Search results

1 – 6 of 6
Article
Publication date: 30 September 2020

Jacob A. Young, James F. Courtney, Rebecca J. Bennett, Timothy Selwyn Ellis and Clay Posey

The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.

Abstract

Purpose

The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.

Design/methodology/approach

Investigators were recruited to participate in an online experiment that tasked subjects with evaluating simulated two-way, computer-mediated communication between an investigator and whistleblower. Several rival explanations were also examined to account for potential confounds.

Findings

While anonymous whistleblowers were perceived to be less credible than identified whistleblowers when reporting via one-way communication, perceived whistleblower credibility was not statistically different when using two-way communication. Further, investigators allocated statistically similar amounts to investigate anonymous and identified reports.

Research limitations/implications

Based upon the results of this study, several new research directions can be explored with respect to maintaining anonymity, assessing credibility and designing reporting systems.

Practical implications

The results support the use of anonymous, two-way communication in whistleblowing reporting systems. Anonymous whistleblowers would benefit from the ability to maintain an active dialogue with investigators without jeopardizing their safety or the investigation.

Social implications

This study provides empirical support for strengthening whistleblowing reporting channels through the adoption of anonymous, two-way, computer-mediated communication. Doing so can better preserve the anonymity of those willing to report wrongdoing and better protect them from potential retaliation.

Originality/value

This study is among the first to empirically test the longstanding theory that anonymous reports are perceived by investigators as less credible than those from identified individuals. This study is also among the first to consider and incorporate anonymous, two-way communication in whistleblowing reporting.

Details

Information Technology & People, vol. 34 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 February 1995

Sylvia Andrews

Demographers, researchers and US Census data users can join the ranks of the do‐it‐yourselfers and create customised demographic tabulations and research data, using three new…

Abstract

Demographers, researchers and US Census data users can join the ranks of the do‐it‐yourselfers and create customised demographic tabulations and research data, using three new Census Bureau CDROM products now available from the Census Bureau: Public User Microdata Samples (PUMS), Census Transportation Planning Package (CTPP) and School District Data Book(SDDB). As a lead state agency for coordinating and distributing Census data, the Indiana State Data Center makes these products available to a variety of users including planners, legislators, state and local agencies, university research departments and area businesses.

Details

Online and CD-Rom Review, vol. 19 no. 2
Type: Research Article
ISSN: 1353-2642

Article
Publication date: 11 November 2019

Anthony Duke Giwah, Ling Wang, Yair Levy and Inkyoung Hur

The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user…

1253

Abstract

Purpose

The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology.

Design/methodology/approach

This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening.

Findings

This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security.

Originality/value

This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Book part
Publication date: 17 December 2016

Susan McDonnell

This chapter explores the role of language in constructing spaces of belonging in the relational lives of young migrant children in Ireland. In particular, it investigates how…

Abstract

Purpose

This chapter explores the role of language in constructing spaces of belonging in the relational lives of young migrant children in Ireland. In particular, it investigates how friendship is negotiated in linguistically normative school spaces.

Methodology/approach

The chapter draws on the findings and analysis of a larger study of Irish childhoods, race and belonging. The research involved qualitative work with 42 children, from migrant and non-migrant backgrounds. Research was undertaken with classroom groups in two primary schools in a large town in the west of Ireland, and with a small sample of migrant children and their parents in family homes. Arts-based and visual methods were incorporated throughout the data collection process.

Findings

Findings from the research indicate intersections between constructions of belonging in linguistic spaces such as the school and possibilities/constraints for children’s peer friendships. While ‘home’ languages and bilingual ability were valued in home contexts, even these spaces were inflected by the ‘English-only’ exigencies of school and broader societal spaces. Regarding peer friendship, the findings show that proficiency in speaking English was central, both in terms of accessing friendship rituals through ‘talk’, and, importantly, in terms of narrativizing self as viable school pupil and peer.

