Journal Articles by Siddhi Pittayachawan

IT consumerization, or the end-user’s adoption of consumer IT for work purpose, is an emerging to... more IT consumerization, or the end-user’s adoption of consumer IT for work purpose, is an emerging topic which recently attracted the attention of researchers and practitioners. This research adopted social network analysis techniques to investigate the determinants of the social influence that resulted in IT consumerization, as well as the structural features of such influence’s network. By testing theoretically-based hypotheses with the exponential random graph modeling approach, our findings suggested that IT consumerization’s influence tended to occur between employees in the same department, coming especially from those who frequently gave work advice, life advice, and organizational updates to others, as well as those who were trusted for expertise by colleagues. The research revealed that IT consumerization’s influence was highly transitive, hierarchical, and non-reciprocal. The research concluded by elaborating future directions about the adoption of social network analysis techniques in technology adoption research, as well as practical recommendations about harnessing the determinants of such influence to manage IT consumerization.

Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the... more Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees' perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior studies have identified the antecedents of a positive InfoSec climate, in particular socialisation through the employees' discussions of InfoSec-related matters to explain the formation of InfoSec climate based on the employees' individual cognition. We conceptualise six forms of socialisation as six networks, which comprise employees' provisions of (1) work advice, (2) organisational updates, (3) personal advice, (4) trust for expertise, (5) InfoSec advice, and (6) InfoSec troubleshooting support. The adoption of a longitudinal social network analysis (SNA), called stochastic actor-oriented modelling (SAOM), enabled us to analyse the changes in the socialising patterns and the InfoSec climate perceptions over time. Consequently, this analysis explains the forming mechanisms of the employees' InfoSec climate perceptions as well as their socialising process in greater detail. Our findings in relation to the forming mechanisms of InfoSec-related socialisation and InfoSec climate, provide practical recommendations to improve organisational InfoSec. This includes identifying influential employees to diffuse InfoSec knowledge within a workplace. Additionally, this research proposes a novel approach for InfoSec behavioural research through the adoption of SNA methods to study InfoSec-related phenomena.

Purpose
The purpose of this paper is to investigate how buyer–supplier social capital may help mi... more Purpose
The purpose of this paper is to investigate how buyer–supplier social capital may help mitigate operational supply risk (OSR) of small- and medium-sized enterprises (SMEs). It empirically examines a framework that posits the direct and mediated impacts of three dimensions of buyer–supplier social capital – structural, relational and cognitive – and supplier integration on the OSR of SMEs and consequently their operational performance.
Design/methodology/approach
This study uses data collected via a questionnaire from 485 manufacturing SMEs in Bangladesh for analysis using structural equation modeling.
Findings
The analysis reveals that all the three dimensions of buyer–supplier social capital can effectively reduce the OSR of SMEs, either directly or indirectly through supplier integration. The mediating role of supplier integration in the relationship between social capital and OSR is confirmed and the negative impact of OSR on operational performances of SMEs is verified.
Research limitations/implications
Generalization of the findings needs to be prudent since the study gathered information only from manufacturing SMEs in Bangladesh on the buyer side of the buyer–supplier dyad.
Practical implications
Findings of this study can provide references for SME practitioners to formulate their OSR mitigation strategies for enhancing operational performance.
Originality/value
This study adds to the currently scarce literature on OSR of SMEs by combining antecedents and consequences of OSR in a single framework. It also extends the use of buyer–supplier social capital to risk mitigation research.

This study aims to investigate and improve the understanding of customer repurchase behaviour in ... more This study aims to investigate and improve the understanding of customer repurchase behaviour in the Unified Theory of Acceptance and Use of Technology (UTAUT2) model that the influence mobile services repurchase behaviour among the Australian customers. Underpinned by UTAUT2, marketing mix theory and expectation confirmation theory, this research proposed model examines the customer satisfaction and customer experience within the mobile service technology context. The proposed model is tested using an empirical study of 364 subjects in Australia. Using partial least squares path modelling, the study assessed the validity of scales. The main purpose of this paper is instrument validation and hypothesis testing will be done in the next phase of this study. The results show that constructs reliability and average variance extracted is within an acceptable range. The model did pass the discriminant validity test as the Fornell-Larcker criterion and Heterotrait-Monotrait ratio (HTMT). These findings will lead to the next phase analysis of hypotheses testing at a later stage. A revised UTAUT model is introduced by the addition of two independent variables such as customer satisfaction and customer experience which helps to understand repurchase behaviour. This research model can be used by the mobile telecommunication businesses and market researcher. Moreover, this model can be used by future researchers.

