Search results

1 – 10 of 49
Per page
102050
Citations:
Loading...
Available. Open Access. Open Access
Article
Publication date: 24 May 2023

Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…

2707

Abstract

Purpose

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.

Design/methodology/approach

The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.

Findings

The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.

Originality/value

Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Available. Open Access. Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

1351

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Access Restricted. View access options
Book part
Publication date: 10 February 2023

Fatima Shaikh, Gul Afshan and Kiran Sood

Introduction: Technology and the environment remain uncertain for organisations that impose enormous challenges and opportunities to redesign policies and practices for human…

Abstract

Introduction: Technology and the environment remain uncertain for organisations that impose enormous challenges and opportunities to redesign policies and practices for human resources (HR). The use of technology is ubiquitous and pervasive. Technology has altered the way individuals and organisations seek knowledge, process information, instrument, and practice the learning outcomes.

Purpose: This conceptual paper highlights the change in technological and change nature of work impact on HR practices. Technology has changed the nature of work, which affects individuals and organisations. The dynamic change in technology forces organisations to rethink policies and procedures that fuel the organisation’s competence. The difference in HR practices (recruitment and selection, training and development, performance management, and turnover) is not a trend but rather a need for organisational survival. There is not only a transformation in technological implementation in an organisation but also in employee–organisation relations. The organisations install technology and replace employees.

On the contrary, employees leave an organisation and switch towards self-employed jobs entitled Gig-economy (World Bank, 2018). The individuals are moving towards a more flexible and self-employed relationship. Unfortunately, though, working flexibly create concern for an employee–employer relationship such as pension plan, health insurance, and paid leaves. It also creates income inequality.

Methodology: This is a conceptual paper.

Findings: Technology has a dual effect on the organisation and employees. Thus, technology affects employees, employers, and organisations. The change in technology moderates the psychological contract and career selection, leading to change in the policies and practices of the HR department. A research model is proposed in this conceptual research study which will further be tested to examine and confirm the impact of change.

Details

The Adoption and Effect of Artificial Intelligence on Human Resources Management, Part B
Type: Book
ISBN: 978-1-80455-662-7

Keywords

Available. Content available
Book part
Publication date: 10 February 2023

Free Access. Free Access

Abstract

Details

The Adoption and Effect of Artificial Intelligence on Human Resources Management, Part B
Type: Book
ISBN: 978-1-80455-662-7

Access Restricted. View access options

Abstract

Details

The Development of the Maltese Insurance Industry: A Comprehensive Study
Type: Book
ISBN: 978-1-78756-978-2

Access Restricted. View access options
Article
Publication date: 1 February 1997

Paul Herbig and Alan Shao

The Overseas Chinese, the Chinese Commonwealth, or the Chinese Web, consists of companies formed by Chinese who are found outside of China and inside other countries, such as, the…

303

Abstract

The Overseas Chinese, the Chinese Commonwealth, or the Chinese Web, consists of companies formed by Chinese who are found outside of China and inside other countries, such as, the United States, Thailand, Singapore, and Malaysia. These Chinese entrepreneurs work under a set of familial, cultural, and relationship values. They help one another and protect each others businesses. Non‐Chinese companies are now realising the potential growth of this unofficial Chinese economy. This network was first formed by family relationships. However, foreign companies outside this web may find it easier to enter by linking themselves into joint ventures, marriages, political opportunities or just by having some common culture. This Chinese economy is starting to grow approximately by 5% each year. These Chinese entrepreneurs are not cluttered in a single region, as it is in the case of North America, Europe, and Japan. But yet, these potential marketers are failing to realise the importance and the power of this growing economy.

Details

Cross Cultural Management: An International Journal, vol. 4 no. 2
Type: Research Article
ISSN: 1352-7606

Access Restricted. View access options
Article
Publication date: 10 August 2015

Russell Paul Warhurst and Kate Emma Black

This article aims to review the changing demographics of employment and it proceeds to critically examine the existing literature on later-career workers’ experiences of training…

3915

Abstract

Purpose

This article aims to review the changing demographics of employment and it proceeds to critically examine the existing literature on later-career workers’ experiences of training and development. Population ageing in developed economies has significant implications for workplace learning, given suggestions that most occupational learning for later-career workers occurs on-the-job within the workplace. The literature suggests that later-career workers receive very little formal occupational training. However, significant gaps are revealed in the existing research knowledge of the extent and nature of older workers learning particularly with regard to incidental learning in the workplace.

Design/methodology/approach

A qualitative empirical investigation has been conducted among later-career managerial workers and the visual elicitation methodology adopted is detailed.

