Search results

1 – 9 of 9
Article
Publication date: 11 June 2018

Martin Karlsson, Thomas Denk and Joachim Åström

The purpose of this paper is to investigate the occurrence of value conflicts between information security and other organizational values among white-collar workers. Further…

Abstract

Purpose

The purpose of this paper is to investigate the occurrence of value conflicts between information security and other organizational values among white-collar workers. Further, analyzes are conducted of the relationship between white-collar workers’ perceptions of the culture of their organizations and value conflicts involving information security.

Design/methodology/approach

Descriptive analyses and regression analyses were conducted on survey data gathered among two samples of white-collar workers in Sweden.

Findings

Value conflicts regarding information security occur regularly among white-collar workers in the private and public sectors and within different business sectors. Variations in their occurrence can be understood partly as a function of employees’ work situations and the sensitivity of the information handled in the organization. Regarding how perceived organizational culture affects the occurrence of value conflicts, multivariate regression analysis reveals that employees who perceive their organizations as having externally oriented, flexible cultures experience value conflicts more often.

Research limitations/implications

The relatively low share of explained variance in the explanatory models indicates the need to identify alternative explanations of the occurrence of value conflicts regarding information security.

Practical implications

Information security managers need to recognize that value conflicts occur regularly among white-collar workers in different business sectors, more often among workers in organizations that handle sensitive information, and most often among white-collar workers who perceive the cultures of their organizations as being externally oriented and flexible.

Originality/value

The study addresses a gap in the information security literature by contributing to the understanding of value conflicts between information security and other organizational values. This study has mapped the occurrence of value conflicts regarding information security among white-collar professionals and shows that the occurrence of value conflicts is associated with work situation, information sensitivity and perceived organizational culture.

Details

Information & Computer Security, vol. 26 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 21 December 2021

Martin Karlsson, Fredrik Karlsson, Joachim Åström and Thomas Denk

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

4352

Abstract

Purpose

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

Design/methodology/approach

The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (n = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.

Findings

The results indicate that organizational cultures with an internal focus are positively related to employees’ information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees’ information security policy compliance.

Research limitations/implications

The results suggest that differences in organizational culture are important for employees’ information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.

Practical implications

Practitioners should be aware that the different organizational cultures do matter for employees’ information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.

Originality/value

Few information security policy compliance studies exist on the consequences of different organizational/information cultures.

Open Access
Article
Publication date: 23 June 2022

Sofia Alexopoulou, Joachim Åström and Martin Karlsson

Technology access, digital skills, and digital services are increasingly prerequisites for public life and accessing public services. The digital divide in contemporary societies…

3109

Abstract

Purpose

Technology access, digital skills, and digital services are increasingly prerequisites for public life and accessing public services. The digital divide in contemporary societies matters for efforts to digitalize the welfare state. Research has already mapped individual determinants of digital exclusion and the existence of an age-related digital divide. However, far less attention has been paid to variations in digital inclusion between countries and to their potential explanations related to political systems. This study explores the influence of variations in welfare regimes on the digital divide among seniors (aged 65+) in Europe.

Design/methodology/approach

This article presents time-series cross-sectional analyses of the relationship between welfare state regimes and digital inclusion among seniors in European countries. The analyses are based on data from Eurostat, the World Bank, and the UN E-Government Survey.

Findings

The authors find extensive variation in the digital inclusion of citizens between welfare regimes and argue that considering regime differences improves the understanding of these variations. The findings indicate that the age-related digital divide seems to be least evident in countries with more universalistic welfare regimes and most evident in countries where seniors rely more on their families.

Originality/value

This is the first comparative study of the association between welfare state regimes and digital inclusion among seniors.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 July 2017

Fredrik Karlsson, Martin Karlsson and Joachim Åström

This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic…

Abstract

Purpose

This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic measure, which introduces the idea of competing organisational imperatives.

Design/methodology/approach

A survey was developed using two sets of items to measure compliance. The survey was sent to 600 white-collar workers and analysed through ordinary least squares.

Findings

The results suggest that when using the value-monistic measure, employees’ compliance was a function of employees’ intentions to comply, their self-efficacy and awareness of information security policies. In addition, compliance was not related to the occurrence of conflicts between information security and other organisational imperatives. However, when the dependent variable was changed to a value-pluralistic measure, the results suggest that employees’ compliance was, to a great extent, a function of the occurrence of conflicts between information security and other organisational imperatives, indirect conflicts with other organisational values.

Research limitations/implications

The results are based on small survey; yet, the findings are interesting and justify further investigation. The results suggest that relevant organisational imperatives and value systems, along with information security values, should be included in measures for employees’ compliance with information security policies.

Practical implications

Practitioners and researchers should be aware that there is a difference in measuring employees’ compliance using value monistic and value pluralism measurements.

