484 research outputs found

    Editorial: IT-enabled Organization Design

    Get PDF
    Editorial for the issue

    Editorial

    Get PDF
    Editorial for the issue

    Editorial

    Get PDF
    Editorial for the issue

    Making Sense of Institutionalizing Information Systems Security Management in Organizations

    Get PDF

    Editorial: Information Systems Continuous Use and Maintenance

    Get PDF

    Editorial

    Get PDF
    Editorial for the issue

    The Implementation of Online Education on Campus

    Get PDF

    The Impact of Board Structure on Information Security Breaches

    Get PDF
    This paper investigates the association between the board structure of a firm and the possibility of information security breaches. Building on the agency theory and resource dependence theory, we hypothesize that the board structure could affect the guidance and advice capability of the board on the executives’ decision of information security management. Our results show that the board size and the number of independent directors could increase the possibility of security breaches while the average and heterogeneity of age/tenure could reduce it. Our findings shed lights on the crucial role played by the board when managing information security risks in organizations

    Investigating Employees’ Proactive Extra-Role Information Security Behaviors through Security Mindfulness

    Get PDF
    Connecting mindfulness with organizational information security (InfoSec) is an increasingly attractive research topic. This paper conceptualizes InfoSec mindfulness as a dynamic InfoSec-specific trait evident when handling organizational information assets. We investigate the motivational factors that contribute to InfoSec mindfulness and the effects of InfoSec mindfulness on employees’ proactive extra-role information security behaviors (ISBs), which refers to self-initiated and future-oriented behaviors that go beyond an organization’s information security policies (ISPs) and are independent on rewards or punishments. This paper provides significant theoretical contributions to InfoSec behavioral literature by conceptualizing InfoSec mindfulness and deepening the understanding of proactive extra-role ISBs. We also summarize our research methodology to develop the scale of InfoSec mindfulness and test its validity for our future study

    Employees’ workplace cyberloafing: based on the perspective of guanxi

    Get PDF
    Cyberloafing is the biggest time waster in organization, 69 percent of respondents admitted waste time on non-work related activities each day. This number might be higher in China for a larger population of cyber citizens. Previous Studies have investigated the antecedents from various perspectives, such as organization justice, deterrence and work stressor. No one addressed cyberloafing from the perspective of guanxi, even though the strength of guanxi directly determines the appropriate behavior of employees , and employees are grounded by such behavioral norms. To fill this gap, we proposed a research model from the perspective of guanxi theory to understand employees’ cyberloafing behavior
    • …
    corecore