Now showing 1 - 10 of 37
  • Publication
    Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context
    (Elsevier, )
    Shadow IT refers to the use of information technology (IT) solutions and systems without prior explicit organizational approval. In this research, we have investigated an important role of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context. Using the theory of organizational and individual inertia and status quo framework as theoretical lenses, we sought to explain the factors that form an individual's cognitive based inertia. Our study offers important insights into how inertia shapes and drives cognitive based inertia, which drives the behavioral intention to continue using Shadow IT. We suggest several new insights for theory and practitioners on how to better address the Shadow IT phenomenon with the objective that organizations are more agile, productive and efficient but at the same time, more compliant with information security policy requirements.
    Type:
    Journal:
  • Publication
    Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
    (Taylor & Francis, 2020-03-01) ;
    Lowry, Paul Benjamin
    We conducted a design-science research project to improve an organization’s compound problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal security training. To do so, we created a gamified security training system focusing on two factors: (1) enhancing intrinsic motivation through gamification and (2) improving security learning and efficacy. Our key theoretical contribution is proposing a recontextualized kernel theory from the hedonic-motivation system adoption model that can be used to assess employee security constructs along with their intrinsic motivations and coping for learning and compliance. A six-month field study with 420 participants shows that fulfilling users’ motivations and coping needs through gamified security training can result in statistically significant positive behavioral changes. We also provide a novel empirical demonstration of the conceptual importance of “appropriate challenge” in this context. We vet our work using the principles of proof-of-concept and proof-of-value, and we conclude with a research agenda that leads toward final proof-in-use.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 112
  • Publication
    The Effects of a Gamified Human Resource Management System on Job Satisfaction and Engagement
    (Blackwell Publ., 2020-01-27) ;
    Marzi, Giacomo
    ;
    Caputo, Andrea
    ;
    Bal, Matthijs
    Type:
    Journal:
  • Publication
    Improving warning messages adherence: can Maya Security Bot advisor help?
    (Palgrave Macmillan, 2019-06-18)
    Despite several different methods that have been suggested to improve users’ adherence to warning messages, users are still left alone in their decision-making process and have to deal with possible negative consequences of their decisions. To improve warning message adherence and to help users make a more informed decision, supported by the social facilitation theory and following design-driven approach, we implemented a real-time security bot advisor Maya. We conducted an online experiment with 312 users. The results suggest significant improvement in the warning adherence (from 38 to 61%) with the highest effect on older users. We demonstrated that the security bot advisor can be of a great help in influencing a user’s decision-making process. We suggest several ways that our findings can be used by warning designers and provide new directions for future research.
    Type:
    Journal:
  • Publication
    Type:
    Journal:
  • Publication
    The effects of the elaboration likelihood model on initial trust formation in financial advisory services
    Purpose In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system (MSS) targeted for high net worth individuals (HNWIs) becomes critical. Despite long-term trustworthy relationships between HNWIs and financial advisors, studies suggest that the formation of initial trust poses a significant challenge. The purpose of this paper is to identify various features related to initial trust antecedents. Design/methodology/approach The study was conducted using the survey data, and employs variance-based structural equation modeling (SEM) techniques to test hypotheses. Findings The findings from a closed experiment with 107 participants suggest that compared to more traditional service systems, customers are more prone to the construct of service quality, and specifically professional, prompt, dependable and timely financial advice. Originality/value The study validated key constructs that positively influence the initial trust formation process and ultimately the intention to use in an MSS for the financial advisory. The authorts particularly emphasized the rebalancing and monitoring steps in the financial planning process between HNWIs and client advisors.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 35
  • Publication
    Open Source Software Adoption: Lessons from Linux in Munich
    (Inst. of Electrical and Electronics Engineers, 2017-02-02) ;
    It took 10 years for the city of Munich to migrate 15,000 PCs from Windows to the Linux operating system. Was it worth it? This article focuses on how to effectively cope with open source software (OSS) adoption in an organizational context. Based on the Linux in Munich case, the authors present challenges and risks for IT decision makers and propose recommendations for evaluating and calculating the risks of OSS adoption.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 12
  • Publication
    A new perspective on neutralization and deterrence: Predicting shadow IT usage
    (Elsevier, 2017-12-01) ;
    Barlow, Jordan B.
    ;
    This study examines the role of neutralization and deterrence in discouraging employees from using Shadow IT: tools, services and systems used in an organization but not authorized by the IT department. Our study provides a unique contribution to the IT security literature by studying effects of neutralization on both intentions (self-reported) and actual behavior, as well as examining the role of shame as a mediator. We surveyed employees from four organizations and found that the “metaphor of the ledger” neutralization technique predicts Shadow IT intention and actual Shadow IT usage. We also find that neutralization and deterrence effects influence shame.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 70
  • Publication
    Factors driving unified communications and collaboration adoption and use in organizations
    (Emerald Group Publ., 2016-02-23) ;
    Purpose Purpose of this research paper is to reveal factors that drive the adoption and use of Unified Communications & Collaboration technology in Organizations. Design/methodology/approach We used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares (PLS)-method was used for the latent variables LVP-analysis. Findings We found that UTAUT constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology. Research limitations/implications Future research should incorporate multi-cultural and organizational culture dimensions Practical implications Our study reveals main adoption and use factors behind UC&C technology. Organizations should look at the best procedures and processes on how to motivate, encourage, and push their employees to use the UC&C technology which drives important economies of scale. Training, influence of colleagues, peers and superiors are the key drivers of a successful UC&C adoption. Originality/value Paper closes existing research gap and provides useful insights to organizations about the technology adoption and use factors of the UC&C technology. Our study reveals important decision making factors, to take into account, that play crucial role in the technology adoption.
    Type:
    Journal:
    Volume:
    Issue:
    Scopus© Citations 14