1
|
Lyu T, Guo Y, Chen H. Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism. INFORMATION TECHNOLOGY & PEOPLE 2023. [DOI: 10.1108/itp-10-2021-0817] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/18/2023]
Abstract
PurposeBased on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.Design/methodology/approachThe data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).FindingsThe study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.Originality/valueThis study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.
Collapse
|
2
|
Palanisamy R, Norman AA, Mat Kiah ML. Employees’ BYOD Security Policy Compliance in the Public Sector. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2023.2178038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/06/2023]
|
3
|
Goel L, Zhang JZ, Williamson S. Work-to-Home Cybersecurity Spillover: Construct Development and Validation. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2128116] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
- Lakshmi Goel
- Department of Management, Coggin College of Business, University of North Florida, Jacksonville, Florida 32224, USA
| | - Justin Zuopeng Zhang
- Department of Management, Coggin College of Business, University of North Florida, Jacksonville, Florida 32224, USA
| | - Steven Williamson
- Department of Management, Coggin College of Business, University of North Florida, Jacksonville, Florida 32224, USA
| |
Collapse
|
4
|
Chen H, Liu M, Lyu T. Understanding employees’ information security–related stress and policy compliance intention: the roles of information security fatigue and psychological capital. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2022-0047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and information security policy (ISP) compliance intention and the effects of psychological capital (PsyCap) on relieving SRS and promoting compliance.
Design/methodology/approach
The authors tested a series of hypotheses by applying partial least squares–based structural equation modeling to survey data from 488 employees in Chinese enterprises.
Findings
The results suggest that the relationship between SRS and ISP compliance intention is fully mediated by information security fatigue. Employees’ SRS promotes their information security fatigue, which reduces their intention to follow ISPs. In addition, employees with high PsyCap may experience low levels of SRS and information security fatigue, which promotes their willingness to comply with ISPs.
Originality/value
This study extends knowledge by introducing information security fatigue and PsyCap to the field of information security management, and it calls attention to the effects on information security behaviors of employee emotions and positive psychological resources in an organization. The authors reveal the emotion-based mediating effect of information security fatigue and the positive influence of PsyCap in information security management.
Collapse
|
5
|
Seedoyal Doargajudhur M, Hosanoo Z. The mobile technological era: insights into the consequences of constant connectivity of personal devices by knowledge workers. INFORMATION TECHNOLOGY & PEOPLE 2022. [DOI: 10.1108/itp-08-2021-0593] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeAs employees’ adoption of Bring Your Own Device (BYOD) has increased, so has research interest into the impact of BYOD on human resources outcomes. The present study aims at understanding the relationship between BYOD and human resources outcomes.Design/methodology/approachThe study employs the inductive data-driven content analysis approach to analyze the data collected through qualitative semi-structured interviews with a sample of 28 knowledge workers from different occupational sectors in Mauritius.FindingsThe results show the double-edged sword brought about by BYOD implementation. This trend is associated with perceived job performance, job satisfaction, organizational commitment and work motivation while also having an effect on work-life conflict and stress.Practical implicationsThis study has implications for organizations that are concerned about formulating guidelines and policies in relation to workers' adoption of BYOD in the workplace. This trend permits employees to continue to communicate and work irrespective of new working conditions and social distancing since the Covid-19 pandemic has changed the way organizations operate around the globe.Originality/valueDriven by the JD-R theory, themes and sub-themes were linked by the emerging relationships to present a conceptual framework to understanding employees' well-being since this is a pertinent research area for scholars and practitioners, as well as a topic of growing prominence for modern organizations.
Collapse
|
6
|
Abstract
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously reluctant to embrace BYOD have been forced to accept it to facilitate remote work. The aim of this paper is to discover, through a study conducted using a survey questionnaire instrument, how employees practice and perceive the BYOD security mechanisms deployed by Australian businesses which can help guide the development of future BYOD security frameworks. Three research questions are answered by this study: What levels of awareness do Australian businesses have for BYOD security aspects? How are employees currently responding to the security mechanisms applied by their organisations for mobile devices? What are the potential weaknesses in businesses’ IT networks that have a direct effect on BYOD security? Overall, the aim of this research is to illuminate the findings of these research objectives so that they can be used as a basis for building new and strengthening existing BYOD security frameworks in order to enhance their effectiveness against an ever-growing list of attacks and threats targeting mobile devices in a virtually driven work force.
Collapse
|
7
|
Palanisamy R, Norman AA, Mat Kiah L. BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2022. [DOI: 10.1080/10919392.2022.2028530] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Affiliation(s)
- Rathika Palanisamy
- Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti of Malaya, Jalan Universiti, Malaysia
| | - Azah Anir Norman
- Department of Information Systems, Faculty of Computer Science and Information Technology, University of Malaya, Jalan Universiti, Malaysia
| | - Laiha Mat Kiah
- Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti of Malaya, Jalan Universiti, Malaysia
| |
Collapse
|