SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Kajtazi Miranda) "

Sökning: WFRF:(Kajtazi Miranda)

  • Resultat 1-45 av 45
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Flores, César Vásquez, et al. (författare)
  • Human Factors for Cybersecurity Awareness in a Remote Work Environment
  • 2023
  • Ingår i: ICISSP 2023 - Proceedings of the 9th International Conference on Information Systems Security and Privacy. - : SCITEPRESS - Science and Technology Publications. - 2184-4356. - 9789897586248 ; , s. 608-616
  • Konferensbidrag (refereegranskat)abstract
    • The conveniences of remote work are various, but a surge in cyberthreats has heavily affected the optimal processes of organizations. As a result, employees' cybersecurity awareness was jeopardized, prompting organizations to require improvement of cybersecurity processes at all levels. This paper explores which cybersecurity aspects are more relevant and/or relatable for remote working employees. A qualitative approach via interviews is used to collect experiences and perspectives from employees in different organizations. The results show that human factors, such as trust in cybersecurity infrastructure, previous practices, training, security fatigue, and improvements with gamification, are core to supporting the success of a cybersecurity program in a remote work environment.
  •  
2.
  • Haftor, Darek, et al. (författare)
  • An Information Logistics Research Program
  • 2010
  • Ingår i: Proceedings of the 4th European Conference on Information Management and Evaluation. - : Reading Academic Publishing Limited. - 9781906638733
  • Konferensbidrag (refereegranskat)abstract
    • Our human and social affairs operate inherently various modes of information sharing; in this we frequently encounter instances where the needed information is not provided to the needing actor, at the right time and cost, and in the right format. To this end, an Information Logistics Research Program has been formulated, grounded both in current research findings and in the actual needs and opportunities of organizations and individuals. The aim of the program is to guide a long term and comprehensive research efforts by indicating the key research domains to be addressed. The formulated research program proposes the following four key research frontiers for Information Logistics: the Information Logistics Operational Models, the Information Logistics Business Models, the Information Needing Actor, and the Information Logistics Foundations. The proposed Research Program also provides suggestions for how to research the defined frontiers.
  •  
3.
  •  
4.
  •  
5.
  •  
6.
  • Haftor, Darek, et al. (författare)
  • In Search for Unity within the Diversity of Information Societies
  • 2011
  • Ingår i: Information and Communication Technologies, Society and Human Beings: Theory and Framework (Festschrift in honor of Gunilla Bradley). - Hershey, New York : IGI Global. - 9781609600570 - 1609600576 ; , s. 540-546
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • This final Chapter represents the responsibility, the privilege but also the aspiration of the two editors of this Gunilla Bradley Festschrift. The aspiration here is no less than to identify a key message that emerges out of the contributions in this volume considered as a whole. In other words, the question here is: what do all this research and reasoning say to us? Of course, each reader of this Volume will derive her or his own interpretation and thus also a key message, which we only see as the richness offered by this Festschrift. Therefore, the key message presented here must be regarded only as one possible message that is formed by the two editors’ own predispositions: intellectual, cultural, motivational, and other.
  •  
7.
  •  
8.
  • Haftor, Darek, et al. (författare)
  • Information Logistics as a Guide for 
Research and Practice of e-Maintenance Operations
  • 2011
  • Ingår i: International Journal of Performability Engineering. - 0973-1318. ; 7:6, s. 593-603
  • Tidskriftsartikel (refereegranskat)abstract
    • Although the development of e-maintenance operations is understood to offer promising opportunities, it seems to be mainly driven by Information and Communication Technologies (ICT) applications development. This is unfortunate, as ICT has no value in itself; rather its benefit comes from the way in which it is utilized within its particular context. Thus, a conceptual framework is proposed to guide both the practice and the research of e-maintenance operations. The framework combines an Industrial Value Chain with a Buyer- Consumer Value Chain, where their intersections articulated in terms of categories derived from Information Logistics. This provides a structure for the conception of e-maintenance that needs to be populated with published research and current e-maintenance practice. This may uncover white spaces where research efforts deserve particular attention and are driven by value generation – for instance, economic. A brief case study, from a leading European truck- manufacturer, illustrates the proposed conceptual framework in application.
  •  
9.
  • Haftor, Darek M., et al. (författare)
  • A Review of Information Logistics Research Publications
  • 2011. - 1
  • Ingår i: Business Information Systems Workshops. - Berlin, Heidelberg : Springer. - 1865-1348 .- 1865-1356. - 9783642253690 - 9783642253706 ; , s. 244-255
  • Konferensbidrag (refereegranskat)abstract
    • ‘Information Logistics’ has presented itself as an intellectual and professional domain addressing the question of timely providence of the right information. A question that emerges then is: What is Information Logistics? To answer this question, a comprehensive review of research publications was conducted, where ‘Information Logistics’ was featured in the publication title. A detailed analysis of the content of these publications identified eleven different research directions, where five are currently active, all in Europe. Among various findings, the results show that these research directions have been pursued independently of each other, addressing different kinds of research questions and contexts, utilising different research approaches, and therefore generating a variety of unrelated research results. All the reviewed research here shows that there are numerous unmet empirical needs in our human and social affairs, as well as a need for intra-disciplinary developments, which calls for a joint mobilisation of the research efforts.
  •  
10.
  • Haftor, Darek, et al. (författare)
  • Research and Practice Agenda of Industrial e-Maintenance: Information Logistics as a Driver for Development
  • 2010
  • Ingår i: Proceedings of the <em>1st International Congress on eMaintenance</em>. - Luleå. - 9789174391206 ; , s. 56-61
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents an inquiry into the domain of e-maintenance, particularly of industrial entities. As a domain of research and practice, e-maintenance is understood to offer great opportunities, however it seems to be driven by the development of applications of Information and Communication Technology (ICT). This ICT-driven approach is unfortunate, as ICT has no value in itself, rather its benefit comes for how it processes information, and more broadly how it forms its contextual activities. To remedy this situation, a conceptual framework is proposed, to guide both the practice and the research of e-maintenance operations. This framework combines the seminal Industrial Value Chain framework and then the Buyer-Consumer Value Chain, and articulates their intersection with a set of defined categories derived from Information Logistics. This provides one possible structure for the conception of e-maintenance, which needs to be populated with the published research and practice results. This, in turn, may uncover white spaces where research efforts deserve particular attention and are driven by value generation – whether economic or other – instead of experimental ICT application developments. The presentation of this framework is accompanied with a brief example that contrasts an event-driven versus a plan-driven approach to e-maintenance.
