For AuthorsIf you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.comEmerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online products and additional customer resources and services.Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation. Design/methodology/approach -This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees' IS security behavior is introduced by assembling the core constructs of the used theories. Findings -The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees' security behavior is presented.Research limitations/implications -Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum. Practical implications -This study presents an overview of determinants that have been proven to influence employees' behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs. Originality/value -This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees' security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.
Smart services serve customers and their individual, continuously changing needs; information and communications technology enables such services. The interactions between customers and service providers form the basis for co-created value. A growing interest in smart services has been reported in the literature in recent years. However, a categorization of the literature and relevant research fields is still missing. This article presents a structured literature search in which 109 relevant publications were identified. The publications are clustered in 13 topics and across five phases of the lifecycle of a smart service. The status quo is analyzed, and a heat map is created that graphically shows the research intensity in various dimensions. The results show that there is diverse knowledge related to the various topics associated with smart services. One finding suggests that economic aspects such as new business models or pricing strategies are rarely considered in the literature. Additionally, the customer plays a minor role in IS publications. Machine learning and knowledge management are identified as promising fields that should be the focus of further research and practical applications. Concrete ideas for future research are presented and discussed and will contribute to academic knowledge. Addressing the identified research gaps can help practitioners successfully provide smart services.
Explaining the influence of management leadership on employees' information security behaviour is an important focus in information systems research and for companies and organizations. Unfortunately, the role of leadership
Services play an important role in the manufacturing industry. A shift in emphasis from selling physical products to offering product-service systems is perceived. Detailed knowledge of machines, components and subcomponents in whole plants must be provided. Installed base management contributes to this and enables services in manufacturing to maintain high machine availability and reduce downtimes. Installed base management assists in data structuring and management. By combining installed base data with sensor data, a digital twin of the installed base results. Following the action design research approach, an integrated installed base management system for manufacturing is presented and implemented in practice. An engineering and manufacturing company is involved in the research process and ensures practical relevance. Requirements are not only deduced from the literature but also identified in focus group discussions. A detailed test run with real data is performed for evaluation purpose using a demonstration machine. To enable a generalization, design principles for the development and implementation of such an integrated installed base management system are created. KeywordsInstalled base management • Integrated installed base management system • Digital twin • Action design research (ADR)
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.