Search results

1 – 10 of 69
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 12 March 2018

Khaled A. Alshare, Peggy L. Lane and Michael R. Lane

The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on…

2051

Abstract

Purpose

The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory.

Design/methodology/approach

The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression.

Findings

The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant.

Research limitations/implications

As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study.

Practical implications

The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated.

Social implications

Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations.

Originality/value

Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.

Access Restricted. View access options
Article
Publication date: 21 June 2019

Khaled A. Alshare, Mohammad Kamel Alomari, Peggy L. Lane and Ronald D. Freeze

Expert systems (ES) design emulates expertise with the intention that the ES be used by non-experts. This study aims to predict end-user intention and use of ES by proposing a…

515

Abstract

Purpose

Expert systems (ES) design emulates expertise with the intention that the ES be used by non-experts. This study aims to predict end-user intention and use of ES by proposing a research model that extends the basic components of the unified theory of acceptance and use of technology (UTAUT) by including additional relevant factors to ES, including the expert domain, perceived relevance, reliability, quality of ES and management support, which directly and indirectly influence the end-user intention to use an expert system.

Design/methodology/approach

A structural equation model (SEM), using LISREL, was used to test the measurement and structural models using a sample of 205 end-users of expert systems in the USA. These users of expert systems come from a variety of domains. The factors include both internal and external factors for the individual level of analysis design of this study.

Findings

The results showed behavioral intention had the strongest effect on usage, followed by perceived relevance. With respect to the factors that impact intention, perceived relevance had the strongest total effect, followed by attitude. For attitude, effort expectancy had the strongest total effect, followed by management support and perceived relevance.

Research limitations/implications

The results of this study should assist decision-makers in planning training and communications about the use of expert systems so that the expert systems will be used as intended.

Originality/value

The originality of this work resides in the addition of external factors to the UTAUT model that helps provide advice to practitioners in the support needed to insure expert system implementation success.

Details

Journal of Systems and Information Technology, vol. 21 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Access Restricted. View access options
Article
Publication date: 28 October 2010

Joshua Doane, Judy A. Lane and Michael J. Pisani

Volume 25 celebrates the 25th year of publication for the American Journal of Business (AJB). Launched by eight MAC schools of business in March 1986, the Journal has featured…

429

Abstract

Volume 25 celebrates the 25th year of publication for the American Journal of Business (AJB). Launched by eight MAC schools of business in March 1986, the Journal has featured more than 700 authors who have contributed more than 330 research articles at the intersection of theory and practice. From accounting to marketing, management to finance, the Journal prominently covers the breadth of the business disciplines as a general business outlet intended for both practitioners and academics. As the Journal reaches out beyond the MAC in sponsorship, authorship, and readership, we assess the Journal’s first quarter century of impact.

Details

American Journal of Business, vol. 25 no. 2
Type: Research Article
ISSN: 1935-519X

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

101241

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Access Restricted. View access options
Article
Publication date: 1 May 1987

On April 2, 1987, IBM unveiled a series of long‐awaited new hardware and software products. The new computer line, dubbed the Personal Systems 30, 50, 60, and 80, seems destined…

96

Abstract

On April 2, 1987, IBM unveiled a series of long‐awaited new hardware and software products. The new computer line, dubbed the Personal Systems 30, 50, 60, and 80, seems destined to replace the XT and AT models that are the mainstay of the firm's current personal computer offerings. The numerous changes in hardware and software, while representing improvements on previous IBM technology, will require users purchasing additional computers to make difficult choices as to which of the two IBM architectures to adopt.

Details

M300 and PC Report, vol. 4 no. 5
Type: Research Article
ISSN: 0743-7633

Access Restricted. View access options
Article
Publication date: 1 August 1936

SEPTEMBER this year will be unique in the history of the librarian in England in that for the first time in nearly sixty years the annual conference of the Library Association has…

