Now showing 1 - 10 of 20
  • Publication
    Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context
    (Elsevier, )
    Shadow IT refers to the use of information technology (IT) solutions and systems without prior explicit organizational approval. In this research, we have investigated an important role of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context. Using the theory of organizational and individual inertia and status quo framework as theoretical lenses, we sought to explain the factors that form an individual's cognitive based inertia. Our study offers important insights into how inertia shapes and drives cognitive based inertia, which drives the behavioral intention to continue using Shadow IT. We suggest several new insights for theory and practitioners on how to better address the Shadow IT phenomenon with the objective that organizations are more agile, productive and efficient but at the same time, more compliant with information security policy requirements.
    Type:
    Journal:
  • Publication
    Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
    (Taylor & Francis, 2020-03-01) ;
    Lowry, Paul Benjamin
    We conducted a design-science research project to improve an organization’s compound problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal security training. To do so, we created a gamified security training system focusing on two factors: (1) enhancing intrinsic motivation through gamification and (2) improving security learning and efficacy. Our key theoretical contribution is proposing a recontextualized kernel theory from the hedonic-motivation system adoption model that can be used to assess employee security constructs along with their intrinsic motivations and coping for learning and compliance. A six-month field study with 420 participants shows that fulfilling users’ motivations and coping needs through gamified security training can result in statistically significant positive behavioral changes. We also provide a novel empirical demonstration of the conceptual importance of “appropriate challenge” in this context. We vet our work using the principles of proof-of-concept and proof-of-value, and we conclude with a research agenda that leads toward final proof-in-use.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 112
  • Publication
    The Effects of a Gamified Human Resource Management System on Job Satisfaction and Engagement
    (Blackwell Publ., 2020-01-27) ;
    Marzi, Giacomo
    ;
    Caputo, Andrea
    ;
    Bal, Matthijs
    Type:
    Journal:
  • Publication
    Type:
    Journal:
  • Publication
    The effects of the elaboration likelihood model on initial trust formation in financial advisory services
    Purpose In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system (MSS) targeted for high net worth individuals (HNWIs) becomes critical. Despite long-term trustworthy relationships between HNWIs and financial advisors, studies suggest that the formation of initial trust poses a significant challenge. The purpose of this paper is to identify various features related to initial trust antecedents. Design/methodology/approach The study was conducted using the survey data, and employs variance-based structural equation modeling (SEM) techniques to test hypotheses. Findings The findings from a closed experiment with 107 participants suggest that compared to more traditional service systems, customers are more prone to the construct of service quality, and specifically professional, prompt, dependable and timely financial advice. Originality/value The study validated key constructs that positively influence the initial trust formation process and ultimately the intention to use in an MSS for the financial advisory. The authorts particularly emphasized the rebalancing and monitoring steps in the financial planning process between HNWIs and client advisors.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 35
  • Publication
    Open Source Software Adoption: Lessons from Linux in Munich
    (Inst. of Electrical and Electronics Engineers, 2017-02-02) ;
    It took 10 years for the city of Munich to migrate 15,000 PCs from Windows to the Linux operating system. Was it worth it? This article focuses on how to effectively cope with open source software (OSS) adoption in an organizational context. Based on the Linux in Munich case, the authors present challenges and risks for IT decision makers and propose recommendations for evaluating and calculating the risks of OSS adoption.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 12
  • Publication
    Factors driving unified communications and collaboration adoption and use in organizations
    (Emerald Group Publ., 2016-02-23) ;
    Purpose Purpose of this research paper is to reveal factors that drive the adoption and use of Unified Communications & Collaboration technology in Organizations. Design/methodology/approach We used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares (PLS)-method was used for the latent variables LVP-analysis. Findings We found that UTAUT constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology. Research limitations/implications Future research should incorporate multi-cultural and organizational culture dimensions Practical implications Our study reveals main adoption and use factors behind UC&C technology. Organizations should look at the best procedures and processes on how to motivate, encourage, and push their employees to use the UC&C technology which drives important economies of scale. Training, influence of colleagues, peers and superiors are the key drivers of a successful UC&C adoption. Originality/value Paper closes existing research gap and provides useful insights to organizations about the technology adoption and use factors of the UC&C technology. Our study reveals important decision making factors, to take into account, that play crucial role in the technology adoption.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 14
  • Publication
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 6
  • Publication
    Email: from hero to zero - the beginning of the end?
    (Palgrave Macmillan, 2015-11-01) ; ;
    Silic, Dario
    In 2011, the CEO of Atos, Thierry Breton, announced an unprecedented move for the company. The global information services giant would become a ‘zero’ email company with the objective of eradicating internal email use and replacing it with blueKiwi – enterprise social network software. This case serves to teach the challenges and key lessons behind the social collaboration transformation in a large organization where 76,000 employees switched to a new mode of collaboration. The approach of how to become a zero email company is detailed, highlighting the importance of the first-order and second-order change. The case helps to understand what it takes to shift organizational culture and employee mindset, as well as what challenges and barriers need to be overcome to make such an important step on a large organizational scale.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 2
  • Publication
    Taxonomy of technological risks of open source software in the enterprise adoption context
    (Emerald, 2015-10-15) ; ;
    Silic, Dario
    Purpose - The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy. Design/methodology/approach - The authors conducted an extensive literature review followed by expert interviews and applied the method for taxonomy development. Findings - This research has identified an integrative OSS risk taxonomy composed of 8 categories with 51 risk items. Originality/value - This taxonomy is a very useful tool for practitioners during the decision-making process when evaluating, assessing and calculating risks related to OSS adoption. Moreover, researchers can use it as a starting point for future studies to better understand the OSS phenomenon.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 12