Corporations continue to see a growing demand for Bring-Your-Own-Device (BYOD) programs which all... more Corporations continue to see a growing demand for Bring-Your-Own-Device (BYOD) programs which allow employees to use their own computing devices for business purposes. This study analyses the demand of digital natives for such programs when entering the workforce and how they perceive the benefits and risk associated with BYOD. A theoretical model building on net valence considerations, technology adoption theories and perceived risk theory is proposed and tested. International students from five countries in their final year and with relevant work experience were surveyed. The results show that the intention to enroll in a BYOD program is primarily a function of perceived benefits while risks are widely ignored. Only safety and performance risks proved to contribute significantly to the overall perceived risk. The knowledge acquired from this study is particularly beneficial to IT executives as a guide to deciding whether and how to set up or adjust corporate BYOD initiatives.

As modern organisations are using strategic information systems as their competitive advantage, t... more As modern organisations are using strategic information systems as their competitive advantage, the management of information security (IS) is regarded as a top priority. However, technical measures are no longer sufficient for protecting IS, and the prevalence of centralised IS controls and top-down approach in IS management are challenged by the dynamic socio-organisational environment. In this article, a canonical action research (CAR) project discusses the use of social network analysis (SNA) methods to design and implement a cascading IS training/diffusion, which leveraged the social dynamics in the workplace to enhance the IS-related interactions between the employees in a large construction organisation in Southeast Asia. Through the enhanced IS interactions, which involved the employees' provisions of IS resources and IS influence, results indicated an improvement in the employees' attitudes towards IS. The research outcomes advocated the effective use of SNA methods, in combination with the CAR approach, which included the network metrics and means to select the suitable champions for the diffusion of IS, as well as to measure the diffusion effectiveness. Future directions to develop new IS-related network theories and apply SNA methods to study other IS concepts are also discussed.

While prior research has been examining information security behaviours in mature environments wi... more While prior research has been examining information security behaviours in mature environments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understand what factors affect the formation of an emerging information security environment, so that security managers can make use of the forming mechanisms to improve the security environment without relying too much on enforcement. This research adopts exponential random graph modeling to predict the occurrence of information security influence among 114 employees in a recently established construction organisation. Our empirical findings show that physically co-locating, as well as having specific senior levels and similar tenure can result in more security influence. Other contributing work relationships include the exchange of work-related advice, interpersonal trust, and seeing others as role model and long-term collaborators. The structural features of the information security influence network were also examined, which offer strategies for security managers to diffuse security behaviours within the workplace. Furthermore, specific directions for future network research were elaborated in detail.
As organisations are developing people-centric security workplaces, where proactive security beha... more As organisations are developing people-centric security workplaces, where proactive security behaviours are fostered, it is important to understand more about the sources of security influence. This research applied social network analysis methods to investigate security influence within a large interior contractor in Vietnam. The findings revealed that security influence occurs between employees in the same department, especially comes from those at senior positions, have longer tenure, or younger age. Engagement in daily work and security-related activities can also increase the likelihood of influencing security behaviours. Moreover, we found the security influence network to be transitive and have a hierarchical structure.

The rapid digital transformation and technological disruption in modern organisations demand the ... more The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation's social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper proposes the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis approach and describe their empirical applications in a real case study of a large organisation in Vietnam, which utilised these methods to improve employees' information security awareness. Towards the end of the paper, a framework detailing the strategies for conducting social network analysis in the behavioural information security field is developed and presented.

