13,996 research outputs found

    Measuring and Validating Emotional Intelligence as Performance or Self-Report

    Get PDF
    This is a study of emotional intelligence (EI). EI was measured by performance and self-report tasks. Data were also obtained on basic values, some standard personality dimensions such as those specified in the five-factor model, social adjustment and several scales of impression management. Criteria were loneliness, work-family life balance and Internet addiction, and also measures of emotional and value deviance. Participants were college students in a business education program who participated anonymously in the extensive test session, which took about six hours to complete. It was found that EI measures - both self-report and performance - intercorrelated as expected, and that EI was strongly related as expected to criteria. People high in EI reported less loneliness, less Internet addiction and better work/studies - leisure/family balance. Impression management was more strongly related to self-report data than to performance. Self-report data were to a large extent accounted for by measures of personality according to the five-factor model, but performance measures were not. Finally, the extent of faking was measured and controlled for.emotional intelligence; personality; five-factor model; and impression management

    Orientation and Social Influences Matter: Revisiting Neutralization Tendencies in Information Systems Security Violation

    Get PDF
    It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security policy from social perspectives. This study is a quantitative study that used a survey methodology for data collection. A stratified sampling method was used to ensure equal representation in the population. A sample of members was collected using a random sampling procedure from each stratum. All data were collected by sending a survey link via email through SurveyMonkey’s participant outreach program to the aforementioned groups. Partial least squares were used for data analysis. Findings showed business and ethical orientation had a negative impact on accepting neutralization techniques which ultimately result in the intent to violate information security policy. Furthermore, this research found neutralization, social influences, and social pressures as having 24 percent of influence to violate information security policy. Business orientation and ethical orientation contributed to 15 percent of influence in variance on employees accepting neutralization techniques. Implications of this research suggest information security policies can be compromised by employees and additional measures are needed. Behavioral analytics may provide an understanding of how employees act and why. Routine training is necessary to help minimize risks, and a healthy security culture will promote information security as a focal point to the organization

    Anger and assaultiveness of male forensic patients with developmental disabilities : links to volatile parents

    Get PDF
    This study with 107 male forensic patients with developmental disabilities investigated whether exposure to parental anger and aggression was related to anger and assaultiveness in a hospital, controlling for background variables. Patient anger and aggression were assessed by self-report, staff-ratings, and archival records. Exposure to parental anger/aggression, assessed by a clinical interview, was significantly related to patient self-reported anger, staff-rated anger and aggression, and physical assaults in hospital, controlling for age, intelligence quotient, length of hospital stay, violent offense history, and childhood physical abuse. Results are consonant with previous findings concerning detrimental effects of witnessing parental violence and with the theory on acquisition of cognitive scripts for aggression. Implications for clinical assessment and cognitive restructuring in anger treatment are discussed

    An Empirical Examination of the Impact of Organizational Injustice and Negative Affect on Attitude and Non-Compliance with Information Security Policy

    Get PDF
    Employees’ non-compliance with Information Security (IS) policies is an important socio-organizational issue that represents a serious threat to the effective management of information security programs in organizations. Prior studies have demonstrated that information security policy (ISP) violation in the workplace is a common significant problem in organizations. Some of these studies have earmarked the importance of this problem by drawing upon cognitive processes to explain compliance with information security policies, while others have focused solely on factors related to non-compliance behavior, one of which is affect. Despite the findings from these studies, there is a dearth of extant literature that integrates both affective and cognitive theories that shed light on a more holistic understanding of information security non-compliance behaviors. This research developed a theoretical model of the relationship between negative affect and cognitive processes and their influence on employees’ ISP non-compliance at the workplace. Cognitive processes provide a significant foundation in understanding why employees show non-compliance behavior with ISPs and rules at the workplace. However, they do not completely explain the motivations behind the deviant employee’s non-compliance behavior. This research examined how the relationships between organizational injustice frameworks and negative affect influence attitude, which, in turn, influences behaviors that can be used to understand ISP non-compliance. Extant literature has explored theories like neutralization, deterrence, theory of planned behavior, rational choice theory, affective events theory, and work-related events as an outcome of neutralization, and organizational injustice, to explain cognitive reactions. The research model was empirically tested using the data collected from 115 participants who participated in a scenario-based survey. The results showed that negative affect has a significantly positive impact on employees’ attitude and ISP non-compliance behavior. Distributive, informational and interpersonal injustices were also found to influence ISP non-compliance in a significant but negative direction. The study contributes to both theory for IS research and practice for organizational management of security policies

    ANALYSIS OF THE DEVELOPMENT AND APPLICATIONS OF RISK ASSESSMENT FOR SEX OFFENDERS IN CORRECTIONAL POPULATIONS: A COMPARATIVE REVIEW

    Get PDF
    This review discusses the content and theory that drive the creation of risk assessment of sex offenders. While risk assessment tools are used by corrections agencies to determine the potential risk for reoffending for all types of offenders, this paper focuses on those used for sex offenders. The intent with this project is to assess various risk assessment tools and describe the implications on possible new scales, and to cover potential solutions to problems inherent to the field of risk assessment. These goals are accomplished by extensive inventory of the most widely used risk scales, followed by discussion of a series of viable solutions to the problems inherent with risk scales. Suggested changes to the field of risk assessment include incorporating step-wise applications and using theoretically- grounded scale components. This paper also organizes much of the current literature about risk assessment and highlights common shortcomings and innovations of each scale discussed

