首页 > 最新文献

Journal of Organizational Computing and Electronic Commerce最新文献

英文 中文
A new direction to better understand post-adoption behavior: The theory of need for information systems 一个更好地理解采用后行为的新方向:信息系统需求理论
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-03 DOI: 10.1080/10919392.2019.1554281
Jiming Wu
ABSTRACT A comprehensive review of the information systems literature suggests that the traditional perception–intention–usage framework may be deficient in explaining post-adoption behaviors. As an effort to fill this gap, the current paper presents a new theory – the theory of need for information systems (TNIS) – and introduces two new constructs – need for technology and need for information. Drawing on the needs-based perspective on behaviors, TNIS conceptualizes these two need constructs as the key predictors of continuance intention and usage. The current paper also discusses useful insights, important implications, and an appropriate instrument for measuring the two new constructs. This study thus contributes to a novel framework to advance theoretical understanding of post-adoption behaviors and to direct future research toward new avenues.
摘要对信息系统文献的全面回顾表明,传统的感知-意图-使用框架可能在解释采用后行为方面存在缺陷。为了填补这一空白,本文提出了一种新的理论——信息系统需求理论(TNIS),并引入了两个新的概念——技术需求和信息需求。利用基于需求的行为观,TNIS将这两种需求结构概念化为持续意图和使用的关键预测因素。本文还讨论了有用的见解,重要的含义,以及测量这两个新结构的适当工具。因此,本研究有助于建立一个新的框架,以促进对收养后行为的理论理解,并指导未来的研究走向新的途径。
{"title":"A new direction to better understand post-adoption behavior: The theory of need for information systems","authors":"Jiming Wu","doi":"10.1080/10919392.2019.1554281","DOIUrl":"https://doi.org/10.1080/10919392.2019.1554281","url":null,"abstract":"ABSTRACT A comprehensive review of the information systems literature suggests that the traditional perception–intention–usage framework may be deficient in explaining post-adoption behaviors. As an effort to fill this gap, the current paper presents a new theory – the theory of need for information systems (TNIS) – and introduces two new constructs – need for technology and need for information. Drawing on the needs-based perspective on behaviors, TNIS conceptualizes these two need constructs as the key predictors of continuance intention and usage. The current paper also discusses useful insights, important implications, and an appropriate instrument for measuring the two new constructs. This study thus contributes to a novel framework to advance theoretical understanding of post-adoption behaviors and to direct future research toward new avenues.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"115 - 124"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1554281","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59758983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A morphological review of enterprise social media literature 企业社交媒体文献的形态回顾
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-03 DOI: 10.1080/10919392.2019.1583456
Suchitra Veeravalli, V. Vijayalakshmi
ABSTRACT Introduction of Enterprise Social Media (ESM) in organizations is driven by a need to improve communication and knowledge sharing within the enterprise. Studies show that soon after ESM adoption, there is some initial enthusiasm and subsequently there is a perceptible drop in usage. A review of ESM literature in a morphological framework, with the aim of demystifying the troubling trend, is presented here. Morphological analysis of literature helps exhibit relevant work on ESM in a framework consisting of dimensions and options from which insights can be derived. The framework developed depicts ESM literature through seven dimensions – organizational level factors influencing ESM, unit of analysis, business objectives of ESM adoption, individual level factors influencing ESM, theoretical framework used, outcomes of adoption, and context of ESM implementation. For each of the dimensions, relevant options were explored and listed. Preliminary observation indicates that at an individual level, themes such as absorptive capacity and lurking behavior of individuals need to be studied in the context of ESM. At an organizational level, the impact of human resources (HR) policies on ESM adoption, uses of ESM for internal crowdsourcing need to be evaluated. Practitioners can use these findings to assess and design their ESM strategies and for academicians, the morphological framework reveals the state of current research in the field and identifies gaps for further research in specific areas of ESM.
