Search results
1 – 9 of 9Rosalind Searle, Karen V. Renaud and Lisa van der Werff
Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and…
Abstract
Purpose
Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and under-examined context and dynamic space within which to examine trust. In this paper, we address this deficit.
Design/methodology/approach
Drawing on pertinent theory and reports of empirical studies, we outline the basis of two alternative subsequent trajectories, drawing out the relationships between trust, vulnerability and emotion, both positive and negative, in the aftermath of an adverse cyber event.
Findings
We combine stage theory and social information processing theories to delineate the dynamics of trust processes and their multilevel trajectories during adverse cyber event aftermaths. We consider two response trajectories to chart the way vulnerability arises at different levels within these social systems to create self-reinforcing trust and distrust spirals. These ripple out to impact multiple levels of the organisation by either amplifying or relieving vulnerability.
Research limitations/implications
The way adverse cyber events aftermaths are managed has immediate and long-term consequences for organisational stakeholders. Actions impact resilience and the ability to preserve the social fabric of the organisations. Subsequent trajectories can be “negative” or “positive”. The “negative” trajectory is characterised by efforts to identify and punish the employee whose actions facilitated the adverse events, i.e. the “who”. Public scapegoating might follow thereby amplifying perceived vulnerability and reducing trust across the board. By contrast, the “positive” trajectory relieves perceived vulnerability by focusing on, and correcting, situational causatives. Here, the focus is on the “what” and “why” of the event.
Practical implications
We raise the importance of responding in a constructive way to adverse cyber events.
Originality/value
The aftermaths of cyber attacks in organisations are a critical, neglected context. We explore the interplay between trust and vulnerability and its implications for management “best practice”.
Details
Keywords
Marc Dupuis, Rosalind Searle and Karen V. Renaud
The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in…
Abstract
Purpose
The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in organizational settings; consequences could be significant and costly. Increasingly, the cause may be a cybersecurity exploit, such as a well-targeted phishing email. In the aftermath, line managers have a choice in responding to the individual who caused the incident. Negative emotions, such as shame and regret, may deliberately be weaponized. Alternatively, positive emotions, such as grace, forgiveness and mercy, may come into play.
Design/methodology/approach
We detail a study with 60 participants to explore attribution differences in response to adverse incidents, both non-cybersecurity and cybersecurity. We examined the stages that occur in the aftermath of such adverse incidents where grace may be observed.
Findings
Our participants generally believed that grace was indicated toward those who triggered an adverse cybersecurity incident, pointing to situational causes. This was in stark contrast to their responses to the non-cybersecurity incident, where the individual was often blamed, with punishment being advocated.
Research limitations/implications
The role of positive emotions merits investigation in the cybersecurity context if we are to understand how best to manage the aftermaths of adverse cybersecurity incidents.
Practical implications
Organizations that mismanage aftermaths of adverse incidents by blaming, shaming and punishing those who make mistakes will harm the individual who made the mistake, other employees and the long-term health of their organization in the long run.
Originality/value
To the best of the authors’ knowledge, this is the first study to reveal the grace phenomenon in the cybersecurity context.
Details
Keywords
Astha Jaiswal and Dinesh Kumar
This chapter overviews and briefly presents the literature concerning women and science from the field of feminist science studies (FSS). A major and time-consuming challenge…
Abstract
This chapter overviews and briefly presents the literature concerning women and science from the field of feminist science studies (FSS). A major and time-consuming challenge encountered during the process of this review was organising the highly varied subtopics into meaningful categories. For the sake of easy understanding, we begin the study by describing the field of science and technology study (STS) and then we move on to discuss the origin of FSS and major strands of intersection between science and feminist epistemology.
Details
Keywords
Abstract
This chapter discusses the control of women's bodies and minds through the daily practices of menstrual control apps. Based on Michel Foucault's concepts (2003, 2006, 2013), the research is based on women's relationship with their own bodies. Still, it is wider than the body per se since the central theme is the construction of subjectivities. This paper embraces power modalities and explores disciplinary and discursive practices and regimes of truth, biopower, biopolitics and governance. The paper frames the fundamental points of Michel Foucault's analysis of power and how they are associated with strategies used for menstrual tracking apps. It looks at how apps act on the subjectivity of being a woman, shaping ways of thinking and acting. It looks at how disciplinary practices, knowledge–power and surveillance, as Foucault tells us, relate to themselves and medicine. The text highlights that monitoring data and corporate surveillance by menstrual apps poses unprecedented challenges to feminist politics. Therefore, we argue that the technology of menstrual tracking apps acts subtly and uninterruptedly to docilise female bodies and make them useful. Trying to find new paths and solutions from a feminist and critical perspective, we offer suggestions for further research on the topic, disregarding liberal approaches which rely on media literacy exclusively rather than a holistic comprehension of technology and women's rights.
Details
Keywords
Kirti Sood and Simarjeet Singh
The present study aims to systematically synthesize the academic and industrial literature on multi-central bank digital currencies (m-CBDCs) arrangements.