  •  
11.
  •  
12.
  • Kajtazi, Miranda, 1983- (författare)
  • A proposal for a model to guide the formulation of information literacy strategy in organizations
  • 2009
  • Ingår i: <em>Proceedings of the 15th Annual CPTS Working Conference</em>. - 9789080771871 ; , s. 116-130
  • Konferensbidrag (refereegranskat)abstract
    • ABSTRACT. In this paper we develop a model of how information literacy (IL) strategy contribute to information retrieval process in organizations. Information retrieval is a challenging task that requires careful undertaking, concerning the issue related to information inadequacy. Our focus is on IL strategy and how it can improve information retrieval process, although being dependent on information technology (IT) capabilities. The purpose of this paper is to show how organizations can use IL strategy to guide their formulation and use of it in organizations. This research presents a model of IL strategy, which intends to accomplish contribution in organizations with IL strategy. For this, we adopt the theory of contribution behaviors focusing on how technology affects organizations. In this model we introduce three processes: analyze, search and manage. These processes are successors of contribution behaviors activities, but are also related to IL strategy activities. Finally, with this model we intend to show how individual’s motivational state is characterized by a normative, tactical and strategic information retrieval process in organizations, which affects organization’s performance, retaining with IT capability dependency.
  •  
13.
  •  
14.
  • Kajtazi, Miranda, 1983- (författare)
  • An Exploration of Information Inadequacy: Instances that Cause the Lack of Needed Information
  • 2011
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Information is one of the most essential resources in our contemporary societies, as it guideshuman thinking, planning and subsequent actions, which in turn generates consequencesthat are desired or not. The Lehman Brothers bankruptcy in 2008, the tsunami in Indonesiain 2004, the Space Shuttle Challenger destruction in 1986 are just three instances ofdramatic situations, emerging continuously, where information plays a crucial role. Thisstudy investigates the phenomenon of the lack of needed information, predominantlyexperienced with difficulties in human, social and industrial affairs. Consequently, thechallenge is to understand why such situations emerge. Two approaches are utilized toexplore this challenge using an interpretivist tradition. The first is a hermeneutic approach,the second a grounded theory approach. The first approach – theoretically oriented –investigates numerous theoretical bodies, selected with the assumption that they can explainthe addressed challenge. The results show that there are no comprehensive theoreticalbodies that can fully account for the phenomenon of the lack of needed information.Furthermore, there is no consensus on what “information” is – the very core of thechallenge, which gave the foundations for a formulation of an alternative notion ofinformation and is instrumental for the present investigation. Thus, no a priori theory isused to guide the empirical investigation. The second approach – empirically oriented –investigates fifty empirical cases, where the lack of needed information is clearly manifested.The results present an initial outline for a possible future theory of information inadequacy,constituted by the dichotomy of information-lack and information-overflow. Informationlackis dominated by: “information is non-existent”, “information is insufficient”, “information is censored” and “information is undelivered”. Whereas, information-overflow isdominated by: “information is ambiguous”, “information is redundant”, “information isirrelevant” and “information is undervalued”. The two main dichotomous characteristics andtheir interrelations result in patterns of various information inadequacies. The keyconclusion of the present study is that while dramatic situations are increasing everyday,there is as yet no theoretical body designed to comprehensively account for the phenomenonin context; only partial accounts are found. Thus, the empirical investigation suggests thatthe phenomenon of the lack of needed information seems to emerge because of diversefactors, ranging from political and cultural structures, through human individualcapabilities, and ending with procedural and technological artefacts. This study advocatesthat further research is needed to fully account for and explain instances of the lack ofneeded information, and that such an account requires an innovative and interdisciplinary focus.
  •  
15.
  • Kajtazi, Miranda, et al. (författare)
  • An exploration of opportunities for a theory of information inadequacy
  • 2018
  • Ingår i: This Changes Everything – ICT and Climate Change : What Can We Do? - 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Proceedings - What Can We Do? - 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Proceedings. - Cham : Springer International Publishing. - 1868-4238. - 9783319996042 ; 537, s. 384-394
  • Konferensbidrag (refereegranskat)abstract
    • Our everyday experiences show that the lack of needed information in various human affairs may give rise to consequences that we would like to avoid – e.g. the 2004 Tsunami in Southeast Asia. However, we still do not have a coherent theoretical body that addresses such experiences of information inadequacy as this changes everything in respect to the current conception of the information society, where technology plays a central role. To this end, we provide an initial exploration of opportunities for such a theory: when needed information is not available in human affairs, for any reason. We start with diagnoses of five existing central theoretical bodies that constitute promising candidates to account for instances of information inadequacy. The results show though that these do not offer a comprehensive account for situations where needed information is missing. Secondly, an empirical investigation was conducted, utilizing grounded theory approach, where fifty cases of information inadequacy were analysed. This revealed a number of patterns of plausible causes of information inadequacies in human affairs, which offer a preliminary foundation for a future theory of information inadequacy. This result suggests that information inadequacies may be understood as various instances of information-lack and information-overflow. These two, in turn, include numerous factors that cause information inadequacies, ranging from political and cultural structures, through human individual capabilities, and ending with procedural set-ups and technological artefacts. We advocate that further research should be conducted to explore various instances of information inadequacy aimed to the formulation of a coherent theory.
  •  
16.
