Search results

1 – 10 of 352
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 9 October 2009

Michael Workman

Surveillance is seen as an important tool to prevent security breaches and may improve prosecutorial ability, but employees may engage in subtitle counterproductive behaviors in…

1089

Abstract

Purpose

Surveillance is seen as an important tool to prevent security breaches and may improve prosecutorial ability, but employees may engage in subtitle counterproductive behaviors in protest. This poses significant risks and costs to employers. The purpose of this paper is to summarize the results of a previous field study of the influences from justice perceptions as mitigation and prescribe some methods for addressing the issues that are raised.

Design/methodology/approach

Drawing from protection motivation theory, the psychological contract, and the systems of organizational justice, a threat control model about surveillance attitudes is field‐tested in a randomized design.

Findings

Trust and perceptions of justice mediated attitudes about surveillance practices; and threat severity and efficacy of surveillance in maintaining security moderated attitudes about corporate surveillance are founded.

Originality/value

The paper illustrates the theoretical linkages between surveillance practices and employee counterproductive behaviors. Grounded in these findings, an explanation for how security managers might balance the simultaneous demands for security while maintaining an effective workforce is presented.

Details

Information Management & Computer Security, vol. 17 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 2012

Michael Workman

Funding agencies such as the Office of Naval Research, Department of Homeland Security, and others, have reduced funding for non‐tactical operations. Simultaneously, organizations…

946

Abstract

Purpose

Funding agencies such as the Office of Naval Research, Department of Homeland Security, and others, have reduced funding for non‐tactical operations. Simultaneously, organizations are squeezing their overhead budgets (where security initiatives fall) and are focusing more on revenue generation given current economic climates. Thus, in both governmental sectors and in commercial settings, there are reasons to believe that strategic security initiatives are being sacrificed, and those that survive must be compelling. To assist organizational leaders with these difficult choices, it is critical to understand biases that affect decisions about strategic security initiatives. The purpose of this paper is to validate and empirically test the predictability of a theoretical model, from which implications can be made for research and practice.

Design/methodology/approach

Using behavioral decision theory, a randomized longitudinal study was conducted over three years with a multinational corporation with headquarter‐offices in the UK and the USA, and regional offices in India, Germany and France. From these data, a model was developed and tested for fit with a confirmatory factor analysis and its predictive ability was tested using structured equation modeling.

Findings

It was found that risk aversion, overconfidence, adjustment of cognitive anchors, and expected utility biases affected whether managers and other stakeholders continued or terminated strategic security initiatives.

Originality/value

Prematurely terminating or over commitment to a strategic initiative can be costly if not significantly damaging to an organization or government military or intelligence agency. Understanding how biases factor into these decisions can help strategic initiative decision makers improve their decisions and assist them in recognizing normative rules or optimal (straddle point) solutions.

Access Restricted. View access options
Article
Publication date: 21 November 2008

Michael Workman

Recently, the role of human behavior has become a focal point in the study of information security countermeasures. However, few empirical studies have been conducted to test…

3407

Abstract

Purpose

Recently, the role of human behavior has become a focal point in the study of information security countermeasures. However, few empirical studies have been conducted to test social engineering theory and the reasons why people may or may not fall victim, and even fewer have tested recommended treatments. Building on theory using threat control factors, the purpose of this paper is to compare the efficacy of recommended treatment protocols.

Design/methodology/approach

A confirmatory factor analysis of a threat control model was conducted, followed by a randomized assessment of treatment effects using the model. The data were gathered using a questionnaire containing antecedent factors, and samples of social engineering security behaviors were observed.

Findings

It was found that threat assessment, commitment, trust, and obedience to authority were strong indicators of social engineering threat success, and that treatment efficacy depends on which factors are most prominent.

Originality/value

This empirical study provides evidence for certain posited theoretical factors, but also shows that treatment efficacy for social engineering depends on targeting the appropriate factor. Researchers should investigate methods for factor assessment, and practitioners must develop interventions accordingly.

Details

Information Management & Computer Security, vol. 16 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 3 February 2012

Michael Workman

The purpose of this paper is to develop and validate a model of how cognitive biases and framing effects influence managerial decision‐making about strategic initiatives.

2328

Abstract

Purpose

The purpose of this paper is to develop and validate a model of how cognitive biases and framing effects influence managerial decision‐making about strategic initiatives.

Design/methodology/approach

Because the author was interested in understanding real‐world practices about strategic decisions, he chose to conduct a quasi‐experimental field study over a three‐year period with managers in a multinational corporation. He developed a questionnaire and a series of vignettes for the independent measures, and examined database records of decisions for the dependent measures.

Findings

After validating the instrument items, the author conducted a confirmatory factor analysis for model fit, and then tested the model's predictive ability and interactions. The model indicated that risk aversion, overconfidence, anchoring, and expected utility affected commitment decisions, and these factors interacted with framing effects.