企业社会媒体(ESM)在组织中的引入是由于需要改善企业内部的沟通和知识共享。研究表明,在采用ESM后不久,最初有一些热情,随后使用率明显下降。在形态学框架下的ESM文献回顾,目的是揭开令人不安的趋势,在这里提出。文献的形态分析有助于在由维度和选项组成的框架中展示ESM的相关工作,从中可以获得见解。所开发的框架通过七个维度来描述ESM文献——影响ESM的组织层面因素、分析单元、采用ESM的业务目标、影响ESM的个人层面因素、使用的理论框架、采用的结果和实施ESM的背景。对于每个维度,研究并列出了相关选项。初步观察表明,在个体层面,个体的吸收能力和潜伏行为等主题需要在ESM的背景下进行研究。在组织层面,需要评估人力资源政策对ESM采用的影响,以及内部众包中ESM的使用情况。从业者可以使用这些发现来评估和设计他们的ESM策略,对于学者来说,形态框架揭示了该领域当前的研究状况,并确定了ESM特定领域进一步研究的差距。
{"title":"A morphological review of enterprise social media literature","authors":"Suchitra Veeravalli, V. Vijayalakshmi","doi":"10.1080/10919392.2019.1583456","DOIUrl":"https://doi.org/10.1080/10919392.2019.1583456","url":null,"abstract":"ABSTRACT Introduction of Enterprise Social Media (ESM) in organizations is driven by a need to improve communication and knowledge sharing within the enterprise. Studies show that soon after ESM adoption, there is some initial enthusiasm and subsequently there is a perceptible drop in usage. A review of ESM literature in a morphological framework, with the aim of demystifying the troubling trend, is presented here. Morphological analysis of literature helps exhibit relevant work on ESM in a framework consisting of dimensions and options from which insights can be derived. The framework developed depicts ESM literature through seven dimensions – organizational level factors influencing ESM, unit of analysis, business objectives of ESM adoption, individual level factors influencing ESM, theoretical framework used, outcomes of adoption, and context of ESM implementation. For each of the dimensions, relevant options were explored and listed. Preliminary observation indicates that at an individual level, themes such as absorptive capacity and lurking behavior of individuals need to be studied in the context of ESM. At an organizational level, the impact of human resources (HR) policies on ESM adoption, uses of ESM for internal crowdsourcing need to be evaluated. Practitioners can use these findings to assess and design their ESM strategies and for academicians, the morphological framework reveals the state of current research in the field and identifies gaps for further research in specific areas of ESM.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"139 - 162"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1583456","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42474215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Should executives go to jail over cybersecurity breaches? 高管们应该因网络安全漏洞入狱吗?
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-02 DOI: 10.1080/10919392.2019.1568713
Dave Chatterjee
ABSTRACT The Consumer Data Protection Act, a new bill introduced by Senator Ron Wyden, is proposing “jail time of up to 20 years for executives who knowingly sign off on incorrect or inaccurate annual certifications of their companies’ data-security practices.” The bill also recommends that companies be fined “up to 4 percent of their annual revenue.” While the critics consider the penalties too harsh and severe, the proposed legislation reflects two key realities – a) active involvement and commitment of senior management is essential to achieving a high level of cybersecurity preparedness; and b) legislation and fear of severe penalties (such as Sarbanes-Oxley Act of 2002 and European Union’s General Data Protection Regulation) is often necessary to motivate desired organizational behavior. In an increasingly digital ecosystem characterized by high levels of electronic connectivity, vulnerability to cyberattacks is growing. Organizations are in a perpetual state of breach with rapidly expanding attack surfaces and evolving threat vectors. Protecting confidential data and related digital assets is becoming critical to survival and success. Senior management must come to terms with this new business reality and give strategic priority to cybersecurity preparedness and investments. Research finds active involvement of top management in cyber risk mitigation initiatives to be a critical success factor and best practice. The onus is also on senior management to create a high-performance security culture founded on three key cornerstones – commitment, preparedness, and discipline. They also must lead the charge in establishing a cybersecurity governance structure characterized by joint ownership, responsibility, and accountability.