  • Kajtazi, Miranda, 1983- (författare)
  • Assessing Escalation of Commitment as an Antecedent of Noncompliance with Information Security Policy
  • 2013
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • For organizations, emphasizing investments in security technology has become the norm. Trending security technologies are important for an organization’s information security strategy. Organizations commonly use such technologies to enforce information security policy (ISP) compliance on the part of their employees, to ensure the security of their information resources. Yet, it seems that employees frequently establish rules of their own for complying with the ISP. Questioning this concern, the present dissertation addresses employees’ violation of information security rules and regulations. The motivation is based on the concern that information security policy noncompliance is largely influenced by escalation of commitment. Escalation is a phenomenon that explains how employees in organizations often get involved in nonperforming tasks, commonly reflecting the tendency of persistence, when investments of resources have been initiated. This dissertation develops an integrated model based on Self-Justification theory, Prospect theory, and Approach Avoidance theory, that centres on two main factors of noncompliance, namely self-justification and sunk costs. These factors act as mediating mechanisms to explain the dependent factor of the willingness to engage in noncompliant behaviour. The theoretical model is empirically tested with a data set that represents responses from 639 respondents across 27 organizations using the scenario-based survey approach. The results of this dissertation present a dual outcome. For theory, our theoretical framework not only enriches the literature on information security by proving that escalation behaviour is an antecedent of noncompliance, but also generates new insights about the escalation of commitment literature. The findings suggest that employees’ cognitive traits are escalation’s main antecedents that present the necessary stimulation to violate an ISP, while employees’ emotional traits do not influence such stimulation when overpowered by cognitive traits. Our results also suggest that employees engaged in nonperforming tasks often become noncompliant, even though they were complying before. In principle, the findings show that employees prioritize the completion of their tasks, rather than their commitment to comply with the ISP, and thus become noncompliant. In practice, our results show that employees’ willingness to engage in noncompliant behaviour is largely influenced by self-justification and sunk costs. The main results suggest that (a) self-justification is largely driven by the benefits of noncompliance outweighing the costs of compliance; (b) sunk costs are largely driven by the completion effect; (c) the benefit of noncompliance is a significant factor in self-justification, partially mediated by its influence on the willingness to engage in noncompliance; and (d) the completion effect is a significant factor in the sunk costs, fully mediated by its influence on the willingness to engage in noncompliance. This dissertation advocates that further research is needed to account for and explain noncompliant behaviour by utilizing escalation theories in more depth, and that such an account requires an innovative and empirically driven effort.
  •  
17.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Assessing Self-Justification as an Antecedent of Noncompliance with Information Security Policies
  • 2013
  • Ingår i: Proceedings of the 24th Australasian Conference on Information Systems. - : Royal Melbourne Institute of Technology (RMIT). - 9780992449506 ; , s. 1-12
  • Konferensbidrag (refereegranskat)abstract
    • This paper aims to extend our knowledge about employees’ noncompliance with Information Security Policies (ISPs), focusing on employees’ self-justification as a result of escalation of commitment that may trigger noncompliance behaviour. Escalation presents a situation when employees must decide whether to persist or withdraw from nonperforming tasks at work. Drawing on self-justification theory and prospect theory, our model presents two escalation factors in explaining employee’s willingness to engage in noncompliance behaviour with ISPs: self-justification and risk perceptions. We also propose that perceived benefits of noncompliance and perceived costs of compliance, at the intersection of cognitive and emotional driven acts influence self-justification. The model is tested based on 376 respondents from banking industry. The results show that while self-justification has a significant impact on willingness, risk perceptions do not moderate their relation. We suggest that future research should explore the roles of self-justification in noncompliance to a greater extent.
  •  
18.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Assessing Sunk Cost Effect on Employees'€™ Intentions to Violate Information Security Policies in Organizations
  • 2014
  • Ingår i: Proceedings of the 47th Annual Hawaii International Conference on System Sciences. - : IEEE. - 9781479925049 ; , s. 3169-3177
  • Konferensbidrag (refereegranskat)abstract
    • It has been widely known that employees pose insider threats to the information and technology resources of an organization. In this paper, we develop a model to explain insiders' intentional violation of the requirements of an information security policy. We propose sunk cost as a mediating factor. We test our research model on data collected from three information-intensive organizations in banking and pharmaceutical industries (n=502). Our results show that sunk cost acts as a mediator between the proposed antecedents of sunk cost (i.e., completion effect and goal in congruency) and intentions to violate the ISP. We discuss the implications of our results for developing theory and for re-designing current security agendas that could help improve compliance behavior in the future.
  •  
19.
  • Kajtazi, Miranda, et al. (författare)
  • CONCEPTUALIZING THE IMPACT OF DIGITAL BUSINESS MODELS ON PRIVACY CONCERNS
  • 2023
  • Ingår i: 36th Bled eConference : Digital Economy and Society: The Balancing Act for Digital Innovation in Times of Instability, BLED 2023 - Proceedings - Digital Economy and Society: The Balancing Act for Digital Innovation in Times of Instability, BLED 2023 - Proceedings. - Maribor : University of Maribor University Press. - 9789612867515 ; , s. 721-735
  • Konferensbidrag (refereegranskat)abstract
    • Digital technologies have enabled novel forms and reconfigurations of value creation, delivery, and capture. These new reconfigurations challenge the conventional notion of value creation with digital business models. On that premise, the widening of privacy concerns, alert us that organizations of the elite digital, like Netflix, Amazon, and Spotify, design technology to feed on personal data, based on algorithmic profiling capabilities. Then, privacy itself becomes their digital business model. In this paper we conceptualize the impact of digital business models on privacy concerns, by presenting a focused literature review that presents 4 waves of research on understanding privacy from the context of digital business models. With our initial findings, we recommend that future technological development should pay central attention to privacy-preserving digital business models, by making it possible that data privacy is envisioned with the right safeguards, targeting ‘invisibility’ of the user.
