SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Kajtazi Miranda 1983 ) "

Sökning: WFRF:(Kajtazi Miranda 1983 )

  • Resultat 1-10 av 19
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Haftor, Darek, et al. (författare)
  • Research and Practice Agenda of Industrial e-Maintenance: Information Logistics as a Driver for Development
  • 2010
  • Ingår i: Proceedings of the <em>1st International Congress on eMaintenance</em>. - Luleå. - 9789174391206 ; , s. 56-61
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents an inquiry into the domain of e-maintenance, particularly of industrial entities. As a domain of research and practice, e-maintenance is understood to offer great opportunities, however it seems to be driven by the development of applications of Information and Communication Technology (ICT). This ICT-driven approach is unfortunate, as ICT has no value in itself, rather its benefit comes for how it processes information, and more broadly how it forms its contextual activities. To remedy this situation, a conceptual framework is proposed, to guide both the practice and the research of e-maintenance operations. This framework combines the seminal Industrial Value Chain framework and then the Buyer-Consumer Value Chain, and articulates their intersection with a set of defined categories derived from Information Logistics. This provides one possible structure for the conception of e-maintenance, which needs to be populated with the published research and practice results. This, in turn, may uncover white spaces where research efforts deserve particular attention and are driven by value generation – whether economic or other – instead of experimental ICT application developments. The presentation of this framework is accompanied with a brief example that contrasts an event-driven versus a plan-driven approach to e-maintenance.
  •  
3.
  • Kajtazi, Miranda, 1983- (författare)
  • A proposal for a model to guide the formulation of information literacy strategy in organizations
  • 2009
  • Ingår i: <em>Proceedings of the 15th Annual CPTS Working Conference</em>. - 9789080771871 ; , s. 116-130
  • Konferensbidrag (refereegranskat)abstract
    • ABSTRACT. In this paper we develop a model of how information literacy (IL) strategy contribute to information retrieval process in organizations. Information retrieval is a challenging task that requires careful undertaking, concerning the issue related to information inadequacy. Our focus is on IL strategy and how it can improve information retrieval process, although being dependent on information technology (IT) capabilities. The purpose of this paper is to show how organizations can use IL strategy to guide their formulation and use of it in organizations. This research presents a model of IL strategy, which intends to accomplish contribution in organizations with IL strategy. For this, we adopt the theory of contribution behaviors focusing on how technology affects organizations. In this model we introduce three processes: analyze, search and manage. These processes are successors of contribution behaviors activities, but are also related to IL strategy activities. Finally, with this model we intend to show how individual’s motivational state is characterized by a normative, tactical and strategic information retrieval process in organizations, which affects organization’s performance, retaining with IT capability dependency.
  •  
4.
  •  
5.
  • Kajtazi, Miranda, 1983- (författare)
  • An Exploration of Information Inadequacy: Instances that Cause the Lack of Needed Information
  • 2011
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Information is one of the most essential resources in our contemporary societies, as it guideshuman thinking, planning and subsequent actions, which in turn generates consequencesthat are desired or not. The Lehman Brothers bankruptcy in 2008, the tsunami in Indonesiain 2004, the Space Shuttle Challenger destruction in 1986 are just three instances ofdramatic situations, emerging continuously, where information plays a crucial role. Thisstudy investigates the phenomenon of the lack of needed information, predominantlyexperienced with difficulties in human, social and industrial affairs. Consequently, thechallenge is to understand why such situations emerge. Two approaches are utilized toexplore this challenge using an interpretivist tradition. The first is a hermeneutic approach,the second a grounded theory approach. The first approach – theoretically oriented –investigates numerous theoretical bodies, selected with the assumption that they can explainthe addressed challenge. The results show that there are no comprehensive theoreticalbodies that can fully account for the phenomenon of the lack of needed information.Furthermore, there is no consensus on what “information” is – the very core of thechallenge, which gave the foundations for a formulation of an alternative notion ofinformation and is instrumental for the present investigation. Thus, no a priori theory isused to guide the empirical investigation. The second approach – empirically oriented –investigates fifty empirical cases, where the lack of needed information is clearly manifested.The results present an initial outline for a possible future theory of information inadequacy,constituted by the dichotomy of information-lack and information-overflow. Informationlackis dominated by: “information is non-existent”, “information is insufficient”, “information is censored” and “information is undelivered”. Whereas, information-overflow isdominated by: “information is ambiguous”, “information is redundant”, “information isirrelevant” and “information is undervalued”. The two main dichotomous characteristics andtheir interrelations result in patterns of various information inadequacies. The keyconclusion of the present study is that while dramatic situations are increasing everyday,there is as yet no theoretical body designed to comprehensively account for the phenomenonin context; only partial accounts are found. Thus, the empirical investigation suggests thatthe phenomenon of the lack of needed information seems to emerge because of diversefactors, ranging from political and cultural structures, through human individualcapabilities, and ending with procedural and technological artefacts. This study advocatesthat further research is needed to fully account for and explain instances of the lack ofneeded information, and that such an account requires an innovative and interdisciplinary focus.
