Socio-technical systems cybersecurity framework

2019 ◽  
Vol 27 (2) ◽  
pp. 233-272 ◽  
Author(s):  
Masike Malatji ◽  
Sune Von Solms ◽  
Annlizé Marnewick

Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal emphasis of both the social, technical and environmental factors affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecurity frameworks. The outcome of this exercise culminated in the design of a socio-technical systems cybersecurity framework that can be applied to any new or existing information and cybersecurity solutions in the organisation. A framework parameter to help continuously monitor the mutual alignment of the social, technical and environmental dimensions of the socio-technical systems cybersecurity framework was also introduced. Findings The results indicate a positive application of the socio-technical systems theory to the information and cybersecurity domain. In particular, the application of the conceptual process model is able to successfully categorise the selected information and cybersecurity practices into either social, technical or environmental practices. However, the validation of the socio-technical systems cybersecurity framework requires time and continuous monitoring in a real-life environment. Practical implications This research is beneficial to chief security officers, risk managers, information technology managers, security professionals and academics. They will gain more knowledge and understanding about the need to highlight the equal importance of both the social, technical and environmental dimensions of information and cybersecurity. Further, the less emphasised dimension is posited to open an equal but mutual security vulnerability gap as the more emphasised dimension. Both dimensions must, therefore, equally and jointly be emphasised for optimal security performance in the organisation. Originality/value The application of socio-technical systems theory to the information and cybersecurity domain has not received much attention. In this regard, the research adds value to the information and cybersecurity studies where too much emphasis is placed on security software and hardware capabilities.

2014 ◽  
Vol 21 (2) ◽  
pp. 83-97
Author(s):  
Arne Lindseth Bygdås

Purpose – The literature on knowledge transfer is dominated by a one-way transmission model logic where knowledge is captured and transferred from one source to another, assuming the source and receiver resemble each other and have some common knowledge. The social learning processes, what is learned and the phases and sequences of the developmental processes by which learning take place are more or less black boxed in the literature. This paper investigates the social dynamics of the formation and shaping of organizational practice from scratch in a greenfield organizational setting where no prior organizational practice exist. Design/methodology/approach – The paper builds on a case study approach applied in two greenfield organizational settings. A descriptive process model is developed to analyze the translocation and sociogenesis of organizational practices. Findings – A transfer-approach provides a too simplistic and narrow understanding of the process of “moving” organizational practices. Establishing an organizational practice can be described as a community of knowing “in the making” following various modes of cultural learning characterised by mutual adjustments, joint interactions, and alignment of shared understandings, and as such is more learned than transferred. Practical implications – The process model developed in the paper provides a platform for better understanding, planning and execution of intra-firm knowledge transfer and regeneration. Originality/value – The paper provides an in-depth empirical analysis of organizational practice generation from scratch emphasizing the social dynamics and co-construction of meaning when a collective capability is being acquired and built up.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mauro Vivaldini

PurposeConsidering the importance of a safe food chain for consumers and the advent of blockchain technology (BT), this research studies a food service (FS) distributor. The research aims to understand the implications related to the functional processes of distribution in FS in which it would be possible to use blockchain to achieve agility, transparency of information and improvements in food safety.Design/methodology/approachFirstly, theory regarding blockchain technology in the supply chain (BT-SC) and FS was analyzed to contextualize the theme conceptually. A single case study including 11 supply chain companies was applied in a BT implementation study in an FS distributor.FindingsInvestment in infrastructure is often identified as a barrier to adoption of BT-SC. This was, however, not found in this case. Furthermore, the validation of users was only necessary for those parties directly participating in the process or information input. Finally, findings differentiate between qualifying criteria and operational processes when considering BT projects in FS.Research limitations/implicationsThe findings are restricted to this single case that provided an in-depth understanding of the topic. Statistical generalization is not possible at this stage of the research.Practical implicationsThe study is a practical example and can provide several insights to anyone looking to implement BT in their SC.Social implicationsThe social importance of the study lies in the importance of FS in the food sector, and by presenting ways that contribute to mitigating risks to consumers.Originality/valueReal-life cases of application of BT-SC illustrate its functionalities in operational processes.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Akif Cicek ◽  
Rüveyda Kelleci ◽  
Pieter Vandekerkhof