  •  
20.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Escalation of commitment as an antecedent to noncompliance with information security policy
  • 2018
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 26:2, s. 171-193
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose: This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a task - referred to as a task unlikely to be completed without violating the organization's information security policy (ISP).Design/methodology/approach: An empirical test of the suggested relationships in the proposed model was conducted through a field study using the survey method for data collection. Pre-tests, pre-study, main study and a follow-up study compose the frame of our methodology where more than 500 respondents are involved across different organizations.Findings: The results confirm that the antecedents that explain the escalation of commitment behavior in terms of the effect of lost assets, such as time, effort and other resources, give us a new lens to understand noncompliance behavior; employees seem to escalate their commitments to the completion of their tasks at the expense of becoming noncompliant with ISP.Research limitations/implications: One of the key areas that requires further attention from this study is to better understand the role of risk perceptions on employee behavior when dealing with value conflicts. Depending on how risk-averse or risk seeking an employee is, the model showed no significant support in either case to influence their noncompliance behavior. The authors therefore argue that employees' noncompliance may be influenced by more powerful beliefs, such as self-justification and sunk costs.Practical implications: The results show that when employees are caught in tasks undergoing difficulties, they are more likely to increase noncompliance behavior. By understanding better how project obstacles result in such tasks, security managers can define new mechanisms to counter employees' shift from compliance to noncompliance.Social implications: Apart from encouraging compliance with enforcement mechanisms (using direct behavioral controls like sanctions or rewards), indirect behavior controls may also encourage compliance. The authors suggest that the ISPs should state that the organization would take positive actions toward task completion and help their employees to resolve their problems quickly.Originality/value: This study is the first to tackle escalation of commitment theories and use antecedents that explain the effect of lost assets, such as time, effort and other resources can also explain noncompliance with ISP in terms of the value conflicts, where employees would often choose to forego compliance at the expense of finishing their tasks.
  •  
21.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Exploring the Notion of Information: A Proposal for a Multifaced Understanding
  • 2011
  • Ingår i: tripleC. - : Global Sustainable Information Society. - 1726-670X. ; 9:2, s. 305-315
  • Tidskriftsartikel (refereegranskat)abstract
    • Man’s notion of ‘information’ is essential as it guides human thinking, planning, and consequent actions. Situations such as the Haiti earthquake in 2010, the financial crisis in Greece in 2010, and the oil slick in the Gulf of Mexico in 2010 are just a few instances of constant growing empirical dilemmas in our global society where information plays a central role. The meaning of what information is has clear implications for how we deal with it in our practical lives, which in turn may give rise to situations that we would prefer to be without. In this sense, the notion of information has evidently presented the need to question what it really means and how it dominates the functioning of our global society. To address this fundamental issue of information, two questions are explored and presented in this paper: What notions of information are dominating the scholarly literature? And what are the differences between these notions? To answer these questions, we have conducted a comprehensive literature survey of more than two hundred scholarly publications. Detailed analyses of the content of these publications identified four kinds of forms of information notions. The results show that these four forms present diverse and opposing views of the notion of information, labelled as the ‘quartet model of information’. These ad-dress different foci, contexts, and challenges. In addition, we propose an alternative and novel understanding of the notion of information, associated with how information functions in our global society. This understanding offers a new perspective intended to address significant needs of the information society.
  •  
22.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Guilt Proneness as a Mechanism Towards Information Security Policy Compliance
  • 2013
  • Ingår i: Proceedings of the 24th Australasian Conference on Information Systems. - : Royal Melbourne Institute of Technology (RMIT). - 9780992449506
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we develop a theoretical framework for understanding the role guilt proneness plays in the Information Security Policy (ISP) compliance. We define guilt proneness as an emotional personality trait indicative of a predisposition to experience a negative feeling about ISP violation. We develop a research model based on the theory of planned behaviour, guilt proneness theory and rational choice theory to explain employees’ intentions to comply with ISPs by incorporating the guilt proneness as a moderator between benefit of compliance and benefit of violation as perceived by employees and their attitude towards compliance. Identifying the roles of predispositions like guilt proneness in the ISP compliance will have interesting theoretical and practical implications in the area of information security.
  •  
23.
  • Kajtazi, Miranda, 1983- (författare)
  • How to improve information flow in telecom enterprises
  • 2009
  • Konferensbidrag (refereegranskat)abstract
    • Abstract. In this paper, I develop a model for understanding the importance of combining information logistics and semantic information. I use this combination as a representation of an initial solution to the problem of information overflow. The focus is on how could be possible to improve information flow, which indeed is essential and it impacts operational efficiency and enterprise productivity. The model combines information logistics and semantic information as a mean to provide the right person, with semantic information, at the right time and for the right purpose. This combination is a foundation for just-in-time information, also considered as a problem-solving basis for telecom enterprises, which could facilitate their daily workload. The results are based on empirical data gathered from structured interviews of sixty participants, who revealed new stories of how these telecom enterprises are miss functioning due to information overflow. I discuss the implications of this model, considered as an initial solution to reach efficient information flow and to improve communication process that is of crucial importance in every enterprise. This research uses the empirical data to explore the problem of information overflow, mainly from a design perspective, which indeed leads this research to further develop an analytical understanding of the problem.
  •  
24.
  • Kajtazi, Miranda, 1983- (författare)
  • Information Asymmetry in the Digital Economy
  • 2010
  • Ingår i: Proceedings of the IEEE International Conference on Information Society (i-Society 2010). - London, UK : IEEE Press. - 9780956426338 ; , s. 148-155
  • Konferensbidrag (refereegranskat)abstract
    • Information asymmetry is a problem that prevents communication processes to be effective in the digital economy. In this paper, we propose a model for understanding information asymmetry. Our analyses are conducted using the newspaper industry, the healthcare sector, and the stock exchange market. These analyses are examined using theories of communication processes in which two or more actors are necessary to engage in activities of information exchange. The study of these three examples resulted in the identification of four information exchange patterns: influenced, intentional, hindered, and unawares. Furthermore, we discuss implications of the model for information exchange in practice. The paper concludes by challenging sustainability in the digital economy, which remains problematic and difficult to achieve.
