Showing 11 - 20 of 204
Because users treat embodied agents (EAs) as social actors, users hold expectations about human-to-EA communication (HtEAC) similar to those in human-to-human communication. This study extends Expectancy Violations Theory (EVT) to examine how different forms of interfaces that confirm or violate...
Persistent link: https://www.econbiz.de/10014129449
Organisations increasingly rely on information and related systems, which are also a source of risk. Unfortunately, employees represent the greatest risk to organisational information, because they are the most frequent source of information security breaches. To address this ‘weak link’ in...
Persistent link: https://www.econbiz.de/10014144961
Traditional organizational and information systems (IS) researchers have stridently resisted data collections using online data panels, such as Mechanical Turk (MTurk). Although many of their concerns are legitimate, we strongly disagree with the grounds and substance of their reasons for...
Persistent link: https://www.econbiz.de/10014126603
Researchers and practitioners have long believed that information technology (IT) is a key tool for fostering innovation. However, there is a certain inconsistency in the literature, which makes it challenging for researchers to figure out exactly how and why IT plays such a pivotal, strategic...
Persistent link: https://www.econbiz.de/10014032507
The central theme of this paper is that information technology (IT) can create ethical organizations endowed with virtuous characteristics, and that such ethical organizations can innovate better in today’s dynamic market environment. Drawing upon the notion of virtue ethics propounded by the...
Persistent link: https://www.econbiz.de/10014035892
Lack of compliance with organizational information security policies (ISPOs) is a widespread organizational issue that increasingly bears very large direct and qualitative costs. The purpose of our study was to explain the causes of tensions within organizations to either comply with new ISPOs...
Persistent link: https://www.econbiz.de/10014038742
This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focus on virtue ethics. Our research investigates the theoretical significance of CIO virtues on two CIO capabilities and their corresponding influence on the CIO’s role effectiveness in organizations
Persistent link: https://www.econbiz.de/10014110896
Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to...
Persistent link: https://www.econbiz.de/10014360878
Persistent link: https://www.econbiz.de/10012670537
Persistent link: https://www.econbiz.de/10003849227