ENFORCING INFORMATION SECURITY POLICIES THROUGH CULTURAL BOUNDARIES: A MULTINATIONAL COMPANY APPROACH

Size: px
Start display at page:

Download "ENFORCING INFORMATION SECURITY POLICIES THROUGH CULTURAL BOUNDARIES: A MULTINATIONAL COMPANY APPROACH"

Transcription

1 Association for Information Systems AIS Electronic Library (AISeL) ECIS 2011 Proceedings European Conference on Information Systems (ECIS) Summer ENFORCING INFORMATION SECURITY POLICIES THROUGH CULTURAL BOUNDARIES: A MULTINATIONAL COMPANY APPROACH Ali Yayla Follow this and additional works at: Recommended Citation Yayla, Ali, "ENFORCING INFORMATION SECURITY POLICIES THROUGH CULTURAL BOUNDARIES: A MULTINATIONAL COMPANY APPROACH" (2011). ECIS 2011 Proceedings This material is brought to you by the European Conference on Information Systems (ECIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ECIS 2011 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.

2 ENFORCING INFORMATION SECURITY POLICIES THROUGH CULTURAL BOUNDARIES: A MULTINATIONAL COMPANY APPROACH Yayla, Ali Alper, School of Management, PO Box 6000, Binghamton University-SUNY, Binghamton, NY, 13902, USA, ayayla@binghamton.edu Abstract Information security policies can be considered as guidelines and used as a starting point to create a security structure within an organization. Although practitioners continuously emphasize the importance of such policies, information system scholars have not paid the required attention to this context from the cross-cultural perspective. The purpose of this study is to look at the cultural and institutional differences of a multinational company (MNC) and its subsidiaries, and discuss how these differences affect the MNC s strategy to enforce corporate information security policies to its subsidiaries in different cultural settings. The proposed framework considers the effects of the cultural distance, national economy, institutional distance, and stickiness of the knowledge transfer on the process of enforcing information security policies from the parent company to its subsidiaries. Keywords: Information security, Information security policy, Cultural distance, Institutional distance, Knowledge transfer, Stickiness

3 1 Introduction Today, ensuring availability, integrity and confidentiality of information and data concerns many organizations. Deterrence can be one of the initial steps that organizations can take to ensure information security (Straub and Welke, 1998). However, successful deterrence depends on organization s ability to control its environment with respect to internal and external threats. Information security policies define the nature of these controls (i.e., technical, formal and informal controls) and how these controls complement each other (Dhillon, 1999). Moreover, security policies govern how organizations information should be protected (Kabay, 2002; Barman, 2002). Whitman (2004) posits that a good security policy needs to outline individual responsibilities, define authorized and unauthorized uses of the systems, provide venues for employee reporting of identified or suspects threats to the system, define penalties for violations, and provide a mechanism for updating policy (p.52). Enforcing corporate security policies has been reported as one of the most effective ways to prevent or reduce electronic crime (Gordon et al., 2004). Overall, security policies can be considered as guidelines and can be used as a starting point for creating a security structure within an organization (Whitman, 2004). The nature of multinational companies (MNCs) adds a layer of complexity to enforcing security policies because MNCs need to consider the effects of different cultural and organizational settings and integrate these in their corporate security policies. Basing his arguments on Hofstede s cultural dimensions, Abdul-Gader (1997) emphasized culture as one of the most important environmental factors that MNCs should consider while adopting global Information Systems (IS) policies in Arab Gulf countries. He postulated that misconceptions of understanding about fate in the Islamic context and the technical capability of the Arab language are some of the issues that need to be considered by MNCs. However, management practices do not have to be different just because subsidiaries and parent company are in different countries and cultural settings. In their study, for instance, Anakwe et al. (2000) concluded that organizational support enhances microcomputer usage in Nigeria. Their result found support in other studies which demonstrated that similar management practices can be effective in different cultural settings (Igbaria, et al. 1995; Igbaria, 1992). Although practitioners continuously emphasize the importance of security policies, IS scholars have not paid the required attention to this context from the cross-cultural perspective. For instance, in their citation analysis of IS articles, Ford et al. (2003) found 57 articles about various contexts of IS that cited Hofstede s research on national culture. Further analyses showed that IS Management area led with 25 articles. Within this research stream, however, no study cited Hofstede s work in the IS Risk Management context. We aim to fulfil this gap by looking at cultural and institutional differences of an MNC and its subsidiaries and by investigating how these differences affect the MNC s strategy to enforce corporate security policies to its subsidiaries in different cultural settings. More specifically, we will discuss cultural distance, institutional distance, and the stickiness of the knowledge transfer and offer series of propositions. Our goal is to make a unique contribution to the IS security literature by focusing on the issues to be considered while enforcing information security policies within the MNC framework. 2 Theoretical Framework According to Minbaeva et al. (2003), MNCs can develop knowledge in one location and exploit it in another location through internal transfer of knowledge. One way of creating competitive advantage for MNCs is effectively sharing organizational practices (Jensen and Szulanski, 2004). For example, in the strategy literature, organizational practices and routines are considered as important sources of

