24 research outputs found

    THE COLLECTIVE VIOLATION TALK SHOW: HOW DO WORKGROUPS ACCOUNT FOR CYBERDEVIANCE?

    Get PDF
    Cyberdeviance within workgroups is one of the most challenging cybersecurity problems facing modern organizations. Cyberdeviance is an intentional form of security policy violation, reflecting the outcome of a justification process deeming the violation acceptable for the violator. The collective nature of cyberdeviance within groups increases the challenge because group context can steer members to act in accordance with the group’s decisions, even when it violates organizational directives. Despite these challenges, we know very little about how workgroups justify cyberdeviance. We ask: How do workgroups create and validate accounts for cyberdeviance? Guided by the theoretical lens of accounts and based on insights from five deviant workgroups using unauthorized technologies (aka, shadow IT), our analysis points to three core findings. First, the group context is crucial to understanding the violation framing process. Second, at the discursive level, the groups use a unique set of verbalizations that deem cyberdeviance acceptable within the group. Third, we found that this set of verbalized accounts is instrumental to ensure group cohesion and belongingness. We discuss the theoretical and practical implications of these novel insights

    Security-Related Cynicism: Construct Development and Measurement

    Get PDF
    The widespread belief that employees are the weakest link in organizational information security leads to exposing them to a myriad of security requirements (i.e., policies and technical controls). Motivated by prior research indicating that such requirements can also have adverse effects, we introduce the concept of security-related cynicism. Based on organizational literature on employee cynicism, we develop a multidimensional construct including three key targets of employees’ security-related cynicism – the people responsible for information security, the employed security technologies, and the information security policies in use. We present our initial development of security-related cynicism by conceptualizing the construct, generating items from literature, and assessing the items’ content validity. By conducting a pretest and a main study, we plan to empirically validate a construct that helps researchers and practitioners alike to measure employees’ cynical attitudes towards information security

    Shadow IT and computer-mediated collaboration : developing a framework based on social presence theory

    Get PDF
    The use of unauthorized technologies in the workplace, called shadow IT (SIT), is increasing within organizations. Previous research identified that Shadow technologies are often collaborative systems used by employees to communicate and share content with colleagues, clients, or external partners. Therefore, we aim to develop a framework for the influence of shadow IT usage on computer-mediated collaboration based on Social Presence Theory. We conducted a literature review that resulted in a framework and the development of research propositions. The literature suggests that there is a positive influence of shadow IT usage on employee collaboration and communications. This paper presents theoretical and practical contributions. Analyzing shadow IT and collaboration through a theoretical lens makes progress on the discussion about the consequences of these unauthorized technologies for individuals and organizations. It is important for organizations to comprehend these impacts, such as on collaboration, which, in turn, can facilitate improvements in employee productivity.A utilização de tecnologias não autorizadas no local de trabalho, chamadas de Shadow IT (SIT), está aumentando nas organizações. Pesquisas anteriores identificam que tecnologias Shadow são frequentemente sistemas colaborativos utilizados pelos funcionários para se comunicar e compartilhar conteúdo com colegas de trabalho, clientes ou parceiros externos. O objetivo deste trabalho é desenvolver um framework, à luz da Teoria da Presença Social, de como o uso de shadow IT pode influenciar a colaboração mediada pela tecnologia. Para tanto, foi realizada uma revisão de literatura, culminando no desenvolvimento de um framework e em proposições de pesquisa. A literatura sugere que há uma influência positiva do uso de shadow IT na colaboração dos funcionários. Este trabalho traz contribuições teóricas e práticas. A análise da relação Shadow IT e colaboração a partir de uma lente teórica corrobora para a discussão dos impactos destas tecnologias não autorizadas. Para as organizações, é importante conhecer estes impactos, como por exemplo na colaboração, o que, por sua vez, pode viabilizar melhorias na produtividade dos funcionários

