find that employees expect narcissistic co-workers to engage in continuing future CWB and this, in turn, increases employees' willingness to engage in retaliatory CWB. That is, non-narcissistic employees are provoked to engage in organizationally-destructive behaviors by peers perceived as narcissists. This affect is attenuated by the employee’s own narcissism. Relative to non-narcissists, narcissistic employees find a narcissistic co-worker more likeable, which reduces their willingness to engage in retaliatory CWB against the co-worker.
Practical implications
For corporations and HR managers, this study demonstrates the caution necessary when considering hiring and operational practices. Specifically, non-narcissists demonstrate increased willingness to engage in organizationally-destructive behaviors after interpersonal conflict with a narcissistic co-worker.
Originality/value
The authors extend prior research about interpersonal drivers of CWB, which primarily considered superior-subordinate dyad, by examining the joint effects of individual and co-worker narcissism in peer-to-peer relationships.
Details
Keywords
Christiaan Ernst (Riaan) Heyman
This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing…
Abstract
Purpose
This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing material for Mirror Trading International (MTI). The red flag checklist test seeks to establish if MTI’s marketing material posted on YouTube® (in the form of a live video presentation) exhibits any of the red flags from the checklist.
Design/methodology/approach
The study uses a structured literature review and qualitative analysis of red flags for Ponzi and cryptocurrency Ponzi schemes.
Findings
A research lacuna was discovered with regard to cryptocurrency Ponzi scheme red flags. By means of a structured literature review, journal papers were identified that listed and discussed Ponzi scheme red flags. The red flags from the identified journal papers were subsequently used in a qualitative analysis. The analyses and syntheses resulted in the development of a red flag checklist for cryptocurrency Ponzi schemes, with five red flag categories, containing 18 associated red flags. The red flag checklist was then tested against MTI’s marketing material (a transcription of a live YouTube presentation). The test resulted in MTI’s marketing material exhibiting 88% of the red flags contained within the checklist.
Research limitations/implications
The inherent limitations in the design of using a structured literature review and the lack of research regarding the cryptocurrency Ponzi scheme red flags.
Practical implications
The study provides a red flag checklist for cryptocurrency Ponzi schemes. The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.
Social implications
The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.
Originality/value
The study provides a red flag checklist for cryptocurrency Ponzi schemes.
Details