The impact of mobile shadow IT usage on knowledge protection: an exploratory study

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mohammed Abbas ◽  
Adnan Alghail

Purpose The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole. Design/methodology/approach This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP. Findings The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization. Practical implications For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations. Originality/value This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.

2018 ◽  
Vol 52 (1) ◽  
pp. 84-104 ◽  
Author(s):  
Carolina Guerini ◽  
Eliana Alessandra Minelli

Purpose The purpose of this paper is to focus on the profile of DiDIYers and the antecedents of digital do it yourself (DiDIY) in Network Marketing Direct Selling Organizations (NMDSO). Design/methodology/approach A two-step research design allowed the detection of DiDIYers strictu sensu (i.e. digital makers). After collecting data about the attitudes and the actual use of digital technology (DT) by network marketers through an online survey, an open-ended interview technique made it possible to analyze the personal characteristics of DiDIYers, the motivations that drive them and the activities that mainly foster the creation of artifacts in the DT domain. Besides, it allowed to recognize the perceived benefits and the impact of DiDIY output on networkers’ downline and firms’ performance. Findings The results provide a preliminary profile of the DiDIYer in network marketing communities that is suitable for further comparative studies. More specifically, this exploratory study acknowledges the most important antecedents of DiDIY in digital literacy – including the awareness of being a digital literate and/or a potential appropriateur – and in organizational culture. Research limitations/implications This is an exploratory study based on a limited sample of DiDIYers, nevertheless it offers a preliminary view of the subjective side of the DiDIY phenomenon in network marketing and represents as well a context-bound study. Practical implications Considering the ascribed benefits of DiDIY output on the traditional network marketing objectives (effectiveness, efficiency, cohesion, mutual assistance and reinforcement) network marketing communities could benefit from an increase of attention to the topic. Originality/value The study throws light on the process of DiDIY within direct sales and network marketing activities by defining a preliminary profile of digital makers and thus, underlining a phenomenon neglected so far.


2016 ◽  
Vol 15 (3) ◽  
pp. 118-122 ◽  
Author(s):  
Chris Pace

Purpose The purpose of this paper is to examine the impact that cyberattacks are having on organizations and the growing need these create for H.R. departments to collaborate more closely with IT departments. Design/methodology/approach Current thinking regarding managing cybersecurity suggests that it should be managed holistically, i.e. by the human resources (HR) department and information technology (IT) department working together more closely. This sees the IT department providing the IT security tools and the HR department providing the appropriate processes and procedures that need to be followed, as well as creating a necessarily more “vigilant” culture. Findings Several practical steps are outlined that will help HR departments protect themselves against a data breach. Originality/value Cyberthreats are amongst the top threats to UK business, according to the government. Managing cybersecurity has long been left almost solely to the technology experts. The continuing number of high-profile data breaches suggests that cybersecurity tools alone will not stop information leaking from companies. There is an important role for HR teams in encouraging and enforcing a more proactive, vigilant culture amongst the workforce and working more closely with IT to improve security practices.


2019 ◽  
Vol 27 (5) ◽  
pp. 601-620
Author(s):  
Lamya Abdullah ◽  
Juan Quintero

Purpose The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously. Design/methodology/approach An approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected. Findings Discussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained. Originality/value A preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).


2013 ◽  
Vol 114 (3/4) ◽  
pp. 132-141 ◽  
Author(s):  
Judith Mavodza

PurposeThe purpose of this paper is to discuss issues involved in navigating the modern information environment where the relevance of cloud computing is unavoidable. This is a way of shifting from the hardware and software demands of storing and organizing data, to information access concerns. That is because with the exponential growth in information sources and all accompanying complexities, the limited capacity of libraries to host their own in its entirety necessitates opting for alternatives in the cloud.Design/methodology/approachA review of current literature about the topic was performedFindingsLiterature used reveals that currently, libraries are using the cloud for putting together user resources, i.e. using Software as a Service (SaaS), such as in library catalogues, WorldCat, Googledocs, and the aggregated subject gateways like SUMMON, and others; the web Platform as a Service (PaaS) as in the use of GoogleApp Engine; or Infrastructure as a Service (IaaS) as in the use of D‐Space, FEDORA, and others. The cloud is confirmed as a facilitator in storing and accessing information in addition to providing a unified web presence with reduced local storage capacity challenges.Originality/valueThe value of these findings is to remind librarians of the shift in focus towards which devices provide the easiest access to data and applications. This is one of the reasons they in many instances are currently having to address issues relating to the use of electronic media tools such as smartphones, iPad, e‐book readers, and other handheld devices. The largely borderless information resources also bring to the forefront considerations about digital rights management, fair use, information security, ownership and control of data, privacy, scholarly publishing, copyright guidance, and licensing that the librarian has to be knowledgeable about. It has become necessary for librarians who make use of commercial cloud services to be conversant with the implications on institutional data. To avert the ever present dangers and risks involving cyber‐security, it is usually practical for institutions to keep policies, procedures, fiscal, and personnel data in private clouds that have carefully crafted access permissions. Being aware of these implications enables thoughtful, adaptive planning strategies for the future of library practice and service.


