52 research outputs found

    The Role of Organizational Support for Creativity in Knowledge Management Systems

    Get PDF

    Browser Update Practices in Households: Insights from Protection Motivation Theory and Customer Satisfaction

    Get PDF
    Web Browser is the most common tool used for surfing the Internet. With personal computer users growing by leaps and bounds, the use of browsers is also increasing at a similar rate. Outdated versions of browsers have security flaws and hence represent a significant threat to the cyber infrastructure. Yet many users do not keep their browsers updated. Given the fact that voluntariness of action characterizes personal computer users\u27 security behavior, we argue that satisfaction derived from using the browser along with perceptions of threat severity and vulnerability play an important role in browser update intention. However, considering the inconsistency of household computer users\u27 behavior, we posit that urgency plays a role in the browser update behavior. Using a combined model of Customer Satisfaction and Protection Motivation Theory along with positive and negative urgency as direct antecedents’ to behavior, we evaluate the important antecedents to browser update intentions

    Are Printed Documents Becoming Irrelevant? The Role of Perceived Usefulness of Knowledge Repositories in Selecting From Knowledge Sources

    Get PDF
    Knowledge sourcing through knowledge repositories, people, and documents in organizational settings are investigated in this paper. This competition among the knowledge sources is modeled via the perceived usefulness and ease of use of a Knowledge Management System (KMS) and extends the work of Gray and Durcikova (2005-2006) by adopting the concept of competition among knowledge sources suggested by Zimmer et al (2007-2008). Results suggest that when a KMS is perceived to be useful, users tend to reduce the usage of printed documents as a source of knowledge. However, when a KMS is perceived to be useful and easy to use, knowledge sourcing from other individuals is not influenced. This suggests that while good quality KMS may be slowly replacing printed documents, they complement sourcing knowledge from colleagues rather than reducing it. Implications for future research and practice are offered

    Knowledge Systems and Risk Management: Towards a Risk and Threat Assessment Framework

    Get PDF
    Knowledge is the most important asset that a company can have. Thus, it is imperative that this asset is safeguarded just like generic information assets. However, knowledge management (KM) and knowledge systems are different than traditional information systems with different threats and different operational requirements. Risk assessment is the corner stone to security. This paper discusses risk assessment. frameworks and builds on a KM/knowledge system specific risk assessment framework with a step-by-step guideline for managers as well as a generic KM/knowledge system specific threat assessment

    Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior

    Get PDF
    Secure behavior, defined as users’ compliance with their organization’s password policy, is critical for sustaining a profitable and operational organization. Training that provides security arguments and promotes systematic cognitive processing has been shown to be an effective mechanism for improving secure behavior. Training by providing security cues, on the other hand, has been criticized as having a short-lived and unpredictable influence on secure behavior. This paper challenges this criticism by explaining how security cues influence secure behavior and when they are more effective in influencing secure behavior than security arguments. We hypothesize the different theoretical mechanisms through which security arguments and security cues influence secure behavior. We further hypothesize that when users’ attitude toward behaving secure is poor, security arguments should be used. However, when users’ attitude toward behaving secure is positive, security cues should be used. This paper suggests how to test our proposed hypotheses in an experimental setting
    corecore