Filters








139,791 Hits in 6.9 sec

Understanding the Role of Incentives in Security Behavior

Sanjay Goel, Kevin Williams, Jingyi Huang, Merrill Warkentin
2020 Proceedings of the 53rd Hawaii International Conference on System Sciences   unpublished
In this research we examine the role of financial incentives in changing user behavior; we specifically provide incentives to users for good security practices.  ...  Several theories from different domains have been used for understanding and changing user security behavior including deterrence, fear appeals, and education; however, the success of these approaches  ...  A larger study is now planned to understand the role of incentives further as well as to clarify the role of nudges in sustaining the behavior.  ... 
doi:10.24251/hicss.2020.519 fatcat:pp4c7myuevcxjet3zohilgzvxy

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath, H.R. Rao
2009 Decision Support Systems  
In this paper, we develop and test a theoretical model of the incentive effects of penalties, pressures and perceived effectiveness of employee actions that enhances our understanding of employee compliance  ...  Thus, the area of end-user security behaviors in organizations has gained an increased attention. In information security observing end-user security behaviors is challenging.  ...  Part of this research is funded by NSF under grant no. 0402388, grant no. 0802062 and MDRF grant no. F0630. The usual disclaimer applies.  ... 
doi:10.1016/j.dss.2009.02.005 fatcat:fjhi2j2cojclbnj53n5tx3rb6m

Safety Incentive Program for Construction Project: Case Studies of Several Construction Projects in Klang Valley, Malaysia

Nor Haslinda Abas, Mohammad Hafiz Nurahim, Norazam Yasin, Muhamad Hanafi Rahmat
2020 Civil engineering and architecture  
This paper presents a study on the effectiveness of safety incentive programs on construction sites in Klang Valley, Malaysia.  ...  The findings show that all selected case study projects had implemented a safety incentive program in different ways, such as using safety awards, housekeeping, unsafe behavior reporting, etc.  ...  Acknowledgements The authors would like to thank the Research Fund E15501, Research Management Centre, Universiti Tun Hussein Onn Malaysia for supporting this research.  ... 
doi:10.13189/cea.2020.080320 fatcat:66qgzooht5envgmysoc36lczty

Fraud Detection, Conservatism and Political Economy of Whistle Blowing

K. Ozili Peterson
2016 Academic Journal of Interdisciplinary Studies  
A discussion of some factors that influence the whistle-blowers' incentive to blow the whistle or to remain silent in the face of persuasive fraud red flags, is also presented.  ...  The paper suggests that the tradeoff between the cost and benefit of whistle-blowing may compel the whistle-blower to apply some degree of conservatism in their whistle-blowing activities.  ...  While an understanding of the effectiveness of financial incentives in promoting whistle-blowing is important, it is needful to apply caution when advocating for financial incentives to whistle-blowers  ... 
doi:10.5901/ajis.2016.v5n3p17 fatcat:mqzrlpnqhzhxfo5345e64ba57m

How Does Social Security Claiming Respond to Incentives? Considering Husbands' and Wives' Benefits Separately

Alice Henriques
2012 Social Science Research Network  
Variation in incentives comes from rule changes to the Social Security benefit calculation in addition to the age difference between spouses and the relative strength of the wife's labor force history.  ...  I show that husbands' claiming behavior responds to the actuarial incentives built into their own retired worker benefit formula, but not to the incentives built into the spouse and survivor formulas that  ...  The first robustness check incorporates the impact of health on Social Security incentives as expected lifetime plays a central role in the calculation of SSW.  ... 
doi:10.2139/ssrn.2054772 fatcat:i64ruuzuijhjbcix4y6wmhfowu

Incentive Alignment and Risk Perception: An Information Security Application

Fariborz Farahmand, Mikhail J. Atallah, Eugene H. Spafford
2013 IEEE transactions on engineering management  
We also present the results of our findings from our interviews of 42 information security executives across the U.S. about the role of risk perception and incentives in information security decisions.  ...  Reasons for this shortcoming include the neglect of the role of stakeholder perceptions in organizational reward systems, and misaligned incentives for effective allocation of resources.  ...  ACKNOWLEDGMENT This paper is an extension and expansion of the work presented as "Incentives and Perceptions of Information Security Risks," at the 29th International Conference on Information Systems,  ... 
doi:10.1109/tem.2012.2185801 fatcat:vz4bcr7pgfhndfrtcttcjvgley

A Touch on Employees Motivation

Mohammed Hokroh
2014 International Journal of Human Resource Studies  
The purpose of this paper is to describe and analyze three motivational tools and techniques namely financial, compensations and training that could help companies guide their employees toward achieving  ...  superior performance especially in Middle Eastern.  ...  (Oleson 2004) 2.2 Compensations Incentives: According to Maslow's hierarchy of needs theory, needs for safety, security and belongingness play a major role in employees' motivation.  ... 
doi:10.5296/ijhrs.v4i1.4936 fatcat:xgfczd57hzbgfgavua3apyeccm