2016 ◽  
Vol 2 (1) ◽  
pp. 28-39 ◽  
Author(s):  
Margaret Vickers ◽  
Philip Birch ◽  
Sally Gallovic ◽  
Michael Kennedy

Purpose – Police officers from a police force in Australia were interviewed about the types and level of surveillance they experience in their work, with the recognition of technology contributing to an increased level of such. The concept of the Panopticon and the Looking-Glass Self offer useful frameworks for understanding the experiences of those police officers interviewed. The paper aims to discuss these issues. Design/methodology/approach – Based on 14 in-depth unstructured interviews with police officers, this study is an exploratory piece of research. Findings – This study presents findings in which police officers spoke of the surveillance they encounter from the perspective of the police organisation; their own self-surveillance as well as being monitored by other police officers. This paper argues that the Panopticon Effect can negatively impact on individual officers as well as overall police practice. Originality/value – This paper is an exploratory study based on the experiences of rank and file police officers currently in service. The paper considers the surveillance and scrutiny of police officers from within the organisation and recognises the impact of technology.


2015 ◽  
Vol 14 (6) ◽  
pp. 214-219 ◽  
Author(s):  
Mike Weston

Purpose – This paper aims to look at the benefits, risks and ethics behind introducing wearable sensors into the workplace. There are expected to be more than three billion wearable sensors worldwide by 2025 (Hayward and Chansin, 2015). The emergence of technology that has the capability to closely monitor employees has provoked widespread ethical debate (Joseph et al., 2015, p. 244). Design/methodology/approach – The author undertook a review of the current wearable devices on the market, the impact of previous technological innovations on workplaces and the possible impact of wearable devices on organisations. Findings – Wearable technology has the potential to increase productivity. Businesses that embrace these devices are likely to become leaders in their industries (Li, 2015, p. 4). However, any move to use wearable devices in the workplace must be undertaken with sensitivity, and it is recommended that employee participation in wearables programmes is initially voluntary. Businesses must also ensure employees understand how the data collected will be used, who has access to the data and how it is stored. Use of a third party to collect and analyse the information is recommended as an extra security and privacy measure. Originality/value – The work contained in this paper has not been replicated elsewhere.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Peter Knight ◽  
Karen Peesker ◽  
Claudia C. Mich

PurposeThe purpose of this exploratory study is to investigate the impact of sales education on recent graduates' career preparedness and understand how sales programs might prepare students better for successful sales careers. We investigate the known competencies leading to sales success that were, or were not, adequately developed by their university sales programs.Design/methodology/approachThe authors collected and analyzed qualitative data from in-depth interviews with a sample of 20 recent university sales graduates working in a sales career. Over 23 h of interviews were transcribed and analyzed via NVivo. Braun and Clarke’s (2006) framework was applied in this study to code the data.FindingsThe study identifies that while respondents are positive about their overall sales education and feel confident about their knowledge of the sales process, they are not always confident in their ability to deal with ambiguity and the unknown. This study revealed that constructs of self-leadership and career choice self-efficacy deserve further consideration as components of the university sales program curriculum.Research limitations/implicationsAs with all exploratory research, there are limits to generalizability; however, this study revealed that the constructs of goal setting, self-leadership and self-knowledge hold promise for further study as a means to increase sales-related self-efficacy and career readiness.Practical implicationsRespondents were positive about their overall sales education experience but identified a need for more effective sales education in cold calling, prospecting and the inherent level of rejection to be prepared for inside sales positions in which sales graduates increasingly start their careers.Social implicationsLower turnover and better educational preparedness of sales program graduates clearly will accrue socioeconomic benefits.Originality/valueThis is the first study to examine the impact of sales education on recent graduates’ career preparedness and the first study for this journal to focus on sales as an area of professional competency and related sales pedagogy. Further, the qualitative methodology, which is relatively unique in sales research, provides rich data that is particularly useful for exploratory research to help provide a structure for universities to strengthen their sales programs through targeted training to help students enhance self-leadership and career preparedness.