PurposeFamily governance mechanisms serve to govern and strengthen relations between the family and the business, as well as the relationships between the members of the business family itself. However, despite agreement on the importance of adopting family governance structures, explicit research on the determinants of family governance mechanisms is currently missing. Therefore, the purpose of this study is to uncover the determinants of family meetings. In order to do so, the social systems theory is used to unravel several determining factors of this crucial form of family governance mechanisms in private family firms.Design/methodology/approachThe authors perform a qualitative study by conducting semi-structured interviews in eight Belgian private family firms in order to discover the antecedents of the implementation of family meetings. The authors use a pattern-matching technique as an analytical strategy.FindingsThe findings of the study highlight the importance of “soft,” relational, qualitative issues as antecedents of family meetings as opposed to previous research on family governance, which predominantly focused on “hard,” quantitative measures (e.g. family ownership). The findings of the study also provide novel insights into the origins of the family component (i.e. family meetings) of family business governance.Originality/valueWhile the current literature has only focused on describing the different types of family governance and their positive consequences for the family firm, the authors take a step back to explain why family meetings, as a form of family governance, are adopted in the first place. Second, the authors demonstrate the instrumentality of the social systems theory in understanding the family's needs that necessitate the implementation of family governance mechanisms.


2015 ◽  
Vol 1 (2) ◽  
pp. 87-97 ◽  
Author(s):  
Kate Silver ◽  
Sarah Parsons

Purpose – There is a substantial lack of research focusing on how to support the social understanding of high-functioning adults with autism (HFA). The perspectives of three adults with HFA were used to develop and implement self-prompt systems to increase knowledge and awareness of social situations. The paper aims to discuss these issues. Design/methodology/approach – Semi-structured interviews and diaries were used to support individuals to reflect on video-based and real-life social situations, within a qualitative participatory case study design. Qualitative data were analyzed thematically. Findings – Participants developed and used a self-prompt system to support their social understanding in a range of situations. “Noticing the unusual” in social situations, consideration of the potential impact of others’ behavior on them personally, and guessing the intention of others were identified as useful strategies. Basing social judgments on the facial expressions of others was not useful. Research limitations/implications – This was a small-scale study with only three high-functioning participants and so the research needs to be extended to a wider group. Practical implications – There is considerable potential for this approach to be used with adults accessing support services because the strategies identified can be easily applied and personalized. Social implications – Independent, unplanned use of the self-prompt strategy enabled participants to reduce dependence on others in social situations through supporting their independent thinking and actions. Originality/value – This study moves away from a deficit-focussed model of intervention to one that seeks to uncover strengths in order to empower individuals to use their existing knowledge.


2014 ◽  
Vol 21 (1) ◽  
pp. 48-68 ◽  
Author(s):  
Andrea J. Hester

Purpose – This paper aims to examine organizational information systems based on Web 2.0 technology as socio-technical systems that involve interacting relationships among actors, structure, tasks and technology. Alignment within the relationships may facilitate increased technology use; however, gaps in alignment may impede technology use and result in poor performance or system failure. The technology examined is an organizational wiki used for collaborative knowledge management. Design/methodology/approach – Results of a survey administered to employees of an organization providing cloud computing services are presented. The research model depicts the socio-technical component relationships and their influence on use of the wiki. Hierarchical latent variable modelling is used to operationalize the six main constructs. Hypotheses propose that as alignment of a relationship increases, wiki use increases. The partial least squares (PLS) method is used to examine the hypotheses. Findings – Based on the results, increased perceptions of alignment among technology and structure increase wiki use. Further analysis indicates that low usage may be linked to gaps in alignment. Many respondents with lower usage scores also indicated “low alignment” among actor-task, actor-technology, and task-structure. Research limitations/implications – The sample size is rather small; however, results may give an indication as to the appropriateness of dimensions chosen to represent the alignment relationships. Socio-technical systems theory (STS) is often utilized in qualitative studies. This paper introduces a measurement instrument designed to evaluate STS through quantitative analysis. Practical implications – User acceptance and change management continue to be important topics for both researchers and practitioners. The model proposed here provides measures that may reveal predictive indicators for increased information system use. Alternatively, practitioners may be able to utilize a diagnostic tool as presented here to assess underlying factors that may be impeding effective technology utilization. Originality/value – The paper presents a diagnostic tool that may help management to better uncover misaligned relationships leading to underutilization of technology. Practical advice and guidelines are provided allowing for a plan to rectify the situation and improve technology usage and performance outcomes.


