Search results
1 – 6 of 6Jacob A. Young, James F. Courtney, Rebecca J. Bennett, Timothy Selwyn Ellis and Clay Posey
The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.
Abstract
Purpose
The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.
Design/methodology/approach
Investigators were recruited to participate in an online experiment that tasked subjects with evaluating simulated two-way, computer-mediated communication between an investigator and whistleblower. Several rival explanations were also examined to account for potential confounds.
Findings
While anonymous whistleblowers were perceived to be less credible than identified whistleblowers when reporting via one-way communication, perceived whistleblower credibility was not statistically different when using two-way communication. Further, investigators allocated statistically similar amounts to investigate anonymous and identified reports.
Research limitations/implications
Based upon the results of this study, several new research directions can be explored with respect to maintaining anonymity, assessing credibility and designing reporting systems.
Practical implications
The results support the use of anonymous, two-way communication in whistleblowing reporting systems. Anonymous whistleblowers would benefit from the ability to maintain an active dialogue with investigators without jeopardizing their safety or the investigation.
Social implications
This study provides empirical support for strengthening whistleblowing reporting channels through the adoption of anonymous, two-way, computer-mediated communication. Doing so can better preserve the anonymity of those willing to report wrongdoing and better protect them from potential retaliation.
Originality/value
This study is among the first to empirically test the longstanding theory that anonymous reports are perceived by investigators as less credible than those from identified individuals. This study is also among the first to consider and incorporate anonymous, two-way communication in whistleblowing reporting.
Details
Keywords
Demographers, researchers and US Census data users can join the ranks of the do‐it‐yourselfers and create customised demographic tabulations and research data, using three new…
Abstract
Demographers, researchers and US Census data users can join the ranks of the do‐it‐yourselfers and create customised demographic tabulations and research data, using three new Census Bureau CDROM products now available from the Census Bureau: Public User Microdata Samples (PUMS), Census Transportation Planning Package (CTPP) and School District Data Book(SDDB). As a lead state agency for coordinating and distributing Census data, the Indiana State Data Center makes these products available to a variety of users including planners, legislators, state and local agencies, university research departments and area businesses.
Anthony Duke Giwah, Ling Wang, Yair Levy and Inkyoung Hur
The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user…
Abstract
Purpose
The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology.
Design/methodology/approach
This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening.
Findings
This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security.
Originality/value
This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.
Details
Keywords
This chapter explores the role of language in constructing spaces of belonging in the relational lives of young migrant children in Ireland. In particular, it investigates how…
Abstract
Purpose
This chapter explores the role of language in constructing spaces of belonging in the relational lives of young migrant children in Ireland. In particular, it investigates how friendship is negotiated in linguistically normative school spaces.
Methodology/approach
The chapter draws on the findings and analysis of a larger study of Irish childhoods, race and belonging. The research involved qualitative work with 42 children, from migrant and non-migrant backgrounds. Research was undertaken with classroom groups in two primary schools in a large town in the west of Ireland, and with a small sample of migrant children and their parents in family homes. Arts-based and visual methods were incorporated throughout the data collection process.
Findings
Findings from the research indicate intersections between constructions of belonging in linguistic spaces such as the school and possibilities/constraints for children’s peer friendships. While ‘home’ languages and bilingual ability were valued in home contexts, even these spaces were inflected by the ‘English-only’ exigencies of school and broader societal spaces. Regarding peer friendship, the findings show that proficiency in speaking English was central, both in terms of accessing friendship rituals through ‘talk’, and, importantly, in terms of narrativizing self as viable school pupil and peer.
Originality/value
The significance of this work lies in its examination of the complexity of language as it functions in children’s relational lives. As well as being a pragmatic skill in negotiating and maintaining friendship, it identifies language as a marker of belonging that is shaped by and shapes school spaces, and which has implications for children’s peer friendships in this context. As such, the study points to a role for schools in engaging with and promoting recognition of children’s multilingual resources.
Details
Keywords
Syed Shah Shah Alam, Taslima Jannat, Chieh Yu Lin, Nor Asiah Omar and Yi Hui Ho
The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.
Abstract
Purpose
The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.
Design/methodology/approach
This is an empirical study based on the quantitative approach undertaking a cross-sectional survey method where a convenience sampling technique was applied. The analysis was done using partial least square structural equation model applying Smart-PLS version 3.0.
Findings
This study confirmed that all the components of cognitive appraisal processes, including perceived severity, perceived vulnerability, response efficacy and self-efficacy, have a significant influence on attitude. Attitude, in turn, mediates the relationship between these variables and the behavioural intention of ethical practice, except for perceived vulnerability. Besides, moral obligation is found to mediate the relationship between attitude, self-efficacy and the behavioural intention of ethical decision-making. The study also found that ethical climate and subjective norms have a direct influence on behavioural intention. Furthermore, behavioural intention, ethical climate and self-efficacy are positively related to actual decision-making behaviour. However, this study did not find any direct effect of subjective norms on moral obligation.
Practical implications
The organization should include an emphasis on building ethical culture and setting an ethical code of conduct within the organization to sustain ethical practice within employees. However, the practitioner should work on enhancing self-efficacy to curb unethical practices by individuals.
Originality/value
This research contributes to the management of garments manufacturers by a practical and theoretical understanding of what influences the ethical behavioural decision-making process. Valuable guidelines are provided on the ethical decision-making process in the garments manufacturing companies for future researchers.
Details
Keywords
Fushu Luan, Yang Chen, Ming He and Donghyun Park
The main purpose of this paper is to explore whether the nature of innovation is accumulative or radical and to what extent past year accumulation of technology stock can predict…
Abstract
Purpose
The main purpose of this paper is to explore whether the nature of innovation is accumulative or radical and to what extent past year accumulation of technology stock can predict future innovation. More importantly, the authors are concerned with whether a change of policy regime or a variance in the quality of technology will moderate the nature of innovation.
Design/methodology/approach
The authors examined a dataset of 3.6 million Chinese patents during 1985–2015 and constructed more than 5 million citation pairs across 8 sections and 128 classes to track knowledge spillover across technology fields. The authors used this citation dataset to calculate the technology innovation network. The authors constructed a measure of upstream invention, interacting the pre-existing technology innovation network with historical patent growth in each technology field, and estimated measure's impact on future innovation since 2005. The authors also constructed three sets of metrics – technology dependence, centrality and scientific value – to identify innovation quality and a policy dummy to consider the impact of policy on innovation.
Findings
Innovation growth is built upon past year accumulation and technology spillover. Innovation grows faster for technologies that are more central and grows more slowly for more valuable technologies. A pro-innovation and pro-intellectual property right (IPR) policy plays a positive and significant role in driving technical progress. The authors also found that for technologies that have faster access to new information or larger power to control knowledge flow, the upstream and downstream innovation linkage is stronger. However, this linkage is weaker for technologies that are more novel or general. On most occasions, the nature of innovation was less responsive to policy shock.
Originality/value
This paper contributes to the debate on the nature of innovation by determining whether upstream innovation has strong predictive power on future innovation. The authors develop the assumption used in the technology spillover literature by considering a time-variant, directional and asymmetric matrix to model technology diffusion. For the first time, the authors answer how the nature of innovation will vary depending on the technology network configurations and policy environment. In addition to contributing to the academic debate, the authors' study has important implications for economic growth and industrial or innovation management policies.
Details