4 competitive advantage since these assets are difficult to replicate (Jensen and Szulanski, 2004). Considering that organizational know-how is an important part of a MNC s global integration strategy, its competitive advantage partly resides in the effectiveness of sharing these practices and routines. MNCs are generally under different external and internal pressures. Externally, MNCs have to consider the institutional, cultural, and economic environments in multiple countries and have to be isomorphic with the local institutional environment to maintain their legitimacy (Kostova and Roth, 2002). Establishing and maintaining legitimacy in their multiple host environments is critical for companies that span various countries (Kostova and Zaheer, 1999). Internally, MNCs have to create consistency among their subsidiaries by leveraging activities worldwide to retain their competitive advantages (Kostova and Roth, 2002). We postulate that the process of enforcing information security policies to subsidiary companies would be affected by the cultural and institutional distances between the parent company and the subsidiary company. Moreover, the stickiness of the information security context would further affect this process. Figure 1 presents the framework of our study. Cultural Distance Institutional Distance Parent Company Enforcing Information Security Policies Subsidiary Company Stickiness Figure 1: The proposed framework for enforcing information security policies in multinational companies The main goal of information security policies is to provide a set of rules and guidelines to protect the organization from security breaches. Under the umbrella of this goal, organizations can have variety of security policies addressing different issues such as identification and authorization, Internet access, contingency planning, and even social networking. Although MNCs can span across continents, the interconnectedness of IT emphasizes the importance of enforcing information security policies on subsidiaries by the parent companies. Such that, a security breach or comprise of access rights at the subsidiary company can easily target the parent company through privilege escalation or social engineering. While transferring the actual information security policies consists of a simple process of sending the policies to the subsidiary companies, it is the implications of adhering with the requirements of such policies that create the difficulties in enforcing them. Security policies have unique features that separate them from other management practices. For instance, where a human resources practice focuses on recruiting, compensation, and performance appraisal, security policies can outline configuration of intrusion detection systems, management of cryptography keys, and designing secure infrastructure. Thus, in addition to traditional difficulties as a result of differences in norms, ethics and values, the technical requirements embedded in information security policies create the unique challenges in transferring and enforcing these policies to subsidiaries.