    A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites

    Get PDF
    This study proposes that individual personality characteristics and behavioral triggering effects come together to motivate online victimization. It draws from psychology’s current understanding of personality traits, attribution theory, and criminological research. This study combines the current computer deviancy and hacker taxonomies with that of the Dark Triad model of personality mapping. Each computer deviant behavior is identified by its distinct dimensions of cyber-criminal behavior (e.g., unethical hacking, cyberbullying, cyberstalking, and identity theft) and analyzed against the Dark Triad personality factors (i.e., narcissism, Machiavellianism, and psychopathy). The goal of this study is to explore whether there are significant relationships among the Dark Triad personality traits and specific cyber-criminal behaviors within social network sites (SNSs). The study targets offensive security engineers and computer deviants from specific hacker conferences and from websites that discuss or promote computer deviant behavior (e.g., hacking). Additional sampling is taken from a general population of SNS users. Using a snowball sampling method, 235 subjects completed an anonymous, self-report survey that includes items measuring computer deviance, personality traits, and demographics. Results yield that there was no significant relationship between Dark Triad and cyber-criminal behaviors defined in the perceived hypotheses. The final chapter of the study summarizes the results and discusses the mechanisms potentially underlying the findings. In the context of achieving the latter objective, exploratory analyses are incorporated and partly relied upon. It also includes a discussion concerning the implications of the findings in terms of providing theoretical insights on the Dark Triad traits and cyber-criminal behaviors more generally

    Examining Employee Social Media Deviance: A Psychological Contract Breach Perspective

    Get PDF
    With the prevalence of social media, employees’ deviant behaviors on social media can go viral and result in unpredictable negative outcomes beyond the workplace. This paper investigates the relationship between abusive supervision and employee social media deviance from the theoretical perspective of psychological contract breach (PCB), and examine the moderating role of social media controls. Building on prior studies of abusive supervision and employee workplace deviance, this paper argues that abusive supervision plays a crucial motivational role in triggering employee social media deviance. Our results demonstrate that employees who experience abusive supervision are more likely to perceive PCB, and thus engage in social media deviance. User awareness of social media policy and informal sanctions can weaken the positive relationship between employee perceived PCB and social media deviance

    UNDERSTANDING SEXUAL HARASSMENT IN MASSIVELY MULTIPLAYER ONLINE ROLE-PLAYING GAMES: CRIME OPPORTUNITY AND AFFORDANCE PERSPECTIVES

    Get PDF
    With the popularity of massively multiplayer online role-playing games (MMORPGs), in-game sexual harassment has drawn tremendous attention from game players, game developers, and governments. Because of its devastating impact on victims, researchers from various disciplines have advocated the importance of understanding sexual harassment in MMORPGs. While information systems (IS) researchers have begun to investigate user behaviors in MMORPGs, research on deviant behaviors in MMORPGs remains scarce in the IS literature. With the inherent focus on sociotechnical factors in the IS discipline, we believe it is crucial to consider both the social and technical elements of sexual harassment in MMORPGs. Thus, our research aims to integrate crime opportunity theory and affordance theory to explain how MMORPG affordances give rise to the evaluation of favorable MMORPG environmental conditions for in-game sexual harassment and the inclination to sexually harass others in the games. This research-in-progress paper proposes a research model and presents our research design for examining sexual harassment in MMORPGs

    Recidivism, gender, and race: An analysis of the Los Angeles County Probation Department’s Risk and Needs Assessment Instruments

    Get PDF
    This study assesses the predictive validity of an adult risk need assessment, the Los Angeles Probation Department’s Risk and Needs Assessment Instruments, on 793 clients using several logistic regression models. Models were generated to look for a relationship between risk score and recidivism. This relationship is further explored across gender and race. There are two separate risk assessment instruments used in this study and the sample is separated into two separate groups. The first risk assessment instrument was based on static risk factors such as history of drug or alcohol use, age of first conviction, and conviction history. This assessment was applied to the sample group labeled investigation. The second risk assessment tool incorporated dynamic risk factors such as employment status, education, and peer group. This assessment was applied to the sample group labeled supervision. The results of the study showed that the risk scores calculated in the investigation sample had no significant relationship with recidivism in general or across race or gender. The risk scores calculated in the supervision sample had a significant relationship with recidivism. However, when examined by gender there was no relationship between risk score and recidivism for the female sample. When examined by race there was not a significant relationship between risk score and recidivism in any racial category. Suggestions for implications in practice and future research are also reviewed

    VULNERABILITY AND E-CRIMINALITY OF IT

    Get PDF
    The development of an informational society requires consolidating trust in information and communication technology (ICT), the protection of personal data and of the right to a private life, but also promoting a world and national unification of the infoinformational society, information and communication technology, informatic safety, vulnerable to e-criminality, knowledge
    • 

    corecore