Search results

1 – 2 of 2
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 16 May 2016

Branko Lobnikar, Kaja Prislan, Barbara Čuvan and Gorazd Meško

For some time now, research conducted in the field of human behavior and criminology has pertained to the contemporary question as to whether there are any relevant differences…

1134

Abstract

Purpose

For some time now, research conducted in the field of human behavior and criminology has pertained to the contemporary question as to whether there are any relevant differences between the genders regarding their integrity and opinions held and, if so, which of these lead to different behaviors. The purpose of this paper is to determine whether there are any gender differences in willingness to report police misconduct and if so, what is the nature of these differences.

Design/methodology/approach

In spring 2011, the study was conducted on a representative sample of 408 frontline Slovenian police officers (87.3 percent were male and 12.7 percent were female). The assessment of the code of silence was conducted using the method developed by Klockars and Kutnjak Ivković (2004), and consisted of 14 hypothetical scenarios describing a range of various forms of police misconduct, from those that merely give the appearance of a conflict of interest, to incidents of bribery and theft. One of the questions explored in relation to the police code of silence was the police officer’s willingness to report misconduct.

Findings

Authors discovered significant differences in 11 of the 14 analyzed cases on the willingness to report police misconduct. Interestingly, female police officers were less willing than their male colleagues to report different forms of police misconduct. Female police officers are less willing to report police corruption in seven cases e.g. shooting runaway suspect, supervisor abusing his/her power, excessive force – punching a suspect, falsification of evidence, supervisor not prevent beating a suspect, police officer take bribes, and doing nothing when juveniles paint graffiti. The results were further analyzed from the group dynamic in Slovenian police point of view. The survey findings could be useful for police chiefs, leaders, and managers who want to achieve the main objective of every modern police organization: to prevent corruption and increase social responsibility.

Originality/value

The study analyzes, comprehensively and originally, whether the female police officers differ from their male colleagues in the level of police integrity and willingness to report the cases of police corruption and/or other forms of police misbehavior.

Details

Policing: An International Journal of Police Strategies & Management, vol. 39 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Available. Open Access. Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

2182

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 2 of 2
Per page
102050