24 research outputs found

    Stress-Based IS Security Compliance: Towards a Conceptual Model

    Get PDF
    This study extends current behavioural information security compliance research by adapting the “work-stress model” of the Job Demands-Resources model to security behaviour. The paper proposes that users’ compliance burnout and security engagement are results of coping with security demands and receiving resources respectively. Compliance burnout would reduce security compliance while security engagement would increase it. The security compliance model developed in this study emphasises developing emotional and cognitive resources from IS users through effective provision of organisational resources and security requirements to promote desired security practice

    Remote Working Burnout: Empirical Study from TOE and Technostress Model

    Get PDF
    Work stress and burnout negatively impact the individual and companies. Remote working exacerbates these issues due to the lack of company support and social interactions. Yet, research on identifying factors contributing to stress and burnout in remote workspaces and differentiating the components of stress and burnout in this context is limited. This work presents and empirically evaluates a conceptual framework, based on the Technology – Organization – Environment framework and the technostress theory, which aims to address these gaps. In particular, the model proposed here distinguishes between technostress, work stress, and burnout. Future work to examine the model will use a survey instrument for data gathering, as well as confirmatory factor analysis and partial least squares for analysis

    An Adoption Model of Software as a Service (SaaS) in SMEs

    Get PDF
    Software as Service (SaaS) model of cloud computing is currently one of the most advanced technology innovations. Due to its scalability and network-based operation, SaaS offers opportunities for small and medium enterprises (SMEs) to take advantage of the latest technology without costly investment on IT infrastructure and expertise. Despite its benefits, SMEs’ adoption of SaaS is not prevalent. In this paper, by synthesizing Diffusion of Innovation theory, Technology-Organization-Environment theory and Protection Motivation theory, we propose a conceptual model which explains adoption factors of SaaS in SMEs. Our proposed model extends focus on protection motivation of SMEs in assessing SaaS adoption risks in addition to technology, organisation, and environment factors

    Factors Affecting Prosocial Sharing Health-related Information on Social Media During a Health Crisis

    Get PDF
    During a health crisis, prosocial sharing of health-related information (HRI) on social media can help to deliver early warnings about new diseases, raise social awareness, exchange support, and spread health policies. Current literature has mainly focused on the factors of general sharing of HRI under normal conditions but neglected those motivations under the health crisis context. This research aims to investigate factors that influence online users’ prosocial sharing of HRI during a health crisis. To obtain the objective, this study developed a dual helping-protecting motivation model from the fear appeal model and social exchange theory. The partial least squares analysis, carried out on the surveyed data of 326 participants, revealed that prosocial sharing intention is affected by protecting factors (i.e., sharing efficacy, response efficacy) and helping factors (i.e., reciprocity expectation). Additionally, both perceived health risk and perceived information quality risk were found to influence the sharing intention via motivational factors

    Understanding the Paradox of Information Systems (IS) Case Studies

    Get PDF
    This research aims to understand the mediating roles of learning engagement, learning process, learning experience and their impacts towards students’ learning outcomes through case study pedagogy. Using data collected from the 2013 cohort of Information Systems (IS) classes at RMIT University Vietnam, findings were based on students’ responses to survey items on whether localized real case studies have positive influence on student engagement (in skill, emotional, participation, and performance), learning process (students’ approach on knowledge), and learning experience (students’ opinion on feedback from classmates and lecturer). The research further explored how these mediators affect students’ learning outcomes in group performance and individual’s perceptions of group learning. Structural equation modeling was used to test the causal model. Analysis revealed that case knowledge and case perception had positive influences on students’ skill and emotional engagement. However, only case knowledge had a positive impact on the functions of feedback

    Exploring Knowledge Sharing Practices for Raising Security Awareness

    Get PDF
    This study aims to explore the types of information can be effectively communicated in three knowledge-sharing methods and their impact on employees’ security practice. On one end, guarding the organisation’s information system against cyber-attacks is critical and improving users’ knowledge and skills is a common approach to any security program. On the other end, organisations lack a clear understanding in determining what types of security information should be delivered through various methods of communication to be effective in boosting users’ knowledge and compliance behaviour. The study employed a qualitative method using semi-structured interviews with business users in Vietnam. The initial findings indicate a single method of knowledge and skill development is not sufficient to assist users to deal with complex and constant changing security needs. It is necessary to further experiment methods of encouraging formal and peer knowledge sharing that can support individual effort in complying with security policies

    Gene Family Abundance Visualization based on Feature Selection Combined Deep Learning to Improve Disease Diagnosis

    Get PDF
    Advancements in machine learning in general and in deep learning in particular have achieved great success in numerous fields. For personalized medicine approaches, frameworks derived from learning algorithms play an important role in supporting scientists to investigate and explore novel data sources such as metagenomic data to develop and examine methodologies to improve human healthcare. Some challenges when processing this data type include its very high dimensionality and the complexity of diseases. Metagenomic data that include gene families often have millions of features. This leads to a further increase of complexity in processing and requires a huge amount of time for computation. In this study, we propose a method combining feature selection using perceptron weight-based filters and synthetic image generation to leverage deep-learning advancements in order to predict various diseases based on gene family abundance data. An experiment was conducted using gene family datasets of five diseases, i.e. liver cirrhosis, obesity, inflammatory bowel diseases, type 2 diabetes, and colorectal cancer. The proposed method provides not only visualization for gene family abundance data but also achieved a promising performance level

    Influence of Security Compliance Demands and Resources on Security Compliance-An Exploratory Study in Vietnam

    No full text
    This study extends current information security compliance research by adapting “work-stress model” of the Job Demands-Resources (JD-R) model to explore how security compliance demands and security resources influence the system users’ information security compliance. The paper proposes that security compliance burnout and security engagement as the mediating factors between security compliance demands, security resources and individual security compliance. We employed a multi-case study method to explore the characteristics of security compliance demands and security resources that could influence security compliance. Interviews with system users in three organisations in Vietnam revealed three types of security compliance and four types of security resources that may influence security compliance burnout and engagement respectively. Practical implications of the initial findings are also presented

    Information Security and People: A Conundrum for Compliance

    No full text

    Factors affecting prosocial sharing health-related information on social media during a health crisis: A dual exchanging-protecting model

    No full text
    During a health crisis, prosocial sharing of health-related information (HRI) on social media can help deliver early warnings about new diseases, raise social awareness, exchange support, and spread health policies. Current literature has mainly focused on the factors of general sharing of HRI under normal conditions but neglected those motivations under the health crisis context. This study aims to investigate factors that influence prosocial sharing of HRI on social media during a health crisis. To obtain the objective, this study proposes a dual exchanging-protecting model derived from the fear appeal model and social exchange theory. A partial least squares analysis, carried out on surveyed data of 326 participants, suggested that online users performed two steps of threat appraisal and coping appraisal when they share HRI on social media. Specifically, both health and information risks were found to have impacts on prosocial sharing via motivational factors. Additionally, the motivations of prosocial sharing include both protecting factors (i.e., sharing efficacy, response efficacy) and an exchanging factor (i.e., reciprocity expectation). Our findings offer several theoretical implications and practical contributions for health communicators
    corecore