Article
Computer Science, Interdisciplinary Applications
Grant Solomon, Irwin Brown
Summary: The study reveals that organizational culture and information security culture have significant influences on employee compliance, with organizational culture having a particularly strong influence on information security culture. A control-oriented organizational culture is conducive to promoting compliance with information security policies.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
(2021)
Article
Computer Science, Information Systems
Sebastian Hengstler, Stephan Kuehnel, Kristin Masuch, Ilja Nastjuk, Simon Trang
Summary: Deterrence theory is commonly used to study non-compliance behavior in information security policy. However, the results of studies in this field are ambiguous. To address this, various influencing factors have been considered, and quantile regression has been applied to estimate the overall effect of deterrents. Based on longitudinal data from the U.S., our findings reveal significant differences in the effects of sanctions certainty and severity among employees with different inclinations towards ISP compliance behavior.
COMPUTERS & SECURITY
(2023)
Article
Information Science & Library Science
Aihui Chen, Yaobin Lu
Summary: This study explores the mechanisms of passengers' protective behavior in ridesharing context, finding that Protection Motivation Theory and Usage Situation Theory are effective in explaining this behavior. The research provides useful recommendations for improving passengers' protective behavior.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
(2021)
Article
Computer Science, Interdisciplinary Applications
Wai-Peng Wong, Kim Hua Tan, Stephanie Hui-Wen Chuah, Ming-Lang Tseng, Kuan Yew Wong, Shamraiz Ahmad
Summary: The study found that information security culture negatively impacted the information quality-information sharing relationship of contract suppliers. However, noncontract suppliers may perform better in certain instances, indicating that they still play an important role in supply chain performance. This presents a dilemma as information security culture motivates noncontract suppliers to share and perform better than contract suppliers.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
(2021)
Article
Chemistry, Multidisciplinary
Tienhua Wu, Kuang-You Tien, Wei-Chih Hsu, Fu-Hsiang Wen
Summary: The study shows that using gamification as a teaching method can effectively enhance students' Information Security Awareness (ISA), especially in the areas of password management, Internet use, and information handling. However, gamification does not have a significant impact on students' attitudes and intentions towards security compliance, as well as their willingness for continuous IS learning.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Information Systems
Amir Fard Bahreini, Hasan Cavusoglu, Ronald T. Cenfetelli
Summary: The increasing use of information technology artifacts in daily life has made security a shared responsibility of users and companies. Improving users' objective security knowledge and providing applications with more secure default settings are commonly adopted methods to help users make more secure decisions. Research shows that objective security knowledge, combined with high subjective security knowledge, can lead to more secure decisions. The presence of subjective security knowledge can also reduce reliance on insecure default settings.
INFORMATION & MANAGEMENT
(2023)
Article
Management
Xing Gao, Siyu Gong, Ying Wang, Yanfang Zhang
Summary: This paper examines security investment and information sharing of two substitutable firms through constructing a game-theoretic model. The results show that the firm with more efficient security investment suffers weaker cyber-attacks, one firm's aggregate defense increases with its unit investment cost, a widely-used compensation mechanism increases expected costs, and each firm's aggregate defense always increases with the unit cost of cyber-attacks under sequential game as the hacker has an advantage of learning the firms' security decisions. These results provide fresh managerial guidelines to security experts of firms.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY
(2023)
Article
Computer Science, Interdisciplinary Applications
Hwee-Chin Tan, Keng Lin Soh, Wai Peng Wong, Ming-Lang Tseng
Summary: This empirical study demonstrated the mitigating effects of organizational ethical climate and information security culture on information leakage, and the impact of information sharing effectiveness on supply chain resilience. The findings indicated that information security culture can reduce the impact of information leakage, while organizational ethical climate cannot.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
(2022)
Article
Computer Science, Information Systems
Fredrik Karlsson, Ella Kolkowska, Johan Petersson
Summary: There is a risk of noncompliance with information security policies when end users have to prioritize between different rationalities in organizations. The purpose of this paper is to elicit a set of requirements for computerized software that support analysis of competing rationalities in relation to end users' compliance and non-compliance with information security policies.
COMPUTERS & SECURITY
(2022)
Article
Computer Science, Information Systems
Shwadhin Sharma, Eduardo Aparicio
Summary: The rapid development of technology and information systems has led to an increase in information security related issues in organizations. The age of remote working has further heightened the need to address these incidents. This study examines the impact of organizational culture and team culture on employees' perceived threats and coping motivation in relation to information security compliance. The findings suggest that both organization and team culture influence employees' perception of threats and motivation to comply with information security policies.
COMPUTERS & SECURITY
(2022)
Article
Environmental Sciences
Dirk J. Roux, Peter Novellie, Izak P. J. Smit, Joop de Kraker, Samantha Mc Culloch-Jones, Luthando E. Dziba, Stefanie Freitag, Danie J. Pienaar
Summary: Adaptive management is a systematic approach that combines learning with implementation to facilitate continuous improvement in natural resource management. Learning from experience and adapting subsequent policies, strategies, and actions is appealing, but obstacles such as lack of documented lessons and insufficient attention to the social aspects of learning hinder its application.