The accepted manuscript (without the publisher's formatting) can be found here: http://www.duydan... more The accepted manuscript (without the publisher's formatting) can be found here: http://www.duydangpham.com/wp-content/uploads/2015/03/Dang-Pham-2016_ExploreSecurityNetworks.pdf
The purpose of this research is to propose network research as an alternative approach in the behavioral security field. A case study was conducted in a large interior contractor to explore eight organizational networks, four of which focus on security behaviors. The researchers employed social network analysis methods, including quantitative and qualitative ones, to analyze the case study’s data and demonstrate the analytical capability of the network analysis approach in the behavioral security field. Key features of the security networks’ structures include high transitivity, hierarchy, and centralization, whereas reciprocity and density are lower than other organizational networks. Moreover, work-related interactions were found to impact security influence, amongst which giving IT advice increases significantly one’s influential status in security matters. Practical implications include suggestions about the use of network analysis methods as a tool for security managers to monitor their behavioral security networks and devise appropriate strategies. Potential research directions are also elaborated, which future research can employ and promote the novel and practical use of network analysis techniques.

As modern organisations are dealing with a growing amount of data and strategic information syste... more As modern organisations are dealing with a growing amount of data and strategic information systems, the need to protect these vital assets becomes paramount. An emerging topic in behavioural security field is security advice sharing, which plays a crucial role in helping organisations develop people-centric security workplaces whereby the employees' information security awareness and personal accountability for security are fostered. This research employs social network analysis methods to explore why the employees are willing to share information security advice, as well as examines the structural patterns of this sharing network. We found favourable security attitude and engagement in daily activities have positive impacts on security advice sharing, whereas perceiving too much social pressure makes the employees deliberately refuse to share security advice. We also found security advice sharing is transitive and non-reciprocal, and there are a few dominant employees who control the flow of security advice. Practical recommendations about strategies to increase security advice sharing within the workplace are discussed, and by conducting this research we demonstrate the empirical adoption of social network analysis techniques in the behavioural security field.

While prior researches have been studying the motivations of individualistic security compliance,... more While prior researches have been studying the motivations of individualistic security compliance, this study explains what motivates the employees to share security advice and troubleshooting with the others. We argue that such findings are crucial for the development of people-centric security workplaces, where desirable security behaviours are disseminated amongst the employees. In this research, we applied network analysis techniques to perform two tasks. First, we explored the structural patterns of the employees' sharing of security advice and troubleshooting. Second, we evaluated the effects of security climate perceptions, perceived accountability, and personal attributes on those sharing activities. While the sharing network was found to be thin and sparse, perceptions of direct supervisor's security practices and accountability for security tasks can increase sharing. Age, seniority, tenure, as well as having the same gender and department membership can also motivate sharing. In contrast, security climate perceptions of co-workers and top management's security practices were found to discourage sharing. Our practical recommendations focus on the strategies to maximise security engagement in the workplace. Potential ideas for future researches were also discussed in details. Most importantly, we hope to offer this research as the foundation for future network studies in behavioural security field.

This article reports how statistical analyses of PhD thesis records can reveal future research ca... more This article reports how statistical analyses of PhD thesis records can reveal future research capacities for disciplines beyond their primary fields. The previous research showed that most theses contributed to and/or used methodologies from more than one discipline. In Australia, there was a concern for declining mathematical teaching and research capacity. We decided to investigate the ‘hidden’ mathematics research capacity in PhDs outside of mathematics. Australian PhD records were re-coded with up to three fields. Records with mathematics as one of their codes were selected and analysed for their relationships to disciplines in their other codes. Triple-coding revealed ‘hidden’ mathematical research capacity that had previously been single-coded in another field had mathematics as one of their subsequent fields. Our findings have implications for policy and planning for mathematics in Australia, and multiple coding of PhD theses records enables analyses for other disciplines to be undertaken to show their research capacities.

As online social networking sites (SNS) are becoming a part of many people’s daily life, they hav... more As online social networking sites (SNS) are becoming a part of many people’s daily life, they have become a topic of interest that attracts the attention of both academics and practitioners. The users’ behaviours on those sites are complex and have important implications. Individuals can use a wide range of SNS’s functionalities, for example, to socialise and promote their online
identities or find friends of common interests. Reckless online behaviours on SNS have been shown to result in breaches of privacy and other risks such as cyber-bullying, cyber-stalking,
and job loss. As a result, there are many concerns over these problems that prevent SNS from reaching their full potential. Given the vast number of user’s concerns, identified by prior
studies, there is a need to explore a typology of users that classifies online personas. This typology would reveal more about the users’ needs and help improve their experience on SNS. To achieve that goal, we collected data from fourteen Vietnamese young adults of different backgrounds who use Facebook, which was then analysed with Q factor analysis. The findings suggested three distinctive online personas that include the Outgoing Connector, the Reserved Trustor, and the Threats Perceiver. Implications for marketing tactics and design of better users’ experiences on social networking sites were discussed, and the proposed typology could serve as a starting point for future research to further explore the different types of social media’s users.