2015 ◽  
Vol 30 (1) ◽  
pp. 72-82 ◽  
Author(s):  
Mario Vafeas

Purpose – The purpose of this study is to investigate the contextual factors that influence the impact of account manager turnover on the client–agency relationship, an under-researched area of relationship management literature. Design/methodology/approach – A case study approach and one-to-one interviews are used to conduct the exploratory study, analysing client–agency relationships within the UK design industry. A conceptual framework covering individual and organisational characteristics is used to examine the contextual factors impacting account manager turnover. Findings – The findings identify both organisational and individual contextual factors that influence the outcome of turnover. Categorized into three core contexts (client-specific knowledge, multiple relationship ties and turnover process management), factors such as agency structure and culture, agency knowledge management policies and client experience were all found to impact on account manager turnover. Research limitations/implications – This small, qualitative, exploratory study suggests the need for further research to investigate the transferability of the findings to a broader range of organisational types and industries and to highlight additional contextual factors that influence the impact of turnover. Practical implications – Account manager turnover does not necessarily mean the end of the client–service firm relationship. Agencies can create contexts that mitigate the potential negative effects. Small firms appear to have advantages inherent in their size, but larger firms can take steps to emulate some of the conditions found in micro firms. Originality/value – This paper adds to the limited number of studies into account manager turnover, making a theoretical and practical contribution, enabling marketing managers to take steps to ensure staff turnover does not result in client switching.


2019 ◽  
Vol 32 (2) ◽  
pp. 251-273 ◽  
Author(s):  
Christopher Reichstein

Purpose The purpose of this paper is to analyze the value of a strong decision-making information technology (IT) influence within organizations. Although research and managerial practice has repeatedly shown the importance of IT departments within firms and has commented on the influence of IT departments on business performance, prior research has still no evidence about the value of a strong decision-making IT influence yet. Design/methodology/approach To prove the influence of the IT department within the company, this study identifies and operationalizes a formative construct determined by four main specifics of the IT department: IT department size, IT department value assessment, IT experience of the top management and degree of digitization. A questionnaire was used to collect the data of 124 experts from companies that could be assigned mainly to the sectors manufacturing, trade as well as information and communication. The data were analyzed using exploratory and confirmatory factor analyses. Further, partial least squares structural equation model (PLS-SEM) was used to test the proposed model. Findings The results show that both investments in the size of the IT department as well as in top managers with IT experience, and a high degree of digitization in a company positively influence the role of the IT department. It also shows that a higher general appreciation of the IT department goes hand in hand with a higher influence of IT in the company. The measures are significant as companies, which do have an influential IT department, actually have higher monetary as well as non-monetary business performances. Practical implications The study is aimed equally at science and practice, as it provides information on the extent to which more importance should be attached to IT management in the future and what organizational adjustments need to be made. Originality/value Despite the ongoing discussions on the importance of IT management for business performance, no existing studies have delivered evidence that there is a significant direct link between the decision-making influence of IT and the extent of corporate performance. The present work therefore has two objectives. The theoretical goal is to clarify the impact of the IT department on business performance and to identify the factors that make up an influential IT department. The practical objective of the research is to provide recommendations on how firms could establish or expand the IT department.


2020 ◽  
Vol 14 (4) ◽  
pp. 1015-1034
Author(s):  
Shilei Hu ◽  
Xiaohong Wang ◽  
Ben Zhang

Purpose This paper aims to examine the influence of individual and combined effects of the mode focused on scientific and technological-based innovation (STI) and the mode based on learning by doing, by using and by interacting (DUI) on firms’ innovation performance and whether information technology (IT) moderates the relation between different innovation modes and firms’ innovation performance. Design/methodology/approach A conceptual model linking innovation modes, IT (including IT infrastructure and the frequency of IT usage) and firms’ innovation performance was developed, and the proposed hypotheses were tested empirically using World Bank’s micro survey data collected from manufacturing firms in an emerging market (China). Findings The results show that individually both STI mode of innovation and DUI mode of innovation have a significant positive effect on firms’ innovative performance, whereas the combined STI and DUI mode of innovation has a negative impact. IT infrastructure moderates the relation between STI (or STI and DUI) mode of innovation and firms’ innovation performance, while the frequency of IT usage has no moderating effects on the relationship between any kind of innovation modes and firms’ innovation performance. Research limitations/implications Although some results are quite different from what is expected, these are insightful for both academics and policymakers. The use of cross-sectional data has its limitations. Therefore, future studies based on longitudinal data should be conducted. This study points toward the need to conduct the meta-analysis to better explain the existing inconsistencies in the findings of relevant quantitative studies. Practical implications This study provides firm managers with practical implications. The conclusions of this study imply that the impact of the combined STI and DUI mode of innovation is likely to be contextual, so firms should make contingent decisions on whether to engage in STI mode of innovation and DUI mode of innovation simultaneously according to their own organizational conditions. Moreover, face-to-face contacts are particularly important when a firm engages in DUI mode of innovation. In addition, the focus of IT strategy of firms engaged in STI mode of innovation should be on perfecting their IT infrastructure rather than increasing the frequency of IT usage. Originality/value This paper provides new evidence for the relation between business innovation modes and firms’ innovation performance, and it is one of the few empirical studies that focus on emerging markets. More importantly, this paper proposes a persuasive explanation framework for understanding the heterogeneous impacts of the combined STI and DUI mode of innovation on firms’ innovation performance. This is the first study that examines the moderating effect of IT on the relationship between business innovation modes and a firm’s innovation performance.


Sign in / Sign up

Export Citation Format

Share Document