Search results

1 – 10 of 182
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 17 July 2023

Noman H. Chowdhury, Marc T.P. Adam and Timm Teubner

A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g…

283

Abstract

Purpose

A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g. best practices, guidelines and policies) intended to strengthen CS. The purpose of this paper is to provide an overview of how specifically time pressure is addressed by CS documents.

Design/methodology/approach

The authors conducted a systematic search for CS documents followed by a content analysis of the identified documents. First, the authors carried out a systematic Web search and identified 92 formal and informal CS documents (e.g. security policies, procedures, guidelines, manuals and best practices). Second, they systematically analyzed the resulting documents (n = 92), using a structured approach of data familiarization and low-/high-level coding for the identification and interpretation of themes. Based on this analysis, the authors formulated a conceptual framework that captures the sources and effects of time pressure along the themes of industry, operations and users.

Findings

The authors developed a conceptual framework that outlines the role of time pressure for the CS industry, threats and operations. This provides a shared frame of reference for researchers and practitioners to understand the antecedents and consequences of time pressure in the organizational CS context.

Research limitations/implications

While the analyzed documents acknowledge time pressure as an important factor for CS, the documents provide limited information on how to respond to these concerns. Future research could, hence, consult with CS experts and policymakers to inform the development of effective guidelines and policies on how to address time pressure in the identified areas. A dedicated analysis within each area will allow to investigate the corresponding aspects of time pressure in-depth along with a consideration for targeted guidelines and policies. Last, note that a differentiation between CS document types (e.g. formal vs informal and global vs regional) was beyond the scope of this paper and may be investigated by future work.

Originality/value

This study makes three main contributions to the CS literature. First, this study broadens the understanding of the role of time pressure in CS to consider the organizational perspective along the themes of industry, threats and operations. Second, this study provides the first comprehensive assessment of how organizations address time pressure through CS documents, and how this compares to existing research in academic literature. Third, by developing a conceptual framework, this study provides a shared frame of reference for researchers and practitioners to further develop CS documents that consider time pressure’s role in secure behavior.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 24 August 2010

W. David Holford

The purpose of this paper is to examine how knowledge is constructed and risk is induced within the workgroup environment of a large North American aerospace company.

702

Abstract

Purpose

The purpose of this paper is to examine how knowledge is constructed and risk is induced within the workgroup environment of a large North American aerospace company.

Design/methodology/approach

Based on an epistemological position on knowledge and risk, an initial conceptual framework is proposed. This is then evaluated and re‐constructed across a qualitative and ethnographic case study approach involving direct observations and interviews, whereby empirical results were interpreted and analysed across discourse analysis.

Findings

A dialogical model is proposed describing both verbal and non‐verbal interactions between group members leading towards knowledge complexification on the one hand and risk mitigation on the other hand. Factors leading towards dialogical breakdown and subsequent risk induction are also presented.

Research limitations/implications

This single case study prevents generalizing the findings across the entire firm in question, and by extension any manner of external validity outside of the firm's context. Additional workgroups/teams within the firm need to be evaluated, while similar studies in other institutions within the knowledge economy are to be envisaged.

Practical implications

Workgroup managers must nurture an environment conducive towards mutual trust and respect, where individuals are given the time and freedom to express themselves, all the while being open to differing viewpoints and experiences. Coercive dialogue between members should be discouraged. It is proposed that this can be achieved across a parental “safety net” approach.

Originality/value

The paper presents the “how” and “why” of an effective dialogical knowledge constructing process occurring at the interpersonal level, attempts to propose how management can to help achieve this within their organisation, and attempts to bridge the areas of knowledge creation and risk induction at the interpersonal/workgroup level.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 5 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 1993

Marc T. Jones

The ideology of the New Right draws many of its foundationalconcepts from the work of Adam Smith. This appropriation andvulgarization of Smith′s work constitutes a major injustice…

303

Abstract

The ideology of the New Right draws many of its foundational concepts from the work of Adam Smith. This appropriation and vulgarization of Smith′s work constitutes a major injustice to this seminally important theorist. In particular, the moral underpinnings of Smith′s project are often ignored, as are his insights on the potential dysfunctions and pathologies a capitalist society might foster. Most critiques of capitalism are launched from a Marxian‐based perspective. Finds, however, that by examining post‐Rogernomics New Zealand in light of the potential dysfunctions identified by Smith, the father of capitalism himself proves to be the most trenchant critic of the current order.

Details

International Journal of Social Economics, vol. 20 no. 12
Type: Research Article
ISSN: 0306-8293

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 1985

At the January meeting of the American Library Association in Washington, DC, IBM equipment and products led the field against Apple and other microcomputer brands. Predictions…

15

Abstract

At the January meeting of the American Library Association in Washington, DC, IBM equipment and products led the field against Apple and other microcomputer brands. Predictions that the IBM PC would become the de facto standard library computer have clearly been fulfilled. It now appears that more powerful IBM products——such as the AT——and a host of peripherals will shortly become commonplace library equipment.

Details

M300 and PC Report, vol. 2 no. 2
Type: Research Article
ISSN: 0743-7633

Access Restricted. View access options
Article
Publication date: 1 June 2002

George K. Chacko

Studies five successful chief ’ntrepreneur officers (CNOs) together with one failure. Looks at why the CNO is indispensable. Presents 36 characteristics of CNOs across six groups…

344

Abstract

Studies five successful chief ’ntrepreneur officers (CNOs) together with one failure. Looks at why the CNO is indispensable. Presents 36 characteristics of CNOs across six groups: eagerly embracing risk, passionately innovating, creating/harnessing disequilibria, empowering the middle management, empowering top management with complementing industry product and participants and with complementing capital products and providers. Uses numerous case studies to demonstrate theory and provide a number of questions and answers.

Details

Management Research News, vol. 25 no. 6/7
Type: Research Article
ISSN: 0140-9174

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1983

VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library housekeeping processes, principally in the…

58

Abstract

VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library housekeeping processes, principally in the UK. It is edited and substantially written by The Information Officer for Library Automation based in Southampton University Library and supported by a grant from the British Library Research and Development Department. Copyright for VINE articles rests with the British Library Board, but opinions expressed in VINE do not necessarily reflect the views and policies of the British Library. The subscription for 1983 for VINE is £22 for UK subscribers and £25 for overseas subscribers. The first copy will be charged at normal rate, but all others will be supplied for only £12 per year UK and £14 per year overseas. VINE is available in either paper copy or microfiche and all back issues are available on microfiche.

Details

VINE, vol. 13 no. 4
Type: Research Article
ISSN: 0305-5728

Access Restricted. View access options
Book part
Publication date: 24 February 2023

Romina Gómez-Prado, Aldo Alvarez-Risco, Jorge Sánchez-Palomino, Berdy Briggitte Cuya-Velásquez, Sharon Esquerre-Botton, Luigi Leclercq-Machado, Sarahit Castillo-Benancio, Marián Arias-Meza, Micaela Jaramillo-Arévalo, Myreya De-La-Cruz-Diaz, Maria de las Mercedes Anderson-Seminario and Shyla Del-Aguila-Arcentales

In the academic field of business management, several potential theories were established during the last decades to explain companies' decisions, organizational behavior…

Abstract

In the academic field of business management, several potential theories were established during the last decades to explain companies' decisions, organizational behavior, consumer patterns, and internationalization, among others. As a result, businesses and scholars were able to analyze and decide based on theoretical approaches to explain the current conditions of the market. Secondary research was conducted to collect more than 36 management theories. This chapter aims to develop the most famous theories related to business applied in the international field. The novelty of this chapter relies on the compilation of recognized previous research studies from the academic literature and evidence in international business.

Access Restricted. View access options
Article
Publication date: 5 November 2024

Marc Dupuis, Rosalind Searle and Karen V. Renaud

The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in…

47

Abstract

Purpose

The purpose of this study was to investigate the role of grace in the aftermaths of adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in organizational settings; consequences could be significant and costly. Increasingly, the cause may be a cybersecurity exploit, such as a well-targeted phishing email. In the aftermath, line managers have a choice in responding to the individual who caused the incident. Negative emotions, such as shame and regret, may deliberately be weaponized. Alternatively, positive emotions, such as grace, forgiveness and mercy, may come into play.

Design/methodology/approach

We detail a study with 60 participants to explore attribution differences in response to adverse incidents, both non-cybersecurity and cybersecurity. We examined the stages that occur in the aftermath of such adverse incidents where grace may be observed.

Findings

Our participants generally believed that grace was indicated toward those who triggered an adverse cybersecurity incident, pointing to situational causes. This was in stark contrast to their responses to the non-cybersecurity incident, where the individual was often blamed, with punishment being advocated.

Research limitations/implications

The role of positive emotions merits investigation in the cybersecurity context if we are to understand how best to manage the aftermaths of adverse cybersecurity incidents.

Practical implications

Organizations that mismanage aftermaths of adverse incidents by blaming, shaming and punishing those who make mistakes will harm the individual who made the mistake, other employees and the long-term health of their organization in the long run.

Originality/value

To the best of the authors’ knowledge, this is the first study to reveal the grace phenomenon in the cybersecurity context.

Details

Journal of Intellectual Capital, vol. 26 no. 1
Type: Research Article
ISSN: 1469-1930

Keywords

Access Restricted. View access options

Abstract

Details

Inside Major East Asian Library Collections in North America, Volume 2
Type: Book
ISBN: 978-1-80455-140-0

Abstract

Details

Inside Major East Asian Library Collections in North America, Volume 1
Type: Book
ISBN: 978-1-80262-234-8

1 – 10 of 182
Per page
102050