Showing 1 - 10 of 238
Organizational insiders have considerable influence on the effectiveness of information security efforts. However, most research conducted in this area fails to examine what these individuals believe about organizational security efforts. To help bridge this gap, this study assesses the mindset...
Persistent link: https://www.econbiz.de/10014147045
Persistent link: https://www.econbiz.de/10003990184
Audience Response Systems (ARS) are a technologies that show promise in helping large groups or classrooms be more effective. We explore the phenomenon of large-group process interactivity in interpersonal computer-mediated communication in the specific case of large classrooms. We develop a...
Persistent link: https://www.econbiz.de/10014060059
This manuscript examines the unintended consequences that organizational computer monitoring can foster within the firm. We apply justice and reactance theories to explain why monitoring can actually increase the occurrence of detrimental organizational behaviors. Our model suggests monitoring...
Persistent link: https://www.econbiz.de/10014175700
Traditional TAM research primarily focuses on utilitarian systems where extrinsic motivations chiefly explain and predict acceptance. We propose a theoretical model, ISAM, which explains the role of intrinsic motivations in building the user attention that leads to hedonic system acceptance....
Persistent link: https://www.econbiz.de/10014203434
Usability flaws found in the later stages of the development process can be extremely costly to resolve. Accordingly, usability evaluation (UE) is an important, albeit expensive, part of software development. We report on how the inexpensive usability evaluation method of heuristic evaluation...
Persistent link: https://www.econbiz.de/10014223476
Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that organizational insiders control much of their organizations’ valuable information, has led both researchers and practitioners to acknowledge the importance of insiders’ behavior...
Persistent link: https://www.econbiz.de/10014107889
Research shows that organisational efforts to protect their information assets from employee security threats do not always reach their full potential and may actually encourage the behaviours they attempt to thwart, such as reactive computer abuse (CA). To better understand this dilemma, we use...
Persistent link: https://www.econbiz.de/10014139311
Practitioners and researchers alike recognize the positive influence insiders' behavior can have on information systems (IS) security. This awareness has resulted in a research stream focused on the performance of protective behaviors. We contribute to this research stream by extending an...
Persistent link: https://www.econbiz.de/10012967404
The market for mobile Internet-based devices is in its infancy and may grow to over $550 billion by 2008. However, the growth of the mobile-device market is limited by problems related to cost, speed, security, privacy, usability, and trust. In particular, lack of consumer trust is said to be...
Persistent link: https://www.econbiz.de/10014028312