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

Liang-Cheng Wei, Carol Hsu, Kai Wang
2016 Asia Pacific Journal of Information Systems  
Drawing on the theory of planned behavior and rational choice theory, we develop a theoretical model to understand the factors at the organizational and individual levels that might influence whistleblowing  ...  Keywords: Information security policy violation, internal whistleblowing, behavioral issues of information security, theory of planned behavior, rational choice theory.  ...  In sum, their study is one of the first studies to illuminate the role of whistleblowing intention in the information security context.  ... 
doi:10.14329/apjis.2016.26.1.163 fatcat:27tom5pxbvcn7hk73qcubiqadu

Plantation Leadership: A 19th Century Toolbox in the 21st Century

Jerry Dale Jones, Brian A. Phillips, Melissa Workman
2015 US-China Education Review. B  
Herzberg (1964) (as cited in Ellis, 1984) distinguished between extrinsic rewards (salaries, fringe benefits, and job security) and intrinsic rewards of the job itself (self-respect and sense of accomplishment  ...  defined employee roles.  ...  The model documents that patterns of behavior have profound effects on adaptive functioning. It demonstrates the role of learning and performance goals in producing individuals' patterns of behavior.  ... 
doi:10.17265/2161-6248/2015.06b.002 fatcat:a4u5c6mmcjc6fndj6exwysxiri

What's New in the Economics of Cybersecurity?: Observational and Empirical Studies

Massimo Felici, Nick Wainwright, Fabio Bisogni, Simona Cavallini
2015 IEEE Security and Privacy  
In response to the changing cybersecurity challenges, spending on information security has grown steadily and might eventually reach a point that's ine cient and una ordable.  ...  directions. is special issue on observational and empirical studies together with the forthcoming special issue on the roles of cyberactors and intermediaries highlights research insights that guide the  ...  The uneven distribution of costs and incentives of cybersecurity stress the different cyberactors' roles and economic exposures.  ... 
doi:10.1109/msp.2015.105 fatcat:67ftnbdxvfanbgtqinrht7egwy

What Usable Security Really Means: Trusting and Engaging Users [chapter]

Iacovos Kirlappos, M. Angela Sasse
2014 Lecture Notes in Computer Science  
Drawing on research on trust, usable security, and economics of information security, we outline how the organization-employee trust relationship can be leveraged by security designers.  ...  Previous studies suggest that most employees are intrinsically motivated to behave securely, and that contextual elements of their relationship with the organization provide further motivation to stay  ...  The role of trust in technology design has been examined by research aiming to create technology platforms that enable the development of trust relationships in online commerce and gaming [16] [17] [18  ... 
doi:10.1007/978-3-319-07620-1_7 fatcat:3uk323pzifh2tfls55snfxcxe4

Human Values and Digital Citizen Science Interactions

Victoria Palacin, Maria Angela Ferrario, Gary Hsieh, Antti Knutas, Annika Wolff, Jari Porras
2021 International Journal of Human-Computer Studies  
Further understanding the influence of human values in digital citizen science is a promising area for future research that could contribute to a) guide the design of incentive mechanisms, b) understand  ...  security values mostly used the application when they had something relevant to submit.  ...  Also, we extend our gratitude to the students who worked in the technical development of the platform (Toni Lepistö and Krishna Vaddepalli) and to those who helped us to facilitate workshops with the community  ... 
doi:10.1016/j.ijhcs.2021.102605 fatcat:eiw3twoeizh5hjgj2wrslyv4hy

What Is the Appropriate Role of the Federal Government in the Private Markets for Credit and Insurance? What Is the Outlook?

Joseph E. Stiglitz
2017 Federal Reserve Bank of St. Louis Review  
I want to focus my remarks this morning on the role of government in risk-bearing.  ...  A little over a decade ago, I addressed the issue of the role of government in riskbearing at a conference sponsored by the Federal Reserve Bank of Cleveland (Stiglitz, 1993).  ...  I want to briefly explore what has happened since then to our understanding of the role of government in risk-bearing, focusing on particular episodes and events. 1.  ... 
doi:10.7916/d8fb5ctq fatcat:4e3orbjaejhyzion5jijr33fqy

The Role of Ideas that shape the Institutional Change in Cybersecurity Economic barriers of cyber-attacks [article]

Raquel Marasigan
2020 Figshare  
The paper presented last September 3, 2019.  ...  The research paper is part of the growing literature on the economics of cybersecurity in the Philippines, as behavior of cybercriminals to continue increase cyber threats are growing, so understanding  ...  We have little understanding of how secure online transactions are and do not know how to deal with our loss or personal space in the digital world.  ... 
doi:10.6084/m9.figshare.12086763.v1 fatcat:4nifq2nshjaf7ft4zzhgtjcj6y

The right incentives enable ocean sustainability successes and provide hope for the future

Jane Lubchenco, Elizabeth B. Cerny-Chipman, Jessica N. Reimer, Simon A. Levin
2016 Proceedings of the National Academy of Sciences of the United States of America  
We thank Amanda Leland and Doug Rader of Environmental Defense Fund for assistance.  ...  .); and by the Nordforsk-funded project Green Growth Based on Marine Resources: Ecological and Socio-Economic Constraints (GreenMAR) (S.A.L.).  ...  Behavioral Incentives and Social Norms Although economic incentives play an important role in driving behavior, they are only one means of effecting change.  ... 
doi:10.1073/pnas.1604982113 pmid:27911770 pmcid:PMC5187698 fatcat:ggiurkwyufbvnfkw577oga4ff4
« Previous Showing results 1 — 15 out of 139,791 results