摘要:参议员Ron Wyden提出的新法案《消费者数据保护法》提议“对那些故意签署不正确或不准确的公司数据安全实践年度认证的高管处以最高20年的监禁。”该法案还建议对公司处以“高达其年收入4%”的罚款。尽管批评者认为处罚过于严厉,但拟议的立法反映了两个关键现实——a)高级管理层的积极参与和承诺对于实现高水平的网络安全准备至关重要;b)立法和对严厉惩罚的恐惧(如2002年的《萨班斯-奥克斯利法案》和欧盟的《通用数据保护条例》)往往是激励期望的组织行为所必需的。在以高水平电子连接为特征的日益数字化的生态系统中,对网络攻击的脆弱性正在增加。随着攻击面迅速扩大和威胁载体不断演变,组织处于永久的破坏状态。保护机密数据和相关数字资产对于生存和成功变得至关重要。高级管理层必须接受这种新的业务现实,并将网络安全准备和投资置于战略优先地位。研究发现,高层管理人员积极参与网络风险缓解举措是一个关键的成功因素和最佳做法。高级管理层也有责任创建基于三个关键基石(承诺、准备和纪律)的高性能安全文化。他们还必须带头建立以共同所有权、责任和问责为特征的网络安全治理结构。
{"title":"Should executives go to jail over cybersecurity breaches?","authors":"Dave Chatterjee","doi":"10.1080/10919392.2019.1568713","DOIUrl":"https://doi.org/10.1080/10919392.2019.1568713","url":null,"abstract":"ABSTRACT The Consumer Data Protection Act, a new bill introduced by Senator Ron Wyden, is proposing “jail time of up to 20 years for executives who knowingly sign off on incorrect or inaccurate annual certifications of their companies’ data-security practices.” The bill also recommends that companies be fined “up to 4 percent of their annual revenue.” While the critics consider the penalties too harsh and severe, the proposed legislation reflects two key realities – a) active involvement and commitment of senior management is essential to achieving a high level of cybersecurity preparedness; and b) legislation and fear of severe penalties (such as Sarbanes-Oxley Act of 2002 and European Union’s General Data Protection Regulation) is often necessary to motivate desired organizational behavior. In an increasingly digital ecosystem characterized by high levels of electronic connectivity, vulnerability to cyberattacks is growing. Organizations are in a perpetual state of breach with rapidly expanding attack surfaces and evolving threat vectors. Protecting confidential data and related digital assets is becoming critical to survival and success. Senior management must come to terms with this new business reality and give strategic priority to cybersecurity preparedness and investments. Research finds active involvement of top management in cyber risk mitigation initiatives to be a critical success factor and best practice. The onus is also on senior management to create a high-performance security culture founded on three key cornerstones – commitment, preparedness, and discipline. They also must lead the charge in establishing a cybersecurity governance structure characterized by joint ownership, responsibility, and accountability.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"1 - 3"},"PeriodicalIF":2.9,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1568713","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47984318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks 加密注入:向基于加密货币的以网络为中心的互联网攻击的范式转变
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-02 DOI: 10.1080/10919392.2019.1552747
Aaron Zimba, Zhaoshun Wang, Mwenge Mulenga
ABSTRACT Crypto-mining attacks have emerged as a new generation of web-based attacks which have seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack vector has by far been the most widely employed attack methodology but it faces the task of luring the victim to the infected web resources. However, cryptojacking injection presents a paradigm shift to web-based crypto-mining attacks in that it eliminates the need for a pivotal third-party such as the exploitable web server. Thus, instead of attacking credit card and other private information of e-commerce users, attackers seek to maliciously abuse a victim’s CPU to generate cryptocurrency. In this paper, we investigate and evaluate cryptojacking injection – a state-of-the-art web-centric attack vector in the crypto-mining attacks landscape. We formulate an attack model based on finite state machines which depicts the various breaches of confidentiality, integrity and availability in the web system as the attack progresses. We show how this new attack vector attacks some of the core components of e-commerce (URL, HTTP and HTML) to generate Monero crypto currency from benign web users. We evaluate our modeling approach with a series of experiments with two attack scenarios using different operating systems. Results show that the attack is indeed cross-platform and feasible on any operating system of a browser-capable device. We analyze the generated network traffic during the attack and draw features such as URLs and the parsed files, the associated cryptographic hashes, and the IP addresses of the crypto-mining domains. These, together with host-based features such as exhaustive CPU usage can be used as indicators of compromise and subsequently act as feed into intrusion detection systems.
