Technology Related Policies

In this study, it is hypothesized that the two technology-related policies that have the potential to influence levels of trust in B2B e-commerce are the security policy and the privacy policy. The relevant technology-related procedures examined in this study relate to (a) Regular review of policies (b) Ethical hacking; (c) Formulation of a security team; (d) Conduct various awareness and training programs; (e) Membership of security regulatory institutions; (f) Allotments of certificates from various seals of approvals; etc. The present chapter examines the relationship between levels of assurance with regard to these technology-related policies and procedures and the levels of trust in B2B e-commerce.

2011 ◽  
pp. 2352-2364
Author(s):  
Yvette Ghormley

The number and severity of attacks on computer and information systems in the last two decades has steadily risen and mandates the use of security policies by organizations to protect digital as well as physical assets. Although the adoption and implementation of such policies still falls far short, progress is being made. Issues of management commitment, flexibility, structural informality, training, and compliance are among the obstacles that currently hinder greater and more comprehensive coverage for businesses. As security awareness and security-conscious cultures continue to grow, it is likely that research into better methodologies will increase with concomitant efficiency of security policy creation and implementation. However, attacks are becoming increasingly more sophisticated. While the human element is often the weakest link in security, much can be done to mitigate this problem provided security policies are kept focused and properly disseminated, and training and enforcement are applied.


2008 ◽  
pp. 1727-1740
Author(s):  
Charla Griffy-Brown ◽  
Mark W.S. Chun

This chapter demonstrates the importance of a well-formulated and articulated information security policy by integrating best practices with a case analysis of a major Japanese multinational automotive manufacturer and the security lessons it learned in the implementation of its Web-based portal. The relationship between information security and business needs and the conflict that often results between the two are highlighted. The case also explores the complexities of balancing business expedience with long-term strategic technical architecture. The chapter provides insight and offers practical tools for effectively developing and implementing information security policies and procedures in contemporary business practice.


2003 ◽  
Vol 1 (3) ◽  
Author(s):  
Andrea Wyatt

The ability of expert practitioners to make sound judgments when faced with non-routine situations calls on a form of tacit knowing that has been loosely branded as ‘intuition’, a ‘sixth sense’, or ‘gut feeling’. The development of tacit knowledge is associated with nonformal learning that occurs in the context of the workplace; however, the elusive nature of this phenomenon has served to hamper research efforts. The focus has therefore shifted away from tacit knowledge toward the more observable concept of ‘judgment’. Paramedics are called to make clinical judgments as part of their everyday practice, often unaware of the basis behind these judgments. This case study examines the source of knowledge drawn on by experienced paramedics when making judgments, especially when faced with situations they have not previously encountered, and proposes how new knowledge and meaning is constructed through such involvements. A better understanding of the relationship between knowing and judgment, and how they are developed, will have future implications for the provision of ongoing education and training programs for paramedics.


2017 ◽  
Vol 5 (3) ◽  
pp. 814
Author(s):  
Nizar M. Ali ◽  
Jagar M. Ismail ◽  
Avan Y. Haji

The research aims to identify the business ethics and their role in achieving the performance efficiency. Research descriptive and analytical approach were used. To identify the variables a tool has designed For data collection, consisting of (30) paragraph and its representing the paragraphs of business ethics and the performance efficiency. The outcomes of Questionnaire were analyzed and distributed to the administration staff at the presidency of Zakho University which it were (44) statistical forms and displayed by (SPSS) using statistical forms average, standard deviations, and the relationship between the Line and influence. Descriptive analysis of the variables business ethics shown that the degree of overall variable agreement reached (62.28%). also the degree of overall variable agreement of performance efficiency reached (46.67%). Based on the research test and its hypo thesis research found there were a significant correlation between business ethics and efficient performance at all level. The existence of moral effect were found in business ethics in the performance efficiency at all level. Based on the conclusion a subjections has set, the most important subject to everyone wither they are academics or employs in the education institution. Research sample shad work to gather to determine the works ethics and to give more attention in how to continue to apply the moral control and its elements, also to focus on compliance with regulation as model for the application of work ethic because of its role in enhancing the performance of the institution operations. All the powers would assist them must be given to wards a achieving the goals also in order to address the problem of the low level of performance. And develop their abilities and improve their performance also participating in scientific conferences, seminars and training programs specialized in quality of performance.