Malware have been regarded as a persistent threat to both individuals and organisations due to it... more Malware have been regarded as a persistent threat to both individuals and organisations due to its wide spread via various means of infection. With the increasing use of personal mobile devices and the trending adoption of Bring Your Own Device (BYOD) practices, this threat has become even more versatile and dreadful as it could hide behind the users' typical and daily Internet activities. The importance of investigating whether the user's intention to perform malware avoidance behaviours would change across multiple contexts is emphasised. Consequently, this study determines the contributing factors and compares their impacts on such intention by extending Protection Motivation Theory in two different contexts. A total of 252 Australian higher education students were surveyed when using mobile devices such as smartphone, laptop and tablet at home and at a BYOD-enabled university. Paired t-test, Bayesian structural equation modelling, and revised z-test were employed for data analysis. The empirical findings reveal that intention to perform malware avoidance behaviours differed across the contexts. Furthermore, the researchers found perceptions of self-efficacy and vulnerability to have different impacts on such intention and other variables in the model. As a result, such findings suggested developing community of practice and repeated trainings to maintain the users' confidence in their own abilities to cope with malware threats. Message that focuses on the threats' consequences was suggested to improve home users' intention to avoid malware, along with a number of factors that could be critical to designing information security education programs. Moreover, these implications particularly address information security management at educational institutions that adopt BYOD policy. Finally, theoretical contributions include an extended model based on Protection Motivation Theory that reflects the users' intention to avoid malware threats in BYOD context, from which directions for future research were also provided.
OECD countries today are focusing on ways to incorporate IS/IT to facilitate superior healthcare ... more OECD countries today are focusing on ways to incorporate IS/IT to facilitate superior healthcare delivery. However, studies of IS/IT implementations for Chinese Medicine (CM) practice are very limited. We analyse western medicine (WM) and CM diagnosis and treatment processes and find that these clinical processes share some similarities. Hence, we contend that by implementing IS/IT system solutions, CM practice can also enjoy similar benefits from IS/IT as WM. This paper serves to identify a role for IS/IT in assisting CM clinic key processes as well as identify key IT investment portfolio components of such IS/IT solutions.

Hajj & Umrah religious tourism accounts for seven million visitors each year in Saudi Arabia. The... more Hajj & Umrah religious tourism accounts for seven million visitors each year in Saudi Arabia. The government has recently taken initiatives to promote the use of Information Systems (IS) in the religious tourism industry, encouraging firms to adopt IS innovations like e-commerce and enforcing the use of the Makha’a information system in Umrah for external pilgrims and the Yosr information system in Hajj for internal pilgrims. This study outlines the motivations and challenges that affect the utilisation of various IS services in the Saudi religious tourism industry through a qualitative analysis of the views and perceptions of senior executives and owners of travel firms. The findings suggest that while government initiatives and industry competitiveness were two positive factors promoting IS use, there are some major barriers preventing private firms from fully utilising the advantages of information systems. These include external factors such as lack of support from the IT industry and access to IT resources as well as internal factors within an organisation such as lack of commitment or the need for professional IT expertise. The study finds that relative advantage is a critical contributor to IS utilisation which depends on information systems characteristics.

Saudi Arabia is gifted with Hajj & Umrah religious tourism that accounts for 7 million visitors e... more Saudi Arabia is gifted with Hajj & Umrah religious tourism that accounts for 7 million visitors each year and constitutes a highly profitable business which could be further enhanced with e-commerce integration. However, despite the availability of technological and financial resources, e-commerce has not been adopted to its full capacity in the Saudi tourism market. This study conducted a qualitative survey among decision makers in the Saudi tourism industry and found that cultural aspects are a significant reason behind the limited adoption of e-commerce. There is a pervasive trust issue with online business with fears about privacy and security compounded by a low level of awareness of e- commerce services as such. It also found that Saudis overall have not developed a comfort level with the procedures involved in online transactions. Also, most Saudi travel agencies are family businesses which in most cases have a risk- averse leadership that likes to stick to the status. The rich and nuanced explanation of these cultural factors in this paper explains how e-commerce usage in Saudi Arabia is lagging behind despite the availability of technological and financial capability.

