Search
Now showing items 1-8 of 8
The impact of DC (defined contribution) scheme structure and communication policies: a bounded rationality framework
(2015-09-11)
Concepts from bounded rationality, particularly biases, are frequently used to
explain the successes and the failures of pension scheme defaults. This
research suggests that pension literature has focused on pension ...
Pension scheme defaults: questionable foundations and unconsidered outcomes
(2015-03-27)
Inertia, the behaviour of doing nothing and allowing the current situation to prevail, is
reported in many empirical pension studies. However, the reasons for the behaviour are
not agreed. Various explanations include: ...
How do firms present choice to consumers? Some unusual decision constructs along the B2C transaction process
(2015)
Certain features amongst some online retailers are atypical of ‘good’ design; the
transaction process presents consumers with optional extras that not only slowed the
process down, but also stressed and agitated consumers. ...
An eye tracking pilot study of optional decision constructs in B2C transactional processes
(14th International Conference on WWW/INTERNET (ICWI), 2015-10)
Previous research indicated the design of certain decision constructs could be unclear to users in the business to consumer
(B2C) transactional process. This pilot study, using eye tracking and cued retrospective think-aloud ...
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)
A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Investigation of employee security behaviour: A grounded theory approach
(Springer, 2015-05-09)
At a time of rapid business globalisation, it is necessary to
understand employee security behaviour within diverse cultural settings. While
general deterrence theory has been extensively used in Behavioural Informatio ...
A survey of cyberbullying amongst students in Ireland's higher education sector
(International Association for Development of the Information Society, 2015-10-26)
Cyberbullying is an extension of traditional bullying where victims are harassed via the internet or mobile phones. This
study investigated the victims’ experiences of cyberbullying including the prevalence, type and ...