Originality/value

Few studies exist that critically compare the two different compliance measures for the same population.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 July 2015

Fredrik Karlsson, Joachim Åström and Martin Karlsson

The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge…

1889

Abstract

Purpose

The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.

Design/methodology/approach

Results are based on a literature review of information security culture research published between 2000 and 2013 (December).

Findings

This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.

Research limitations/implications

Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.

Practical implications

Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.

Originality/value

Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.

Content available
Book part
Publication date: 24 November 2010

Abstract

Details

Advances in Librarianship
Type: Book
ISBN: 978-1-84950-979-4

Article
Publication date: 3 October 2023

Michael S.W. Lee and Damien Chaney

While the metaverse is promised to be the next big step for the Internet, this new technology may also bear negative impacts on individuals and society. Drawing on innovation…

Abstract

Purpose

While the metaverse is promised to be the next big step for the Internet, this new technology may also bear negative impacts on individuals and society. Drawing on innovation resistance literature, this article explores the reasons for metaverse resistance.

Design/methodology/approach

The study is based on 66 semi-structured interviews, and the subsequent data were analysed thematically.

Findings

The findings revealed 11 reasons for metaverse resistance: lack of understanding, lack of regulation, addiction avoidance, claustrophobia, loss of social ties, disconnection from reality, privacy concerns, extreme consumer society, unseen benefits, infeasibility and nausea.

Practical implications

By understanding the various reasons for metaverse resistance managers and policymakers can make better decisions to overcome the challenges facing this innovation, rather than adopting a “one-size-fits-all” approach.

Originality/value

While the literature has mainly adopted a positive perspective on the metaverse, this research offers a more nuanced view by identifying the reasons why consumers may resist the metaverse. Furthermore, this study introduces for the first-time “addiction-driven-innovation-resistance (ADIR)” as a potential reason for metaverse resistance, which may also apply to other cases of innovation resistance, when new innovations are perceived as being “too good” and therefore potentially addictive.

Details

Internet Research, vol. 34 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 12 October 2015

Lisa Börjesson

The purpose of this paper is to nuance the perception about professional documentation (a.k.a. “grey literature”), assuming perception of documentation being a cultural aspect of…

1011

Abstract

Purpose

The purpose of this paper is to nuance the perception about professional documentation (a.k.a. “grey literature”), assuming perception of documentation being a cultural aspect of accessibility.

Design/methodology/approach

The study explores variations within the archaeological report genre through a bibliometric analysis of source use. Source characteristics are explored as well as correlations between report authors and source originators. Statistical frequency distribution is complemented by a correspondence analysis and a k-means cluster analysis to explore patterns. The patterns are interpreted as “frames of references” and related to circumstances for archaeological work. The study also discusses source representations.

Findings

The source use patterns reveal a latent variation, not visible in the general analysis: a professional/academic frame of reference (mainly among authors affiliated with incorporated businesses and sole proprietorships) and an administrative frame of reference (mainly among authors affiliated with government agencies, foundations, and member associations) emerge.

Research limitations/implications

The study focuses on Swedish field evaluation reports. Future research could test the results in relation to other types of reports and go beyond the document perspective to explore source use in documentation practices.

Social implications

The results on variations in frames of references among report writers have implication for report readers and user. The results should also be considered in archaeology management and policy-making. On the level of source representation the results call for clarifications of vague representations and possibly omitted sources.

Originality/value

This study contextualizes archaeological information use and focuses on variations in professional archaeology which has received little previous research attention. The bibliometric approach complements previous qualitative studies of archaeological information.

Details

Journal of Documentation, vol. 71 no. 6
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 13 March 2017

Olof Sundin, Jutta Haider, Cecilia Andersson, Hanna Carlsson and Sara Kjellberg

The purpose of this paper is to understand how meaning is assigned to online searching by viewing it as a mundane, yet often invisible, activity of everyday life and an integrated…

2277

Abstract

Purpose

The purpose of this paper is to understand how meaning is assigned to online searching by viewing it as a mundane, yet often invisible, activity of everyday life and an integrated part of various social practices.

Design/methodology/approach

Searching is investigated with a sociomaterial approach with a starting point in information searching as entangled across practices and material arrangements and as a mundane part of everyday life. In total, 21 focus groups with 127 participants have been carried out. The study focusses particularly on peoples’ experiences and meaning-making and on how these experiences and the making of meaning could be understood in the light of algorithmic shaping.

Findings

An often-invisible activity such as searching is made visible with the help of focus group discussions. An understanding of the relationship between searching and everyday life through two interrelated narratives is proposed: a search-ification of everyday life and a mundane-ification of search.

Originality/value

The study broadens the often narrow focus on searching in order to open up for a research-based discussion in information science on the role of online searching in society and everyday life.

Details

Journal of Documentation, vol. 73 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 9 of 9