{"title":"Implementation of an Additional Factor for Secure Authentication in Online Transactions","authors":"Vipin Khattri, D. Singh","doi":"10.1080/10919392.2019.1633123","DOIUrl":"https://doi.org/10.1080/10919392.2019.1633123","url":null,"abstract":"ABSTRACT To eradicate financial fraud, governments encourage the digitization of financial transactions, which is also reinforced by the digital economy paradigm. Recently, there has been an exponential increase in the number of e-transactions, and the incidence of cyber crimes related to online transaction fraud has also been increasing. To prevent online transaction fraud, the stakeholders of financial-transaction-related companies have implemented various secured authentication and authorization practices at all levels. In this paper, an additional factor for secure authentication for online transactions has been proposed. A third authentication factor, in addition to Personal Identification Number (PIN) and one time password (OTP), has been proposed, which is based on the global positioning system (GPS) location of the user who initiates the transaction. The strategy is to approve / decline the transaction based on a specified distance constraint between the transaction device and the user’s mobile device; this distance is used as an additional authentication factor (third factor) to verify the online transaction. The main objective of this study is to prevent fraudsters from performing online transactions from devices that do not belong to the user and are not currently in the possession of the user. The simulation results show that a high detection rate, i.e., 98.55%, is obtained using the proposed method.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"258 - 273"},"PeriodicalIF":2.9,"publicationDate":"2019-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1633123","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43501119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise cybersecurity training and awareness programs: Recommendations for success","authors":"Wu He, Z. Zhang","doi":"10.1080/10919392.2019.1611528","DOIUrl":"https://doi.org/10.1080/10919392.2019.1611528","url":null,"abstract":"ABSTRACT To help employees recognize and change their computing security behavior, organizations need to invest in cybersecurity training and awareness programs to encourage their employees’ active engagement in complying with their security policies. However, many organizations’ cybersecurity training and awareness programs fail to achieve their goals as employees feel bored with such training programs and lack enthusiasm to participate in them. Highlighting the criticality of the success of cybersecurity training and awareness programs in organizations, this paper identifies best practices and provides actionable insights (relating cyber awareness to employees’ personal life, reinforcing security procedures and guidelines, instilling a “relaxed alert” state of employees, and minimizing security fatigue for employees) that will help enterprises develop and implement economical, effective, and engaging cybersecurity training and awareness programs.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"249 - 257"},"PeriodicalIF":2.9,"publicationDate":"2019-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1611528","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48733237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) – A Persuasion and Cognitive Elaboration Perspective","authors":"Xue Yang, Xinwei Wang, W. Yue, C. Sia, X. Luo","doi":"10.1080/10919392.2019.1639913","DOIUrl":"https://doi.org/10.1080/10919392.2019.1639913","url":null,"abstract":"ABSTRACT Bring-Your-Own-Device (BYOD) has gained increased popularity in organizations but may engender information security concerns. To address these concerns, employees are expected to opt-in and comply with organizational BYOD security policy. This study investigates the factors that affect employees’ opt-in decisions with BYOD security policy. Drawing on the theoretical lenses of persuasion and cognitive elaboration, we propose that employees’ cognitive elaborations of BYOD security policy could be affected by the valence of justification of the BYOD security policy, the stringency of BYOD security measures, and the sequence of the introduction of BYOD security policy in relation to employees’ use of personal devices to perform organizational tasks and such cognitive elaborations would in turn affect opt-in decisions. We conducted an experimental survey to test our propositions. The results indicate that positive BYOD security policy justification framing and post-task security policy exposure would lead to more positive cognitive elaboration, decision to opt-in, and compliance with the BYOD security policy. This research has significant implications for security management with respect to the design and implementation of BYOD security policy within an organization according to the nature of security policy and the task requirements.