The value of work integrated learning (WIL) is well-established in the education of information m... more The value of work integrated learning (WIL) is well-established in the education of information management (IM) professionals. Adding value to WIL through cross-cultural or cross-disciplinary experiences is considered in this article. Using online communication, simulation activities, and onsite work, students from RMIT Melbourne and RMIT Ho Chi Minh City were involved in planning, negotiating, and delivering specific projects in the Da Nang General Hospital (DNGH) in Vietnam as part of their WIL. Evaluation of the whole project was undertaken through the collection of data from an online survey which rated the importance and performance of specific elements of the project. Feedback from focus group interviews was also collected and has informed the evaluation. The analysis of the data revealed positive participant perceptions of the outcomes of the project and its importance which may be taken into consideration by similar cross-cultural projects.
Uploads
Journal Articles by Siddhi Pittayachawan
The purpose of this paper is to investigate how buyer–supplier social capital may help mitigate operational supply risk (OSR) of small- and medium-sized enterprises (SMEs). It empirically examines a framework that posits the direct and mediated impacts of three dimensions of buyer–supplier social capital – structural, relational and cognitive – and supplier integration on the OSR of SMEs and consequently their operational performance.
Design/methodology/approach
This study uses data collected via a questionnaire from 485 manufacturing SMEs in Bangladesh for analysis using structural equation modeling.
Findings
The analysis reveals that all the three dimensions of buyer–supplier social capital can effectively reduce the OSR of SMEs, either directly or indirectly through supplier integration. The mediating role of supplier integration in the relationship between social capital and OSR is confirmed and the negative impact of OSR on operational performances of SMEs is verified.
Research limitations/implications
Generalization of the findings needs to be prudent since the study gathered information only from manufacturing SMEs in Bangladesh on the buyer side of the buyer–supplier dyad.
Practical implications
Findings of this study can provide references for SME practitioners to formulate their OSR mitigation strategies for enhancing operational performance.
Originality/value
This study adds to the currently scarce literature on OSR of SMEs by combining antecedents and consequences of OSR in a single framework. It also extends the use of buyer–supplier social capital to risk mitigation research.
The purpose of this research is to propose network research as an alternative approach in the behavioral security field. A case study was conducted in a large interior contractor to explore eight organizational networks, four of which focus on security behaviors. The researchers employed social network analysis methods, including quantitative and qualitative ones, to analyze the case study’s data and demonstrate the analytical capability of the network analysis approach in the behavioral security field. Key features of the security networks’ structures include high transitivity, hierarchy, and centralization, whereas reciprocity and density are lower than other organizational networks. Moreover, work-related interactions were found to impact security influence, amongst which giving IT advice increases significantly one’s influential status in security matters. Practical implications include suggestions about the use of network analysis methods as a tool for security managers to monitor their behavioral security networks and devise appropriate strategies. Potential research directions are also elaborated, which future research can employ and promote the novel and practical use of network analysis techniques.
identities or find friends of common interests. Reckless online behaviours on SNS have been shown to result in breaches of privacy and other risks such as cyber-bullying, cyber-stalking,
and job loss. As a result, there are many concerns over these problems that prevent SNS from reaching their full potential. Given the vast number of user’s concerns, identified by prior
studies, there is a need to explore a typology of users that classifies online personas. This typology would reveal more about the users’ needs and help improve their experience on SNS. To achieve that goal, we collected data from fourteen Vietnamese young adults of different backgrounds who use Facebook, which was then analysed with Q factor analysis. The findings suggested three distinctive online personas that include the Outgoing Connector, the Reserved Trustor, and the Threats Perceiver. Implications for marketing tactics and design of better users’ experiences on social networking sites were discussed, and the proposed typology could serve as a starting point for future research to further explore the different types of social media’s users.
The purpose of this paper is to investigate how buyer–supplier social capital may help mitigate operational supply risk (OSR) of small- and medium-sized enterprises (SMEs). It empirically examines a framework that posits the direct and mediated impacts of three dimensions of buyer–supplier social capital – structural, relational and cognitive – and supplier integration on the OSR of SMEs and consequently their operational performance.
Design/methodology/approach
This study uses data collected via a questionnaire from 485 manufacturing SMEs in Bangladesh for analysis using structural equation modeling.
