10 research outputs found

    Sustainable human resource management and job satisfaction— unlocking the power of organizational identification: A cross-cultural perspective from 54 countries

    Get PDF
    Sustainable human resource management is gaining importance in organizations due to its role in developing a sustainable work environment and well-being. This paper discusses the relationship between employee perceptions of sustainable human resource management and job satisfaction in 54 countries. We propose that sustainable HRM is positively associated with job satisfaction but that this relationship is moderated by employees’ identification with the organization and country-level individualism-collectivism. Thus, we suggest national culture functions as a second-level moderator of the relationship of sustainable HRM with organizational identification on job satisfaction. Findings from the multi-level analyses using data from 14,502 employees nested within 54 countries provided support for our hypotheses, namely that employee perceptions of sustainable HRM were positively associated with job satisfaction and that this relationship was more pronounced for employees with lower levels compared to higher levels of organizational identification in individualistic rather than collectivistic countries. These findings bear important implications for both theory and practice

    Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors Type 1 and Type 2 attack surface

    No full text
    Summary Hypervisors have become a key element of both cloud and client computing. It is without doubt that hypervisors are going to be commonplace in future devices, and play an important role in the security industry. In this paper, we discuss in detail the various lessons learnt whilst building and breaking various common hypervisors. In particular, we take a trip down memory lane and examine a few vulnerabilities found in popular hypervisors that have led to break-outs, trying to offer a generic mitigation when possible. To add some spice, we will talk about details of four not-yet-discussed vulnerabilities we recently discovered in VirtualBox, and examine DMA attacks against DeepSafe. Scope There is a plethora of various hypervisor solutions available nowadays. Some of them are designed from the scratch with security in mind, and e.g. use formal verification to provide assurance about their security. As those solutions are not the mainstream today, in this paper we will focus on the popular commercial virtualization software used commonly nowadays. One of the solution (DeepSafe) is very different from the others, and will be covered in the later part of the paper. We will start with discussion about common Type 1 and Type 2 hypervisors; Xen, VirtualBox, VMWare, ESX, HyperV all belong to these two categories

    Security Issues and Challenges for Virtualization Technologies

    No full text
    corecore