15 research outputs found

    How Paternalistic Leaders Motivate Employees’ Information Security Policy Compliance? Building Climate or Applying Sanctions

    Get PDF
    This paper studies the influencing mechanisms of Paternalistic Leadership in motivating employees’ Information Security Polices Compliance. We proposed that Sanctions and Information Security Climate can mediate the impact of different PL dimensions. Based on survey data from 760 participants, we found that, for different PL dimension, their influencing mechanism are different. The impact of AL dimension is partially mediated by employees’ perception of the Sanction, while the impact of BL dimension and ML dimension are partially mediated by employees’ perception of the Information Security Climate. Our research extends the existing literature by introducing the impact of specific leadership styles on employees’ ISP Compliance and discovering the mediating role of Sanction and Information Security Climate. New knowledge is also found about how each PL dimension affects employees’ Compliance in the information security context

    Will Security and Privacy Updates Affect Users’ Privacy Choices of Mobile Apps

    Get PDF
    There is a growing emphasis among users on safeguarding personal privacy and authorization for applications. To address this, Security and Privacy Updates (SPU) are employed to bolster app security, alleviate user apprehensions regarding security, and encourage users to share data and permissions with greater confidence. Based on the Protection Motivation Theory (PMT), we propose that SPU, an IT technology itself, has a dual effect on users’ privacy choices, security threat susceptibility and security response efficacy are the two key mediators to explain this phenomenon, and that this influencing process will be moderated by user’s privacy trade-off. We will investigate this process through a set of online experiments

    China's energy consumption and economic activity at the regional level

    Get PDF
    Since 2013, China's economy has undergone a series of major structural changes under the new normal. This study aimed to research China's plateauing regional-level energy consumption at this stage by analysing socioeconomic factors driving energy consumption changes from 2002 to 2019 through decomposition analysis and regional value chains. The results indicate that the annual growth rate of China's energy consumption dropped from 10% between 2002 and 2013 to 2% between 2013 and 2019, mainly attributable to energy efficiency enhancement offsetting the −27% increase from 2013 to 2019 and structural changes. At the regional level, the three structural drivers were closely related, including the regional structure, industrial structure and energy structure. Under the new normal, the −2.58% contribution of the regional structure to energy consumption growth was mainly made by regions with a high energy efficiency; one way to improve the energy efficiency was to upgrade the regional industrial structure, leading to the slowdown by 0.26%; and industrial transition could be accompanied by adjustment of the energy structure towards relatively clean energy, thereby offsetting growth by −0.13%. The energy consumption required to create value-added outflows along regional value chains varied greatly across regions, sectors and years

    How paternalistic leaders motivate employees\u27 information security policy compliance? Building climate or applying sanctions

    No full text
    This paper studies the influencing mechanisms of Paternalistic Leadership in motivating employees\u27 Information Security Polices Compliance. We proposed that Sanctions and Information Security Climate can mediate the impact of different PL dimensions. Based on survey data from 760 participants, we found that, for different PL dimension, their influencing mechanism are different. The impact of AL dimension is partially mediated by employees\u27 perception of the Sanction, while the impact of BL dimension and ML dimension are partially mediated by employees\u27 perception of the Information Security Climate. Our research extends the existing literature by introducing the impact of specific leadership styles on employees\u27 ISP Compliance and discovering the mediating role of Sanction and Information Security Climate. New knowledge is also found about how each PL dimension affects employees\u27 Compliance in the information security context

    Dual-channel competition: the role of quality improvement and price-matching

    No full text
    International audienceQuality improvement and price-matching are two commonly used competing strategies by the retailers. However, it is still unclear how the retailers should deliberate over the two strategies when selling in both online and offline markets. In this paper, we consider two dual-channel retailers selling a substitutable product to consumers in both online and offline markets. Especially, the retailers compete in the online market, and their offline markets are exclusive to themselves. We establish a game-theoretical model to investigate the trade-off between quality improvement and price-matching in competition, and the impact on retailers' profits and consumer surplus in the dual-channel market structure. The analysis shows that, first, a retailer should choose to improve its quality to avoid price competition when the online market is small; second, when retailers engage in price competition, the retailer with larger offline market is more willing to adopt price-matching, while the retailer with a small share of offline market can be hurt; third, quality improvement can always increase the consumer surplus, while price-matching always hurts consumer surplus due to price collusion. © 2021 Informa UK Limited, trading as Taylor & Francis Group

    Game of information security investment: Impact of attack types and network vulnerability

    No full text
    The level of firms\u27 information security investment has recently become a critical issue in the management of IT infrastructure. Prior studies have not considered attack types and firms interconnection simultaneously when investigating the optimisation of such investment. Using game theory, we demonstrate that the optimal security investment level of an interconnected firm against targeted attacks is different from that against opportunistic attacks. Our model shows that not all information security risks are worth fighting against. As the potential loss increases, it is unadvisable to increase the security investment proportionately. Firms should increase investments with intrinsic vulnerability when facing target attacks, but focus on those systems that fall into the midrange of intrinsic vulnerability when facing opportunistic attacks. Firms are unwilling to invest in security and often offload reliability problems onto others when the trusted interdependence relationship becomes tighter in the absence of economic incentives. Thus we also discuss two economic incentives to motivate firms: liability and security information sharing. We find that if the rules are set properly, both economic incentives are effective to not only internalise the negative externality and improve a firm\u27s security level, but also reduce the total expected cost. We show that firms\u27 optimal investments of liability always increase with the increasing number of firms, but the optimal investments on security information sharing increase only when the number of firms is large enough. These insights draw attention to many trade-offs firms often face and the importance of accurate assessment of firms\u27 security environment. Future research directions are discussed based on the limitations and possible extensions of this study

    How paternalistic leadership influences it security policy compliance: The mediating role of the social bond

    Get PDF
    Leadership plays an important role in changing employees’ behavior. This paper aims to investigate the relationship between paternalistic leadership and employees’ information security policy (ISP) compliance. We adopt social bond theory as the theoretical lens to explain the effect of paternalistic leadership on ISP compliance through social bond formation. We developed a research model and tested it using data comprising 314 dyads of employees and their supervisors in organizations. The results show that all three dimensions of paternalistic leadership- benevolence, morality, and authoritarianism-positively influence employee ISP compliance. The social bond partially mediates the effects of benevolence and morality on compliance intention. Overall, this paper reveals the positive effect of paternalistic leadership in improving ISP compliance and the mediating role of the social bond in explaining the impact of paternalistic leadership on ISP compliance. In addition, the mediation effect of the social bond suggests that the non-IT related routine behavior of leaders can also affect employee ISP compliance through facilitating the formation of social bonds with and among employees

    The bullwhip effect on inventory under different information sharing settings based on price-sensitive demand

    No full text
    Information sharing (IS) is proved to be a valid method to counter demand variability amplification along the supply chain, or bullwhip effect (BWE). Different from the traditional way of measuring the BWE based on order quantity, we measure the BWE on inventory in different IS settings and try to find the best IS approach. In this paper, the retailer will face the market demand which is price-sensitive, and the price follows a first-order autoregressive process. This demand model includes some indexes that can provide more useful managerial insights than previously studied parameters. Our study identifies the best IS setting under any conditions, and clarifies that the benefits of IS will be evident when the overall market product pricing process is highly correlated over time, the demand shocks to the retailer are high, the price sensitivity coefficient is small, the overall market shocks are low, the retailer’s lead-time is long and the manufacturer’s lead-time is short
    corecore