Originality/value

The significance of this work lies in its examination of the complexity of language as it functions in children’s relational lives. As well as being a pragmatic skill in negotiating and maintaining friendship, it identifies language as a marker of belonging that is shaped by and shapes school spaces, and which has implications for children’s peer friendships in this context. As such, the study points to a role for schools in engaging with and promoting recognition of children’s multilingual resources.

Details

Friendship and Peer Culture in Multilingual Settings
Type: Book
ISBN: 978-1-78635-396-2

Keywords

Article
Publication date: 12 April 2024

Syed Shah Shah Alam, Taslima Jannat, Chieh Yu Lin, Nor Asiah Omar and Yi Hui Ho

The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.

Abstract

Purpose

The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.

Design/methodology/approach

This is an empirical study based on the quantitative approach undertaking a cross-sectional survey method where a convenience sampling technique was applied. The analysis was done using partial least square structural equation model applying Smart-PLS version 3.0.

Findings

This study confirmed that all the components of cognitive appraisal processes, including perceived severity, perceived vulnerability, response efficacy and self-efficacy, have a significant influence on attitude. Attitude, in turn, mediates the relationship between these variables and the behavioural intention of ethical practice, except for perceived vulnerability. Besides, moral obligation is found to mediate the relationship between attitude, self-efficacy and the behavioural intention of ethical decision-making. The study also found that ethical climate and subjective norms have a direct influence on behavioural intention. Furthermore, behavioural intention, ethical climate and self-efficacy are positively related to actual decision-making behaviour. However, this study did not find any direct effect of subjective norms on moral obligation.

Practical implications

The organization should include an emphasis on building ethical culture and setting an ethical code of conduct within the organization to sustain ethical practice within employees. However, the practitioner should work on enhancing self-efficacy to curb unethical practices by individuals.

Originality/value

This research contributes to the management of garments manufacturers by a practical and theoretical understanding of what influences the ethical behavioural decision-making process. Valuable guidelines are provided on the ethical decision-making process in the garments manufacturing companies for future researchers.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 13 December 2022

Fushu Luan, Yang Chen, Ming He and Donghyun Park

The main purpose of this paper is to explore whether the nature of innovation is accumulative or radical and to what extent past year accumulation of technology stock can predict…

Abstract

Purpose

The main purpose of this paper is to explore whether the nature of innovation is accumulative or radical and to what extent past year accumulation of technology stock can predict future innovation. More importantly, the authors are concerned with whether a change of policy regime or a variance in the quality of technology will moderate the nature of innovation.

Design/methodology/approach

The authors examined a dataset of 3.6 million Chinese patents during 1985–2015 and constructed more than 5 million citation pairs across 8 sections and 128 classes to track knowledge spillover across technology fields. The authors used this citation dataset to calculate the technology innovation network. The authors constructed a measure of upstream invention, interacting the pre-existing technology innovation network with historical patent growth in each technology field, and estimated measure's impact on future innovation since 2005. The authors also constructed three sets of metrics – technology dependence, centrality and scientific value – to identify innovation quality and a policy dummy to consider the impact of policy on innovation.

Findings

Innovation growth is built upon past year accumulation and technology spillover. Innovation grows faster for technologies that are more central and grows more slowly for more valuable technologies. A pro-innovation and pro-intellectual property right (IPR) policy plays a positive and significant role in driving technical progress. The authors also found that for technologies that have faster access to new information or larger power to control knowledge flow, the upstream and downstream innovation linkage is stronger. However, this linkage is weaker for technologies that are more novel or general. On most occasions, the nature of innovation was less responsive to policy shock.

Originality/value

This paper contributes to the debate on the nature of innovation by determining whether upstream innovation has strong predictive power on future innovation. The authors develop the assumption used in the technology spillover literature by considering a time-variant, directional and asymmetric matrix to model technology diffusion. For the first time, the authors answer how the nature of innovation will vary depending on the technology network configurations and policy environment. In addition to contributing to the academic debate, the authors' study has important implications for economic growth and industrial or innovation management policies.

Details

European Journal of Innovation Management, vol. 27 no. 4
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 6 of 6