2017 ◽  
Vol 35 (4) ◽  
pp. 798-821 ◽  
Author(s):  
Peng Wu ◽  
Si Shen ◽  
Daqing He ◽  
Jia Tina Du

Purpose The purpose of this paper is to understand blog users’ negative emotional norm compliance decision-making in crises (blog users’-NNDC). Design/methodology/approach A belief–desire–intention (BDI) model to evaluate the blog users’-NNDC (the BDI-NNDC model) was developed. This model was based on three social characteristics: self-interests, expectations and emotions. An experimental study was conducted to evaluate the efficiency of the BDI-NNDC model by using data retrieved from a popular Chinese social network called “Sina Weibo” about three major crises. Findings The BDI-NNDC model strongly predicted the Blog users’-NNDC. The predictions were as follows: a self-interested blog user posted content that was targeting his own interests; a blogger with high expectations wrote and commented emotionally negative blogs on the condition that the numbers of negative posts increased, while he ignored the norm when there was relatively less negative emotional news; and an emotional blog user obeyed the norm based on the emotional intentions of the blogosphere in most of the cases. Research limitations/implications The BDI-NNDC model can explain the diffusion of negative emotions by blog users during crises, and this paper shows a way to bridge the social norm modelling and the research of blog users’ activity and behaviour characteristics in the context of “real life” crises. However, the criterion for differentiating blog users according to social characteristics needs to be further revised, as the generalizability of the results is limited by the number of cases selected in this study. Practical implications The current method could be applied to predict emotional trends of blog users who have different social characteristics and it could support government agencies to build strategic responses to crises. Originality/value This paper supports the creation of normative models and engineering methods to predict blog users’-NNDC and mitigate their effect in real-world crises.


2016 ◽  
Vol 22 (2) ◽  
pp. 199-214 ◽  
Author(s):  
Ronald Ferguson ◽  
Kaspar Schattke ◽  
Michele Paulin

Purpose – The purpose of this paper is to study micro-level research into the social dimensions of entrepreneurial partnerships assessed by the influences of: the degree of interpersonal attraction, the strength of relational norms and the level of partner trustworthiness on value co-creations in an emerging biotechnology network. Design/methodology/approach – Financial and scientific partnerships were investigated by structured interviews with entrepreneurs. Financial partnerships were also studied using interviews with lead investors. Research design and analyses were based on a Conditional Process Model. Findings – Partner trustworthiness was found to be critical for the co-creation of value in both types of partnerships. In financial partnerships, the level of interpersonal attraction and relational norms strength acted independently as antecedents of partner trustworthiness. Only the entrepreneur linked interpersonal attraction directly to value co-creation. Both entrepreneurs and lead investors perceived the association between interpersonal attraction and co-created value to be mediated through partner trustworthiness. Only the lead investor perceived this mediation to be moderated by relational norms strength. However, in scientific partnerships, relational norms strength, but not interpersonal attraction, contributed to partner trustworthiness that subsequently effected value co-creation. The entrepreneur’s trustworthiness perception in both types of partnerships was mainly due to a partner’s reputation, whereas for lead investors it was primarily the perceived reliability of the entrepreneur. Originality/value – This research points out the challenges of measurement and interpretation of network research. Theoretical conclusions based on only one partner’s perspective and in one context would not be sufficient to describe the complexity of value co-creations in entrepreneurial networks. Also, the cooperative social, rather than competitive opportunistic nature of entrepreneurial knowledge-intensive networks was confirmed.