2015 ◽  
Vol 6 (1) ◽  
Author(s):  
Azman Ismail ◽  
Ng Kueh Hua ◽  
Yusof Ismail ◽  
Ainon Jauhariah Abu Samah ◽  
Rixal Abu Bakar ◽  
...  

<p>An administrator plays a vital role in the growth and development of his/her subordinates. Despite this notion, the role of an administrator in the context of training programs and transfer of training is not well studied. Therefore, this study is set to examine the relationship between administrator’s role in training programs and training transfer. A survey method was utilized to gather 706 survey questionnaires from employees of local authorities of three cities in the state of Sarawak, Malaysia. The results of SmartPLS path model analysis confirmed that the ability of administrators to properly implement support, communication and assignment in planning and implementing training programs has been an important predictor of training transfer in the studied organization. Further, this study provides discussion, implications and conclusion.</p>


Author(s):  
Charla Griffy-Brown ◽  
Mark W.S. Chun

This chapter demonstrates the importance of a well-formulated and articulated information security policy by integrating best practices with a case analysis of a major Japanese multinational automotive manufacturer and the security lessons it learned in the implementation of its Web-based portal. The relationship between information security and business needs and the conflict that often results between the two are highlighted. The case also explores the complexities of balancing business expedience with long-term strategic technical architecture. The chapter provides insight and offers practical tools for effectively developing and implementing information security policies and procedures in contemporary business practice.


2012 ◽  
Vol 7 (4) ◽  
pp. 575-581
Author(s):  
Yusof Ismail ◽  
Nurhana M. Rafiudd ◽  
Azman Ismail ◽  
Muhammad Zulfadhliz ◽  
Mohd Hasbullah B. Mohamad ◽  
...  

2018 ◽  
Vol 22 (1) ◽  
pp. 2156759X1986733
Author(s):  
Ami Camp ◽  
Sejal Parikh Foxx ◽  
Claudia Flowers

Homelessness remains a national concern impacting the lives of many individuals and families. We examined the relationships among participating school counselors’ self-reported multicultural self-efficacy, empathy, training, and knowledge and skills supporting students experiencing homelessness. Results of a three-stage hierarchical multiple regression indicated that the most significant predictors of school counselors’ knowledge and skills were training and multicultural self-efficacy, respectively. We present implications for training programs, counselor educators, and practicing school counselors.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Naveed Ahmed ◽  
Cai Li ◽  
Sikandar Ali Qalati ◽  
Habib ur Rehman ◽  
Asadullah Khan ◽  
...  

AbstractThis study aims to measure and investigates the mediating effect of business incubators (BIs) and the influence of training programs, capital support, and networking services on sustainable entrepreneurship growth (SEG). A mediated conceptual model is constructed to simplify the effect and influences of variables taken in this study. A quantitative research method is employed on a sample size of 567. A survey questionnaire was used as an instrument to collect data from incubator centers and entrepreneurs. The method of bootstrapping, partial least squares (software 3.2.8) Algorithms, and structural equation models were used. In findings, the positive and significant influence of networking services, capital support, and training programs were identified on SEG. Also, the relationship between networking services, capital support, training programs, and SEG was mediated by BIs.


2020 ◽  
pp. 789-816
Author(s):  
Yasha Afshar-Jalili ◽  
Ali Khamseh

Psychological capital (PsyCap) has drawn the attention of researchers in the last decade. Scholars claim that PsyCap plays a significant role in both individual and organizational performance. Considering the importance of the construct, this research aimed to investigate the relationship between early maladaptive schemas (EMS) and PsyCap. The research methodology was a quantitative method with a survey approach. Using PLS software for analyzing data, findings reported the EMSs in four domains, including disconnection and rejection, im-paired autonomy and performance. Impaired limits and other-directedness are negatively related to an individual's PsyCap. Results can suggest how individual and organizational PsyCap can be enhanced by schema-focused interventions and training programs. Likewise, this study provides theoretical implications for future researchers to investigate the extent that schema-focused interventions, as well as training programs, can improve the individual, group, and organizational PsyCap.


Sign in / Sign up

Export Citation Format

Share Document