Search results for "Rational choice"

showing 9 items of 9 documents

National Preferences and the European Union Presidency: The Case of German Energy Policy towards Russia*

2011

This article analyses the formation and development of Member State preferences and positions before and during the European Union (EU) Presidency term. The empirical analysis focuses on the Federal Republic of Germany's policy concerning EU–Russian relations, especially regarding energy policy. The extent to which liberal intergovernmentalism (LI) furthers our understanding of state behaviour in the context of the EU Presidency is questioned. The findings suggest that LI adequately explains the formation of German positions prior to assuming office, as its policy objectives are chiefly influenced by domestic producers' interests. However, LI cannot satisfactorily account for German governm…

Economics and EconometricsPresidencyRational choice institutionalismContext (language use)General Business Management and AccountingEnergy policyPolitical economyPolitical Science and International RelationsInstitutionalismMember stateEconomicsmedia_common.cataloged_instanceBusiness and International ManagementEuropean unionEconomic systemLiberal intergovernmentalismmedia_commonJCMS: Journal of Common Market Studies
researchProduct

Game theory as a marketing tool: uses and limitations

2011

The growth of complexity of the business environment in which firms operate, calls for more effective tools, able to consider the effect of the strategic choices of the actors of the market and to supply information useful for managerial decision process. Game theory seems to be an ideal candidate for this scope. Nevertheless, because of its axiomatic approach, its validity to highlight and define marketing issues has many critics. This paper analyses the main literature about the use of game theory for marketing management decisions and highlights its limits in this field in order to answer to the question: Can game theory be an effective marketing tool?

Game theory Marketing management Rational choice in marketingSettore SECS-P/08 - Economia E Gestione Delle Imprese
researchProduct

IS Security Policy Violations

2012

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…

IS security policiesCritical security studiesStrategy and ManagementRational choice theoryIS security complianceCommitdeterrence theoryComputer Science ApplicationsTest (assessment)IS securityHuman-Computer InteractionEmpirical researchInformation security standardsrational choice theoryEconomicsIs securitySanctionsPositive economicsSocial psychologyJournal of Organizational and End User Computing
researchProduct

Toward a Unified Model of Information Security Policy Compliance

2018

Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the majority of previous information security behavior models, (2) empirically compares these theories (Study 1), (3) proposes a unified model, called the unified model of information security policy compliance (UMISPC), which integrates elements across these extant theories, and (4) empirically tests the UMISPC in a new study (Study 2), which provided preliminary empirical support for the model. The 11 theories reviewed are (1) the theory of reasoned action, (2) neutralization techniques, (3) the health belief model,…

Information Systems and ManagementManagement scienceComputer scienceturvallisuus05 social sciencesTheory of planned behaviorRational choice theoryContext (language use)02 engineering and technologyInformation securitySecurity policyinformation system securityComputer Science ApplicationsManagement Information SystemsTheory of reasoned actionEmpirical researchunified theory020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingsurveyBalance theoryInformation Systemstietojärjestelmät
researchProduct

Rational Choice Theory and the Environment: Variants, Applications, and New Trends

2010

Rational choice theory (RCT) is a research paradigm based on methodological individualism. Collective phenomena are explained by assumptions about the behavior of (subjectively) rational individual or corporate actors. In environmental research, RCT is used to predict ecological perceptions, attitudes and behavior on the micro level, and to shed light on environmental outcomes on the macro level. The most fundamental insight from RCT is that environmental problems are often the result of a social dilemma, that is, individuals’ purposive action leads to unintended negative collective consequences. This chapter addresses variants of RCT including game theory, shows applications in the field o…

Management scienceComputer sciencemedia_common.quotation_subject05 social sciencesRational choice theorySocial dilemma010501 environmental sciences01 natural sciencesAction (philosophy)0502 economics and businessHappinessEnvironmental sociology050207 economicsNeuroeconomicsPositive economicsGame theoryMethodological individualism0105 earth and related environmental sciencesmedia_common
researchProduct

Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies

2021

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…

Rational Choice TheoryorganisaatiokulttuuriInformation SecuritytietoturvapolitiikkaInformation Security Policy CompliancetietoturvaOrganizational Culturerationaalisen valinnan teoria
researchProduct

From equilibrium to chaos and back : methodological evaluation of research of the majority rule

2000

According to the canonical model situated at the heart of the " economic " - or, as the political scientists prefer to call it, rational-choice - theory of (democratic) politics, whenever the matter to be decided raises, or consists of, at least two distinct issues, it is generally impossible to reach a determinate decision by using the majority rule. This problem, referred to as that of disequilibrium, equilibrium instability, or even"chaos", was first underplayed and then deemed ominous to the point of seriously undermining the development prospects of the whole theory. However, more recently, the concern it was the source o f until the 1980s has given way to a state of renewed confidence…

VoterChoix rationnelElectionEquilibriumSciences politiquesInstabilityVoteDemocracyRational choice[SHS.SCIPO]Humanities and Social Sciences/Political scienceDémocratieEtudes générales. Idéologies.MajoritéThéorieChaosInstabilitéTheoryGeneral Studies. Ideologies.Political sciencesElecteurSociologie politiquePolitical sociologyEquilibre[ SHS.SCIPO ] Humanities and Social Sciences/Political science[SHS.SCIPO] Humanities and Social Sciences/Political science
researchProduct

Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia

2021

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most of the security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to c…

information security policy compliancetietosuojaRational Choice Theoryorganisaatiokulttuuriorganizational culturecomputing value frameworktietoturvapolitiikkaorganisaatiottietoturvarationaalisen valinnan teoria
researchProduct

Disciplinary Versus Institutional Approaches, Higher Education

2020

Institutional perspectives focus on HEIs as organisations and disciplinary perspectives focus on HEIs as cultural entities. This entry discusses the strengths and weaknesses of cultural and institutional approaches to higher education and higher education research. peerReviewed

resource dependence theorydisciplinary culturessystems of higher educationHigher educationinstituutiotbusiness.industrykorkeakoululaitoshistorical institutionalismsociological institutionalismtieteensosiologianew institutionalisminstitutionalismitoimintakulttuuriPolitical sciencePedagogyrational choice institutionalismagent theorykorkeakoulutbusinessDisciplineinstitutional culturetiedeyhteisöt
researchProduct