Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*

2012 ◽  
Vol 43 (4) ◽  
pp. 615-660 ◽  
Author(s):  
Qing Hu ◽  
Tamara Dinev ◽  
Paul Hart ◽  
Donna Cooke
2019 ◽  
Vol 14 (2) ◽  
pp. 291-311 ◽  
Author(s):  
Peng-Yu Li ◽  
Kuo-Feng Huang

PurposeThe purpose of this paper is to investigate why firms engaged in R&D investment and international diversification produce different results in innovation performance.Design/methodology/approachThis study is based on a sample of 283 Taiwanese manufacturing firms in the information technology industry.FindingsThe findings showed that in the top management teams (TMTs) with greater tenure diversity there was a stronger relationship between R&D investment and innovation performance. In addition, the TMTs with greater educational diversity enhanced the relationship between international diversification and innovation performance.Originality/valueThis study stresses the vital role of TMT diversity in resource allocation and information processing during the process of innovation. The authors examined the critical role of TMT educational diversity in bringing a wider range of network resources and the role of TMT tenure diversity in the allocation of firm-specific resources. The TMT diversity causes firms to experience different innovation results during the innovation process.


Author(s):  
Hamed Taherdoost ◽  
Mitra Madanchian ◽  
Mona Ebrahimi

As the pace of changes in the digital world is increasing exponentially, the appeal to shift from traditional platforms to digital ones is increasing as well. Accomplishing digital transformation objectives is impossible without information security considerations. Business leaders should rethink information security challenges associated with digital transformation and consider solutions to seize existing opportunities. When it comes to information security, human beings play a critical role. Raising users' awareness is a meaningful approach to avoid or neutralize the likelihood of unwanted security consequences that may occur during transforming a system digitally. This chapter will discuss cybersecurity and information security awareness and examine how digital transformation will be affected by implementing information security awareness. This chapter will discuss the digital transformation advantages and serious challenges associated with cybersecurity, how to enhance cybersecurity, and the role of information security awareness to mitigate cybersecurity risks.


2007 ◽  
Vol 52 (174-175) ◽  
pp. 9-27 ◽  
Author(s):  
Biljana Bogicevic-Milikic

The paper intends to investigate how companies can efficiently manage their organizational cultures through changes in the reward system. The paper is based on a research which has taken place in one Serbian company which decided to change its organizational culture, as a prerequisite for further organizational changes. As the main instrument for changing organizational culture, the top management used changes in the reward system. The findings suggest that in the short run only narrow changes of organizational culture are likely to occur. The influence of the reward system on cultural changes is quite limited, and therefore should be strengthened by using various HRM policies.


2013 ◽  
Vol 3 (4) ◽  
pp. 22-31
Author(s):  
Ilona Ilvonen ◽  
Pasi Virtanen

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.


2014 ◽  
pp. 153-175
Author(s):  
Kelly LeCouvie ◽  
Jennifer Pendergast

Sign in / Sign up

Export Citation Format

Share Document