  •  
6.
  • Kajtazi, Miranda, 1983- (författare)
  • Assessing Escalation of Commitment as an Antecedent of Noncompliance with Information Security Policy
  • 2013
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • For organizations, emphasizing investments in security technology has become the norm. Trending security technologies are important for an organization’s information security strategy. Organizations commonly use such technologies to enforce information security policy (ISP) compliance on the part of their employees, to ensure the security of their information resources. Yet, it seems that employees frequently establish rules of their own for complying with the ISP. Questioning this concern, the present dissertation addresses employees’ violation of information security rules and regulations. The motivation is based on the concern that information security policy noncompliance is largely influenced by escalation of commitment. Escalation is a phenomenon that explains how employees in organizations often get involved in nonperforming tasks, commonly reflecting the tendency of persistence, when investments of resources have been initiated. This dissertation develops an integrated model based on Self-Justification theory, Prospect theory, and Approach Avoidance theory, that centres on two main factors of noncompliance, namely self-justification and sunk costs. These factors act as mediating mechanisms to explain the dependent factor of the willingness to engage in noncompliant behaviour. The theoretical model is empirically tested with a data set that represents responses from 639 respondents across 27 organizations using the scenario-based survey approach. The results of this dissertation present a dual outcome. For theory, our theoretical framework not only enriches the literature on information security by proving that escalation behaviour is an antecedent of noncompliance, but also generates new insights about the escalation of commitment literature. The findings suggest that employees’ cognitive traits are escalation’s main antecedents that present the necessary stimulation to violate an ISP, while employees’ emotional traits do not influence such stimulation when overpowered by cognitive traits. Our results also suggest that employees engaged in nonperforming tasks often become noncompliant, even though they were complying before. In principle, the findings show that employees prioritize the completion of their tasks, rather than their commitment to comply with the ISP, and thus become noncompliant. In practice, our results show that employees’ willingness to engage in noncompliant behaviour is largely influenced by self-justification and sunk costs. The main results suggest that (a) self-justification is largely driven by the benefits of noncompliance outweighing the costs of compliance; (b) sunk costs are largely driven by the completion effect; (c) the benefit of noncompliance is a significant factor in self-justification, partially mediated by its influence on the willingness to engage in noncompliance; and (d) the completion effect is a significant factor in the sunk costs, fully mediated by its influence on the willingness to engage in noncompliance. This dissertation advocates that further research is needed to account for and explain noncompliant behaviour by utilizing escalation theories in more depth, and that such an account requires an innovative and empirically driven effort.
  •  
7.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Assessing Self-Justification as an Antecedent of Noncompliance with Information Security Policies
  • 2013
  • Ingår i: Proceedings of the 24th Australasian Conference on Information Systems. - : Royal Melbourne Institute of Technology (RMIT). - 9780992449506 ; , s. 1-12
  • Konferensbidrag (refereegranskat)abstract
    • This paper aims to extend our knowledge about employees’ noncompliance with Information Security Policies (ISPs), focusing on employees’ self-justification as a result of escalation of commitment that may trigger noncompliance behaviour. Escalation presents a situation when employees must decide whether to persist or withdraw from nonperforming tasks at work. Drawing on self-justification theory and prospect theory, our model presents two escalation factors in explaining employee’s willingness to engage in noncompliance behaviour with ISPs: self-justification and risk perceptions. We also propose that perceived benefits of noncompliance and perceived costs of compliance, at the intersection of cognitive and emotional driven acts influence self-justification. The model is tested based on 376 respondents from banking industry. The results show that while self-justification has a significant impact on willingness, risk perceptions do not moderate their relation. We suggest that future research should explore the roles of self-justification in noncompliance to a greater extent.
