699 research outputs found

    Modular and Collaborative Theorizing: A Move Away from Theoretical Superstars

    Get PDF
    Theorizing is often described as a rigorous, nebulous, and time-consuming process. In the end, theories are traditionally attributed to one individual or to a small group of individuals. Consider for example Einstein’s Theory of Relativity, Aker’s Social Learning Theory, Davis’ Technology Adoption Model, and Fishbein and Ajzen\u27s Theory of Reasoned Action. Further, expectations of IS theories are quite high and accepted in fewer publication outlets as compared to routine theory testing endeavors, creating extra risk in commencing the theorizing process. The “average” researcher’s involvement in theorizing is often limited to theory testing and incremental theory extension through these testing efforts. This critical polemic proposes that such arrangements are not necessary and may be damaging to the collective creativity of the IS discipline. In this polemic, we identify different configurations for work products and working relationships between researchers to collaboratively develop novel IS theories in a modular and incremental fashion

    The Dark Side of Leadership in Information Systems Security: A Model of the Effect of Manager Transgressions on Employee Security Behaviors

    Get PDF
    This paper presents a conceptual model to explain employee security behaviors as a function of manager’s transgressions in the workplace. To date, most information systems security (ISS) studies neglect the effects poor leadership can have on the security of organizational ISS. This paper seeks to broaden the study of leadership in information systems security by examining negative effects of leadership. This paper suggests that leader transgressions create punitive desires in employees that result in ISS-related deviance. This paper identifies two forms of deviance, intentional policy non-compliance and less intentional neglect of proactive security behaviors. Importantly, although other studies mention these two forms of deviance, this paper is one of few that model them together. The model in this paper can help leaders understand the effects of their negative behaviors and direct leaders toward ways to improve relationships with employees, and thereby enhance security

    The Practice and Importance of Chestnut Cultivation in Azerbaijan in the Face of Blight, Cryphonectria parasitica (Murrill) Barr

    Get PDF
    The arrival and spread of chestnut blight, caused by the fungus Cryphonectria parasitica (Murrill) Barr, in Caucasian Azerbaijan has compromised the livelihoods of chestnut farmers and is causing rapid genetic erosion in the center of diversity for the European chestnut, Castanea sativa Mill. In Azerbaijan, blight was first reported in 2008 and is currently present in all chestnut-growing regions. Fortunately, there is a demonstrated biological control technique which may be applied in the context of Europe and Eurasia. This presents an opportunity to simultaneously achieve environmental and genetic resource conservation goals while reinforcing the livelihoods and maintenance of diversity of the nation’s chestnut growers. However, national institutions primarily recognize the economic and genetic importance of certain elite crops, particularly those which were prominent production goods during the Soviet period. The present work was undertaken to characterize the socio-economic role of chestnut production and use in the communities where this crop is grown and sold. We investigate the monetary role of chestnut sales in the livelihoods of growers and collectors. It is hypothesized that while continuing to be a minor production good nationally, chestnut sales in a newly entrepreneurial agricultural sector have taken on tremendous livelihood importance to specific communities. The socio-economic importance of chestnut-based income to Azerbaijan’s chestnut-growing communities is illustrated by the results of in-depth household budget interviews from 22 chestnut-growing households in two villages

    Control-Related Motivations and Information Security Policy Compliance: The Effect of Reflective and Reactive Autonomy

    Get PDF
    Employees’ failures to follow information security policy can be costly to organizations. Organizations implement security controls in order to motivate employees. Many control-related motivations have been explored in information security research (e.g., self-efficacy and behavioral control); however, self-determination has yet to receive attention. Self-determination theory is widely used in other fields to explain intrinsically driven performance. This paper examines the effect self-determination—conceptualized as reflective autonomy, and psychological reactance—conceptualized as reactive autonomy have on employees’ intentions to comply with security policy. Reflective and reactive autonomy offer complementary yet opposite conceptualizations of autonomy, offering a more holistic view of control-related motivation. We find that both reflective and reactive autonomy affect information security policy compliance intentions. Reflective autonomy increases and reactive autonomy decreases compliance intentions. Managers should become aware of the way employees view security controls in order to develop controls that maximize reflective autonomy and minimize reactive autonomy in employees

    Learning Computing Topics in Undergraduate Information Systems Courses: Managing Perceived Difficulty

    Get PDF
    Learning technical computing skills is increasingly important in our technology driven society. However, learning technical skills in information systems (IS) courses can be difficult. More than 20 percent of students in some technical courses may dropout or fail. Unfortunately, little is known about students’ perceptions of the difficulty of technical IS courses and how students cope with the perceived difficulty of technical content in IS courses. This paper explores how students perceive the difficulty of technical IS courses and how difficulty perceptions influence learning outcomes and perceptions. Learning technical topics may be particularly difficult for students from non-IS majors, yet this is only speculative. The extent to which non-IS majors are disadvantaged in technical IS courses is also explored. To explore these issues, this paper adopts a mixed-method approach. First, a grounded theory is developed from secondary data to explain difficulty perceptions and the successful management of those perceptions. Second, a quantitative test is conducted to validate the grounded theory. Finally, the grades of IS and non-IS majors are compared

    Inconsistencies in Neanderthal Genomic DNA Sequences

    Get PDF
    Two recently published papers describe nuclear DNA sequences that were obtained from the same Neanderthal fossil. Our reanalyses of the data from these studies show that they are not consistent with each other and point to serious problems with the data quality in one of the studies, possibly due to modern human DNA contaminants and/or a high rate of sequencing errors

    Assessing the Performance of the Haplotype Block Model of Linkage Disequilibrium

    Get PDF
    Several recent studies have suggested that linkage disequilibrium (LD) in the human genome has a fundamentally “blocklike” structure. However, thus far there has been little formal assessment of how well the haplotype block model captures the underlying structure of LD. Here we propose quantitative criteria for assessing how blocklike LD is and apply these criteria to both real and simulated data. Analyses of several large data sets indicate that real data show a partial fit to the haplotype block model; some regions conform quite well, whereas others do not. Some improvement could be obtained by genotyping higher marker densities but not by increasing the number of samples. Nonetheless, although the real data are only moderately blocklike, our simulations indicate that, under a model of uniform recombination, the structure of LD would actually fit the block model much less well. Simulations of a model in which much of the recombination occurs in narrow hotspots provide a much better fit to the observed patterns of LD, suggesting that there is extensive fine-scale variation in recombination rates across the human genome

    To Fear or Not to Fear? A Critical Review and Analysis of Fear Appeals in the Information Security Context

    Get PDF
    Controlling organizational insiders’ security behaviors is an important management concern. Research presents fear appeals as a viable security control to promote protective security behaviors. To date, research has proven security-related fear appeals have to effectively control insiders’ security behaviors. However, from critically examining fear appeals, we find a different story. Specifically, we critically analyze security-related fear appeal research from two ontological positions: critical realism and critical constructivism. The critical realist analysis identifies several issues with existing fear appeal research, which particular research traditions may cause. We explicate these traditions and issues in the paper. The critical constructivist analysis draws on critical management studies of control and Foucault’s work to identify the identities, beliefs, and values that fear appeals promote and the ways in which fear appeals create discursive closures that limit the consideration and discussion of other positions. Based on the two analyses, we provide important directions for future fear appeal research
    • 

    corecore