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"274 - 293"},"PeriodicalIF":2.9,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1639913","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44744651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Negotiation protocol based on ordered weighted averaging and Fuzzy metrics","authors":"José Leão e Silva Filho, Danielle Costa Morais","doi":"10.1080/10919392.2019.1587230","DOIUrl":"https://doi.org/10.1080/10919392.2019.1587230","url":null,"abstract":"ABSTRACT Negotiation Support Systems are used to exchange offers and to improve the negotiation process. Some methods are based on perspectives like heuristics in order to bring the negotiation protocol gradually closer to reality. These approaches can be important in real negotiation as they can help to improve skillsespecially in distributive bargaining. This paper proposes a Negotiation Support framework to provide the negotiator with recommendations on making decisions in a negotiation process. To input this idea into negotiation protocols, this paper suggests that some concepts based on OWA (Ordered Weighted Averaging) and some of its metrics (Orness, Dispersion) be included in the heuristics of a structured negotiation schedule. It is expected that the support provided will aid the negotiator to make decisions during the negotiation process, to learn from the elicitation and his own behavior the results obtained can help the negotiator improving his skills in the negotiation process.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"40 1","pages":"190 - 208"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79883990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systems theoretic process analysis of information security: the case of aadhaar","authors":"P. Tarafdar, I. Bose","doi":"10.1080/10919392.2019.1598608","DOIUrl":"https://doi.org/10.1080/10919392.2019.1598608","url":null,"abstract":"ABSTRACT A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India’s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"209 - 222"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1598608","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41508374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, A. Abdullah, Raechel Johns
{"title":"USERS’ SOCIOCULTURAL ORIENTATION AND SMART SYSTEMS ACCEPTANCE LINK: DO DEMOGRAPHICS MATTER?","authors":"Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, A. Abdullah, Raechel Johns","doi":"10.1080/10919392.2019.1611287","DOIUrl":"https://doi.org/10.1080/10919392.2019.1611287","url":null,"abstract":"ABSTRACT This research investigates the impact of sociocultural determinants on people’s perceptions and usage of smart systems in the United Arab Emirates (UAE). This research used the Theory of reasoned action, Unified theory of acceptance and use of technology (UTAUT) and Frambach and Schillewaert’s framework. These theories which focus on the determinants of technology acceptance behavior of users have been widely used in contemporary technology acceptance research. Data were collected from the UAE Ministries of Foreign Affairs, Health, and Economy using structured questionnaires. A total of 357 responses were analyzed using multivariate statistical techniques such as regression analysis and factor analysis. Multiple regression analysis helped to determine the direction of relationships between the constructs representing users’ sociocultural orientation, attitude toward smart systems and acceptable behavior. Factor analysis served to identify the underlying dimensions of the above constructs. The major finding of this research is that cultural values and peers’ influence significantly affect users’ perceptions and applications of technological innovations. Furthermore, the study reveals that users’ age and gender wield critical moderating effects on the relationship between cultural values and attitude toward smart systems. These findings have important implications for acceptance and implementation of smart systems in the UAE which are highlighted in this paper. This paper also identifies the limits of this research and explores the venues of further research in this field.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"223 - 247"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1611287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45145581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis","authors":"Hsin-Lu Chang","doi":"10.1080/10919392.2019.1583811","DOIUrl":"https://doi.org/10.1080/10919392.2019.1583811","url":null,"abstract":"ABSTRACT Because of the significant market potential in China, many international enterprises are moving their production line to China. Accompanying production offshoring is the shifting of information systems to ensure that the production processes remain efficient and effective both at home and abroad. However, many enterprises encounter problems while deploying offshore information systems in China, especially when the systems are interorganizational systems (IOS) that span organizational boundaries and involve the management of relationships among participants. Therefore, this paper aims to identify critical success factors of offshore interorganizational systems in China through a case study of a supply chain relationship based on an e-procurement system between a Taiwanese personal computer manufacturer and its Chinese partners. Although this system had been well used by Taiwanese users, the performance of this system in China was relatively unsatisfactory in terms of grant complaints from Chinese users. Based on the relational view of the firm, four IOS-specific relational factors are proposed and examined: (1) IOS-specific assets, (2) IOS knowledge-sharing routines, (3) system complementarity, and (4) IOS governance. The case analysis reveals that effective IOS governance most strongly affects the results of offshoring in China, whereas system complementarity has the least influence.