Purpose The purpose of this paper is to develop a model that integrates moral disengagement (MD) and organizational ethical climate (OEC) to understand information security policy (ISP) violation behavior in the workplace. This study extends prior work by identifying the moderating mechanisms of the ethical culture of OECs in the relationship between employees’ MD and ISP violation behavior intention. Design/methodology/approach By using scenario-based survey data from 433 employees in Chinese enterprises and by applying PLS-based structural equation modeling, the authors test a series of hypotheses. Findings Our empirical results highlight that the concept of MD has a significant effect on employees’ intention to violate ISPs. The authors also find that the OEC has a moderating role in the relationship between MD and ISP violation intention: the moderating role of law-and-rule-oriented OEC is significantly negative, but instrumentalism-oriented OEC positively moderates this relationship. Originality/value This study contributes to the literature on information security behavior by integrating two ethical theory frameworks MD and OECs into one theoretical model, and it calls attention to how ethical factors at the individual cognition level and organizational climate level work together to influence personal information security behavior. This study provides a new perspective of OEC from which to understand policy violation caused by moral self-regulation failure, and empirically explores its moderating role.
PurposeThe rapid development of the Internet in China has profoundly affected the country's charities, which many people support through online donations (e.g. providing financial help) and charity information forwarding (a new behavior of participating in online charities via social media). However, the development of online charities has been accompanied by many problems, such as donation fraud and fake charity information, which adversely affect social kindness. The purpose of this paper is to understand people's online donation and forwarding behaviors and to explore the mechanisms of such behaviors from the perspectives of cognitive-based trust and emotional-based empathic concern.Design/methodology/approachThis study developed a research model based on the elaboration likelihood model (ELM) and stimulus–organism–response (SOR) model. The researchers obtained 287 valid samples via a scenario-based experimental survey and conducted partial least squares structural equation modeling (PLS-SEM) to test the model.FindingsThe results indicated that (1) online donation intention is motivated by rational-based trust and emotional-based empathic concern; (2) online charity information forwarding is triggered only when trust is built, and there is no significant correlation between empathic concern and forwarding intention; and (3) content quality, initiator credibility, and platform reputation are three critical paths to promote trust; in addition, an individual's empathic concern can be motivated by the emotional appeal.Originality/valueThis study highlights the different mechanisms of donation and forwarding behaviors and provided theoretical measures for motiving trust and empathic concern in the online context to promote people's participation in online charity.
Purpose Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software. Design/methodology/approach A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model. Findings Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool. Practical implications This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior. Originality/value This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
The fatigue life prediction method of a low pressure turbine shaft of the turbojet engine is presented. According to working conditions and assembled conditions of the turbojet engine, load types, load values and constraints of the turbine shaft are analyzed. ANSYS software is employed to simulate actual working conditions to obtain stress-strain distributions of the low pressure turbine shaft. Finally, based on stress-strain curves and surface quality, the fatigue life of the low-pressure turbine shaft is calculated with the modified local stress-strain method and the linear cumulative fatigue damage model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.