Search results
1 – 4 of 4Malcolm Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac and Marcus Butavicius
The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how…
Abstract
Purpose
The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings.
Design/methodology/approach
This study was a scenario‐based role‐play experiment that involved the development of a web‐based questionnaire that was only accessible by invited participants when they attended a one‐hour, facilitated session in a computer laboratory.
Findings
The findings indicate that overall, genuine e‐mails were managed better than phishing e‐mails. However, informed participants managed phishing e‐mails better than not‐informed participants. Other findings show how familiarity with computers, cognitive impulsivity and personality traits affect behavioural responses to both types of e‐mail.
Research limitations/implications
This study does not claim to evaluate actual susceptibility to phishing emails. The subjects were University students and therefore the conclusions are not necessarily representative of the general population of e‐mail users.
Practical implications
The outcomes of this research would assist management in their endeavours to improve computer user behaviour and, as a result, help to mitigate risks to their organisational information systems.
Originality/value
The literature review indicates that this paper addresses a genuine gap in the research.
Details
Keywords
Indrit Troshani, Cate Jerram and Sally Rao Hill
Human resources information systems (HRIS) are becoming increasingly important in helping modern organizations manage their human assets effectively. Yet, HRIS adoption remains an…
Abstract
Purpose
Human resources information systems (HRIS) are becoming increasingly important in helping modern organizations manage their human assets effectively. Yet, HRIS adoption remains an under‐researched phenomenon. The purpose of this paper to isolate the factors that influence the organizational adoption of HRIS in public sector organizations.
Design/methodology/approach
Adopting the technology‐organization‐environment model as an analytical framework, the paper draws on qualitative evidence from 16 interviews across 11 Australian public sector organizations.
Findings
The authors find that champions in public sector organizations should demonstrate HRIS benefits before their adoption can succeed. With standardization trends adopted by HRIS vendors, complete organizational fit between adopted HRIS and business processes may be elusive for adopters suggesting that post‐adoption vendor support must be negotiated if costly customizations are to be minimized. In addition to various organizational factors, including management commitment and human capability, the authors also find that broader environmental factors including regulatory compliance can have a deep impact on the success of HRIS adoption by creating urgency in adoption intentions.
Originality/value
There is paucity of research concerning HRIS adoption in the public sector which presents unique challenges due to its idiosyncrasies. This paper contributes to the existing body knowledge by investigating the role of technological, organizational, and environmental factors and their interactions. It provides an improved understanding of the challenges related to HRIS adoption in public sector organizations.
Details
Keywords
Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius and Cate Jerram
– The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations.
Abstract
Purpose
The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations.
Design/methodology/approach
A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus areas. It was completed by 203 participants across the three organisations. This was complemented by interviews with senior management from these agencies.
Findings
Overall, management and employees had reasonable levels of InfoSec awareness. However, weaknesses were identified in the use of wireless technology, the reporting of security incidents and the use of social networking sites. These weaknesses were identified in the survey data of the employees and corroborated in the management interviews.
Research limitations/implications
As with all such surveys, responses to the questions on attitude and behaviour (but not knowledge) may have been influenced by the social desirability bias. Further research should establish more extensive baseline data for the survey and examine its effectiveness in assessing the impact of training and risk communication interventions.
Originality/value
A new survey tool is presented and tested which is of interest to academics as well as management and IT systems (security) auditors.
Details
Keywords
On the other hand the people of Canada have lived essentially on the same type of diet as that employed in the northern United States. It includes all the products of field and…
Abstract
On the other hand the people of Canada have lived essentially on the same type of diet as that employed in the northern United States. It includes all the products of field and garden with which we are familiar, together with meats in liberal amounts and dairy products in moderate quantities. The latter is the kind of diet which supports the civilization of England, and also the most progressive European countries as well as that of the northern United States and all other parts of the world which have been peopled by colonization from European stock, wherever the climate will permit.