Abstract
Purpose
The present study aims to systematically synthesize the academic and industrial literature on multi-central bank digital currencies (m-CBDCs) arrangements.
Design/methodology/approach
The study adopted a unique multivocal literature review methodology that considers both white and grey literature. For white literature searches, the study relied on Scopus, Web of Science (WOS), and Google Scholar bibliometric databases; for grey literature searches, the study used the Google search engine.
Findings
The findings of the study illustrated that M-CBDC arrangements, through various design options, have the potential to revolutionize the contemporary international payment system. M-CBDC arrangements will lead to more integrated financial systems and promote economic growth. However, m-CBDC arrangements will also have serious macroeconomic implications, such as contagion and currency substitution risks.
Research limitations/implications
The present review is one of the earliest reviews of m-CBDC arrangements. In addition, the findings of the study offer valuable insights for both academicians and policymakers.
Originality/value
The study is also one of the pioneer studies in management studies that apply a multivocal literature review methodology.
Details
Keywords
Mahdi Salehi, Raha Rajaeei, Ehsan Khansalar and Samane Edalati Shakib
This paper aims to determine whether there is a relationship between intellectual capital and social capital and internal control weaknesses and assess the relationship between…
Abstract
Purpose
This paper aims to determine whether there is a relationship between intellectual capital and social capital and internal control weaknesses and assess the relationship between the variables of intellectual capital and social capital and internal control weaknesses.
Design/methodology/approach
The statistical population consists of 1,309 firm-year observations from 2014 to 2020. The research hypothesis is tested using statistical methods, including multivariate, least-squares and fixed-effects regression.
Findings
The results demonstrate a negative and significant relationship between intellectual capital, social capital and internal control weaknesses. The study also finds that increased intellectual and social capital quality improves human resource utilization, control mechanism, creativity and firm performance. The results also show that intellectual capital and social capital enhancement will reduce internal control weaknesses in the upcoming years.
Originality/value
This paper is the pioneer study on the relationship between intellectual capital and social capital and internal control weaknesses in Iran, carried out separately and in exploratory factor analysis. This paper considers intellectual capital components for theoretical factor analysis, including human capital, structural capital and customer capital. Internal control weakness is assessed based on financial, non-financial and information technology (IT) weaknesses.
Details
Keywords
Lipsa Jena, Subash Chandra Pattnaik and Rashmita Sahoo
The present study purports to unravel the mechanism in relationship among leadership behaviour integrity, organisational career development and employee engagement. Further, it…
Abstract
Purpose
The present study purports to unravel the mechanism in relationship among leadership behaviour integrity, organisational career development and employee engagement. Further, it also aims to understand if the employee feedback self-efficacy has any moderating influence on the relationship between leader behavioural integrity and organisational career development.
Design/methodology/approach
Pre-existing questionnaires are used for collecting data from a total of 417 employees working in the information technology industry operating within India. Analysis of the data is done using structural equation modelling technique.
Findings
Results of the study show that organisational career development partially mediates the relationship between leadership behavioural integrity and employee engagement. It is also found that feedback self-efficacy plays a moderating role in the relationship between leadership behavioural integrity and organisational career development.
Originality/value
The study helps to understand the mechanism of the relationship between leadership behavioural integrity and employee engagement through organisational career development with the support of ethical theory and social exchange theory. It also shows the moderating role played by feedback self-efficacy in the relationship between leadership behavioural integrity and organisational career development using social learning perspective.
Details
Keywords
Somipam R. Shimray and Prosperous Nongsiej
The purpose of this study is to examine the “Top 100” articles that received the highest online attention in 2023.
Abstract
Purpose
The purpose of this study is to examine the “Top 100” articles that received the highest online attention in 2023.
Design/methodology/approach
The author examined data obtained from the Dimensions database. They determined the top 100 articles with the highest Altmetric Attention Score published in 2023 using the Dimensions database. The search was done on December 31, 2023, and the publication type was limited to articles. Furthermore, articles were analyzed to identify online attention platforms, subject categories, publication sources, access types and authorship patterns. The data were organized in Microsoft Excel for eventual examination.
Findings
The most discoursed article in 2023 has an Article Attention Score of 26156. The “Top 100 List” is dominated by COVID-19-related studies. X (249,064), Mendeley (2,445) and News (1,977) are the most prominent sharing and discussion platforms. There is an unequal distribution of articles in 28 subject categories. The top 100 articles were published in 67 journals. The majority of articles are accessible under the open-access model. The top 100 articles are written by 1,323 authors, with an authorship range of 1 to 308. The majority of articles are the result of collaborative work, and the correlation analysis between citations and AAS indicates a weak positive correlation possibly because of different factors influencing each metric and their methods of measuring scholarly impact.
Originality/value
To the best of the authors’ knowledge, this study is the first to present online attention to academic articles published in 2023. This study examines the effect of online attention platforms on research, which may be used as a measure of research outcome.
Details