  •  
25.
  • Kajtazi, Miranda, et al. (författare)
  • Information Inadequacy : Some Causes of Failures in Human and Social Affairs
  • 2011
  • Ingår i: Electronic Journal of Information Systems Evaluation. - Reading, UK : Academic Publishing Limited. - 1566-6379. - 9781906638733 ; 14:1, s. 63-72
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper takes initial steps in facilitating researchers and practitioners to increase the relevance of information for their contexts. Our focus is on forging new possibilities to understand and improve the contemporary dilemma of information inadequacy. We define information inadequacy as vulnerable and inadequate information, composed by the dichotomy of information lack and/or of information overflow, which impose complexities and unexpected behaviour in human and social affairs. By exploring the lack of needed information in human and social affairs, we conducted an inquiry of different empirical and research objects that relate to information inadequacy (for example, empirical situations, theories, or other theoretically and practically based artifacts). The question that emerges then is: How to secure that the needed information is provided to the recipient at the right time, reducing the cause of unpredictable failures and fatalities in our global society? To answer this question, our paper presents initial guiding with a systematic approach that focuses on evaluating and further improving research and practice for information relevance. The empirical cases are mostly based on situations, such as: the financial failures of the Lehman Brothers Bankruptcy 2008, and the Enron bankruptcy 2001; or the disasters of the Space Shuttle Columbia 2003, and Space Shuttle Challenger 1986. The analyses are examined using theories of information behaviour that influence communication processes, from where two or more different actors are necessary to engage in activities of information exchange. The results include the identification of four information exchange patterns: influenced, intentional, hindered, unawares. Furthermore, we discuss implications of the model for practices with information. The paper concludes by challenging the role of information inadequacy in all economic, social and political affairs that remains problematic.
  •  
26.
  • Kajtazi, Miranda, et al. (författare)
  • Information Inadequacy : Some causes of Failures in Human and Social Affairs
  • 2011
  • Ingår i: Electronic Journal of Information Systems Evaluation. - : Academic Conferences Limited. - 1566-6379. ; 14:1, s. 63-72
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we develop a conceptual model for understanding human‑related information practices and their behavioural activities. Our focus is on forging new possibilities to explore and improve the contemporary dilemma when human activities fail due to the lack of the needed information, which is here understood as information inadequacy. More precisely, information inadequacy is defined as vulnerable and inadequate information, composed by the dichotomy of information lack and/or of information overflow, which imposes complexities and unexpected behaviour on human, social and industrial affairs. By exploring the lack of needed information in human, social and industrial affairs, we conducted an inquiry into different empirical situations manifesting information inadequacy, subsequently examining the various theoretical bodies that relate to information inadequacy. The key question was: Which theories may explicate the key human behavioural patterns that cause information inadequacy? To answer this question, our paper presents initial guidance with a systematic approach that focuses on evaluating and further improving research and practice in terms of information relevance. The empirical cases are largely based on major human, social and industrial dysfunctions: the Lehman Brothers' bankruptcy 2008, and the Enron bankruptcy 2001, the disasters of the Columbia space shuttle in 2003, and the Challenger in 1986. The analyses are examined through theories of information behaviour that influence communication processes where two or more different actors are required to engage in activities of communicating information. The results include the identification of four information exchange patterns: influenced, intentional, hindered, and unaware. Furthermore, we discuss the implications of the model for practice with information. The paper concludes by reviewing the role of information inadequacy in economic, social and political contexts that remain challenging.
  •  
27.
  • Kajtazi, Miranda, 1983- (författare)
  • Information inadequacy : The lack of needed information in human, social and industrial affairs
  • 2012
  • Ingår i: ICT Critical Infrastructures and Society. - Berlin, Heidelberg : Springer. - 9783642333316 - 9783642333323 ; , s. 320-329
  • Konferensbidrag (refereegranskat)abstract
    • This study investigates the phenomenon of the lack of needed information, predominantly experienced through difficulties in human, social and industrial affairs. The key concern is, thus, to understand what really causes the lack of needed information. Answers to this concern have been provided from an array of studies mostly focused in the area of information management. However, the literature shows that there is no comprehensive a priori theory to guide an empirical investigation on this matter. Thus, the empirical investigation conducted here is based on grounded theory approach that investigates fifty cases, where the lack of needed information is clearly manifested. The empirical investigation suggests that the phenomenon of the lack of needed information seems to emerge because of diverse factors, ranging from political and cultural structures, through human individual capabilities, and ending with procedural and technological artefacts. The results present an initial outline for a possible future theory of information inadequacy.
  •  
28.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Information Inadequacy : Instances that Causes the Lack of Needed Information
  • 2012
  • Ingår i: The 5<sup>th</sup> Workshop on Information Logistics and Knowledge Supply (ILOG2012), at the 11<sup>th</sup> International Conference on Perspectives in Business Informatics Research (BIR2012). - : Springer. - 9785502000420 ; , s. 7-17
  • Konferensbidrag (refereegranskat)
  •  
29.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Information Security Policy Compliance : An Empirical Study on Escalation of Commitment
  • 2013
  • Ingår i: 19th Americas Conference on Information Systems (AMCIS 2013). - Red Hook, N.Y. : Curran Associates, Inc.. - 9781629933948 ; , s. 2011-2020
  • Konferensbidrag (refereegranskat)abstract
    • This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delineates three mediating factors in explaining attitude: work impediment, information asymmetry, and safety of resources. We also propose information security awareness as an independent variable having an indirect effect on attitude through mediating factors. The proposed model is tested using the data collected from 376 employees working in the banking industry. The results of the PLS analyses show that while information asymmetry and safety of resources have significant impacts on attitude, work impediment does not. The results also show that ISA has significant impact on all three mediating factors.
  •  
30.