摘要加密挖矿攻击是新一代基于网络的攻击,网络犯罪分子避开了臭名昭著的加密勒索软件。水坑攻击向量是迄今为止应用最广泛的攻击方法,但它面临着将受害者引诱到受感染的网络资源的任务。然而,加密劫持注入向基于web的加密挖掘攻击提供了一种范式转变,因为它消除了对关键第三方(如可利用的web服务器)的需求。因此,攻击者不是攻击电子商务用户的信用卡和其他私人信息,而是试图恶意滥用受害者的CPU来生成加密货币。在本文中,我们研究并评估了加密劫持注入——加密攻击领域最先进的以网络为中心的攻击向量。我们建立了一个基于有限状态机的攻击模型,该模型描述了随着攻击的进行,网络系统中对机密性、完整性和可用性的各种破坏。我们展示了这种新的攻击向量如何攻击电子商务的一些核心组件(URL、HTTP和HTML),以从良性网络用户生成Monero加密货币。我们通过使用不同操作系统的两种攻击场景的一系列实验来评估我们的建模方法。结果表明,该攻击确实是跨平台的,在任何具有浏览器功能的设备的操作系统上都是可行的。我们分析了攻击期间生成的网络流量,并绘制了URL和解析的文件、相关的加密哈希以及加密挖掘域的IP地址等特征。这些功能,以及基于主机的功能,如详尽的CPU使用情况,可以用作折衷的指标,并随后作为入侵检测系统的反馈。
{"title":"Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks","authors":"Aaron Zimba, Zhaoshun Wang, Mwenge Mulenga","doi":"10.1080/10919392.2019.1552747","DOIUrl":"https://doi.org/10.1080/10919392.2019.1552747","url":null,"abstract":"ABSTRACT Crypto-mining attacks have emerged as a new generation of web-based attacks which have seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack vector has by far been the most widely employed attack methodology but it faces the task of luring the victim to the infected web resources. However, cryptojacking injection presents a paradigm shift to web-based crypto-mining attacks in that it eliminates the need for a pivotal third-party such as the exploitable web server. Thus, instead of attacking credit card and other private information of e-commerce users, attackers seek to maliciously abuse a victim’s CPU to generate cryptocurrency. In this paper, we investigate and evaluate cryptojacking injection – a state-of-the-art web-centric attack vector in the crypto-mining attacks landscape. We formulate an attack model based on finite state machines which depicts the various breaches of confidentiality, integrity and availability in the web system as the attack progresses. We show how this new attack vector attacks some of the core components of e-commerce (URL, HTTP and HTML) to generate Monero crypto currency from benign web users. We evaluate our modeling approach with a series of experiments with two attack scenarios using different operating systems. Results show that the attack is indeed cross-platform and feasible on any operating system of a browser-capable device. We analyze the generated network traffic during the attack and draw features such as URLs and the parsed files, the associated cryptographic hashes, and the IP addresses of the crypto-mining domains. These, together with host-based features such as exhaustive CPU usage can be used as indicators of compromise and subsequently act as feed into intrusion detection systems.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"40 - 59"},"PeriodicalIF":2.9,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1552747","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47307687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Violators versus non-violators of information security measures in organizations—A study of distinguishing factors 组织中信息安全措施的违反者与非违反者——区分因素的研究
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-02 DOI: 10.1080/10919392.2019.1552743
H. Khan, Khalid A. Alshare
ABSTRACT The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided.
本研究分析了信息安全措施的违规者和非违规者的区别要素。各种要素来源于已有的理论和模型,如一般威慑理论、计划行为理论、理性行为理论、保护动机理论和社会认知理论。为了检验这些因素,数据是通过在美国中西部大学进行的一项在线研究收集的。采用问卷调查的方式收集数据,经过审查,最终选出195份问卷进行分析。这些数据使用二级统计技术进行分析,如卡方分析和方差分析。结果显示,信息安全措施的违规者和非违规者在许多因素上存在显著差异。这些因素包括感知到的隐私、主观规范、感知到的信息安全策略(ISP)范围、感知到的处罚严重程度、感知到的处罚速度、管理支持、组织安全文化和感知到的组织IT能力。不显著因素为信任和工作量。为从业人员和研究人员提供了启示。
{"title":"Violators versus non-violators of information security measures in organizations—A study of distinguishing factors","authors":"H. Khan, Khalid A. Alshare","doi":"10.1080/10919392.2019.1552743","DOIUrl":"https://doi.org/10.1080/10919392.2019.1552743","url":null,"abstract":"ABSTRACT The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"23 - 4"},"PeriodicalIF":2.9,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1552743","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43826929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Spear phishing in a barrel: Insights from a targeted phishing campaign 桶里的矛式网络钓鱼:针对性网络钓鱼活动的见解
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-02 DOI: 10.1080/10919392.2019.1552745
A. Burns, M. E. Johnson, Deanna D. Caputo
ABSTRACT Executives in many industries have fallen prey to socially engineered attacks known as spear phishing. Using highly targeted emails, social engineers trick victims into performing unintended actions by masquerading as legitimate actors. To shed light on effective spear phishing training, we conducted a multi-round experiment. Our results indicate that training users with individual loss messaging might increase the effectiveness of the training. Additionally, we found potential evidence that organizational training can lead to increased overall spear phishing awareness, even for those not directly trained. Despite these promising results, however, individuals’ susceptibility to highly targeted spear phishing attacks remains troubling for practitioners and researchers.