    Collective Deviance in IS

    Get PDF
    Scholars in social psychology and criminology have long argued that deviance is a group phenomenon. Based on the collective deviance literature, we aim to investigate the mechanisms behind deviant behaviors among people in groups, uncovering reasons for collective deviance within organizations. We are performing case studies among work groups (teams and departments) that commit deviances by interviewing employees and managers from those groups. Preliminary findings suggest that several deviances are committed by workgroups and, in most cases, the group’s members are aware they are violating security policies, although their intention is to increase work performance. Furthermore, in some cases, the IT department knows about the deviance, but do not take action to try solving the issue. Understanding employees’ behavior toward collective deviance can aid to cope with IS policy violations, providing new insights into policies development and strategies to mitigate such behaviors and increase information security

    ARE WE PROVIDING SERVICE QUALITY WITH IS? EMPIRICAL EVIDENCE FROM THE JUSTICE SYSTEM OF TWO DEVELOPING COUNTRIES

    Get PDF
    Little is known about Information and Communication Technologies for Development (ICT4D) im-pacts in Latin America justice system and few theoretical advances were done on this topic. This pa-per aims to propose a model grounded in Task-Technology Fit theory and explore its rationality in the justice system of two developing countries: Brazil and Argentina. Interviews with public managers and employees were conducted, and content analysis was applied to examine ICT4D impact on individual performance and public service quality. Our research makes several contributions by proposing a model on how ICT4D intervention can be assessed in an application area like the justice system. We examine the effectiveness of two national ICT4D endeavours, represented by the electronic lawsuit, thus showing how government can lead successful ICT4D implementations in developing countries. The practical value of this research rests on clarifying how ICT4D impacts public employees’ perfor-mance and public service quality. The results should help managers reduce gaps between policy and design of electronic lawsuits, thus guiding ICT4D endeavours by practitioners in other developing countries

    Hamiltonian systems: symbolical, numerical and graphical study

    Get PDF
    Hamiltonian dynamical systems can be studied from a variety of viewpoints. Our intention in this paper is to show some examples of usage of two Maxima packages for symbolical and numerical analysis (\texttt{pdynamics} and \texttt{poincare}, respectively), along with the set of scripts \KeTCindy\ for obtaining the \LaTeX\ code corresponding to graphical representations of Poincar\'e sections, including animation movies.Comment: In order to play the embedded animation, you should use Acrobat Reader. Submitted to Mathematics in Computer Scienc

    Impact of Workaround Behavior and Shadow IT Usage on Individual Performance

    Get PDF
    Managers have faced difficulties in managing workarounds and shadow IT usage within organizations. Extant literature suggests that the alternative practices, called workarounds, increase individual performance. However, some authors argue that a small number of studies have explored the relationship between workaround behavior and individual performance. Motivated by this gap, we performed a survey among 369 IT users to analyze the direct relationship between workaround behavior and individual performance, as well as the indirect relationship mediated by shadow IT. The results here show that workarounds and shadow IT usage increase individual performance according to users’ perception. Finally, the mediating effect of shadow IT on the relationship between workaround and individual performance was also confirmed

    The impact of transportation management system on the operational performance and on the relationship with transport service providers : a user perception

    Get PDF
    As empresas estão investindo em Tecnologia da Informação (TI) e aproveitando ao máximo, as vantagens que ela proporciona, para mudar os processos de negócio e melhorar o desempenho das operações. Dentro deste contexto, pretende-se aqui investigar o uso de um Sistema de Gestão de Transporte (TMS). O objetivo geral deste estudo é avaliar o impacto do uso do TMS e sua relação com o desempenho das operações de transporte das empresas e com os prestadores de serviços de transporte na percepção dos usuários. O método utilizado foi a pesquisa survey e um modelo conceitual foi elaborado e validado utilizando modelagem de equações estruturais (PLS-SEM). O resultado indica que os benefícios de um TMS têm impacto positivo no desempenho das operações de transporte, que, por sua vez, têm impacto positivo na relação com fornecedores de serviço de transporte.Companies are investing in Information Technology (IT) and making the most of the advantages it provides to change the negotiation process in both the internal and external market. Considering this context, we aim to investigate the use of a Transportation Management System (TMS). The general objective of this study is to assess the impact of the use of the TMS and its relationship with the operational transportation performance of companies and with the transport service providers from the users’ perception. To do so, a survey was conducted, which provided data to form a conceptual model that was validated using structural equation modeling (PLS- -SEM). The result indicates that the use of a TMS has a positive impact on the operational transportation performance that, in turn, has a positive impact on the relationship with transport service providers
    corecore