  • Kajtazi, Miranda, et al. (författare)
  • Insights for next generation undergraduate IS curriculum developers
  • 2020
  • Ingår i: Proceedings of the Information Systems Education Conference, ISECON 2020. - 2167-1435. ; 2020-March, s. 71-82
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents analyses on the trends of IS curriculum development that has evolved since its inception from the classical report by the AIS/ACM task force led by Heikki Topi and colleagues published in 2010. Based on an integrated synthesis of the literature, we categorize it into three theoretically-driven dimensions: (i) IS Curricula; (ii) Topic-Based IS Curricula, and (iii) IS Identity Crisis, followed by the identification of four empirically-driven contingencies: (i) Dangers of Legacy; (ii) Resource Competence; (iii) Technological Availability; and (iv) Trend Sensitivity. The paper presents IS curriculum development recommendations specifically driven by the four identified contingencies. Our findings inform how we design and re-design IS curricula. This in turn can influence the way we cross-fertilize with other disciplines forming a consolidated IS education that can offer the right competence to our future graduates, and will likely trigger more attention on information systems across the industry.
  •  
31.
  • Kajtazi, Miranda, et al. (författare)
  • Integration with other data and systems
  • 2017
  • Ingår i: The Routledge Companion to Accounting Information Systems. - : Routledge. - 9781317297345 - 9781138125865 ; , s. 251-261
  • Bokkapitel (refereegranskat)abstract
    • As the new generation of Information Technology is progressing at a rapid pace, with big data establishing a trend in organisations, integration between systems becomes substantial. In this chapter, we particularly look at information security as a system that has become an essential part of Business Intelligence (BI). BI systems represent one type of decision support system (DSS) with a focus on data analysing and presenting actionable information to decision-makers in an accessible and visual manner (Watson and Wixom, 2007). The way business information is presented and delivered through BI (Watson, 2009) can provide support to employees’ decision-making processes (Kowalczyk and Buxmann, 2014; Popovic et al., 2012) and affect organisational knowledge (Shollo and Galliers, 2015). In recent years, BI has been integrated aggressively in many different industries (Arnott and Pervan, 2008), including retail, telecommunication, healthcare, transportation and financial services (Chaudhuri et al., 2011). The rapid growth of mobile computing (Arnott and Pervan, 2014; Hosack et al., 2012) is challenging and changing the BI field (Watson, 2009). Mobile technologies extend BI usage scenario beyond users’ office desks and hours, giving rise to an extension of BI, coined as mobile business intelligence (m-BI). m-BI is defined as “data-driven decision support applications on mobile devices like smartphones and tablet computers” (Power, 2013, p. 6).
  •  
32.
  • Kajtazi, Miranda, et al. (författare)
  • IS Education Revisited : Reflections on a BSc Program in Business Information Systems Design
  • 2019
  • Ingår i: 5th International Conference on Information Management, ICIM 2019. - 9781728134307 ; , s. 144-149
  • Konferensbidrag (refereegranskat)abstract
    • The presence of the information age has greatly influenced how learning in higher education has evolved. Information Systems (IS) curricula are particularly liable with this trend and their likelihood to remain effective depends on how they orchestrate the use of technology. In this study, we evaluate an IS program that was designed and implemented in 2010. We assess its effectiveness eight years after its inception on a qualitative basis with six semi-structured interviews with designers, implementors and quality-assurers. We found that the constructive feedback received in the form of criticism, have pushed us to rethink how IS programs should enhance progressive development, with the aim to prepare IS reflective practitioners for their future in the industry.
  •  
33.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • New Insights Into Understanding Manager’s Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors
  • 2015
  • Ingår i: Proceedings of the Ninth International Symposium on Human Aspects of Information Security &amp; Assurance (HAISA 2015). - Pöymouth : Plymouth University. - 9781841023885
  • Konferensbidrag (refereegranskat)abstract
    • This paper addresses managers’ intentions to overlook their employees’ Information Security Policy (ISP) violation, in circumstances when on-going projects have to be completed and delivered even if ISP violation must take place to do so. The motivation is based on the concern that ISP violation can be influenced by escalation of commitment factors. Escalation is a phenomenon that explains how employees in organizations often get involved in nonperforming projects, commonly reflecting the tendency of persistence, when investments of resources have been initiated. We develop a theoretical understanding based on Escalation of Commitment theory that centres on two main factors of noncompliance, namely completion effect and sunk costs. We tested our theoretical concepts in a pilot study, based on qualitative and quantitative data received from 16 respondents from the IT – industry, each representing one respondent from the management level. The results show that while some managers are very strict about not accepting any form of ISP violation in their organization, their beliefs start to change when they realize that such form of violation may occur when their employees are closer to completion of a project. Our in-depth interviews with 3 respondents in the follow-up study, confirm the tension created between compliance with the ISP and the completion of the project. The results indicate that the larger the investments of time, efforts and money in a project, the more the managers consider that violation is acceptable
  •  
34.
  • Kajtazi, Miranda, et al. (författare)
  • Reframing the Discourse on Work-Life Balance in the Digital Age
  • 2023
  • Ingår i: International Conference on Information Systems, ICIS 2023 : "Rising like a Phoenix: Emerging from the Pandemic and Reshaping Human Endeavors with Digital Technologies" - "Rising like a Phoenix: Emerging from the Pandemic and Reshaping Human Endeavors with Digital Technologies". - 9781713893622
  • Konferensbidrag (refereegranskat)abstract
    • This paper reframes our understanding of the discourse on work-life balance (WLB) from a global perspective, where life on the four income levels (from bottom of the wealth to top of the wealth) is equally considered. Based on a systematic literature review, our initial insights are that WLB of workers in the highest economic sectors has received significant attention from scholars and practitioners in the west, while the global rest and those in other economic sectors, which represents the majority of the world’s population, has almost entirely been overlooked. We argue for a new understanding of WLB that addresses the needs of all people across the globe, regardless of their economic status or geographic position, and independent of their formal or informal work contexts. In our future work, we aim to address how disparities in: (1) agency and dependence; (2) privacy and exposure; (3) connection and disconnection; and (4) formality and informality can affect people's dignity, equality, and healthy environments.
