Designing fair AI for managing employees in organizations: a review, critique, and design agenda

LP Robert, C Pierce, L Marquis, S Kim… - Human–Computer …, 2020 - Taylor & Francis
Organizations are rapidly deploying artificial intelligence (AI) systems to manage their
workers. However, AI has been found at times to be unfair to workers. Unfairness toward …

Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

Developing cybersecurity culture to influence employee behavior: A practice perspective

M Alshaikh - Computers & Security, 2020 - Elsevier
This paper identifies and explains five key initiatives that three Australian organizations have
implemented to improve their respective cyber security cultures. The five key initiatives are …

Access to resources and entrepreneurial well-being: A self-efficacy approach

DR Marshall, WR Meek, RG Swab, E Markin - Journal of business research, 2020 - Elsevier
In this study, we examine an important predictor and outcome associated with well-being for
entrepreneurs: access to resources and persistence. Drawing on social-cognitive theory, we …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance

JB Barlow, M Warkentin, D Ormond… - Journal of the …, 2018 - aisel.aisnet.org
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

A meta-analysis of deterrence theory in information security policy compliance research

S Trang, B Brendel - Information Systems Frontiers, 2019 - Springer
Enforcing information security policies is a key concern of information security managers. To
deter employees from deviant behavior, organizations often implement sanction …

Employees' behavioural intention to smartphone security: A gender-based, cross-national study

N Ameen, A Tarhini, MH Shah, NO Madichie - Computers in Human …, 2020 - Elsevier
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …