Search results

1 – 10 of 10
Article
Publication date: 11 October 2024

Rosalind Searle, Karen V. Renaud and Lisa van der Werff

Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and…

Abstract

Purpose

Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and under-examined context and dynamic space within which to examine trust. In this paper, we address this deficit.

Design/methodology/approach

Drawing on pertinent theory and reports of empirical studies, we outline the basis of two alternative subsequent trajectories, drawing out the relationships between trust, vulnerability and emotion, both positive and negative, in the aftermath of an adverse cyber event.

Findings

We combine stage theory and social information processing theories to delineate the dynamics of trust processes and their multilevel trajectories during adverse cyber event aftermaths. We consider two response trajectories to chart the way vulnerability arises at different levels within these social systems to create self-reinforcing trust and distrust spirals. These ripple out to impact multiple levels of the organisation by either amplifying or relieving vulnerability.

Research limitations/implications

The way adverse cyber events aftermaths are managed has immediate and long-term consequences for organisational stakeholders. Actions impact resilience and the ability to preserve the social fabric of the organisations. Subsequent trajectories can be “negative” or “positive”. The “negative” trajectory is characterised by efforts to identify and punish the employee whose actions facilitated the adverse events, i.e. the “who”. Public scapegoating might follow thereby amplifying perceived vulnerability and reducing trust across the board. By contrast, the “positive” trajectory relieves perceived vulnerability by focusing on, and correcting, situational causatives. Here, the focus is on the “what” and “why” of the event.

Practical implications

We raise the importance of responding in a constructive way to adverse cyber events.

Originality/value

The aftermaths of cyber attacks in organisations are a critical, neglected context. We explore the interplay between trust and vulnerability and its implications for management “best practice”.

Details

Journal of Intellectual Capital, vol. 25 no. 5/6
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 5 November 2024

Marc Dupuis, Rosalind Searle and Karen V. Renaud

The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in…

Abstract

Purpose

The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in organizational settings; consequences could be significant and costly. Increasingly, the cause may be a cybersecurity exploit, such as a well-targeted phishing email. In the aftermath, line managers have a choice in responding to the individual who caused the incident. Negative emotions, such as shame and regret, may deliberately be weaponized. Alternatively, positive emotions, such as grace, forgiveness and mercy, may come into play.

Design/methodology/approach

We detail a study with 60 participants to explore attribution differences in response to adverse incidents, both non-cybersecurity and cybersecurity. We examined the stages that occur in the aftermath of such adverse incidents where grace may be observed.

Findings

Our participants generally believed that grace was indicated toward those who triggered an adverse cybersecurity incident, pointing to situational causes. This was in stark contrast to their responses to the non-cybersecurity incident, where the individual was often blamed, with punishment being advocated.

Research limitations/implications

The role of positive emotions merits investigation in the cybersecurity context if we are to understand how best to manage the aftermaths of adverse cybersecurity incidents.

Practical implications

Organizations that mismanage aftermaths of adverse incidents by blaming, shaming and punishing those who make mistakes will harm the individual who made the mistake, other employees and the long-term health of their organization in the long run.

Originality/value

To the best of the authors’ knowledge, this is the first study to reveal the grace phenomenon in the cybersecurity context.

Details

Journal of Intellectual Capital, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1469-1930

Keywords

Book part
Publication date: 18 November 2024

Astha Jaiswal and Dinesh Kumar

This chapter overviews and briefly presents the literature concerning women and science from the field of feminist science studies (FSS). A major and time-consuming challenge…

Abstract

This chapter overviews and briefly presents the literature concerning women and science from the field of feminist science studies (FSS). A major and time-consuming challenge encountered during the process of this review was organising the highly varied subtopics into meaningful categories. For the sake of easy understanding, we begin the study by describing the field of science and technology study (STS) and then we move on to discuss the origin of FSS and major strands of intersection between science and feminist epistemology.

Details

Social Responsibility, Technology and AI
Type: Book
ISBN: 978-1-83608-496-9

Keywords

Content available
Book part
Publication date: 14 December 2023

Abstract

Details

Childhood, Youth and Activism: Demands for Rights and Justice from Young People and their Advocates
Type: Book
ISBN: 978-1-80117-469-5

Book part
Publication date: 27 November 2024

Juliana Alcantara

This chapter discusses the control of women's bodies and minds through the daily practices of menstrual control apps. Based on Michel Foucault's concepts (2003, 2006, 2013), the…

Abstract

This chapter discusses the control of women's bodies and minds through the daily practices of menstrual control apps. Based on Michel Foucault's concepts (2003, 2006, 2013), the research is based on women's relationship with their own bodies. Still, it is wider than the body per se since the central theme is the construction of subjectivities. This paper embraces power modalities and explores disciplinary and discursive practices and regimes of truth, biopower, biopolitics and governance. The paper frames the fundamental points of Michel Foucault's analysis of power and how they are associated with strategies used for menstrual tracking apps. It looks at how apps act on the subjectivity of being a woman, shaping ways of thinking and acting. It looks at how disciplinary practices, knowledge–power and surveillance, as Foucault tells us, relate to themselves and medicine. The text highlights that monitoring data and corporate surveillance by menstrual apps poses unprecedented challenges to feminist politics. Therefore, we argue that the technology of menstrual tracking apps acts subtly and uninterruptedly to docilise female bodies and make them useful. Trying to find new paths and solutions from a feminist and critical perspective, we offer suggestions for further research on the topic, disregarding liberal approaches which rely on media literacy exclusively rather than a holistic comprehension of technology and women's rights.