  •  
35.
  •  
36.
  • Kajtazi, Miranda, et al. (författare)
  • Toward a unified model of information security policy compliance : A conceptual replication study
  • 2021
  • Ingår i: AIS Transactions on Replication Research. - 2473-3458. ; 7:2, s. 1-15
  • Tidskriftsartikel (refereegranskat)abstract
    • Moody et al. (2018) presented a unified model of information security policy compliance (UMISPC) to explain information systems security (ISS) behaviors. The model was empirically tested against 3 main types of security-related behavior: USB practices, not locking computers appropriately, and password issues. In this study, we present a conceptual replication of Moody et al. (2018) in order to provide stronger empirical support. To this end, our study has empirically examined UMISPC through three types of ISS behaviors within a work environment in the European Union (EU), where General Data Protection Regulation (GDPR) is in force. The replication of the empirical study with the three scenarios is original. While the replication in general highlights the strength of UMISPC, the results also indicate some differences from the original study and show that there is still room for improving some of its theoretical concepts.
  •  
37.
  • Kurti, Erdelina, et al. (författare)
  • Digital Innovation Challenges : The Case of an Academic Library
  • 2024
  • Ingår i: ECIS 2024 Proceedings. - : Association of Information Systems. - 9781958200100 ; , s. 1-16
  • Konferensbidrag (refereegranskat)abstract
    • The push to accelerate digitalization, particularly in educational organizations like academic libraries, highlights the innovation potential. Our study shows that achieving innovation requires understanding unprecedented complexity and tensions that cannot be overlooked. We present three identified phases: (1) emergence of digital practices; (2) enforced experimentation with digital initiatives; and, (3) advancing with digital resources, that depict an organization’s digital innovation journey. Through the case of an academic library, we capture the depths of complexities and tensions in the three phases, where we identify two crucial aspects—work practices and co-dependence – that undergo digital innovation across these three phases. Our findings offer new insights into the complexity and tension-filled nature of digital innovation, particularly pertaining to academic libraries. Despite such challenges, these organizations undergo a transformative digital innovation process, worthy of investigating in future endeavours.
  •  
38.
  • Mansour, Osama, et al. (författare)
  • Using Mobile Data for Understanding Population Movement and Disease Transmission during Covid-19 Outbreak in the Nordics
  • 2022
  • Ingår i: Proceedings of the 55th Annual Hawaii International Conference on System Sciences. - Honolulu, HI : University of Hawai'i Press. - 9780998133157 ; , s. 7151-7160
  • Konferensbidrag (refereegranskat)abstract
    • This study investigates the use of mobile data to understand patterns of population movements and disease transmission during the Covid-19 outbreak. It also focuses on understanding the implications of using this data for individual privacy. Using a mixed-methods approach, we present 10 rich qualitative interviews and 412 surevey responses from participants across the Nordics. Our novel results show that the use of mobile data can be characterized by two main categories: validation data and complementary data. We also identify five implications for practice: sharing resources and expertise between health agencies and telecom companies; extended collaboration with multiple network operators;cross-disciplinary collaboration among multiple parties; developing data and privacy guidelines; and developing novel methods and tools to address the trade-off between maintaining individual privacy and obtaining detailed information from mobile data. These implications may inform immediate and future actions to prepare for, mitigate, and control the spread of infectious diseases using mobile data. They also show privacy-driven limitations of mobile data in terms of data accuracy, richness, and scope.
  •  
39.
  •  
40.
  •  
41.
  • Sarkheyli, Azadeh, et al. (författare)
  • Conceptualizing knowledge risk governance as a moderator to potentially reduce the risks in knowledge sharing
  • 2016
  • Ingår i: Pacific Asia Conference on Information Systems, PACIS 2016. - Chiayi : College of Management, National Chung Cheng University. - 9789860491029
  • Konferensbidrag (refereegranskat)abstract
    • Recent developments in Knowledge Sharing (KS) have heightened the need for security. However, there has been little discussion about 'how to' integrate security into KS models effectively. This research addresses this gap by proposing a KS Risk Governance (KSRG) framework and research model based on the framework to integrate security into KS through Knowledge Risk Governance (KRG). The role of KRG in the model is identified as a moderator which would influence on the risks of KS. The potential constructs for the model are identified through literature review. Social Exchange Theory (SET) is selected as theoretical framework to describe the KS behaviour and identify the formative constructs of KRG. The results of this study indicate that (1) SET factors are positively associated with KS behaviour, (2) KRG moderated the relationship between the SET factors and KS behaviour and (3) KS via KRG as a moderating construct will reduce the risks of KS. Therefore, KSRG framework provides a helpful guideline for senior managers auditing their organization's current KS strategy and requirements for reduction of KS risks.
  •  
42.
  •  
43.
  • Vogel, Bahtijar, et al. (författare)
  • Openness and Security Thinking Characteristics for IoT Ecosystems
  • 2020
  • Ingår i: Information. - Basel, Switzerland : MDPI. - 2078-2489. ; 11:12
  • Tidskriftsartikel (refereegranskat)abstract
    • While security is often recognized as a top priority for organizations and a push for competitive advantage, repeatedly, Internet of Things (IoT) products have become a target of diverse security attacks. Thus, orchestrating smart services and devices in a more open, standardized and secure way in IoT environments is yet a desire as much as it is a challenge. In this paper, we propose a model for IoT practitioners and researchers, who can adopt a sound security thinking in parallel with open IoT technological developments. We present the state-of-the-art and an empirical study with IoT practitioners. These efforts have resulted in identifying a set of openness and security thinking criteria that are important to consider from an IoT ecosystem point of view. Openness in terms of open standards, data, APIs, processes, open source and open architectures (flexibility, customizability and extensibility aspects), by presenting security thinking tackled from a three-dimensional point of view (awareness, assessment and challenges) that highlight the need to develop an IoT security mindset. A novel model is conceptualized with those characteristics followed by several key aspects important to design and secure future IoT systems.