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"163 - 189"},"PeriodicalIF":2.9,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1583811","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49383405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective use of analytic DSS and job performance: Looking beyond technology acceptance","authors":"Damon E. Campbell, Nicholas H. Roberts","doi":"10.1080/10919392.2019.1571756","DOIUrl":"https://doi.org/10.1080/10919392.2019.1571756","url":null,"abstract":"ABSTRACT This study extends and test the work done on effective use of information systems (IS) by developing measures for this construct which expands the conceptualization of use beyond the popular technology acceptance model (TAM). Effective use posits dimensions of use (informed action, representational fidelity, and transparent interaction) which are intended to measure a user’s ability to effectively use an IS in a given context. Moving beyond simple adoption and use contexts is an important distinction that expands researcher’s and practitioner’s ability to assess usage effectiveness. In a work context, it is more important to have high performance and effective usage of systems in comparison to just having high usage rates. Therefore this study uses the context of analytic decision support systems (DSS) and tests the relationship between the proposed dimensions of effective use and job performance. A survey (N = 265) of executives with work experience using analytic DSS was conducted to maximize realism and generalizability. This study is the first to empirically test the proposed relationships of effective use to performance. Results indicate that informed action is a significant predictor of individual job performance. However, representational fidelity and transparent interaction are not significant predictors of job performance.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"125 - 138"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1571756","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43568709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The diffusion of e-participation in public administrations: A systematic literature review","authors":"M. Steinbach, J. Sieweke, Stefan Süß","doi":"10.1080/10919392.2019.1552749","DOIUrl":"https://doi.org/10.1080/10919392.2019.1552749","url":null,"abstract":"ABSTRACT Research on e-participation has grown significantly in the last years. This review focuses on public administrations, which are central actors in the solicitation and organization of e-participation and in the process of diffusion of more democratic decision-making in government contexts. However, research indicates that public administrations often struggle with technological and organizational changes, which suggests that e-participation initiatives may fail due to barriers within public administrations. Although researchers have paid considerable attention to the diffusion of e-participation in public administrations, research so far is multi-disciplinary and fragmented. The aim of this literature review is to structure and systematize the literature regarding phases of e-participation diffusion (adoption, implementation and institutionalization) and levels of analysis (micro, meso, and macro) to map the extant field of e-participation diffusion research and to provide a starting point for future research. The analysis shows that research has concentrated on the phases of adoption and implementation, and on the external context of public administrations (macro) and the organizational (meso) level. Overall, the review identifies major research gaps and offers avenues for future research.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"61 - 95"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2019.1552749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42004814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interorganizational processes in buyer–supplier dyads: An information intensity perspective","authors":"M. Nandy, P. Seetharaman","doi":"10.1080/10919392.2018.1554280","DOIUrl":"https://doi.org/10.1080/10919392.2018.1554280","url":null,"abstract":"ABSTRACT In an increasingly global business environment, organizations interact with partners, suppliers and customers who are geographically spread and exchange information regularly. Without a robust information technology infrastructure, the speed and effectiveness of this information exchange is limited. Business-to-business (B2B) electronic business applications are a class of interorganizational information systems (IOIS) that facilitate such information exchange arising out of interorganizational processes (IOPs). The success of any e-business initiative depends on the successful implementation and the actual use of such IOIS. This study uses the concept of information intensity (II) to identify the information sharing requirements arising from IOPs, thus presenting opportunities for B2B Web site use, with specific reference to organization-specific customer-facing and supplier-facing IOIS. We use data from four buyer–supplier dyads, eight medium- to large-scale organizations in the Indian context and identify a generic set of dominant IOPs in buyer–supplier interactions. Through these we present the sources of II in IOPs along three dimensions – complexity, uncertainty and ambiguity which influence the feature set in the IOISs. We conclude with implications for IOIS design, implementation and use.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"29 1","pages":"114 - 96"},"PeriodicalIF":2.9,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2018.1554280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44103920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}