Sakari Luukkainen, Mikko Karjalainen, Juha Winter and Mehrdad Bagheri Majdabadi
The aim of this paper is to identify promoting and restraining factors of a novel mobile service in the pedestrian safety area.
Abstract
Purpose
The aim of this paper is to identify promoting and restraining factors of a novel mobile service in the pedestrian safety area.
Design/methodology/approach
This paper uses the case study methodology that focus on analyzing a specific case of mobile safety services in depth. A case study is especially suitable for an emerging case, such as pedestrian safety, where the aim is to identify relevant influencing factors of the particular case and not to generalize the findings. To gather data for case study analysis, several expert interviews were performed. Because they provided a large volume of data, the Service, Technology, Organization, and Finance business model framework was used as a way of structuring the analysis.
Findings
The main restraining factors are end-user value proposition, battery life, accuracy of GPS positioning and the revenue model. However, the service could improve traffic safety considerably and it should be introduced first locally in places, where many accidents take place. There is a great interest on driver data, which could be the main advantage for this service in the future. Integration to navigation products would complement the service significantly.
Originality/value
Current traffic safety-related literature covers mainly technical issues, and there are only few papers related to business model issues on that particular service. Observations of the various factors affecting the related evolution at an early phase of the life-cycle support further service design process.
Details
Keywords
Mohan Thite and Ramanathan Iyer
Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…
Abstract
Purpose
Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.
Design/methodology/approach
The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.
Findings
The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.
Originality/value
The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.
Details
Keywords
Yotamu Gangire, Adéle Da Veiga and Marlien Herselman
This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire…
Abstract
Purpose
This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire validation process and the quantitative study results.
Design/methodology/approach
Data obtained through a quantitative survey (N = 263) at a South African university were used to validate the questionnaire.
Findings
Exploratory factor analysis produced 11 factors. Cronbach’s alpha for the 11 factors were all above 0.7, suggesting that the questionnaire is valid and reliable. The responses show that autonomy questions received positive perception, followed by competence questions and lastly relatedness questions. The correlation analysis results show that there was a statistically significant relationship between competence factors and autonomy factors. There was a partial significant relationship between autonomy and relatedness factors, and between competence and relatedness factors. The study results suggest that competence and autonomy could be more important than relatedness in fostering information security behaviour among employees.
Research limitations/implications
This study used a convenience sampling, a cross-sectional design, and was carried out in a single organisation. This could pose limitations when generalising the study results. Future studies could use random sampling and consider other universities for further validation.
Practical implications
Universities can use the questionnaire to identify developmental areas to improve information security from a behaviour perspective.
Originality/value
This paper provides a research instrument for assessing information security behaviour from the perspective of the self-determination theory.
Details
Keywords
Laura Laaksonen, Antti Ainamo and Toni‐Matti Karjalainen
Entrepreneurial passion has recently begun to fascinate a growing number of researchers. While only a few systematic studies exist, Cardon et al.'s review suggests passion as a…
Abstract
Purpose
Entrepreneurial passion has recently begun to fascinate a growing number of researchers. While only a few systematic studies exist, Cardon et al.'s review suggests passion as a prevalent phenomenon among entrepreneurs. They make a call for empirical and systematic studies of entrepreneurial passion to provide insights for practice and research. This paper aims to apply the recent theoretical advances in a particular empirical setting: the heavy metal genre in the popular music industry.
Design/methodology/approach
Using a qualitative in‐depth case study approach, four ventures that are considered new ventures in the metal music business are studied.
Findings
The findings strongly imply that the grounds for a globally successful creative venture require the passion of at least one inventor entrepreneur. Also, at least one founder is needed to take the venture to the next stage, where business is formalized for ramp up and at least one developer is needed to grow the business after the other two identities and earlier stages of the venture life cycle have created the platform on which to build and develop the business. The paper also finds that these role identity‐related behaviors are essential characteristics for artists in the popular music industry.
Originality/value
The popular music industry is an excellent research site for studying entrepreneurial passion because artists start their careers and join together to form bands mainly because of their passion and love to create and perform music. While the theory of entrepreneurial passion offers a promising approach for entrepreneurial studies, few systematic studies exist that apply it.