Options
Mario Silic
Last Name
Silic
First name
Mario
Email
mario.silic@unisg.ch
Now showing
1 - 5 of 5
-
PublicationOpen Source Software Adoption: Lessons from Linux in MunichIt took 10 years for the city of Munich to migrate 15,000 PCs from Windows to the Linux operating system. Was it worth it? This article focuses on how to effectively cope with open source software (OSS) adoption in an organizational context. Based on the Linux in Munich case, the authors present challenges and risks for IT decision makers and propose recommendations for evaluating and calculating the risks of OSS adoption.
Scopus© Citations 14 -
PublicationA new perspective on neutralization and deterrence: Predicting shadow IT usageThis study examines the role of neutralization and deterrence in discouraging employees from using Shadow IT: tools, services and systems used in an organization but not authorized by the IT department. Our study provides a unique contribution to the IT security literature by studying effects of neutralization on both intentions (self-reported) and actual behavior, as well as examining the role of shame as a mediator. We surveyed employees from four organizations and found that the “metaphor of the ledger” neutralization technique predicts Shadow IT intention and actual Shadow IT usage. We also find that neutralization and deterrence effects influence shame.Type: journal articleJournal: Information & managementVolume: 54Issue: 8
Scopus© Citations 79 -
PublicationDeterrent Effects of Warnings on User’s Behavior in Preventing Malicious Software Use(Proceedings of the 50th Annual Hawaii International Conference on System Sciences (HICSS), 2017-01-06)Type: conference paper
-
PublicationImpact of Gamification on User’s Knowledge-Sharing Practices:Relationships between Work Motivation, Performance Expectancy and Work Engagement(Proceedings of the 50th Annual Hawaii International Conference on System Sciences (HICSS), 2017-01-07)Type: conference paper
-
PublicationHealth Belief Model and Organizational Employee Computer Abuse(Springer, 2018)
;Njavro, Mato ;Silic, Dario ;Oblakovic, Goran ;Nah, Fiona Fui-HoonXiao, Bo SophiaThis study is set out to examine the determinants that drive preventive/protective as well as abusive behaviors among employees in the context of information security by extending the health belief model - a model set out to explain and predict healthy behaviors in human beings. A field experiment, accompanied by online surveys in two financial organizations in the US and India is conducted, measuring employees’ actual security behaviors. We identified factors (perceived susceptibility, perceived barriers, and self-efficacy) that have the largest effect on employee’s security behaviors. We offer several theoretical contributions and implications for practice.Type: book section