29

Abstract

SEPTEMBER this year will be unique in the history of the librarian in England in that for the first time in nearly sixty years the annual conference of the Library Association has already become a memory only. There are those who profess to believe that the conference should be restored to the autumn months. It may be suggested on the other hand that the attendance at Margate lent no assistance to that point of view; indeed, the Margate conference was one of the most pleasant, one of the most successful, of which we have record. Nevertheless, if it can be proved that any large body of librarians was unable to be present owing to the change of month, it appears to us that the matter should be considered sympathetically. Although no one holds any longer the view that one week's attendance at a conference will teach more than many months' study in hermit‐like seclusion—the words and sentiments are those of James Duff Brown—because to‐day there is much more intimate communication between librarians than there was when that sentiment was expressed, there is enormous value, and the adjective is not an exaggeration, in one large meeting of librarians in body in the year. It is an event to which every young librarian looks forward as the privilege to be his when he reaches a high enough position in the service; attendance is a privilege that no librarian anywhere would forego. And this, in spite of the fact that there is usually a grumble because the day is so full of meetings that there is very little chance of such recreation as a seaside, or indeed any other, place visited, usually provides for the delegates.

Details

New Library World, vol. 39 no. 2
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 June 1968

ALTHOUGH the first Public Libraries (Scotland) Act was placed on the Statute Book in 1853, it was not until 1899 that the Corporation of the City of Glasgow was empowered to…

93

Abstract

ALTHOUGH the first Public Libraries (Scotland) Act was placed on the Statute Book in 1853, it was not until 1899 that the Corporation of the City of Glasgow was empowered to establish and maintain public libraries throughout the city. Between 1876 and 1897 four attempts were made to secure public approval for the adoption of the Public Libraries (Scotland) Acts, but when all these efforts proved unsuccessful, the Corporation decided in June, 1888 to include in a Local Bill for submission to Parliament, certain clauses conferring upon themselves the power to become a library authority. Promoted in 1899, the Bill became known as the Glasgow Corporation (Tramways, Libraries, etc.) Act 1899, and the library clauses passed through Parliament without opposition and received Royal Assent on 1st August, 1899. The powers conferred by this Local Act empowered the Corporation:

Details

New Library World, vol. 69 no. 12
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 August 1928

THE Blackpool Conference has been duly held; Lord Elgin has handed his office to his successor, Dr. Lindsay; and a presidential address, full of sound commonsense and useful…

26

Abstract

THE Blackpool Conference has been duly held; Lord Elgin has handed his office to his successor, Dr. Lindsay; and a presidential address, full of sound commonsense and useful thought, has been delivered which has been ignored in its essentials by the popular press and inflated in respect of a jest which preceded it. As for the general results of the discussions, they are difficult to assess. Certainly useful work was done. On the “local” side the meeting was completely successful. The nights were illuminated by the wonderful autumn light‐show in which Blackpool surpasses England; in the receptions, amusements and facilities afforded no conference assembly has been entertained more royally.

Details

New Library World, vol. 31 no. 4
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 August 1944

THE hope we expressed in recent pages, that the Library Association might resume its normal methods of life and government, remains a hope. London, where only we suppose the…

31

Abstract

THE hope we expressed in recent pages, that the Library Association might resume its normal methods of life and government, remains a hope. London, where only we suppose the Council could do its work really well, has been of late no place for the meetings of people; and we dare to say that for the key people of any profession or movement to gather there at present would be unwise, even though imagination may increase the risk beyond the warrant of the facts. Nor do we know yet if the worst has been experienced. Meanwhile it is probable that the affairs of librarianship must be delegated to even fewer workers than now. Only the chronically ungracious part of our fraternity will be without gratitude to those who keep things going for us.

Details

New Library World, vol. 47 no. 2
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 March 1985

Life is made up of debits and credits, as Kipling wrote, long accounts have to be paid — mistakes, misconduct, misdeeds, all the mischief and harm they cause, exact payment which…

177

Abstract

Life is made up of debits and credits, as Kipling wrote, long accounts have to be paid — mistakes, misconduct, misdeeds, all the mischief and harm they cause, exact payment which has to be met by someone, not necessarily those that cause the trouble; all too often by innocent victims. The recent industrial strife, destruction and violence, despite the plausible excuses for it, will have disastrous results, a colossal debit in the nation's accounts; and the mass of the people, the vulnerable groups including several millions of elderly pensioners, the handicapped and sick, are under no illusions who will have to pay. The posturing defiance — “heads held high”, bands playing martial music — the complete lack of concern or regret for others will make no difference to the overtaking retribution.

Details

British Food Journal, vol. 87 no. 3
Type: Research Article
ISSN: 0007-070X

1 – 10 of 69
Per page
102050