555 research outputs found

    Organizational culture and information privacy assimilation: An empirical study

    Get PDF
    Data privacy concerns in organizations have been rising over the past several decades. As per the GDPR (General Data Protection Regulation), organizations need to implement highest possible privacy settings by design and default. This study develops a model for understanding the mechanisms of information privacy assimilation in Information Technology (IT) organizations. This study treats information privacy as a distinct dimension separate from information security. We have examined the mediating role of senior management participation and organizational culture on privacy assimilation (strategy and organizational activities). On the strategy, our findings showed that full mediating role of senior management participation for coercive forces, partial mediation for normative and mimetic forces. On the organizational activities, our findings showed that full mediating role of organizational culture for coercive forces and normative forces, partial mediation for mimetic forces. These findings would enable senior managers to identify and respond to institutional pressures by focusing on appropriate factors within the organization

    Antecedents of Information Privacy Assimilation in Indian IT Organizations: An Empirical Investigation

    Get PDF
    Information privacy at the organizational level is receiving increased attention due to the huge amount of personal information being stored, transmitted across national boundaries, and ownership being shared between organizations due to change in business dynamics. This study develops a framework for understanding the mechanisms of information privacy assimilation in Information Technology (IT) organizations. There is a great need for investigating the interplay between external forces and internal influencers that impact the privacy assimilation practices within an organization. To fill this gap, we empirically examined the interplay between the external forces and internal influencers following the institutional theory. Specifically, we have examined the nature and relative significance of influencing forces, and the mediating role of senior management participation. Also, the moderating effects of process capability and cultural aspects have been investigated. This study treats information privacy as a distinct dimension separate from information security. Our findings show that mediating role of senior management participation for coercive and normative forces. Mimetic forces appears to have direct impact on assimilation. Also, positive moderating effect of process capability and negative moderating effect of cultural aspects is observed for coercive forces. These findings would enable senior managers identify and respond to institutional pressures by focusing on appropriate factors within the organization

    Understanding Information Privacy Assimilation in IT Organizations using Multi-site Case Studies

    Get PDF
    We develop a framework for understanding the mechanisms of information privacy assimilation in information technology (IT) organizations. Following neo-institutional theory, we develop a broad conceptual model and further build a detailed theory based on a multi-site, multi-case study of 18 organizations. We treat information privacy as a distinct dimension separate from information security. As in the case of information security, senior management support emerged as a mediator between the external influences of coercive, mimetic, and normative forces and information privacy assimilation. Privacy capability emerged as a distinct construct that had a moderating effect on the influence of coercive and normative forces on privacy assimilation. Similarly, cultural acceptability also moderated the effect of external forces on privacy assimilation. We produce a theoretical model that future research can empirically test. The findings would enable senior managers identify and respond to institutional pressures by focusing on appropriate factors in the organizations

    Existence of limit cycles in a predator-prey system with a functional response

    Get PDF
    We consider the existence of limit cycles for a predator-prey system with a functional response. The system has two or more parameters that represent the intrinsic rate of the predator population. A necessary and sufficient condition for the uniqueness of limit cycles in this system is presented. Such result will usually lead to a bifurcation curve

    Distribution of Glirids in an Alpine national park

    Get PDF
    In this long-term study, we evaluated the distribution of three species of Glirids: Hazel Dormouse (Muscardinus avellanarius), Garden Dormouse (Eliomys quercinus) and Edible Dormouse (Glis glis) in the Gran Paradiso National Park (Western Italian Alps). The aim was to investigate the ecology, adaptation strategies, and distribution of these dormouse populations along an altitudinal gradient. Monitoring started in 2015 and is still ongoing. We used five different techniques (searching for nests, grids of nest boxes, transects of live traps, nesting tubes, and footprint tunnels), placed along an altitudinal gradient from 700 to 2300 m a.s.l. We found a total of 680 signs of the presence of Hazel Dormouse and 46 individuals, 275 signs and 142 individuals of the Garden Dormouse and 674 signs and 67 individuals of the Edible Dormouse. The three species selected different altitudinal gradients: Edible Dormouse from 800 to 1700 m, with a prevalence between 800-1100 m; Garden Dormouse from 1100 to 2000 m, with a prevalence between 1400-1700 m. The Hazel Dormouse was ubiquitous from 800 to 2032 m, without a clear altitudinal pattern. Edible Dormice were mainly found in deciduous and mixed forests, while Garden Dormice usually occurred in coniferous forests. The Hazel Dormouse seemed to be regularly distributed in all forest types up to the tree limit. These results, obtained from diverse methodologies, permitted comparison between the monitoring protocols, improved knowledge of habitat selection by Glirids in Alpine habitats, as well as providing novel insights within the context of climate change

    Existence of Limit Cycles in a Predator-Prey System With a Functional Response,

    Get PDF
    Abstract We consider a predator prey system with the functional response of the form θ(x) = arctan(ax); a > 0. The main concern in this paper is the existence of limit cycles for such system. A necessary and sufficient condition for the nonexistence of limit cycles is given for such system

    The Generalized Stochastic Microdosimetric Model: the main formulation

    Full text link
    The present work introduces a rigorous stochastic model, named Generalized Stochastic Microdosimetric Model (GSM2), to describe biological damage induced by ionizing radiation. Starting from microdosimetric spectra of energy deposition in tissue, we derive a master equation describing the time evolution of the probability density function of lethal and potentially lethal DNA damage induced by radiation in a cell nucleus. The resulting probability distribution is not required to satisfy any a priori assumption. Furthermore, we generalized the master equation to consider damage induced by a continuous dose delivery. In addition, spatial features and damage movement inside the nucleus have been taken into account. In doing so, we provide a general mathematical setting to fully describe the spatiotemporal damage formation and evolution in a cell nucleus. Finally, we provide numerical solutions of the master equation exploiting Monte Carlo simulations to validate the accuracy of GSM2. Development of GSM2 can lead to improved modeling of radiation damage to both tumor and normal tissues, and thereby impact treatment regimens for better tumor control and reduced normal tissue toxicities
    corecore