0000000000084036

AUTHOR

Jonna Järveläinen

0000-0003-2032-489x

showing 2 related works from this author

Business continuity of business models : Evaluating the resilience of business models for contingencies

2019

Company business models are vulnerable to various contingencies in the business environment that may unexpectedly render their business logic ineffective. In particular, technological advancements, such as the Internet of things, big data, sharing economy and crowdsourcing, have enabled new forms of business models that can effectively and abruptly make traditional business models obsolete. By disrupting or even diminishing companies’ revenue streams, environmental contingencies may present a significant threat to business continuity (BC). Evaluating the resilience of business models against these contingencies should therefore be a core area of BC. However, existing BC approaches tend to f…

Value (ethics)liiketoimintamallitComputer Networks and Communicationsvalue creationpalautuminenBig data02 engineering and technologyLibrary and Information SciencesBusiness modelmuutosSharing economyBusiness continuity020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringRevenueBusiness logicbusiness modelsta512resilienceIndustrial organizationta113resilienssiliiketoimintaympäristöbusiness.industrydisaster recoveryarvonluonti05 social sciencessharing economybusiness continuityjakamistalousResilience (organizational)050211 marketingvarautuminenbusinessInformation Systems
researchProduct

Do SETA Interventions Change Security Behavior? : A Literature Review

2023

Information security education, training, and awareness (SETA) are approaches to changing end-users’ security behavior. Research into SETA has conducted interventions to study the effects of SETA on security behavior. However, we lack aggregated knowledge on ‘how do SETA interventions influence security behavior?’. This study reviews 21 empirical SETA intervention studies published across the top IS journals. The theoretical findings show that the research has extended Protection Motivation Theory by (1) enhancements to fear appeals; (2) drawing attention to relevance; (3) incorporating temporality; (4) and shifting from intentions to behavior. In terms of behavior, the SETA interventions h…

security behaviortrainingturvallisuusjohtaminenkoulutussocio-technical issues in organizational information technologiesawarenesssecurity managementtietoturvakäyttäytymineninterventioninterventioseta
researchProduct