15 research outputs found

    Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use

    Get PDF
    Whistle-blowing has long been an important organizational phenomenon that improves organizations in the long-run. Online whistle-blowing systems are becoming increasingly prevalent channels for reporting organizational abuses. Given that the Sarbanes-Oxley Act and similar financial laws throughout the world require multi-national firms to establish whistle-blowing procedures and systems, whistle-blowing research is even more important (Ernst & Young 2009). Existing whistle-blowing theory does not explicitly predict risk, trust, cross-cultural considerations, nor use of anonymous, online whistle-blowing systems. Yet, all of these are key considering in the whistle-blowing act and whistle-blowing in general. Furthermore, unless these systems are further understood, they may not be used, or they may not be used properly. This is a particular problem for multi-national financial firms that increasingly need to comply with whistle-blowing regulations. This research-in-process paper details our plans to create and extend baseline whistle-blowing theory, by uniquely considering anonymity, risk, trust, and cross-cultural considerations in using whistle-blowing systems. The model will be rigorously testing using working professionals in the USA, Middle East, and China. We propose our design and measures for testing the model

    Information systems and culture - a systematic hermeneutic literature review

    Get PDF
    This paper addresses a challenge faced by authors of literature reviews in the information systems (IS) discipline; how can systematic rigor be applied when conducting literature reviews while maintaining flexible hermeneutic engagement with the literature? The paper describes a systematic hermeneutic approach for conducting a literature review that allows the strengths of different literature review methods to be combined in a complementary fashion. The use of this approach is demonstrated through a review of the large extant body of research exploring IS and culture. Culture is widely perceived as an important contributor to issues in IS initiatives. Through this review, an updated and refreshed understanding of IS and culture research is obtained, and ideas for further research are exposed. The hermeneutic approach facilitates the emergence of insight through a cyclical engagement between the authors and the text that in this instance provides a new perspective for future IS and culture research and literature reviews

    A social engineering jelentette veszélyek napjainkban

    Get PDF
    A social engineering angol nyelvterületről származó fogalom napjaink kiberbűnözéséhez köthető népszerű támadási forma. Ennek során a bűnözők az információbiztonságot nem, vagy csak nagyon kevéssé ismerő, vakon együttműködő személyektől szereznek információt. Ezek az értesülések később gyakran védett rendszerekhez történő hozzáférés kulcsaként szolgálnak, vagy csak egyszerűen megkönnyítik a jogtalan hozzáférést. A social engnineering jelensége nem egyszerűen a nemzeti büntetőtörvényekből indul ki, hanem inkább csak több elkövetési módszert, azaz modus operandit foglal magába. Ezek közös jellemzője, hogy a két mozzanatos cselekmény során az elkövetők főként megtévesztéssel, ritkán nyomás gyakorlásával (pszichikai erőszakkal), esetleg ezek kombinációjával, de sohasem fizikai erőszakkal először hozzájutnak a második mozzanat elkövetéséhez szükséges, vagy azt megkönnyítő információkhoz, majd ezeket a cselekmény második mozzanatánál alkalmazzák jogtalan előnyök megszerzése érdekében. A cikk szerzői tudománymetriai vizsgálat keretében elemzik a fogalom eredetét, annak tudományközi kapcsolatait, amelyeket elengedhetetlenül szükségesnek tartanak a mai értelmezéshez. Az ismertté vált esetek alapján felvázolható főbb trendek alapján a szerzők napjainkban megtörtént konkrét példán keresztül igyekeznek bemutatni a jelenséget és felhívni a figyelmet a veszélyekre, a megelőzés terén pedig és az adat- és információbiztonsági tudatosság jelentőségére. A tanulmány zárásaként megvizsgáljuk azokat a személyiséghez kapcsolódó tényezőket, amelyek befolyásolhatják az információbiztonsági tudatosságot

    Global Perspectives on IT Occupational Culture: A Three-Way Cultural Analysis

    Get PDF
    This study examines the occupational values of IT professionals across the world. Using the three-way perspective of cultural theory as integrated, differentiated, and fragmented allows for a more comprehensive view of IT Occupational Culture (ITOC). Conducted under the auspices of the World IT Project, survey responses were gathered from more than 10,000 IT workers in 37 different countries. The findings provide global-based support for the ITOC ideology of values: Autonomy in Decision-Making, Structure in the Workplace, Precision in Communication, Innovation in Technology, Reverence for Knowledge, and Enjoyment in the Workplace (abbreviated as ASPIRE). The most important value was Reverence for Knowledge. ITOC is both more homogeneous and, at the same time, more complex than originally thought. While there are surprising global similarities in ITOC around the world, there are also important differences, which may be due to national culture, especially with regard to Structure in the Workplace and Precision in Communication. A better understanding of ITOC around the world should help reduce the amount of cultural clash between IT departments and business management

    A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research

    Get PDF
    Social networking applications such as blogs, instant messengers, podcasts, social networking websites (e.g., Renren in China, Vkontakte in Russia, Facebook), professional networking websites (e.g., LinkedIn), Twitter, and virtual worlds (e.g., Second Life) have become increasingly popular in the last few years. Because these applications have substantial implications for users, organizations, and society, social networks (SNs) have gained attention from information systems (IS) researchers and grown steadily as a research area since 2004. However, to organize the accumulated research and encourage researchers to examine new and pressing issues in SNs, available knowledge needs to be synthesized and research gaps need to be addressed (Bandara et al., 2011). Therefore, we systematically reviewed publications about SNs published in major IS journals between January 2004 and August 2013 and, in this paper, overview the state of IS research regarding SNs. We show the evolution of the existing IS research on SNs to build a common nomenclature and taxonomy for this area of research, to identify theories used, and to provide a useful roadmap for future research in this area

    Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications

    Get PDF
    Mobile applications (also known as “apps”) have rapidly grown into a multibillion-dollar industry. Because they are available through devices that are “always on” and often with the user, users often adopt mobile apps “on the fly” as they need them. As a result, users often base their adoption and disclosure decisions only on the information provided through the mobile app delivery platform (e.g., the Apple App Store™ or Google Play™). The fact that using a mobile app often requires one to disclose an unprecedented combination of personal information (e.g., location data, preferences, contacts, calendars, browsing history, music library) means that one makes a complex risk/benefit tradeoff decision based on only the small amount of information that the mobile app delivery platform provides—and all in a short period of time. Hence, this process is much shorter and much riskier than traditional software adoption. Through two experiments involving 1,588 mobile app users, we manipulated three primary sources of information provided by a platform (app quality ratings, network size, and privacy assurances) to understand their effect on perceptions of privacy risks and benefits and, in turn, how they influence consumer adoption intentions and willingness to pay (WTP). We found that network size influenced not only perceived benefits but also the perceived risks of apps in the absence of perfect information. In addition, we found that integrating a third party privacy assurance system into the app platform had a significant influence on app adoption and information disclosure. We also found that a larger network size reduces LBS privacy risk perceptions, which confirms our information cascade hypothesis. We discuss the implications of these findings for research and practice

    A Knowledge Development Perspective on Literature Reviews: Validation of a new Typology in the IS Field

    Get PDF
    Literature reviews (LRs) play an important role in developing domain knowledge in all fields. Yet, we observe insufficient insights into the activities with which LRs actually develop knowledge. To address this important gap, we 1) derive knowledge-building activities from the extant literature on LRs, 2) suggest a knowledge-based LR typology that complements existing typologies, and 3) apply the typology in an empirical study that explores how LRs with different goals and methodologies have contributed to knowledge development. In analyzing 240 LRs published in 40 renowned information systems (IS) journals between 2000 and 2014, we draw a detailed picture of knowledge development that one of the most important genres in the IS field has achieved. With this work, we help to unify extant LR conceptualizations by clarifying and illustrating how they apply different methodologies in a range of knowledge-building activities to achieve their goals with respect to theory

    Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

    Get PDF
    Hedonic-motivation systems (HMS)—systems used primarily to fulfill users’ intrinsic motivations—are the elephant in the room for IS research. Growth in HMS sales has outperformed utilitarian-motivation systems (UMS) sales for more than a decade, generating billions in revenue annually; yet IS research focuses mostly on UMS. In this study, we explain the role of intrinsic motivations in systems use and propose the hedonic-motivation system adoption model (HMSAM) to improve the understanding of HMS adoption. Instead of a minor, general TAM extension, HMSAM is an HMS-specific system acceptance model based on an alternative theoretical perspective, which is in turn grounded in flow-based cognitive absorption (CA). The HMSAM extends van der Heijden’s (2004) model of hedonic system adoption by including CA as a key mediator of perceived ease of use (PEOU) and of behavioral intentions to use (BIU) hedonic-motivation systems. Results from experiments involving 665 participants confirm that, in a hedonic context, CA is a more powerful and appropriate predictor of BIU than PEOU or joy, and that the effect of PEOU on BIU is fully mediated by CA sub-constructs. This study lays a foundation, provides guidance, and opens up avenues for future HMS, UMS, and mixed-motivation system research

    Assessing the Effects of Communication Media Affordances and the Awareness of Media Security on Knowledge Sharing Behavior

    Get PDF
    Global Software Development (GSD) team members engage in intellectual activities that involve sharing business domain knowledge and technical knowledge across geographical areas, which is crucial to the successful development of software. In global software development, media choice may influence how virtual teams create and share knowledge. As digital technology advances and organizations become more digitally transformed, current communication theories for media selection lack the explanation to the complicated phenomena with the use of advanced media technologies. There have been many studies focused on the effectiveness of media, but they did not include user’s understanding of system security and its influence on knowledge sharing behavior. However, affordance theory explains the utility with both social actors and technical features. The use of media may be shaped by features of technologies and user’s perception on system security. The goal of this study was to empirically assess the effects of media affordances and media security awareness on knowledge sharing behaviors among GSD team members with the lens of affordance theory. In this study, data was collected through survey from 214 GSD employees, after inviting 1000 employees to participate. The survey data was analyzed to test the effects of communication media affordance and user’s awareness of media security on behavior in knowledge sharing. The analysis results show that awareness of media security had significant moderating effects on the relationships from some actualized media affordances to implicit knowledge sharing. The results of this study revealed positive relationships between perceived media affordances and actualized media affordances. The results also showed that organization tenure had a significant effect on implicit knowledge sharing, and professional tenure had a significant effect on explicit and implicit knowledge behavior. This study contributed to the body of knowledge in organizational communication literature by providing new insights into how technology properties and users’ awareness on technology security shape team members’ knowledge sharing practice
    corecore