Findings
The analysis reveals that all the three dimensions of buyer–supplier social capital can effectively reduce the OSR of SMEs, either directly or indirectly through supplier integration. The mediating role of supplier integration in the relationship between social capital and OSR is confirmed and the negative impact of OSR on operational performances of SMEs is verified.
Research limitations/implications
Generalization of the findings needs to be prudent since the study gathered information only from manufacturing SMEs in Bangladesh on the buyer side of the buyer–supplier dyad.
Practical implications
Findings of this study can provide references for SME practitioners to formulate their OSR mitigation strategies for enhancing operational performance.
Originality/value
This study adds to the currently scarce literature on OSR of SMEs by combining antecedents and consequences of OSR in a single framework. It also extends the use of buyer–supplier social capital to risk mitigation research.
The purpose of this research is to propose network research as an alternative approach in the behavioral security field. A case study was conducted in a large interior contractor to explore eight organizational networks, four of which focus on security behaviors. The researchers employed social network analysis methods, including quantitative and qualitative ones, to analyze the case study’s data and demonstrate the analytical capability of the network analysis approach in the behavioral security field. Key features of the security networks’ structures include high transitivity, hierarchy, and centralization, whereas reciprocity and density are lower than other organizational networks. Moreover, work-related interactions were found to impact security influence, amongst which giving IT advice increases significantly one’s influential status in security matters. Practical implications include suggestions about the use of network analysis methods as a tool for security managers to monitor their behavioral security networks and devise appropriate strategies. Potential research directions are also elaborated, which future research can employ and promote the novel and practical use of network analysis techniques.
identities or find friends of common interests. Reckless online behaviours on SNS have been shown to result in breaches of privacy and other risks such as cyber-bullying, cyber-stalking,
and job loss. As a result, there are many concerns over these problems that prevent SNS from reaching their full potential. Given the vast number of user’s concerns, identified by prior
studies, there is a need to explore a typology of users that classifies online personas. This typology would reveal more about the users’ needs and help improve their experience on SNS. To achieve that goal, we collected data from fourteen Vietnamese young adults of different backgrounds who use Facebook, which was then analysed with Q factor analysis. The findings suggested three distinctive online personas that include the Outgoing Connector, the Reserved Trustor, and the Threats Perceiver. Implications for marketing tactics and design of better users’ experiences on social networking sites were discussed, and the proposed typology could serve as a starting point for future research to further explore the different types of social media’s users.
Background: For electronic commerce companies aiming to be successful in customer service, what academics and practitioners refer to as 'last-mile logistics' is the one moment of truth, when deliveries have to be planned tactically and exactly, so that orders are delivered to customers at the right time, right place, right quantity, right quality , and ultimately at the right cost. When deciphering this type of supply chain, i.e., one that is e-commerce-driven, last-mile logistics is the one segment of the product flow that directly interacts with the ultimate customer, but many times is the one segment that is the most problematic and less efficient to implement well. Lazada Group, a German e-commerce company, discovered the serious complications of 'last-mile logistics' when they first entered Vietnam in 2013.
Methodology: This case study used qualitative method through interviews with Lazada Vietnam's management.
behaviour proactively. Employees can evaluate the priority of security as they observe and interact with the security features that constitute the security climate of the workplace. We examined the fundamental challenge that not every employee could recognise those features. In this multi-stage research, we adopted the theoretical lens of symbolic interactionism to
advance a conceptual model which explains the relationship between organisation’s social networks and the formation of information security climate. A descriptive case study in
Vietnam was then conducted to refine the proposed model. The findings validated and extended the dimensions of information security climate, as well as identified the relevant organisation’s social networks (i.e. information, affect, and power) that lead to its formation.
concept of information security climate that emerge from the individual’s interactions with the work environment, which has been under researched and investigated inconsistently. The second part begins with discussing the influence mechanisms that could disseminate information security climate perceptions, then suggests the adoption of social network analysis techniques to analyse those mechanisms. As a result, the paper forwards an integrated framework about information security climate perceptions, as well as proposes a research agenda for future investigations on how those perceptions could be formed and disseminated within the workplace.
