Search results
1 – 10 of 111Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar
The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…
Abstract
Purpose
The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.
Design/methodology/approach
This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.
Findings
The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.
Practical implications
The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.
Social implications
Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.
Originality/value
The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.
Details
Keywords
Andrew Bruce, John Wills Lloyd and Michael J. Kennedy
Self-monitoring has become one of the most widely employed self-control procedures in special education for students with learning disabilities and emotional or behavioral…
Abstract
Self-monitoring has become one of the most widely employed self-control procedures in special education for students with learning disabilities and emotional or behavioral disorders. Although its success has been documented across age groups, settings, and diverse applications, researchers have continued to study the question of whether focusing self-monitoring on certain target behaviors – particularly attention to task or academic performance – will yield superior outcomes for students. We review 11 available studies that have examined this issue, classifying each study according to the ways in which the researchers had students monitor their own behavior. The results show only small differences among the different methods and indicate a need for teachers to continue exercising professional judgment in planning the use of self-monitoring.
Pooja B. Vijayakumar, Michael J. Morley, Noreen Heraty, Mark E. Mendenhall and Joyce S. Osland
In this contribution, we systematically review the extant global leadership literature to identify important bibliometric and thematic patterns in evidence in this evolving field…
Abstract
In this contribution, we systematically review the extant global leadership literature to identify important bibliometric and thematic patterns in evidence in this evolving field of scholarship. Conceptualizing the phenomenon to include leaders/managers/supervisors who hold global, expatriate, or international positions, we draw out insights accumulated from a total of 327 published articles in key management and organizational behavior journals listed in Scopus. Our analysis proceeds in two sequential phases. Our bibliometric analysis first identifies the most cited articles, most published first authors, country bases of first authors, and frequently publishing journals in this field. This characterizes both the diversity and innovative nature of scholarship in the field. Our thematic content analysis, generated through Nvivo 11, isolates two dominant overarching themes that represent the wellspring for the body of literature, namely global leader development and global leader effectiveness. These themes of development and effectiveness are further explicated through six distinct lenses namely cultural, cognitive, learning, personality trait, social/relational, and political. These lenses are underpinned by a suite of theoretical perspectives encompassing individual, system, and contextual considerations. In combination, these sets of analyses bring added systematics to the field and serve as a point of departure for future inquiry.
Details
Keywords
Declan Dunne, Nikhil Lal, Nagarajan Pranesh, Michael Spry, Christopher Mcfaul and Paul Rooney
A clinical audit is a key component of the clinical governance framework. The rate of audit completion in general surgery has not been investigated. The purpose of this paper is…
Abstract
Purpose
A clinical audit is a key component of the clinical governance framework. The rate of audit completion in general surgery has not been investigated. The purpose of this paper is to assess the rates of audit activity and completion and explore the barriers to successful audit completion.
Design/methodology/approach
This was a multi-centre study evaluating current surgical audit practice. A standardised audit proforma was designed. All clinical audits in general surgery during a two-year period were identified and retrospectively reviewed. Data held by the audit departments were collated, and individual audit teams were contacted to verify the data accuracy. Audit teams failing to complete the full audit cycle with a re-audit were asked to explain the underlying reasons behind this.
Findings
Of the six trusts approached, two refused to participate, and one failed to initiate the project. A total of 39 audits were registered across three surgical directorates. Only 15 out of 39 audits completed at least one audit cycle, with 4 deemed of no value to re-audit. Only seven audits were completed to re-audit. Achieving a publication or a presentation was the most cited reason for not completing the audit loop.
Originality/value
This study demonstrates that the poor rates of audit completion rate found in other areas of clinical medicine pervade general surgery. Improved completion of an audit is essential and strategies to achieve this are urgently needed.
Details
Keywords
Joshua Doane, Judy A. Lane and Michael J. Pisani
Volume 25 celebrates the 25th year of publication for the American Journal of Business (AJB). Launched by eight MAC schools of business in March 1986, the Journal has featured…
Abstract
Volume 25 celebrates the 25th year of publication for the American Journal of Business (AJB). Launched by eight MAC schools of business in March 1986, the Journal has featured more than 700 authors who have contributed more than 330 research articles at the intersection of theory and practice. From accounting to marketing, management to finance, the Journal prominently covers the breadth of the business disciplines as a general business outlet intended for both practitioners and academics. As the Journal reaches out beyond the MAC in sponsorship, authorship, and readership, we assess the Journal’s first quarter century of impact.
Details
Keywords
Paul J. Liquorie and Michael R. Ward
Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in…
Abstract
Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in prosecuting offenders in these events. How then can the greater homeland security community effectively avert future acts of mass violence with its even broader mission set? Physical and technological security countermeasures are not enough to prevent these types of incidents from occurring. The purpose of this chapter is to briefly give an overview of some of the research into the indicators and traits exhibited by perpetrators of mass violence and the best practices that have evolved to intervene as a result. Recognizing the common traits and behaviors displayed by past attackers, their surrounding influences and the common traumas most of them have experienced, is an essential first step in developing effective strategies to prevent acts of mass violence.
Details
Keywords
This paper applies Bhabha’s concept of the third space to frame an understanding of Prem Sikka’s use of digital media to bridge the academic–activist binary. In doing this, the…
Abstract
Purpose
This paper applies Bhabha’s concept of the third space to frame an understanding of Prem Sikka’s use of digital media to bridge the academic–activist binary. In doing this, the paper makes two contributions. First, it conceptualises Sikka’s engagement, and second, through the lens of the third space, it analyses it to establish whether, in the era of the neoliberal corporatised university, public intervention has the potential to generate new perspectives and new knowledge.
Design/methodology/approach
Sikka’s articles and blogs for the period 20 February 2002 to 15 April 2020 were analysed using Leximancer, a textual analysis software programme that displays the output visually. A discriminant analysis was used to identify where each year of the study is situated in the overall semantic analysis. Netnography, the examination of archived published texts, was then used to analyse the responses by members of the public, academics, accountants and auditors, tax experts, policy makers and regulators to Sikka’s digital media engagement.
Findings
As a third space practitioner, Sikka has overcome some of the shortcomings associated with academic research to challenge the activities of professional accounting firms, regulatory bodies and multinational corporations. Through extending the boundaries of accounting and accountability, he has facilitated new radical alliances aiming to create a just and equitable society. The paper also finds that by opening up a third space of engagement, academic activists’ work can play an essential part in social transformation and emancipatory change framed in terms of social justice and equity.
Originality/value
This is one of the few papers to provide an in-depth examination of the activities of an accounting activist over twenty years.
Details