Details

Young Adulthood Across Digital Platforms
Type: Book
ISBN: 978-1-83753-525-5

Keywords

Content available
Book part
Publication date: 21 August 2024

Abstract

Details

The BERA Guide to Mental Health and Wellbeing in Schools: Exploring Frontline Support in Educational Research and Practice
Type: Book
ISBN: 978-1-83797-245-6

Article
Publication date: 18 June 2024

Kirti Sood and Simarjeet Singh

The present study aims to systematically synthesize the academic and industrial literature on multi-central bank digital currencies (m-CBDCs) arrangements.

Abstract

Purpose

The present study aims to systematically synthesize the academic and industrial literature on multi-central bank digital currencies (m-CBDCs) arrangements.

Design/methodology/approach

The study adopted a unique multivocal literature review methodology that considers both white and grey literature. For white literature searches, the study relied on Scopus, Web of Science (WOS), and Google Scholar bibliometric databases; for grey literature searches, the study used the Google search engine.

Findings

The findings of the study illustrated that M-CBDC arrangements, through various design options, have the potential to revolutionize the contemporary international payment system. M-CBDC arrangements will lead to more integrated financial systems and promote economic growth. However, m-CBDC arrangements will also have serious macroeconomic implications, such as contagion and currency substitution risks.

Research limitations/implications

The present review is one of the earliest reviews of m-CBDC arrangements. In addition, the findings of the study offer valuable insights for both academicians and policymakers.

Originality/value

The study is also one of the pioneer studies in management studies that apply a multivocal literature review methodology.

Article
Publication date: 30 May 2023

Mahdi Salehi, Raha Rajaeei, Ehsan Khansalar and Samane Edalati Shakib

This paper aims to determine whether there is a relationship between intellectual capital and social capital and internal control weaknesses and assess the relationship between…

Abstract

Purpose

This paper aims to determine whether there is a relationship between intellectual capital and social capital and internal control weaknesses and assess the relationship between the variables of intellectual capital and social capital and internal control weaknesses.

Design/methodology/approach

The statistical population consists of 1,309 firm-year observations from 2014 to 2020. The research hypothesis is tested using statistical methods, including multivariate, least-squares and fixed-effects regression.

Findings

The results demonstrate a negative and significant relationship between intellectual capital, social capital and internal control weaknesses. The study also finds that increased intellectual and social capital quality improves human resource utilization, control mechanism, creativity and firm performance. The results also show that intellectual capital and social capital enhancement will reduce internal control weaknesses in the upcoming years.

Originality/value

This paper is the pioneer study on the relationship between intellectual capital and social capital and internal control weaknesses in Iran, carried out separately and in exploratory factor analysis. This paper considers intellectual capital components for theoretical factor analysis, including human capital, structural capital and customer capital. Internal control weakness is assessed based on financial, non-financial and information technology (IT) weaknesses.

Details

Journal of Islamic Accounting and Business Research, vol. 15 no. 5
Type: Research Article
ISSN: 1759-0817

Keywords

Article
Publication date: 19 March 2024

Lipsa Jena, Subash Chandra Pattnaik and Rashmita Sahoo

The present study purports to unravel the mechanism in relationship among leadership behaviour integrity, organisational career development and employee engagement. Further, it…

Abstract

Purpose

The present study purports to unravel the mechanism in relationship among leadership behaviour integrity, organisational career development and employee engagement. Further, it also aims to understand if the employee feedback self-efficacy has any moderating influence on the relationship between leader behavioural integrity and organisational career development.

Design/methodology/approach

Pre-existing questionnaires are used for collecting data from a total of 417 employees working in the information technology industry operating within India. Analysis of the data is done using structural equation modelling technique.

Findings

Results of the study show that organisational career development partially mediates the relationship between leadership behavioural integrity and employee engagement. It is also found that feedback self-efficacy plays a moderating role in the relationship between leadership behavioural integrity and organisational career development.

Originality/value

The study helps to understand the mechanism of the relationship between leadership behavioural integrity and employee engagement through organisational career development with the support of ethical theory and social exchange theory. It also shows the moderating role played by feedback self-efficacy in the relationship between leadership behavioural integrity and organisational career development using social learning perspective.

Details

Asia-Pacific Journal of Business Administration, vol. 16 no. 5
Type: Research Article
ISSN: 1757-4323

Keywords

Article
Publication date: 23 September 2024

Somipam R. Shimray and Prosperous Nongsiej

The purpose of this study is to examine the “Top 100” articles that received the highest online attention in 2023.

Abstract

Purpose

The purpose of this study is to examine the “Top 100” articles that received the highest online attention in 2023.

Design/methodology/approach

The author examined data obtained from the Dimensions database. They determined the top 100 articles with the highest Altmetric Attention Score published in 2023 using the Dimensions database. The search was done on December 31, 2023, and the publication type was limited to articles. Furthermore, articles were analyzed to identify online attention platforms, subject categories, publication sources, access types and authorship patterns. The data were organized in Microsoft Excel for eventual examination.

Findings

The most discoursed article in 2023 has an Article Attention Score of 26156. The “Top 100 List” is dominated by COVID-19-related studies. X (249,064), Mendeley (2,445) and News (1,977) are the most prominent sharing and discussion platforms. There is an unequal distribution of articles in 28 subject categories. The top 100 articles were published in 67 journals. The majority of articles are accessible under the open-access model. The top 100 articles are written by 1,323 authors, with an authorship range of 1 to 308. The majority of articles are the result of collaborative work, and the correlation analysis between citations and AAS indicates a weak positive correlation possibly because of different factors influencing each metric and their methods of measuring scholarly impact.

Originality/value

To the best of the authors’ knowledge, this study is the first to present online attention to academic articles published in 2023. This study examines the effect of online attention platforms on research, which may be used as a measure of research outcome.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of 10