Experience Matters

2020 ◽  
Vol 31 (2) ◽  
pp. 1-20
Author(s):  
Leigh A. Mutchler ◽  
Merrill Warkentin

Information systems security is a major organizational concern. This study examines the role of vicarious experience on an individual's behavioral intent to perform a secure recommended response. The protection motivation theory model is expanded to include vicarious experience, which was examined through the separate constructs of vicarious threat experience and vicarious response experience. This study closes a gap in the literature by including vicarious experience in the PMT model and confirming its role as a significant direct influence on the PMT threat and coping constructs, and thus on the PMT model's ability to explain the variance of an individual's intent to perform secure behaviors. Additionally, vicarious experience measures were multi-item reflective scales rather than the single item measures that are more typically used to measure experience. Implications for theory and practice are discussed.

2015 ◽  
Vol 7 (3) ◽  
pp. 1-17
Author(s):  
Juan Luis Santos

This paper discusses the key role of incentives in information systems security. Vulnerabilities can be reduced, and even removed, if individual motivations are taken into account in the process of protection and insurance design. The article first discusses the importance of externalities, free-riding behavior, uncertainty and the incentives mismatch between individuals and organizations involved in information systems security. Previous works perform this study using a game theoretical approach but the paper shows that an agent-based model is capable of including the heterogeneity and interrelations among individuals, not focusing on the reached equilibrium but on the dynamics prior to its emergence.


Author(s):  
Peace Kumah

Emerging human resource management (HRM) practices are focusing on background checks, training and development, employer-employee relations, responsibility and accountability, and monitoring of information systems security resources. Information systems security ensures that appropriate resources and adequate skills exist in the organization to effectively manage information security projects. This chapter examined the role of HRM in enhancing organizational information systems security. Using importance-performance map analysis, the study found training, background checks, and monitoring as crucial HRM practices that could enhance organizational information systems security. Moreover, four indicators, consisting of training on mobile devices security; malware management; background checks; and monitoring of potential, current, and former employees recorded high importance but with rather low performance. Consequently, these indicators should be improved. On the contrary, the organizations placed excessive focus on responsibility, accountability, and employee relations.


2022 ◽  
pp. 1251-1277
Author(s):  
Peace Kumah

Emerging human resource management (HRM) practices are focusing on background checks, training and development, employer-employee relations, responsibility and accountability, and monitoring of information systems security resources. Information systems security ensures that appropriate resources and adequate skills exist in the organization to effectively manage information security projects. This chapter examined the role of HRM in enhancing organizational information systems security. Using importance-performance map analysis, the study found training, background checks, and monitoring as crucial HRM practices that could enhance organizational information systems security. Moreover, four indicators, consisting of training on mobile devices security; malware management; background checks; and monitoring of potential, current, and former employees recorded high importance but with rather low performance. Consequently, these indicators should be improved. On the contrary, the organizations placed excessive focus on responsibility, accountability, and employee relations.


2013 ◽  
Vol 50 (7) ◽  
pp. 598-605 ◽  
Author(s):  
Janine L. Spears ◽  
Henri Barki ◽  
Russell R. Barton

2021 ◽  
Author(s):  
Boyd Novak

<p>This article develops a theory integrating psychological safety and psychological availability within the context of human resource development (HRD) objectives. While research on psychological safety, a willingness to take an interpersonal risk, has blossomed over the past two decades, no theoretical modeling has been offered with links to psychological availability as originally proposed by Kahn (1990). Through the employment of Dubin's (1969) theory-building method, this article develops the integration of psychological safety and psychological availability with a systems framework. A literature review is conducted to define and assess the proposed operational units within the theoretical model focused on inputs, mediating processes, outputs, and feedback input. Implicit voice is proposed as a feedback input that attempts to assess the role of an individual’s prior experiences in the system process. Dubin's (1969) remaining steps for theory construction are completed, up to the point of empirical research. Finally, implications of research, theory, and practice within the field of HRD are examined.</p>


2021 ◽  
Author(s):  
Boyd Novak

<p>This article develops a theory integrating psychological safety and psychological availability within the context of human resource development (HRD) objectives. While research on psychological safety, a willingness to take an interpersonal risk, has blossomed over the past two decades, no theoretical modeling has been offered with links to psychological availability as originally proposed by Kahn (1990). Through the employment of Dubin's (1969) theory-building method, this article develops the integration of psychological safety and psychological availability with a systems framework. A literature review is conducted to define and assess the proposed operational units within the theoretical model focused on inputs, mediating processes, outputs, and feedback input. Implicit voice is proposed as a feedback input that attempts to assess the role of an individual’s prior experiences in the system process. Dubin's (1969) remaining steps for theory construction are completed, up to the point of empirical research. Finally, implications of research, theory, and practice within the field of HRD are examined.</p>


2022 ◽  
pp. 300-325
Author(s):  
Peace Kumah

Emerging human resource management (HRM) practices are focusing on background checks, training and development, employer-employee relations, responsibility and accountability, and monitoring of information systems security resources. Information systems security ensures that appropriate resources and adequate skills exist in the organization to effectively manage information security projects. This chapter examined the role of HRM in enhancing organizational information systems security. Using importance-performance map analysis, the study found training, background checks, and monitoring as crucial HRM practices that could enhance organizational information systems security. Moreover, four indicators, consisting of training on mobile devices security; malware management; background checks; and monitoring of potential, current, and former employees recorded high importance but with rather low performance. Consequently, these indicators should be improved. On the contrary, the organizations placed excessive focus on responsibility, accountability, and employee relations.


Sign in / Sign up

Export Citation Format

Share Document