21,500 research outputs found

    Assessing the Impact of Organizational Internet and Email Monitoring Policy on Australian Employees

    Get PDF
    Monitoring of Internet and email usage within the organisation aims to maintain workers’ productivity, minimise time inefficiency and misuse of resources. Whilst moderate monitoring may control resource efficiency, excessive monitoring may lead to declines in organizational effectiveness and breaches of business ethics. This research will focus on assessing the impact of organizational Internet and email monitoring on employees’ job satisfaction and productivity. Results identified that employees’ perception of Internet and email usage restrictions significantly impacts their satisfaction and perceived productivity. Consequently, findings contribute to a greater understanding of the impact of monitoring thus enabling optimum monitoring to be implemented within the workplace

    Cyber-Slacking: Self-Control, Prior Behavior And The Impact Of Deterrence Measures

    Get PDF
    To further our understanding about how to control Internet abuse in the workplace, this study examines how a person’s level of self-control leads to cyber-slacking, how deterrence measures commonly used within organizations impact individual decisions to cyber-slack, and how self-control moderates the relative salience of one of the commonly used deterrence mechanisms against cyber-slacking, detection (monitoring) systems.  The results suggest that individuals that rate low in self-control overlook potential consequences for abusing the Internet in favor of immediate rewards, thus they have difficulty self-regulating themselves and have a higher propensity to cyber-slack.  The results also indicate that detection systems and awareness of the enforcement of sanctions are the biggest deterrents on individual intentions to cyber-slack and detection systems are even more salient to individuals that rate low in self-control.

    Checking Email in the Bathroom: Monitoring Email Responsiveness Behavior in the Workplace

    Get PDF
    The proliferation of email as a standard method of business communication necessitates research to understand effects on managers and their employees. This research investigates the phenomena of “email responsiveness,” defined as the extent to which individuals in the workplace perceive that they must prioritize how quickly they act in response to receiving an email, and “importance of connectedness,” defined as the priority individuals place on being connected to the organization. We present testable propositions that the social exchange mechanisms of leader-member exchange (LMX) and perceived organizational support (POS) are moderated by connectedness and thereby influence job attitudinal outcomes

    Data Security Threats Sources: An Empirical Examination of Institutional Characteristics

    Get PDF
    Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization\u27s probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type

    Rewarding Carrots & Crippling Sticks: Eliciting Employee Preferences for the Optimal Incentive Mix in Europe

    Get PDF
    A ranking of a variety of incentive devices used by firms according to their perceived effectiveness by employees is identified. The determinants of employee incentive preferences are also investigated, suggesting a ‘menu’ of conditions under which an organization’s personnel policies will have maximum motivational impact on its workforce. Based on the beliefs of a unique sample of workers from seven European countries, the results suggest that (a) the primary determinant of the level of employee effort is the amount of discretion offered at work; (b) pay incentives and ‘gift exchanges’ are the most important motivators; (c) the use of monitoring and Taylor-type assembly lines are the least effective incentives; and (d) the optimal design of incentive strategies by firms is strongly shaped by a host of contextual factors. The expressed desire for autonomy, and distaste for control, by employees gives credibility to the “participative” management approach.Incentives, effectiveness, effort, attitudes, employees

    The Perceived Effectiveness of Information Security Awareness

    Get PDF
    The need to protect information systems as much as possible from security threats and risks has risen in the last few decades due to the increase and sophistication of threats. The purpose of this dissertation is to examine the methods used to implement Information Security Awareness (ISA) programs. And also to investigate how the perceived effectiveness of ISA programs in preventing and mitigating security threats and risks organisations face, is assessed. The inductive research approach was used to explore the human side of the information security problem and how this impacts the perceived effectiveness of ISA programs. Then a prototype of a model to assess an ISA program was replicated. The results indicated that the awareness level of the region used for the implementation was average, meaning the ISA program was not as effective as it was expected to be. The model provides a guide to both researchers and practitioners in assessing ISA programs and obtaining statistical data or empirical data in order to prove how effective it is.   Keywords: Information Security Awareness, Information Security Policy, Information System, Security threats/risks and Perceived Effectiveness

    Surfing the waves : 17th ANZAM conference

    Get PDF

    Evaluating Australian social media policies in relation to the issue of information disclosure

    Get PDF
    Information disclosure is a key concern for many organisations especially in the era of social media. Social media allows for information disclosure to occur easily due to the ubiquitous usage of technology such as mobile devices. Acceptable social media policies can be used by organisations and their employees to improve their decision making behaviours as well as being used as a controlling mechanism to mitigate the issue of information disclosure. Through a review of related research literature along with a content analysis of publicly available Australian social media policies, this paper identifies a perceived gap pertaining to the issue of information disclosure in current Australian social media use policies. To fill this gap, we have highlighted the key components when developing an organisational social media policy. An evaluation criteria is also proposed by the paper that organisations can use to assist in mitigating the information disclosure

    Measuring organisational readiness for patient engagement (MORE) : an international online Delphi consensus study

    Get PDF
    Date of Acceptance: 28/01/2015. © 2015 Oostendorp et al.; licensee BioMed Central. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise statedWidespread implementation of patient engagement by organisations and clinical teams is not a reality yet. The aim of this study is to develop a measure of organisational readiness for patient engagement designed to monitor and facilitate a healthcare organisation’s willingness and ability to effectively implement patient engagement in healthcarePeer reviewedFinal Published versio
    • 

    corecore