  •  
44.
  • Vogel, Bahtijar, et al. (författare)
  • State-of-the-Art in Security Thinking for the Internet of Things (IoT)
  • 2018
  • Ingår i: WISP 2018 Proceedings. - San Francisco, California, US : Association for Information Systems.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • In this paper we propose a model for Internet of Things (IoT) practitioners and researchers on how to use security thinking in parallel with the IoT technological developments. While security is recognized as a top priority, repeatedly, IoT products have become a target by diverse security attacks. This raises the importance for an IoT security mindset that contributes to building more holistic security measures. In understanding this, we present the state-of-the-art in IoT security. This resulted in the identification of three dimensions (awareness, assessment and challenges) that are needed to develop an IoT security mindset. We then interviewed four security and IoT-related experts from three different organizations that formed the basis for our pilot study to test the model. Our results show that the identified three-dimensional model highlights continuous security thinking as a serious matter to sustain IoT development with positive outcomes for its users.
  •  
45.
  • Zec, Milos, et al. (författare)
  • Examining how IT Professionals in SMEs Take Decisions About Implementing Cyber Security Strategy
  • 2015
  • Ingår i: PROCEEDINGS OF 9TH EUROPEAN CONFERENCE ON IS MANAGEMENT AND EVALUATION (ECIME 2015). - : Academic Conferences Limited. - 9781910810569 - 9781910810545 ; , s. 231-239
  • Konferensbidrag (refereegranskat)abstract
    • With the significant growth of cyber space, business organizations have become more alert than ever before that cyber security must be considered seriously and that there is a need to develop up-to-date security measures. It has become an increasing trend that cyber-attackers concentrate more on small and medium than on large enterprises, due to their known vulnerability towards cyber security. In exchange of successful cyber security measures in organizations, the security risks must be taken into consideration more closely that could be helpful for re-thinking their decision-making on cyber security. This article develops a theoretical framework on cyber security with three aspects taken in consideration: organizational, technological and psychological, that deserves the attention of IT professionals while and after creating cyber security measures in their SMEs. The first two aspects (organizational and technological) focus on understanding the IT professionals' decision-making process, while the third aspect (psychological) focuses on understanding the IT professionals' post decision-making reactions. Firstly, the organizational aspect presupposes that the ones who create cyber security measures are exposed to unclear and undefined decision processes and rights that lead to system vulnerabilities. Secondly, the technological aspect focuses on disclosing how many IT professionals in their organizations fail to meet foundational technological measures, such as the existence of Internet firewall, logs of system events, existence of hardware and software inventory list, data backup, antivirus software and password rules. Lastly, the psychological aspect, explains how post cyber security decisions made by IT professionals may have a contra-effect on the organization. Our data analyses collected based on interviews with IT professionals across 6 organizations (SMEs) show that cyber security is yet to be developed among SMEs, an issue that must not be taken lightly. Results show that the IT professionals in these organizations need to strengthen and develop their security thinking, in order to decrease the vulnerability of informational assets among SMEs. We believe that a perspective on understanding decision-making processes upon the cyber security measures by IT professionals in SMEs may bring a theoretical redirection in the literature, as well as an important feedback to practice.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-45 av 45
Typ av publikation
konferensbidrag (30)
tidskriftsartikel (9)
bokkapitel (2)
rapport (1)
annan publikation (1)
doktorsavhandling (1)
visa fler...
licentiatavhandling (1)
visa färre...
Typ av innehåll
refereegranskat (36)
övrigt vetenskapligt/konstnärligt (6)
populärvet., debatt m.m. (3)
Författare/redaktör
Kajtazi, Miranda (26)
Kajtazi, Miranda, 19 ... (19)
Haftor, Darek (14)
Mirijamdotter, Anita (9)
Haftor, Darek, 1969- (4)
Vogel, Bahtijar (4)
visa fler...
Sarker, Saonee (4)
Holmberg, Nicklas (4)
Bulgurcu, Burcu (4)
Cavusoglu, Hasan (4)
Bugeja, Joseph (3)
Benbasat, Izak (3)
Tona, Olgerta (2)
Mirijamdotter, Anita ... (2)
Varshney, Rimpu (2)
Kurti, Erdelina (2)
Johansson, Björn (1)
Kowalski, Stewart, P ... (1)
Ghazawneh, Ahmad, 19 ... (1)
González, José (1)
Carlsson, Sven (1)
Furnell, Steven (1)
Quinn, Martin (1)
Bui, Tung X. (1)
Lenzini, Gabriele (1)
Keller, Christina (1)
Kolkowska, Ella, 197 ... (1)
Kimppa, Kai (1)
Ess, Charles (1)
Rosvall, Jan (1)
Flores, César Vásque ... (1)
Mori, Paolo (1)
Mansour, Osama (1)
Milrad, Marcelo, Pro ... (1)
Strauss, Erik (1)
Hellgren, Magnus (1)
Haftor, Darek M. (1)
Pucihar, Andreja (1)
Haftor, Darek, Assoc ... (1)
Brier, Sören, Profes ... (1)
Leenen, Louise (1)
Kreps, David (1)
Haftor, Darek, Profe ... (1)
Borstnar, Mirjana Kl ... (1)
Bons, Roger (1)
Ongena, Guido (1)
Heikkila, Marikka (1)
Vidmar, Doroteja (1)
Mirijamsdotter, A (1)
Johnson, Desmond (1)
visa färre...
Lärosäte
Linnéuniversitetet (28)
Örebro universitet (16)
Lunds universitet (13)
Malmö universitet (5)
Stockholms universitet (3)
Uppsala universitet (2)
visa fler...
Högskolan i Halmstad (1)
visa färre...
Språk
Engelska (45)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (34)
Samhällsvetenskap (14)
Teknik (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy