4 research outputs found

    46P. Towards an ERP Individual Performance Model

    Get PDF
    A theoretical model to investigate factors influencing enterprise resource planning (ERP) system users’ performance in the post-implementation stage within organization is developed. The hypotheses were tested using survey data from companies that implemented ERP systems. Results from partial least squares (PLS) analyses suggest that organization climate, absorptive capacity, ease of use and system quality positively and directly affect individual performance. Additionally, the findings highlight the important role of absorptive capacity in mediating the effect of social ties on individual performance and positively impacting ease of use. Results also suggest that strong ties have a negative effect on absorptive capacity. Surprisingly, no support was found for the hypotheses that utilization mediates the effect of social ties, absorptive capacity, organization climate, ease of use and system quality on individual performance

    A Cybercrime Taxonomy: Case of the Jamaican Jurisdiction

    Get PDF
    Cybercrimes over the years have become both increasingly numerous and sophisticated. This paper presents a taxonomy for cybercrimes that can be used for the analysis and categorization of such crimes, as well as providing consistency in language when describing cybercrimes. This taxonomy is designed to be useful to information bodies such as the Jamaican Cybercrime Unit, who have to handle and categorize an ever increasing number of cybercrimes on a daily basis. Additionally, cybercrime investigators could use the taxonomy to communicate more effectively as the taxonomy would provide a common classification scheme. The proposed taxonomy uses the concept of characteristics structure. That is, the taxonomy classifies properties about that which is being classified and not by the object itself. The taxonomy consists of characteristics which provide a holistic taxonomy in order to deal with inherent problems in the cybercrime field

    Exploring the Impacts of Individual Styles on Security Compliance Behavior: A Preliminary Analysis

    Get PDF
    It is well known that while there is a strong correlation between adoption of ICTs and economic growth there is also a corresponding strong correlation between the adoption of ICTs and increased ICT-related technological threats that can have severe economic and other negative consequences. Within this context cybersecurity has become a major issue in both “developed” and “developing” countries, with humans being considered the “weakest link in the chain” of system security. While the cybersecurity literature has previously explored constructs such as awareness and self-efficacy to explain cybersecurity compliance behavior, there has been no exploration of the impacts of individuals’ decision styles on cybersecurity related compliance behavior and some other antecedents of such behavior. In this paper we address this issue using an exploratory approach and present a causal model for consideration in future research
    corecore