  •  
8.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Assessing Sunk Cost Effect on Employees'€™ Intentions to Violate Information Security Policies in Organizations
  • 2014
  • Ingår i: Proceedings of the 47th Annual Hawaii International Conference on System Sciences. - : IEEE. - 9781479925049 ; , s. 3169-3177
  • Konferensbidrag (refereegranskat)abstract
    • It has been widely known that employees pose insider threats to the information and technology resources of an organization. In this paper, we develop a model to explain insiders' intentional violation of the requirements of an information security policy. We propose sunk cost as a mediating factor. We test our research model on data collected from three information-intensive organizations in banking and pharmaceutical industries (n=502). Our results show that sunk cost acts as a mediator between the proposed antecedents of sunk cost (i.e., completion effect and goal in congruency) and intentions to violate the ISP. We discuss the implications of our results for developing theory and for re-designing current security agendas that could help improve compliance behavior in the future.
  •  
9.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Escalation of commitment as an antecedent to noncompliance with information security policy
  • 2018
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 26:2, s. 171-193
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose: This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a task - referred to as a task unlikely to be completed without violating the organization's information security policy (ISP).Design/methodology/approach: An empirical test of the suggested relationships in the proposed model was conducted through a field study using the survey method for data collection. Pre-tests, pre-study, main study and a follow-up study compose the frame of our methodology where more than 500 respondents are involved across different organizations.Findings: The results confirm that the antecedents that explain the escalation of commitment behavior in terms of the effect of lost assets, such as time, effort and other resources, give us a new lens to understand noncompliance behavior; employees seem to escalate their commitments to the completion of their tasks at the expense of becoming noncompliant with ISP.Research limitations/implications: One of the key areas that requires further attention from this study is to better understand the role of risk perceptions on employee behavior when dealing with value conflicts. Depending on how risk-averse or risk seeking an employee is, the model showed no significant support in either case to influence their noncompliance behavior. The authors therefore argue that employees' noncompliance may be influenced by more powerful beliefs, such as self-justification and sunk costs.Practical implications: The results show that when employees are caught in tasks undergoing difficulties, they are more likely to increase noncompliance behavior. By understanding better how project obstacles result in such tasks, security managers can define new mechanisms to counter employees' shift from compliance to noncompliance.Social implications: Apart from encouraging compliance with enforcement mechanisms (using direct behavioral controls like sanctions or rewards), indirect behavior controls may also encourage compliance. The authors suggest that the ISPs should state that the organization would take positive actions toward task completion and help their employees to resolve their problems quickly.Originality/value: This study is the first to tackle escalation of commitment theories and use antecedents that explain the effect of lost assets, such as time, effort and other resources can also explain noncompliance with ISP in terms of the value conflicts, where employees would often choose to forego compliance at the expense of finishing their tasks.
  •  
10.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Exploring the Notion of Information: A Proposal for a Multifaced Understanding
  • 2011
  • Ingår i: tripleC. - : Global Sustainable Information Society. - 1726-670X. ; 9:2, s. 305-315
  • Tidskriftsartikel (refereegranskat)abstract
    • Man’s notion of ‘information’ is essential as it guides human thinking, planning, and consequent actions. Situations such as the Haiti earthquake in 2010, the financial crisis in Greece in 2010, and the oil slick in the Gulf of Mexico in 2010 are just a few instances of constant growing empirical dilemmas in our global society where information plays a central role. The meaning of what information is has clear implications for how we deal with it in our practical lives, which in turn may give rise to situations that we would prefer to be without. In this sense, the notion of information has evidently presented the need to question what it really means and how it dominates the functioning of our global society. To address this fundamental issue of information, two questions are explored and presented in this paper: What notions of information are dominating the scholarly literature? And what are the differences between these notions? To answer these questions, we have conducted a comprehensive literature survey of more than two hundred scholarly publications. Detailed analyses of the content of these publications identified four kinds of forms of information notions. The results show that these four forms present diverse and opposing views of the notion of information, labelled as the ‘quartet model of information’. These ad-dress different foci, contexts, and challenges. In addition, we propose an alternative and novel understanding of the notion of information, associated with how information functions in our global society. This understanding offers a new perspective intended to address significant needs of the information society.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 19

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy