The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While most organizations continue to invest in traditional network defences, a formidable security challenge has been brewing within their own boundaries. Malicious insiders with privileged access in the guise of a trusted source have carried out many attacks causing far reaching damage to financial stability, national security and brand reputation for both public and private sector organizations...
In this paper, a position has been taken to include the non-human active agents as insiders of an enterprise, as opposed to only human insiders as found in the literature. This eliminates the necessity of including the psycho-social and criminological behavioural traits to be incorporated in the management of insider threats. A framework of an Enterprise has been developed and it is shown that within...
The problem of insider threats is not new to organizations and research community. Organization cannot afford any kinds of attacks on their confidential information and resources either from insiders or out-siders. The damage done by insiders is more severe than that of external attackers due to their knowledge about the system and potential targets. It has been observed by studying previous case...
The problem of insider threat is receiving increasing attention both within the computer science community as well as government and industry. This paper starts by presenting a broad, multidisciplinary survey of insider threat capturing contributions from computer scientists, psychologists, criminologists, and security practitioners. Subsequently, we present the behavioral analysis of insider threat...
The paper aims to clarify the relationship between human resource (HR) practices and performance. Based on the self-determination theory, we developed and tested a theory of how human resource practices affect employee psychological empowerment and resultant employee energy in the work in this study. A survey of 227 employees from different companies showed that the human resource practices were positively...
Abusive supervision is not scares in Chinese service industries. In this paper, we considered supervisor's personal values play a key role in predicting perceptions of abusive supervision. We tested our model consisting of 171 supervisor - subordinate dyads from Chinese retail organizations. Specifically, we found that in the retail industry: (1) supervisor's self-enhancement values were positively...
In this study, we surveyed 505 employees and their immediate supervisor, and try to investigate the relations between work value, work stress, job performance and perceived organizational support. Through statistical analysis, we find that work stress has a mediating effect between work values and employee performance; perceived organizational support is a moderator between growth value and work stress,...
The literature study indicates that the number of empirical studies on the relationship between work values and job performance of employees are very low, and the results are not complimentary. Although many scholars provide a considerable amount of research regarding the relationship between the work values of an employee and his job performance, few studies take the influence an enterprise environment...
The Royal Malaysia Police (RMP) is one of the largest enforcement agencies in Malaysia. In keeping the security of the country, the service of the police force is very important and undeniable; hence, the objective of this study is to investigate the level of job satisfaction among technical and operational personnel in the Communication Division of the RMP. The findings showed that 23.8% of the respondents...
Almost all organizations and sectors are currently faced with the problem of insider threats to vital computer assets. Internal incidents can cause more than just financial losses, the costs can also include loss of clients and damage to an organization's reputation. Substantial academic research investigating internal threats has been conducted. This paper examines a number of theoretical models...
This paper constructs a psychological contract mechanism model to analyze the affecting process of psychological contract on the teacher. Through anglicizing the process of the university organization payment and the teachers' perceptive value are affected by the change in performance appraisal way, this paper anglicizes the change process of the psychological contract balance and puts forward improving...
This paper unpacks the relation between task conflict and relationship task by an exploratory research with a sample of 253 persons to, From which five escalation factors were extracted. They are mentality, relation, self-character, environment, psychological distance. An escalation model of task conflict into relationship conflict is built to show different effects of 5 accelerating factors in the...
The survey from local enterprises shows that relationship conflict within organization has negative impact on organizational performance, but the effect from task conflict is not significant. The variables of psychological conditions such as psychological meaningfulness, psychological safety and psychological availability not only can directly affect individual's job involvement and organizational...
The relation among job satisfaction, stress level and self-efficacy of safety staff in coalmine was investigated by a questionnaire survey conducted to 43 employees in a state-owned coalmine. The results showed as follows: stress level could predict job satisfaction negatively; self-efficacy could not only predict job satisfaction positively, but also adjust the effect of stress level on job satisfaction;...
We use information technology to accomplish a significant portion of our daily tasks. The way individuals choose to use technology varies as much as the outcomes of their usage. Appropriation the way that people choose or learn to use technology has been explored at a group level to explain group behaviors and performance. Although appropriation antecedents and outcomes have been investigated in many...
The credibility of Website is a sort of psychological feeling, in other words, a sense of trust and its intensity towards the enterprise??s Website produced by the customers from individual or collective perspective. According to the Website??s structure and function modules, the credibility of enterprise??s Website can be divided into three parts, respectively, the credibility of Website structure,...
In this paper an attempt is made to describe the relationship between cyber crime and mental illness. It will create awareness among people about cyber crimes and criminality due to mental illness. Computers and the internet make many actions easier for us. They also make many unlawful activities easier for criminals such as the sharing of, copy right infringement, stock manipulation, child pornography...
Job satisfaction is receiving an increasing attention in China since early 1990s. However, some factors under current Chinese economical and political systems that have an impact on job satisfaction are empirically largely unknown. This study investigates the relationship between informal groups and perceived job satisfaction in the context of Chinese firms. It finds that the usage of informal groups...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.