摘要:许多行业的高管都成为了被称为鱼叉式网络钓鱼的社会工程攻击的牺牲品。社会工程师利用极具针对性的电子邮件,伪装成合法行为者,诱骗受害者采取意想不到的行动。为了阐明有效的鱼叉式网络钓鱼训练,我们进行了多轮实验。我们的研究结果表明,用个人损失信息对用户进行培训可能会提高培训的有效性。此外,我们发现了潜在的证据,表明组织培训可以提高整体鱼叉式网络钓鱼意识,即使是那些没有直接培训的人。然而,尽管取得了这些有希望的结果,但个人对高度针对性的鱼叉式网络钓鱼攻击的易感性仍然困扰着从业者和研究人员。
{"title":"Spear phishing in a barrel: Insights from a targeted phishing campaign","authors":"A. Burns, M. E. Johnson, Deanna D. Caputo","doi":"10.1080/10919392.2019.1552745","DOIUrl":"https://doi.org/10.1080/10919392.2019.1552745","url":null,"abstract":"ABSTRACT Executives in many industries have fallen prey to socially engineered attacks known as spear phishing. Using highly targeted emails, social engineers trick victims into performing unintended actions by masquerading as legitimate actors. To shed light on effective spear phishing training, we conducted a multi-round experiment. Our results indicate that training users with individual loss messaging might increase the effectiveness of the training. Additionally, we found potential evidence that organizational training can lead to increased overall spear phishing awareness, even for those not directly trained. Despite these promising results, however, individuals’ susceptibility to highly targeted spear phishing attacks remains troubling for practitioners and researchers.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"24 - 39"},"PeriodicalIF":2.9,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1552745","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45248576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Profile of JOCEC contributors JOCEC贡献者简介
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-10-02 DOI: 10.1080/10919392.2018.1523353
C. Holsapple
When considering where to submit an article for possible publication, one factor a researcher may want to assess is whether a candidate journal’s contributor profile is consistent with the kind of company his/her research deserves/aspires to keep. The following profile of contributors to the Journal of Organizational Computing and Electronic Commerce is suggestive of the stature of JOCEC as a venue for publishing research about topics related to e-commerce and organizational computing. Over the past dozen years, articles published in JOCEC have been authored by researchers at such U.S. universities as:
当考虑在哪里提交一篇文章以供可能发表时,研究人员可能想评估的一个因素是,候选期刊的撰稿人档案是否与他/她的研究应该/渴望保持的公司类型一致。《组织计算与电子商务杂志》的以下撰稿人简介表明了JOCEC作为出版与电子商务和组织计算相关主题研究的场所的地位。在过去的十几年里,美国大学的研究人员在JOCEC上发表了以下文章:
{"title":"Profile of JOCEC contributors","authors":"C. Holsapple","doi":"10.1080/10919392.2018.1523353","DOIUrl":"https://doi.org/10.1080/10919392.2018.1523353","url":null,"abstract":"When considering where to submit an article for possible publication, one factor a researcher may want to assess is whether a candidate journal’s contributor profile is consistent with the kind of company his/her research deserves/aspires to keep. The following profile of contributors to the Journal of Organizational Computing and Electronic Commerce is suggestive of the stature of JOCEC as a venue for publishing research about topics related to e-commerce and organizational computing. Over the past dozen years, articles published in JOCEC have been authored by researchers at such U.S. universities as:","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"28 1","pages":"291 - 293"},"PeriodicalIF":2.9,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2018.1523353","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45745873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Isn’t it about time to meet DORA? 是不是该见见多拉了?
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-10-02 DOI: 10.1080/10919392.2018.1522774
C. Holsapple
Given that DORA is rarely mentioned in scholarly journals devoted to the information systems (IS) field, it is likely safe to say that most contributors to, and users of, this and other IS journals are unfamiliar with DORA. Although the same holds for other functional areas of business, the situation is quite different in scientific and medical disciplines. Just maybe, these disciplines are onto something – something that could benefit ongoing development and recognition of IS as a discipline. So, what is DORA? Should we care? Why? The answers are important for shaping the development/future of IS as a scholarly discipline, encouraging/facilitating innovation in IS research, allowing/fostering research liberty for young IS scholars, and spurring a productive academic career that avoids disillusionment. Before addressing the questions, think about the state of approaches to evaluating researchers for merit, promotion, tenure, or funding purposes. Disregarding intrusions of organizational politics and personal relationships (which can be quite vexing to those on the short end of power), it seems typical to focus on where a researcher has published his or her work. It is most common for evaluation to focus on placement of articles in journals. This is usually the case for IS, other business disciplines, physical sciences, live sciences, and medical fields. Simply put, the value of a publication is considered to depend primarily on the journal in which it appears. In other words, the value of a gift is considered to depend on judgments about the wrapping that contains it, rather than the nature or utility of the gift itself (Zhang, Rousseau, and Sivertsen 2017). If it has a particular wrapping, then it must certainly be of the highest value. It follows that, if packaged in a different type of wrapping, that very same gift must be less valuable. Adopting such a method for evaluating a researcher’s work means that an article is judged to have less/more merit if it appears in one journal rather than another. Being in one journal versus another somehow diminishes/improves an article’s merit. The article is perceived as becoming imbued with a halo that a journal exudes, and that halo is seen as defining the article’s value. Adopting the halo method of research evaluation transforms the problem from one of assessing the merit of individual articles to the task of assessing the merit of individual journals (i.e., the strengths of their halos; the shininess/aesthetics/approval signaled by the wrapping papers). To support the efforts of evaluators, various approaches have been advanced/adopted for settling on the relative merits of journals in a field. Ultimately, it is the evaluator (or evaluator’s superiors) who selects what journal evaluation approach will be used in a halo exercise. Approaches range from largely subjective to largely objective. Comparative examples of various evaluation approaches can be found in a series of quizzes that are applied to th
鉴于DORA很少在专门研究信息系统(is)领域的学术期刊中被提及,可以肯定地说,本杂志和其他is期刊的大多数贡献者和用户都不熟悉DORA。虽然这同样适用于其他业务职能领域,但在科学和医学领域的情况却大不相同。也许,这些学科是在做一些事情——一些可以有利于IS作为一门学科的持续发展和认可的事情。那么,DORA是什么?我们应该在意吗?为什么?这些问题的答案对于塑造信息系统作为一门学术学科的发展/未来、鼓励/促进信息系统研究的创新、允许/培养年轻的信息系统学者的研究自由,以及刺激富有成效的学术生涯、避免幻灭都很重要。在回答这些问题之前,考虑一下评估研究人员的能力、晋升、任期或资助目的的方法的现状。不考虑组织政治和个人关系的干扰(这对那些处于权力短线的人来说是相当恼人的),关注研究人员在哪里发表了他或她的工作似乎是典型的。最常见的评估是关注文章在期刊中的位置。这通常是信息系统、其他商业学科、物理科学、生命科学和医学领域的情况。简单地说,一篇文章的价值主要取决于发表它的期刊。换句话说,礼物的价值被认为取决于对其包装的判断,而不是礼物本身的性质或效用(Zhang, Rousseau, and Sivertsen 2017)。如果它有一个特殊的包装,那么它肯定是最高价值的。由此可见,如果用不同类型的包装,同样的礼物一定不那么值钱。采用这种方法来评估研究人员的工作意味着,如果一篇文章出现在一个期刊上,而不是另一个期刊上,那么它就会被判断为具有更少/更多的价值。发表在某一期刊上与发表在另一期刊上相比,在某种程度上削弱/提高了一篇文章的价值。这篇文章被认为充满了期刊散发出的光环,而这种光环被视为定义了这篇文章的价值。采用光环法进行研究评价,将问题从评估个别文章的价值转变为评估个别期刊的价值(即其光环的优势;包装纸发出的光泽/美感/赞许)。为了支持评价者的工作,已经提出/采用了各种方法来确定一个领域中期刊的相对优点。最终,是评估者(或评估者的上级)选择在halo练习中使用哪种期刊评估方法。方法的范围从很大程度上主观到很大程度上客观。各种评估方法的比较例子可以在应用于IS期刊背景的一系列测验中找到(Chen和Holsapple 2013)。在主观情况下,归因于期刊光环的力量程度取决于评估者(上级)的有利位置、观点、解释、先入为主的观念、培训、偏见、价值观等。例子包括依赖传统,接受他人的声明,或者为专门研究某个机构或资助机构特别强调的主题的期刊调整账目。为了减轻主观方法的缺点,已经设计了更多的数据驱动方法来评估期刊的价值,将各种技术应用于各种类型的数据集,以便产生:●对每个感兴趣的期刊进行数字评级,反映其光环的强度●将期刊分为几层,其中一层中的期刊具有可比较的光环,但与其他层中的期刊明显不同。组织计算与电子商务学报,2018年第28卷,第2期。4,287 - 290 https://doi.org/10.1080/10919392.2018.1522774
