Search results

1 – 10 of 10
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 19 January 2010

Jan Nolin and Fredrik Åström

LIS has been described as a fragmented field in crisis, with an increased competition from other fields; and lacking in development of theories. The purpose of this paper is to…

5682

Abstract

Purpose

LIS has been described as a fragmented field in crisis, with an increased competition from other fields; and lacking in development of theories. The purpose of this paper is to articulate a strategy in which the perceived weakness can be seen as a source of strength.

Design/methodology/approach

The text builds mostly on reflections on meta‐theoretical and science‐organisation literature. Ten distinct problems for the research field are identified and discussed in order to provide a viable strategy for the future.

Findings

While it is common to suggest a convergent movement toward the idealised characteristics of the strong research discipline as a recipe against fragmentation, a strong convergent movement is suggested that feeds off the fragmented character of the field. What is commonly perceived as a weakness, the multidimensional character of the field, can be translated into a strategic resource.

Originality/value

The paper provides a fresh perspective on the strategic situation of LIS.

Details

Journal of Documentation, vol. 66 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Access Restricted. View access options
Article
Publication date: 5 September 2008

Fredrik Åström

The paper's objective is to analyze the social organization of library and information Science (LIS) using the Nordic countries as example, focusing on organizational setting…

1174

Abstract

Purpose

The paper's objective is to analyze the social organization of library and information Science (LIS) using the Nordic countries as example, focusing on organizational setting, research work and relations between LIS and academia as well as the field of professional practice.

Design/methodology/approach

Based on a framework for analyzing scientific fields, as well as its application on LIS, aspects relating to the impact of contextual factors on research was identified and discussed based on information from, e.g. LIS institution web sites. The results were discussed, not only in relation to the framework primarily utilized, but also from a less disciplinary view on research organization, for analytical contrast.

Findings

A close connection between academic affiliation and research orientation was found, reflected in organizational issues, media for communicating research and access to resources. This relates to general issues of levels of independence from other disciplines and lay groups, to what extent research is evaluated by intra‐disciplinary standards and to the level of consensus on terminology and research processes.

Research limitations/implications

Limiting the study to institutions in one particular geographical area, where several institutions being at an early stage of formalization, the possibility of reaching generalizable conclusions is limited. The strength of the conclusions is also somewhat restrained due to the nature of the empirical material, being based on web documents with varying levels of exhaustability in terms of data provision.

Originality/value

The intellectual organization of LIS research is well‐known, whereas social and institutional aspects have been analyzed to a lesser degree; and with the differences in age and size of Nordic LIS institutions, they provide an interesting case of contemporary institutionalization of LIS research.

Details

Journal of Documentation, vol. 64 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Access Restricted. View access options
Article
Publication date: 28 October 2013

Laura Bowering Mullen

– The purpose of this article is to report on sessions presented at QQML 2013.

473

Abstract

Purpose

The purpose of this article is to report on sessions presented at QQML 2013.

Design/methodology/approach

The approach is an informal review of sessions attended.

Findings

This conference report includes the author's brief notes after attending various sessions.

Originality/value

This is an original conference report written after attendance at QQML.

Details

Library Hi Tech News, vol. 30 no. 9
Type: Research Article
ISSN: 0741-9058

Keywords

Available. Open Access. Open Access
Article
Publication date: 21 December 2021

Martin Karlsson, Fredrik Karlsson, Joachim Åström and Thomas Denk

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

5350

Abstract

Purpose

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

Design/methodology/approach

The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (n = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.

Findings

The results indicate that organizational cultures with an internal focus are positively related to employees’ information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees’ information security policy compliance.

Research limitations/implications

The results suggest that differences in organizational culture are important for employees’ information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.

Practical implications

Practitioners should be aware that the different organizational cultures do matter for employees’ information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.

Originality/value

Few information security policy compliance studies exist on the consequences of different organizational/information cultures.

Access Restricted. View access options
Article
Publication date: 10 July 2017

Fredrik Karlsson, Martin Karlsson and Joachim Åström

This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic…

976

Abstract

Purpose

This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic measure, which introduces the idea of competing organisational imperatives.

Design/methodology/approach

A survey was developed using two sets of items to measure compliance. The survey was sent to 600 white-collar workers and analysed through ordinary least squares.

Findings

The results suggest that when using the value-monistic measure, employees’ compliance was a function of employees’ intentions to comply, their self-efficacy and awareness of information security policies. In addition, compliance was not related to the occurrence of conflicts between information security and other organisational imperatives. However, when the dependent variable was changed to a value-pluralistic measure, the results suggest that employees’ compliance was, to a great extent, a function of the occurrence of conflicts between information security and other organisational imperatives, indirect conflicts with other organisational values.

Research limitations/implications

The results are based on small survey; yet, the findings are interesting and justify further investigation. The results suggest that relevant organisational imperatives and value systems, along with information security values, should be included in measures for employees’ compliance with information security policies.

Practical implications

Practitioners and researchers should be aware that there is a difference in measuring employees’ compliance using value monistic and value pluralism measurements.

Originality/value

Few studies exist that critically compare the two different compliance measures for the same population.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 13 July 2015

Fredrik Karlsson, Joachim Åström and Martin Karlsson

The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge…

1947

Abstract

Purpose

The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.

Design/methodology/approach

Results are based on a literature review of information security culture research published between 2000 and 2013 (December).

Findings

This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.

Research limitations/implications

Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.

Practical implications

Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.

Originality/value

Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.

Access Restricted. View access options
Article
Publication date: 2 April 2019

Helena Francke

The activities of academic researchers are increasingly regulated by neo-liberal ideals, including expectations that researchers are visible online and actively promote their…

452

Abstract

Purpose

The activities of academic researchers are increasingly regulated by neo-liberal ideals, including expectations that researchers are visible online and actively promote their output. The purpose of this paper is to explore how researchers take on this responsibility. It uses the concepts of genre, authorship and self-writing in order to understand how the story of an academic life is constructed on academic web profiles.

Design/methodology/approach

A qualitative content analysis was conducted of material on 64 profiles belonging to 20 researchers on institutional and personal websites, as well as on ResearchGate, Academica.edu and Google Scholar.

Findings

The study shows that while institutional websites primarily contain researcher-produced material, content on commercial platforms is often co-constructed through distributed authorship by the researcher, the platform and other platform users. Nine different ways in which the profile of an “academic self” may be said to highlight the particular strengths of a researcher are identified. These include both metrics-based strengths and qualitative forms of information about the academic life, such as experience, the importance of their research and good teaching.

Social implications

This study of academic web profiles contributes to a better understanding of how researchers self-govern the story of their academic self, or resist such governance, in online environments.

Originality/value

The study furthers the knowledge of how researchers make use of and respond to digital tools for online visibility opportunities and how the story of the “academic self” is “made” for such public presentation.

Details

Online Information Review, vol. 43 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Available. Content available
Article
Publication date: 11 June 2018

Fredrik Karlsson, Ella Kolkowska and Marianne Törner

456

Abstract

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Available. Open Access. Open Access
Article
Publication date: 8 January 2020

Elham Rostami, Fredrik Karlsson and Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…

1722

Abstract

Purpose

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.

Design/methodology/approach

The results are based on a literature review of ISP management research published between 1990 and 2017.

Findings

Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.

Research limitations/implications

Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.

Practical implications

The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.

Originality/value

Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Book part
Publication date: 3 June 2024

Giovanni Amerigo Giuliani

Abstract

Details

The Mainstream Right and Family Policy Agendas in the Post-Fordist Age
Type: Book
ISBN: 978-1-83797-922-6

1 – 10 of 10
Per page
102050