Search results
1 – 5 of 5Rosalind Searle, Karen V. Renaud and Lisa van der Werff
Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and…
Abstract
Purpose
Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and under-examined context and dynamic space within which to examine trust. In this paper, we address this deficit.
Design/methodology/approach
Drawing on pertinent theory and reports of empirical studies, we outline the basis of two alternative subsequent trajectories, drawing out the relationships between trust, vulnerability and emotion, both positive and negative, in the aftermath of an adverse cyber event.
Findings
We combine stage theory and social information processing theories to delineate the dynamics of trust processes and their multilevel trajectories during adverse cyber event aftermaths. We consider two response trajectories to chart the way vulnerability arises at different levels within these social systems to create self-reinforcing trust and distrust spirals. These ripple out to impact multiple levels of the organisation by either amplifying or relieving vulnerability.
Research limitations/implications
The way adverse cyber events aftermaths are managed has immediate and long-term consequences for organisational stakeholders. Actions impact resilience and the ability to preserve the social fabric of the organisations. Subsequent trajectories can be “negative” or “positive”. The “negative” trajectory is characterised by efforts to identify and punish the employee whose actions facilitated the adverse events, i.e. the “who”. Public scapegoating might follow thereby amplifying perceived vulnerability and reducing trust across the board. By contrast, the “positive” trajectory relieves perceived vulnerability by focusing on, and correcting, situational causatives. Here, the focus is on the “what” and “why” of the event.
Practical implications
We raise the importance of responding in a constructive way to adverse cyber events.
Originality/value
The aftermaths of cyber attacks in organisations are a critical, neglected context. We explore the interplay between trust and vulnerability and its implications for management “best practice”.
Details
Keywords
Marc Dupuis, Rosalind Searle and Karen V. Renaud
The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in…
Abstract
Purpose
The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in organizational settings; consequences could be significant and costly. Increasingly, the cause may be a cybersecurity exploit, such as a well-targeted phishing email. In the aftermath, line managers have a choice in responding to the individual who caused the incident. Negative emotions, such as shame and regret, may deliberately be weaponized. Alternatively, positive emotions, such as grace, forgiveness and mercy, may come into play.
Design/methodology/approach
We detail a study with 60 participants to explore attribution differences in response to adverse incidents, both non-cybersecurity and cybersecurity. We examined the stages that occur in the aftermath of such adverse incidents where grace may be observed.
Findings
Our participants generally believed that grace was indicated toward those who triggered an adverse cybersecurity incident, pointing to situational causes. This was in stark contrast to their responses to the non-cybersecurity incident, where the individual was often blamed, with punishment being advocated.
Research limitations/implications
The role of positive emotions merits investigation in the cybersecurity context if we are to understand how best to manage the aftermaths of adverse cybersecurity incidents.
Practical implications
Organizations that mismanage aftermaths of adverse incidents by blaming, shaming and punishing those who make mistakes will harm the individual who made the mistake, other employees and the long-term health of their organization in the long run.
Originality/value
To the best of the authors’ knowledge, this is the first study to reveal the grace phenomenon in the cybersecurity context.
Details
Keywords
Astha Jaiswal and Dinesh Kumar
This chapter overviews and briefly presents the literature concerning women and science from the field of feminist science studies (FSS). A major and time-consuming challenge…
Abstract
This chapter overviews and briefly presents the literature concerning women and science from the field of feminist science studies (FSS). A major and time-consuming challenge encountered during the process of this review was organising the highly varied subtopics into meaningful categories. For the sake of easy understanding, we begin the study by describing the field of science and technology study (STS) and then we move on to discuss the origin of FSS and major strands of intersection between science and feminist epistemology.
Details
Keywords
Abstract
This chapter discusses the control of women's bodies and minds through the daily practices of menstrual control apps. Based on Michel Foucault's concepts (2003, 2006, 2013), the research is based on women's relationship with their own bodies. Still, it is wider than the body per se since the central theme is the construction of subjectivities. This paper embraces power modalities and explores disciplinary and discursive practices and regimes of truth, biopower, biopolitics and governance. The paper frames the fundamental points of Michel Foucault's analysis of power and how they are associated with strategies used for menstrual tracking apps. It looks at how apps act on the subjectivity of being a woman, shaping ways of thinking and acting. It looks at how disciplinary practices, knowledge–power and surveillance, as Foucault tells us, relate to themselves and medicine. The text highlights that monitoring data and corporate surveillance by menstrual apps poses unprecedented challenges to feminist politics. Therefore, we argue that the technology of menstrual tracking apps acts subtly and uninterruptedly to docilise female bodies and make them useful. Trying to find new paths and solutions from a feminist and critical perspective, we offer suggestions for further research on the topic, disregarding liberal approaches which rely on media literacy exclusively rather than a holistic comprehension of technology and women's rights.
Details
Keywords
Lipsa Jena, Subash Chandra Pattnaik and Rashmita Sahoo
The present study purports to unravel the mechanism in relationship among leadership behaviour integrity, organisational career development and employee engagement. Further, it…
Abstract
Purpose
The present study purports to unravel the mechanism in relationship among leadership behaviour integrity, organisational career development and employee engagement. Further, it also aims to understand if the employee feedback self-efficacy has any moderating influence on the relationship between leader behavioural integrity and organisational career development.
Design/methodology/approach
Pre-existing questionnaires are used for collecting data from a total of 417 employees working in the information technology industry operating within India. Analysis of the data is done using structural equation modelling technique.
Findings
Results of the study show that organisational career development partially mediates the relationship between leadership behavioural integrity and employee engagement. It is also found that feedback self-efficacy plays a moderating role in the relationship between leadership behavioural integrity and organisational career development.
Originality/value
The study helps to understand the mechanism of the relationship between leadership behavioural integrity and employee engagement through organisational career development with the support of ethical theory and social exchange theory. It also shows the moderating role played by feedback self-efficacy in the relationship between leadership behavioural integrity and organisational career development using social learning perspective.
Details