{"title":"Isn’t it about time to meet DORA?","authors":"C. Holsapple","doi":"10.1080/10919392.2018.1522774","DOIUrl":"https://doi.org/10.1080/10919392.2018.1522774","url":null,"abstract":"Given that DORA is rarely mentioned in scholarly journals devoted to the information systems (IS) field, it is likely safe to say that most contributors to, and users of, this and other IS journals are unfamiliar with DORA. Although the same holds for other functional areas of business, the situation is quite different in scientific and medical disciplines. Just maybe, these disciplines are onto something – something that could benefit ongoing development and recognition of IS as a discipline. So, what is DORA? Should we care? Why? The answers are important for shaping the development/future of IS as a scholarly discipline, encouraging/facilitating innovation in IS research, allowing/fostering research liberty for young IS scholars, and spurring a productive academic career that avoids disillusionment. Before addressing the questions, think about the state of approaches to evaluating researchers for merit, promotion, tenure, or funding purposes. Disregarding intrusions of organizational politics and personal relationships (which can be quite vexing to those on the short end of power), it seems typical to focus on where a researcher has published his or her work. It is most common for evaluation to focus on placement of articles in journals. This is usually the case for IS, other business disciplines, physical sciences, live sciences, and medical fields. Simply put, the value of a publication is considered to depend primarily on the journal in which it appears. In other words, the value of a gift is considered to depend on judgments about the wrapping that contains it, rather than the nature or utility of the gift itself (Zhang, Rousseau, and Sivertsen 2017). If it has a particular wrapping, then it must certainly be of the highest value. It follows that, if packaged in a different type of wrapping, that very same gift must be less valuable. Adopting such a method for evaluating a researcher’s work means that an article is judged to have less/more merit if it appears in one journal rather than another. Being in one journal versus another somehow diminishes/improves an article’s merit. The article is perceived as becoming imbued with a halo that a journal exudes, and that halo is seen as defining the article’s value. Adopting the halo method of research evaluation transforms the problem from one of assessing the merit of individual articles to the task of assessing the merit of individual journals (i.e., the strengths of their halos; the shininess/aesthetics/approval signaled by the wrapping papers). To support the efforts of evaluators, various approaches have been advanced/adopted for settling on the relative merits of journals in a field. Ultimately, it is the evaluator (or evaluator’s superiors) who selects what journal evaluation approach will be used in a halo exercise. Approaches range from largely subjective to largely objective. Comparative examples of various evaluation approaches can be found in a series of quizzes that are applied to th","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"28 1","pages":"287 - 290"},"PeriodicalIF":2.9,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2018.1522774","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47279956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From traditional interorganisational systems to cloud-based solutions: The impact on supply chain flexibility 从传统的跨组织系统到基于云的解决方案:对供应链灵活性的影响
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-10-02 DOI: 10.1080/10919392.2018.1517480
Evangelia Kopanaki, Panagiota Karvela, N. Georgopoulos
ABSTRACT The fast changing business environment and the intensive market competition forces firms to adjust and remodel their business strategy continuously. As a solution, firms seek flexibility, not only internally but also at the level of their supply chain. To accomplish this, companies invest in information technology (IT), aiming to improve their business processes and collaboration with trading partners. As previous research supports, the use of IT combined with agile supply chain management improves business performance and offers sustainable competitive advantage. However, the extent to which IT enables and supports supply chain flexibility is still debatable and warrants investigation. Although contemporary Internet-based systems (web-based platforms and cloud-based solutions) seem to overcome the rigidity and inflexibility of traditional interorganisational systems (IOS), they are still associated with issues of interoperability and incompatibility. Although they facilitate supply chain collaboration, by providing access to all stakeholders and enabling information-sharing, they may often lead to closed networks of collaboration. To examine these issues, this paper primarily aims to clarify the notion of flexibility at the level of the supply chain. It also aims to contribute to the process by which organisations effectively evaluate and prioritise competing IT investments. Taking into consideration the multidimensional nature of flexibility, this paper proposes a conceptual framework of supply chain flexibility, distinguishing between the operational, structural, and strategic levels of flexibility. It then uses this framework to explain the impact of IT infrastructures (specifically comprising traditional IOS, web-based collaboration platforms and cloud-based solutions) on the various levels of flexibility. Based on previous research, it identifies specific IT characteristics and provides an approach through which practitioners and researchers can compare different technologies and analyse their benefits and limitations, in terms of supply chain flexibility.
