The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
Algorithmic control and gig workers: a legitimacy perspective of Uber drivers
Organisations increasingly rely on algorithms to exert automated managerial control over
workers, referred to as algorithmic control (AC). The use of AC is already commonplace with …
workers, referred to as algorithmic control (AC). The use of AC is already commonplace with …
Examining the impact of algorithmic control on Uber drivers' technostress
This study examines how the use of algorithmic control within gig economy platforms relates
to the well-being and behavior of workers. Specifically, we explore how two different forms of …
to the well-being and behavior of workers. Specifically, we explore how two different forms of …
Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study
C Bartelheimer, V Wolf… - Information Systems …, 2023 - Wiley Online Library
Workarounds are goal‐driven deviations from the standard operating procedures performed
to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes …
to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes …
A pragmatic approach to the limitations of safety management systems in aviation
S Malakis, T Kontogiannis, A Smoker - Safety science, 2023 - Elsevier
Commercial aviation systems are increasingly stretched to their capacity while existing
Safety Management Systems (SMS) do not live up to our expectations as higher efficiency …
Safety Management Systems (SMS) do not live up to our expectations as higher efficiency …
Employees as a source of security issues in times of change and stress: A longitudinal examination of employees' security violations during the COVID-19 pandemic
Whether malicious or not, employees' actions can have significant and detrimental outcomes
for their organizations. Such is the case in organizational cybersecurity, as many issues …
for their organizations. Such is the case in organizational cybersecurity, as many issues …
[PDF][PDF] Algorithmic Controls and their Implications for Gig Worker Well-being and Behavior.
This study examines how the use of algorithmic controls embedded in gig economy
platforms impacts worker well-being and behavior. We draw on the information systems (IS) …
platforms impacts worker well-being and behavior. We draw on the information systems (IS) …
Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework
A Aggarwal, SK Srivastava - Journal of Organizational Computing …, 2024 - Taylor & Francis
In today's organizational landscape, safeguarding information against both intentional and
unintentional insider threats has become a paramount concern. To address this challenge …
unintentional insider threats has become a paramount concern. To address this challenge …
How different rewards tend to influence employee non-compliance with information security policies
Purpose To help reduce the increasing number of information security breaches that are
caused by insiders, past research has examined employee non-compliance with information …
caused by insiders, past research has examined employee non-compliance with information …
Too much information: Questioning security in a post-digital society
L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …
less commonly used in the design of technologies that control access to data and the …