Search results for "Choice"
showing 10 items of 795 documents
IS Security Policy Violations
2012
Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…
Male dominance and immunocompetence in a field cricket
2004
Female preference for dominant males has been found in many species, and it is generally thought that winners of male-male competition are of superior quality. Success in contests probably depends on male condition and overall health. Thus, females could avoid infection and gain genetic benefits in terms of more viable offspring by mating with dominant males. In the present study, we tested whether dominant males of the Mediterranean field cricket, Gryllus bimaculatus, had higher immunocompetence than did their subordinates in experimental trials. We found that dominant males had better immune defense, as indicated by significantly higher encapsulation rate and lytic activity, than did subo…
Condition dependence of pheromones and immune function in the grain beetleTenebrio molitor
2003
Summary 1. Pheromones are chemical signals that function not only as mate attractors, but may also relay important information to prospective mates. In order for the information to be reliable, the signal must be costly to produce and this is likely to result in condition dependent expression of the signal. 2. We present results from two experiments on the grain beetle Tenebrio molitor examining phenotypic condition dependence of pheromones and patterns of female preference for pheromones. We also analysed condition dependence of two measures of immunocompetence: encapsulation response and phenoloxidase activity. 3. By manipulating the nutritional condition of the males we found that the at…
Autonomy Freedom and Preferences for Redistribution
2007
In this paper we study the determinants of people's attitudes toward income inequality and their consequences for redistributive policies. In the light of a recent literature in social choice theory, we argue that an individual's attitudes toward inequality depend upon the extent of autonomy freedom he/she enjoys. We use individual level data to validate our theory and show that the higher the extent of an individual's autonomy freedom, the greater the probability that he/she supports larger income differences as incentives for individual effort. Conversely, the lower the extent of autonomy freedom, the more likely he/she supports the view that incomes should be made more equal. These findi…
International governance mode choice: Evidence from Brazilian franchisors
2021
Abstract The purpose of this article is to test a novel, integrative theory of governance mode selection in the context of international franchising from Brazil. Given the Brazilian emerging market context, we added and tested another variable in the model relating to environmental distance between the home (Brazil) and host countries. To test the theory, we employed two logistic regression models and representative data from the Brazilian Franchising Association in addition to the World Bank's Doing Business index, and the CEPII (Centre d'etudes prospectives et d'informations internationales). Findings show that three factors influence Brazilian franchisors' choices regarding international…
Toward a Unified Model of Information Security Policy Compliance
2018
Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the majority of previous information security behavior models, (2) empirically compares these theories (Study 1), (3) proposes a unified model, called the unified model of information security policy compliance (UMISPC), which integrates elements across these extant theories, and (4) empirically tests the UMISPC in a new study (Study 2), which provided preliminary empirical support for the model. The 11 theories reviewed are (1) the theory of reasoned action, (2) neutralization techniques, (3) the health belief model,…
Cognitive and Affective Consequences of Information and Choice Overload
2021
When interviewed in 1992 in Pittsburgh, Pennsylvania, the Nobel laureate Herbert Simon described a paradox at the heart of living in an economy that made every effort to design and produce ever more “choice alternatives” but that simultaneously allocated very little energy to encouraging people to devote the attention and time actually required to choose. He gave the example of a decision to buy a new house, commenting: “Before you even start the choice process, somebody has presented you with this, and this, and this house” (UBS, 1992). The overabundance of alternatives was lamented by Simon in 1992, when computing power was slower. It is all the more alarming in the modern and constantly …
Entrepreneurship in Burkina Faso : An Economic Analysis of Occupational Choices in the Labor Market and Student Entrepreneurial Intentions
2020
The dominant view of entrepreneurship, particularly in developed countries, is a risky, dynamic activity undertaken voluntarily by a certain category of individuals - " so-called superstars" - in order to benefit more earning opportunities and greater social influence. However, this dynamic view of entrepreneurship contrasts with what is generally described in developing countries, where self-employment is largely conducted in the informal sector; a segment of the labor market that is considered "precarious" and only allows the individual to escape unemployment. Nevertheless, a number of studies, in Africa and more so in Latin America, show that this segment is desirable and likely to provi…
Entry mode choice in the internationalisation of the hotel industry: a holistic approach
2011
This paper empirically investigates the entry mode choice in the hotel industry. Based on more than 1200 entry decisions, which covers practically all operations carried out by the majority of Spanish hotel chains up to 2009, the study attempts to (a) identify the factors that influence the mode choice of incorporating each new hotel within the chain and (b) to reflect the specific nature of the hotel industry with regard to the results obtained from samples of other industries. The results suggest the importance of considering a holistic approach that facilitates the understanding of a complex phenomenon which is not always explained just by efficiency considerations. Additionally, the res…
Entry in a psychically distant market:
2008
Summary This paper investigates the market entry and entry mode choice of eight small and medium-sized Finnish software firms in the Japanese market. The findings in this study reveal that, despite of the psychic distance between Finland and Japan, most of the firms entered Japan at a very early stage of their internationalization process by using direct entry modes. This was mainly due to the market size, sophisticated industry structure, and requirements for intensive cooperation with the customers during the sales process. The firms were able to overcome psychic distance by hiring local employees and western managers who already had working experience in the Japanese market. This finding…