瞬息万变的商业环境和激烈的市场竞争迫使企业不断调整和重塑经营战略。作为解决方案,企业不仅在内部,而且在供应链层面寻求灵活性。为了实现这一目标,公司投资于信息技术(IT),旨在改进其业务流程和与贸易伙伴的协作。正如先前的研究所支持的那样,将IT与敏捷供应链管理相结合可以提高业务绩效,并提供可持续的竞争优势。然而,IT在多大程度上支持供应链的灵活性仍然是有争议的,值得调查。尽管当代基于互联网的系统(基于网络的平台和基于云的解决方案)似乎克服了传统组织间系统(IOS)的刚性和不灵活性,但它们仍然与互操作性和不兼容性问题有关。虽然它们通过向所有利益相关者提供访问和实现信息共享来促进供应链协作,但它们通常可能导致封闭的协作网络。为了研究这些问题,本文主要旨在澄清供应链层面灵活性的概念。它还旨在促进组织有效评估和优先考虑竞争It投资的过程。考虑到灵活性的多维性,本文提出了供应链灵活性的概念框架,区分了灵活性的运营、结构和战略层面。然后,它使用这个框架来解释It基础设施(特别是包括传统的IOS,基于web的协作平台和基于云的解决方案)对不同级别灵活性的影响。基于先前的研究,它确定了具体的it特征,并提供了一种方法,通过这种方法,从业者和研究人员可以比较不同的技术,并分析它们在供应链灵活性方面的优势和局限性。
{"title":"From traditional interorganisational systems to cloud-based solutions: The impact on supply chain flexibility","authors":"Evangelia Kopanaki, Panagiota Karvela, N. Georgopoulos","doi":"10.1080/10919392.2018.1517480","DOIUrl":"https://doi.org/10.1080/10919392.2018.1517480","url":null,"abstract":"ABSTRACT The fast changing business environment and the intensive market competition forces firms to adjust and remodel their business strategy continuously. As a solution, firms seek flexibility, not only internally but also at the level of their supply chain. To accomplish this, companies invest in information technology (IT), aiming to improve their business processes and collaboration with trading partners. As previous research supports, the use of IT combined with agile supply chain management improves business performance and offers sustainable competitive advantage. However, the extent to which IT enables and supports supply chain flexibility is still debatable and warrants investigation. Although contemporary Internet-based systems (web-based platforms and cloud-based solutions) seem to overcome the rigidity and inflexibility of traditional interorganisational systems (IOS), they are still associated with issues of interoperability and incompatibility. Although they facilitate supply chain collaboration, by providing access to all stakeholders and enabling information-sharing, they may often lead to closed networks of collaboration. To examine these issues, this paper primarily aims to clarify the notion of flexibility at the level of the supply chain. It also aims to contribute to the process by which organisations effectively evaluate and prioritise competing IT investments. Taking into consideration the multidimensional nature of flexibility, this paper proposes a conceptual framework of supply chain flexibility, distinguishing between the operational, structural, and strategic levels of flexibility. It then uses this framework to explain the impact of IT infrastructures (specifically comprising traditional IOS, web-based collaboration platforms and cloud-based solutions) on the various levels of flexibility. Based on previous research, it identifies specific IT characteristics and provides an approach through which practitioners and researchers can compare different technologies and analyse their benefits and limitations, in terms of supply chain flexibility.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"28 1","pages":"334 - 353"},"PeriodicalIF":2.9,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2018.1517480","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48890778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
EOV Editorial Board EOV编辑委员会
IF 2.9 4区 管理学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-10-02 DOI: 10.1080/10919392.2018.1530083
{"title":"EOV Editorial Board","authors":"","doi":"10.1080/10919392.2018.1530083","DOIUrl":"https://doi.org/10.1080/10919392.2018.1530083","url":null,"abstract":"","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"28 1","pages":"378 - 378"},"PeriodicalIF":2.9,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2018.1530083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41690713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Organizational Computing and Electronic Commerce
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1