Originality/value

Decision‐makers often fall victim to biases and make sub‐optimal decisions, especially regarding long‐term strategic initiatives. To illustrate, some managers may continue to invest in initiatives that have little or no hope of succeeding because they have already invested heavily in them, or they may prematurely terminate them. An explanatory model is helpful to management and organizational developers to learn how to make optimal decisions using normative rules.

Available. Content available
Article
Publication date: 1 March 2007

Gina Vega and Roland E. Kidwell

This article advances a conceptual typology delineating the differences and similarities between business- and social-sector new venture creators. Our classification scheme…

6418

Abstract

This article advances a conceptual typology delineating the differences and similarities between business- and social-sector new venture creators. Our classification scheme differentiates business and social entrepreneurs, considering characteristics of social entrepreneurs in a larger entrepreneurial context.Within a conceptual 2x2 typology based on two dimensions: drive (passion vs. business) and desired return (financial ROI vs. social ROI), we identify and classify 80 examples of new venture creators into one of the quadrants of an enterprise model of entrepreneurs. Preliminary results reveal similarities between social and traditional entrepreneurs and differentiate social entrepreneurs in terms of traits, goals, tendencies, and motivational sources.

Details

New England Journal of Entrepreneurship, vol. 10 no. 2
Type: Research Article
ISSN: 1550-333X

Available. Content available
Article
Publication date: 20 November 2009

430

Abstract

Details

Information Management & Computer Security, vol. 17 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 1968

Sellers, Harman and Salmon

October 11, 1967 Negligence — Electricity — Unguarded electric wires — Electrician required to tighten wires — Mobile electric crane in course of construction — Not practice to

15

Abstract

October 11, 1967 Negligence — Electricity — Unguarded electric wires — Electrician required to tighten wires — Mobile electric crane in course of construction — Not practice to guard wires — Whether absence of guard negligence — Electrician requiring to remove any guard to carry out work — Statutory duty — Duty to safeguard electric conductor — Fall while descending scaffolding — Whether “reasonably practicable” to guard wires — Whether employers in breach of statutory duty — Electricity Regulations, 1908 (S.R.&O. 1908, No. 1312), reg.2.

Details

Managerial Law, vol. 3 no. 5
Type: Research Article
ISSN: 0309-0558

Access Restricted. View access options
Article
Publication date: 1 January 1975

Knight's Industrial Law Reports goes into a new style and format as Managerial Law This issue of KILR is restyled Managerial Law and it now appears on a continuous updating basis…

837

Abstract

Knight's Industrial Law Reports goes into a new style and format as Managerial Law This issue of KILR is restyled Managerial Law and it now appears on a continuous updating basis rather than as a monthly routine affair.

Details

Managerial Law, vol. 18 no. 1
Type: Research Article
ISSN: 0309-0558

Access Restricted. View access options
Article
Publication date: 1 November 1969

L.J. Danckwerts, John Stephenson J. and Gordon Willmer

May 6, 1969 Building — Safety regulations — Application — “Affect” — Workman's presence in particular place not reasonably foreseeable by employer — Whether workman affected by…

26

Abstract

May 6, 1969 Building — Safety regulations — Application — “Affect” — Workman's presence in particular place not reasonably foreseeable by employer — Whether workman affected by regulations — Workman not expressly forbidden to go to place in question — Whether impliedly authorised or permitted to be there — Workman's presence there unforeseeably foolish — Whether resulting accident entirely own fault — Liability of employers — Building (Safety, Health and Welfare) Regulations, 1948 (S.I. 1948, No. 1145), regs. 4(1), 27(2), 28(1).

Details

Managerial Law, vol. 7 no. 2
Type: Research Article
ISSN: 0309-0558

Access Restricted. View access options
Article
Publication date: 1 April 1971

Hailsham L.C. of St. Marylebone, Hodson, Viscount Dilhome, Donovan and Gardiner

October 21, 1970 Factory — Dangerous machinery — Dangerous combination of machinery and material — Danger arising from “nip” between moving workpiece and imperceptibly moving…

32

Abstract

October 21, 1970 Factory — Dangerous machinery — Dangerous combination of machinery and material — Danger arising from “nip” between moving workpiece and imperceptibly moving boring bar — Automatic cooling device — Coolant applied by hand — Practice known to employers — Workman's hand caught in “nip” — Whether duty on employers to fence boring bar — Whether dangerous part of machinery — Danger of accident foreseen by employers — Whether foreseeable — Workman unable to establish exactly how accident happened — Materiality — Factories Act, 1961 (9 & 10 Eliz. II, c.34), s.14 (1).

Details

Managerial Law, vol. 10 no. 1
Type: Research Article
ISSN: 0309-0558

1 – 10 of 352
Per page
102050