Efficient logistics systems are the basis for trade in any economy. While Supply Chain and Logistics systems contribute heavily to the improvement of a firm’s performance, lecturers require contextualized cases from companies in industry to more effectively transfer knowledge to students on logistics and supply chain management concepts.
Additionally, case studies, as part of case-based teaching and learning, give business graduates the opportunity to learn analytic and quantitative type of skills, both key in the operations of a business, and specifically in the discipline of Supply Chain Management where these are essential to plan, analyze, and optimize business operations across firms. When all is said and done, developing analytic skills is one of the key challenges in teaching logistics courses. With its popularity as a profession for new graduates worldwide and with high emphasis at RMIT University Melbourne towards the development of the program at all campuses in the globe, the deployment of any new teaching practice designed in-mind for developing students’ analytic skills in logistics is imperative.
Just recently at Vietnam campus, a Supply Chain and Logistics Management minor was introduced in 2014 and the Bachelor of Business in Logistics and Supply Chain Management will be launched in 2015. This project will enhance the analytic skills of logistics and supply chain management students at all campuses through the development of contextualised case studies and enhanced learning materials for logistics minors and courses in the program. Much more than that, the case studies produced for this project will be contextualized to the business environment in Vietnam, a window to logistics students everywhere who may like the challenge of analyzing and applying logistics management practices in the context of an emerging market.
Overall, the findings indicate that organisations are developing the “right mind-set”, taking a number of “softer actions”’; and investing in new technologies to use IT as part of the solution to pursue both eco- efficiency and eco-sustainability objectives. Nevertheless, the state of Green IT among the surveyed organisations can be considered at the early stage of maturity.
Trust is a complex and multifaceted issue that must be addressed from multiple angles. Merely focusing on either Internet and network security applications or web interface alone does not guarantee that consumers will trust e-vendors. Previous research on trust tried to understand consumers’ attitudes, intentions, and behaviour that are related to trust in online shopping. However, it failed to provide a proper solution that can foster online trust because the focus to date is mainly on technical issues and secure transactions rather than what makes consumers trust e-commerce websites. As B2C e- commerce develops, risks such as identity theft, fraud, phishing, and hacking activities have emerged affecting trust in online shopping. Therefore, the objective of this research is to investigate what factors enhance consumer trust in B2C e-commerce via the Internet.
Based on the literature, five important factors that affect trust and which are barriers to online shopping are cybercrime, security, control, web interface, and trusted third party (TTP). To establish trust in B2C e-commerce, relevant four theories—Semiotics, Trust in Signs, Simmelian Model of Trust, and Trustworthiness—were used to guide this research. Led by the literature and four theories, twelve hypotheses were developed to establish the impact of cybercrime, security, control, web interface, and TTP on trust via the proposed research model.
This research undertaken to validate the proposed trust model was directed by pragmatism. It is an appropriate paradigm for this research because it allowed the researcher to comprehensively understand a complex problem such as trust. This was achieved via quantitative and qualitative research undertaken a two-phase mixed method, that guided the researcher to conduct quantitative and qualitative studies sequentially. The quantitative study validated the hypotheses and the conceptual model. The qualitative study then confirmed the findings of the quantitative study and explored additional trust issues in online shopping.
The quantitative study was conducted using an online questionnaire, and the data was analysed with structural equation modeling (SEM). Findings from the quantitative study show that consumers recognise six trust issues in online shopping, which is opposed to the proposed research model. These issues are fraud, privacy, security, control, web design, and warranty.
The qualitative study was then conducted using focus groups to understand the findings and trends from the quantitative study. Conversations from the focus groups was recorded, transcribed, and analysed to establish trust issues. The findings from the qualitative study confirmed the findings from the quantitative study. They also explained some new findings from the SEM analysis.
A comparison of the findings from both studies establishes a practical guide for e-vendors to foster consumer trust in online shopping. This includes what makes consumers trust e- vendors’ websites, which contains trust issues that customers value and how it can be incorporated in B2C e-commerce. This research also contributes to the body of knowledge on trust by introducing a multi-theoretical approach to foster consumer trust in B2C e-commerce.