JOURNAL OF ENVIRONMENTAL MANAGEMENT
(2022)
Article
Hospitality, Leisure, Sport & Tourism
SangGon (Edward) Lim, Chihyung Michael Ok
Summary: This study examines the importance of knowledge sharing in gaining competitive advantage within hospitality organizations, proposing an integrative framework based on meta-analytic examinations. The research comprehensively investigates the relationships of knowledge sharing with its antecedents and consequences, conducting full-information meta-analytic structural equation modeling to examine causality and moderating roles. Findings from robust meta-analytic procedures provide advanced understanding of the nomological network of knowledge sharing in the hospitality organizational context.
INTERNATIONAL JOURNAL OF HOSPITALITY MANAGEMENT
(2021)
Article
Information Science & Library Science
Ashari Halisah, Sharmila Jayasingam, Thurasamy Ramayah, Simona Popa
Summary: The study found that performance climate moderates the effect of knowledge sharing culture on employees' knowledge sharing intention, emphasizing the importance of goal congruence to minimize social dilemmas in knowledge sharing.
JOURNAL OF KNOWLEDGE MANAGEMENT
(2021)
Article
Computer Science, Information Systems
Akshay Aggarwal, Ram Kumar Dhurkari
Summary: Stress plays a critical role in ISP compliance behavior, but there is inconsistency in the association between stress and compliance. Factors such as age, country, and respondent category influence this association. This has valuable implications for managers and is relevant to the COVID-19 pandemic.
COMPUTERS & SECURITY
(2023)
Article
Computer Science, Artificial Intelligence
Xing Gao, Siyu Gong, Ying Wang, Xifan Wang, Manting Qiu
Summary: This paper examines the strategic interaction between firms and hackers in a resource sharing environment and finds that stricter security standards should be formulated from a socially optimal standpoint. It also suggests that compensation mechanisms may harm each firm.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Abdullah Ibrahim Alkraiji, Uchitha Jayawickrama, Femi Olan, Md Asaduzzaman, Maduka Subasinghage, Samanthika Gallage
Summary: This paper aims to explore the Key Influencing Factors (KIFs) during pre-implementation and implementation of ERP projects from the perspective of national ERP vendors. A mixed methods study was conducted on 10 national ERP vendors involved in government sector projects in Saudi Arabia. The prioritisation of KIFs revealed the most important factors to be ERP capabilities and stakeholder managers.
ENTERPRISE INFORMATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Florie Bandara, Uchitha Jayawickrama, Maduka Subasinghage, Femi Olan, Hawazen Alamoudi, Majed Alharthi
Summary: Organizations are integrating big data technologies with ERP systems to enhance ERP responsiveness. However, managing the integration between ERP systems and big data technologies is a challenge, leading to a lack of ERP responsiveness. This study examines the factors impacting ERP responsiveness with a focus on big data technologies. The results identify 12 factors and their relationships that impact ERP responsiveness, offering practical implications for ERP and big data management practice.
INFORMATION SYSTEMS FRONTIERS
(2023)
Article
Computer Science, Information Systems
Subasinghage Maduka Nuwangi, Darshana Sedera, Shirish C. Srivastava
Summary: This study examines the control mechanisms for managing modularized ISD projects, uncovering the influence of intra-project modular dependencies on the choice of control mechanisms. Results show that in scenarios with low-level dependencies, formal outcome and formal behavior control mechanisms are preferred, while flexible project practices and volatile client requirements may reduce the reliance on formal controls. Additionally, the level of informal clan control is influenced by the level of interdependencies between intra-project modules.
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS
(2021)
Article
Computer Science, Information Systems
Subasinghage Maduka Nuwangi, Darshana Sedera
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS
(2020)
Article
Information Science & Library Science
Robert Ogulin, Gustavo Guzman, Subasinghage Maduka Nuwangi
JOURNAL OF KNOWLEDGE MANAGEMENT
(2020)
Article
Computer Science, Information Systems
Karen Renaud, Merrill Warkentin, Ganna Pogrebna, Karl van der Schyff
Summary: Insider threats can cause significant damage due to insiders' access and trust. To mitigate these threats, organizations must understand different types of insider threats and employ tailored measures.
INFORMATION & MANAGEMENT
(2024)
Article
Computer Science, Information Systems
Quirin Demlehner, Sven Laumer
Summary: This article discusses the challenges brought by the rapid development of artificial intelligence in the adoption of technology at an individual level. It focuses on the role of biases and examines their impact on user decision making. Through a case study of three German car manufacturers, the article highlights the importance of the pre-announcement phase in information systems adoption and provides a comprehensive analysis of biases caused by individuals' cognitive limitations. It also reveals a notable spillover effect of users' experiences and opinions on AI from their personal lives to their professional lives, which contradicts previous findings in IS research.
INFORMATION & MANAGEMENT
(2024)
Article
Computer Science, Information Systems
Xinyu Sun, Yan Zhang, Juan Feng
Summary: This study investigates the impact of online information on brand reputation and brand premium in the online market. The findings suggest that the presence of online information may change the situation of brand premium, and firms with lower reputation can potentially earn higher profits under certain conditions. Additionally, as the gap in brand reputation increases, the profits of both firms may also increase, leading to a win-win situation in brand competition.
INFORMATION & MANAGEMENT
(2024)