2015 ◽  
Vol 35 (9/10) ◽  
pp. 699-719 ◽  
Author(s):  
Borbála Kovács

Purpose – The purpose of this paper is to formulate a conceptually and empirically grounded new understanding of childcare arrangements for cross-national and longitudinal micro-level empirical research by drawing on theoretical discussions about the social, spatial and temporal dimensions of embodied childcare and empirical data in the form of parental narratives from a Romanian qualitative study. Design/methodology/approach – The paper builds on a critique of an extensive body of empirical literature on the micro-level organisation of childcare and the thematic analysis of in-depth interviews with Romanian parents. The paper combines a critical literature review with findings from a qualitative study on childcare. Findings – The paper formulates a new understanding of household-level childcare arrangements that is context-insensitive, yet reflects the social, spatial and temporal concerns that the organisation of embodied childcare often raises. The paper expands on six real-life care arrangements in Romanian households represented as different combinations of care encounters. Research limitations/implications – As the paper draws on parental narratives from a single country, Romania, the mapping of childcare arrangements in other jurisdictions and/or at different times would strengthen the case for the proposed understanding of care arrangements as a valuable tool to represent, compareand contrast household-level care routines. Originality/value – The idea that parents (especially mothers) make work-care decisions in the light of what is best for their child has been widely documented. However, taxonomies of care arrangements have failed to reflect this. The proposed conceptualisation of childcare arrangements addresses this issue by articulating a conceptually coherent approach to developing empirically grounded childcare typologies that “travel well” cross-nationally and over time.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jasna Pocek ◽  
Diamanto Politis ◽  
Jonas Gabrielsson

PurposeThis study focuses on extra-curricular start-up programs for students at higher educational institutions. It explores the social and situated learning experiences of students who participate in start-up programs, as well as how the processes and outcomes of entrepreneurial learning are potentially shaped by this context.Design/methodology/approachThe study follows multiple cohorts of students who have participated in an extra-curricular start-up program managed by three collaborating universities in Greater Copenhagen. The data have been inductively analyzed using semi-structured interviews with students and project managers during and after the start-up program, complemented with project progress reports, observation notes and survey data.FindingsThe analysis generates a grounded, theoretically informed process model of entrepreneurial learning situated in extra-curricular start-up programs. The model depicts how the immersion, comprehension and co-participation in entrepreneurship as social practice subsequently enables students to expand knowledge structures and develop greater self-confidence in performing entrepreneurship. The model identifies three interconnected components that trigger entrepreneurial learning among students, which allow them to acquire two set of competencies: venture creation competencies and enterprising competencies.Originality/valueThe findings offer unique insights into how the social and relational environment influence and shape the learning experience of students, hence filling the research void on entrepreneurial learning in the situated context of extra-curricular enterprise activities. The findings also elucidate how individual learning experiences of students are potentially shaped by the immersion, comprehension and co-participation in entrepreneurship as social practice.


2018 ◽  
Vol 24 (2) ◽  
pp. 357-383 ◽  
Author(s):  
Wai Yin Mok

Purpose Concurrency is a desirable property that enhances workflow efficiency. The purpose of this paper is to propose six polynomial-time algorithms that collectively maximize control flow concurrency for Business Process Model and Notation (BPMN) workflow models. The proposed algorithms perform model-level transformations on a BPMN model during the design phase of the model, thereby improving the workflow model’s execution efficiency. Design/methodology/approach The approach is similar to source code optimization, which solely works with syntactic means. The first step makes implicit synchronizations of interdependent concurrent control flows explicit by adding parallel gateways. After that, every control flow can proceed asynchronously. The next step then generates an equivalent sequence of execution hierarchies for every control flow such that they collectively provide maximum concurrency for the control flow. As a whole, the proposed algorithms add a valuable feature to a BPMN modeling tool to maximize control flow concurrency. Findings In addition, this paper introduces the concept of control flow independence, which is a user-determined semantic property of BPMN models that cannot be obtained by any syntactic means. But, if control flow independence holds in a BPMN model, the model’s determinism is guaranteed. As a result, the proposed algorithms output a model that can be proved to be equivalent to the original model. Originality/value This paper adds value to BPMN modeling tools by providing polynomial-time algorithms that collectively maximize control flow concurrency in a BPMN model during the design phase of the model. As a result, the model’s execution efficiency will increase. Similar to source code optimization, these algorithms perform model-level transformations on a BPMN model through syntactic means; and the transformations performed to each control flow are guaranteed to be equivalent to the control flow. Furthermore, a case study on a real-life new employee preparation process is provided to demonstrate the proposed algorithms’ usefulness on increasing the process’s execution efficiency.


Sign in / Sign up

Export Citation Format

Share Document