Three Essays on Information Security Risk Management (open access)

Three Essays on Information Security Risk Management

Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely …
Date: May 2018
Creator: Ogbanufe, Obiageli
System: The UNT Digital Library
A Foot in Two Worlds: Exploring Organizational and Professional Dual Identification (open access)

A Foot in Two Worlds: Exploring Organizational and Professional Dual Identification

Who am I? Who are you? Who are we? These are some of the fundamental questions that identity scholars have grappled with since the 1900s when researchers across multiple disciplines first began to theorize about the self, identity, and identification. While the benefits and consequences of singular identities has been largely studied, recent scholars have argued for the importance of multiple identity research, as multiple identities have become increasingly salient to individuals due to societal and organizational changes including globalization and technological advancements. An important phenomenon within multiple identity research is dual identification, of which I explore a specific type– identification with both one's organization and one's profession. Using a three-study, quantitative design spanning two industries, I studied the effects of dual identification and identity conflict on individual psychological outcomes, turnover intentions, and OCB engagement. Findings from these three studies, holistically, indicate that when individuals experience identity conflict between their organizational and professional identities, they experience negative outcomes. These negative outcomes – increased emotional exhaustion, psychological distress, and turnover intentions, in addition to reduced OCB engagement – have important ramifications for the individuals themselves and their organization. However, post-hoc results indicate that dual identification – through the main effects of …
Date: May 2018
Creator: Ostermeier, Kathryn
System: The UNT Digital Library
A Mixed Methodology Approach to Extend Understanding of the Success Factors of Performance-Based Contracting (open access)

A Mixed Methodology Approach to Extend Understanding of the Success Factors of Performance-Based Contracting

Performance-based contracting (PBC) is an outcome-based product support strategy that provides efficient performance solutions for buyers. Suppliers under performance-based contracting are rewarded after achieving desired performance objectives. While current scholarship has deepened our knowledge of the benefits of PBC, the particular factors behind effective and efficient performance-based contracts (PBCs) are still vague. Thus, this dissertation will focus on essential dimensions for the successful PBC. There remains a great deal that is not understood about the success factors for effective PBCs. When looking at the critical criteria for the selection of suppliers in the context of PBC, even less is known. This dissertation contains three essays with the purpose of: (1) investigating the effect of supply chain collaboration and upfront investments on the benefits of the PBC; (2) exploring supplier selection criteria for successful PBC; and (3) examining the effect of contract length and fleet size on upfront investments for effective and efficient PBC. These three essays offer a solid foundation for theoretical and practitioner understanding for effective PBCs.
Date: August 2018
Creator: Uvet, Hasan
System: The UNT Digital Library
Supply Chain Learning: A Grounded Theory Analysis (open access)

Supply Chain Learning: A Grounded Theory Analysis

Under the unifying theme of supply chain learning, this three essay dissertation extends scholarship by investigating these multi-tier relationships. Theory is emerged, grounded in data, gathered from functioning supply chains in an effort to provide scholars and practitioners with an increased understanding of the SCL phenomena. Essay 1, entitled "Supply Chain Learning: An Exploratory Literature Review" examines the current literature in an attempt to address the shortcomings and emerge areas that have been less explored and less understood. By exposing these areas of research opportunities using a grounded theory methodology, a framework was emerged allowing identification of the limitations of extant literature and providing a springboard for future research. This framework also allowed further investigation into the SCL processes and expansion of the current understanding by providing academia with a comprehensive review of the literature and revealing the shortcomings that exist related to SCL. Using the framework emerged in Essay 1, Essay 2 entitled "Toward Supply Chain Learning: A Focus on the Customers of Logistics Service Providers" explores the rationalization and cognitive processes of senior level executives of firms utilizing national or global supply chains. These respondents are directly engaged in creating, establishing and operating relationships with third party logistics …
Date: August 2018
Creator: Morgan, Thomas V.
System: The UNT Digital Library
Creating Supply Chain Resilience with Information Communication Technology (open access)

Creating Supply Chain Resilience with Information Communication Technology

Supply chain resilience refers to the capability of a supply chain to both withstand and adapt to unexpected disturbances. In today's turbulent business environment, firms are continually seeking to create more resilience within their supply chain through increased information communication technology use and enhanced business-to-business relationships. The focus of this dissertation is the investigation of how information communication technology creates resilience at the differing process levels of supply chain operations. Past research into information communication technology use within supply chains has often been conducted at the macro-level of supply chain phenomena. As such, there is still much to understand about how decision-makers interact with information communication technology at the micro-level of supply chain decision-making. A more in-depth, broad coverage of this interaction will provide both practitioners and academics a better understanding of how to leverage information communication technology in achieving supply chain resilience. To meet this aim, this dissertation contains three essays that re-orient conceptual thinking about supply chain phenomenon, explore how advances in information communication technology influence business-to-business relationships, and identify how information communication technology effects the decision-making of supply chain managers.
Date: May 2018
Creator: Glassburner, Aaron
System: The UNT Digital Library