Findings

The results of the investigation show how the later-career managers in question were learning extensively, albeit incidentally, from workplace challenges specifically those associated with their responsibilities and from interacting with their managers, teams and external stakeholders.

Originality/value

The article draws conclusions for policymakers and those tasked with ensuring the continued learning and development of an ageing workforce.

Details

Journal of Workplace Learning, vol. 27 no. 6
Type: Research Article
ISSN: 1366-5626

Keywords

Access Restricted. View access options
Article
Publication date: 2 October 2019

Yaotang Peter Lin

The purpose of this paper is to conduct a brief survey on the Catholic Church in Taiwan since its establishment by the Spanish missionaries in 1662 until today on its internal…

86

Abstract

Purpose

The purpose of this paper is to conduct a brief survey on the Catholic Church in Taiwan since its establishment by the Spanish missionaries in 1662 until today on its internal development and external relationship with the government. It is interesting to discover that, mostly, the Church has a harmonious relationship with the government, except a very few cases in which its foreign missionaries following the social teaching of the Church antagonize the government. However, it does not affect the close relationship between the Church and government in Taiwan.

Design/methodology/approach

It is a qualitative research on archive and books to research on the events of the Catholic Church in Taiwan in the discipline of social sciences. Historical research is in the majority of events.

Findings

The finding is acceptable because it is one of the few writings on the Catholic Church in Taiwan when writing on the Protestant Churches in Taiwan is flooding.

Originality/value

This is a ground-breaking work with academic value.

Details

Asian Education and Development Studies, vol. 9 no. 3
Type: Research Article
ISSN: 2046-3162

Keywords

Access Restricted. View access options
Article
Publication date: 12 July 2022

John Paul Mynott and Stephanie Elizabeth Margaret O'Reilly

Lesson study (LS) is a collaborative form of action research. Collaboration is central to LS methodology, therefore exploring and expanding the understanding of the collaborative…

187

Abstract

Purpose

Lesson study (LS) is a collaborative form of action research. Collaboration is central to LS methodology, therefore exploring and expanding the understanding of the collaborative features that occur in LS is a priority. This paper explores the features of collaboration in existing publications on LS to consider if, as Quaresma (2020) notes, collaboration is simplistically referred to within LS research.

Design/methodology/approach

Utilising a qualitative review of LS literature to explore LS collaboration through Mynott's (2019) outcome model and Huxham and Vangen's (2005) theory of collaborative advantage and inertia. 396 publications using “lesson study” and “collaboration” as key words were considered and reviewed, with 26 articles further analysed and coded, generating a collaborative feature matrix.

Findings

While collaboration in LS is referred to generically in the articles analysed, the authors found examples where collaboration is considered at a meta, meso and micro level (Lemon and Salmons, 2021), and a balance between collaborative advantage and inertia. However, only a small proportion of LS publications discuss collaboration in depth and, while the matrix will support future research, more focus needs to be given to how collaboration functions within LS.

Originality/value

Through answering Robutti et al.'s (2016) question about what can be learnt from the existing LS research studies on collaboration, this paper builds on Mynott's (2019) outcome model by providing a detailed matrix of collaborative features that can be found in LS work. This matrix has applications beyond the paper for use by facilitators, leaders of LS, and researchers to explore their LS collaborations through improved understanding of collaboration.

Details

International Journal for Lesson & Learning Studies, vol. 11 no. 3
Type: Research Article
ISSN: 2046-8253

Keywords

Access Restricted. View access options
Article
Publication date: 7 June 2019

Chiou-Fa Lin, Cheng-Huei Chiao and Bin Wang

The purpose of this paper is to examine the impact of post-trade transparency on price efficiency and price discovery.

273

Abstract

Purpose

The purpose of this paper is to examine the impact of post-trade transparency on price efficiency and price discovery.

Design/methodology/approach

The authors use an exogeneous change in market transparency in the Taiwan Stock Exchange that mandates the disclosure of unexecuted orders of the five best bid and ask prices after each trade, and conduct an event study analysis.

Findings

After the change, price efficiency enhances for both large and small firms, although the impact on stock prices is greater when the firm is larger. The authors also find that post-change trading reveals more private information for large firms but more public information for small firms. The findings support the view that transparency has a positive impact on market quality.

Originality/value

The paper adds to a large body of literature investigating the relationship between transparency and market behavior, especially the ongoing debate about whether trading transparency positively affects price dynamics. The findings also have important policy implications for the regulators.

Details

Managerial Finance, vol. 45 no. 8
Type: Research Article
ISSN: 0307-4358

Keywords

1 – 10 of 49
Per page
102050