2022
DOI: 10.1016/j.im.2021.103574
|View full text |Cite
|
Sign up to set email alerts
|

A neo-institutional perspective on the establishment of information security knowledge sharing practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 73 publications
0
6
0
Order By: Relevance
“…A proportion of IS-dedicated literature has been directed towards protective behaviours, including mobile/online health and telemedicine adoption [ 45 , 46 ], compliance to information security policy [ 47 ], and others. In these studies, researchers have used two general theoretical methods to examine protective behaviours, with the first approach depending on general theories to shed light on and predict different general behaviour types, the top theories being the theory of reasoned action (TRA) and the theory of planned behaviour (TPB).…”
Section: Introductionmentioning
confidence: 99%
“…A proportion of IS-dedicated literature has been directed towards protective behaviours, including mobile/online health and telemedicine adoption [ 45 , 46 ], compliance to information security policy [ 47 ], and others. In these studies, researchers have used two general theoretical methods to examine protective behaviours, with the first approach depending on general theories to shed light on and predict different general behaviour types, the top theories being the theory of reasoned action (TRA) and the theory of planned behaviour (TPB).…”
Section: Introductionmentioning
confidence: 99%
“…A large body of existing research on effective knowledge sharing has focused on numerous operating systems, such as enterprise social media for knowledge acquisition, creation and exploitation (Annosi et al , 2021; Luqman et al , 2021), organisational structural improvements in human resource management (HRM) practices and culture (Lei et al , 2021), social factors, such as interpersonal relationships and organisational trust (Rutten et al , 2016) and leadership styles, including transformational (Yin et al , 2019), diversity-oriented (Lee et al , 2020) and ethical (Sun et al , 2019) leadership. While these are valuable insights regarding knowledge sharing, our understanding of knowledge sharing is not yet comprehensive and requires additional scholarly attention (Awan et al , 2020; Hassandoust et al , 2022).…”
Section: Introductionmentioning
confidence: 99%
“…However, scholars have rarely examined the indirect associations between psychological power and three types of job performance – task performance, proactive performance and affiliative performance (TPA performance). Seminal work on power in organisational psychology (Hassandoust et al , 2022; Del Giudice and Della Peruta, 2016) has suggested that psychological power in the workplace shapes the learning and knowledge sharing processes (Wang et al , 2019). It is, therefore, crucial to examine all of these associations, which makes the current research timely and relevant because it enables supervisors to manage effectively and quickly.…”
Section: Introductionmentioning
confidence: 99%
“…Second, scholars should ask how top management could do more in helping shape the formation of a security culture. Clearly, top management is an important factor in a firm's ability to procure resources and transform them into the security knowledge base of a firm (Hassandoust et al, 2022). However, the findings of these research raise some questions about how top management can support their practical competencies, and ultimately, their security culture.…”
Section: Discussionmentioning
confidence: 99%