5 2.1 National Culture and Cultural Distance Various cross-cultural studies reported that there is a certain level of cultural coherence within the majority of nations (Hofstede and Peterson, 2000). The concepts that describe a nation s culture can be derived from Hofstede s (1980) study across 40 nations. The proposed four culture dimensions from his study are power distance, individualism versus collectivism, masculinity versus femininity, and uncertainty avoidance. The cultural distance (Kogut and Singh, 1988) is derived as a composite index from Hofstede s culture dimensions and widely used in international business and various other business disciplines (Shenkar, 2001). Literature suggests that the cultural distance can affect various organizational level decisions including choice of entry mode of the MNC (Kogut and Singh, 1988), performance of alliances (Sirmon and Lane, 2004), distributed justice values (Giacobbe-Miller et al., 2003), and human resources management practices (Liu, 2004). These studies conclude that cultural dimensions and cultural distance index have a central role in MNCs global strategy. The cultural dimensions have substantial importance in the success of enforcing security policies from the parent company to its subsidiaries as well. From the power distance perspective, it is important to look at the effects of restrictions outlined in security policies. Access controls, for example, can be considered as an effective measurement that is enforced by certain security policies. These controls restrict users from series of actions such as downloading files from the Internet, installing programs, and accessing certain parts of a computer network (Barman, 2002; Wakefield, 2004; Kabay, 2002). With respect to enforcing security policies, these restrictions may be problematic in high power distance cultures because adoption of power reducing technologies would be limited in such cultures (Straub et al., 1997). Hofstede (1980, 1997, 2001) posits that masculine societies put more stress on careers. This may lead masculine societies being performance oriented. Therefore, any technological or policy-based change in organizations that may hinder performance would create conflicts in masculine societies. Technologies outlined in security policies such as firewalls, antivirus programs, and passwords are generally considered as having negative effects on performance (Bace, 2002; Barman, 2004; Brussin, 2002; Cobb, 2002; Sandhu, 2002). Therefore, enforcing security policies to masculine societies may compromise certain drawbacks. Moreover, security policies reduce ambiguity by outlining certain rules and procedures. The salience of these policies depends on the society s level of uncertainty. Weak uncertainty avoidance societies are in favor of less formalization and standardization, whereas in strong uncertainty avoidance societies, there is an emotional need for rules (Hofstede, 1997). Therefore, this cultural dimension also has an impact on enforcing security policies to subsidiaries. Furthermore, security policies may require actions such as monitoring messages, recording keystrokes and collecting private data (Levine, 2002). Similarly, these policies may outline procedures for disciplining computer abusers in organizations (Barman, 2002). The tolerance level for these issues may differ across societies with respect to the individualism/collectivism dimension. Considering that cultural distance index captures the effects of all four cultural dimensions, MNCs that have big differences in this index compared to their subisidiaries would require different approaches in enforcing security policies. This leads to our first proposition; P1a: High cultural distance between the parent company and its subsidiaries will have a negative effect on the process of enforcing information security policies to the subsidiary companies. According to Hofstede and Peterson (2000) and Hofstede (2001) the cultural dimensions are useful and essential, however, they provide only limited detail. Gross national product, given as an example, often matters more than national culture in the national difference context. Parallel to this line of

6 thought, digital divide may be considered as an important factor in enforcing security policies to subsidiaries. Some of the limited examples on digital divide point out the potential effects of differences in national economies. For example, Dewan et al. (2004) demonstrated the importance of digital divide on cross-cultural IT penetration. Checchi et al. (2003) posited that governments play a central role in the implementation of IT policies. However, in less developed countries, the role of governments becomes more salient, as regional agencies, such as industrial/professional associates and international agencies step up into the policy making stage. In another study, Ehikamenor (2002) posited that some of the important factors that inhibit the application of information and communication technologies in Nigeria are inflation, low GDP, and exchange rates. Moreover, enforcing security policies in less developed countries would be problematic in terms of meeting the requirements of such policies. One problem is the availability of skilled IT staff. Organizations in less developed countries may not have enough human resources or capital to train their IT staff to meet the requirements. Another problem is the availability of necessary technology. For instance, required hardware and software products may not be available in less developed countries. These issues concerning countries economic viability lead us to our next proposition; P1b: Differences in the national economy of the parent company and its subsidiaries will have a negative effect on the process of enforcing information security policies to the subsidiary companies. 2.2 Institutional Theory and Institutional Distance The institutional theory (Scott, 1995) considers the institutional environment as the key determinant of the firm structure and its behavior. In their review of the institutional theory, Xu and Shenkar (2002) discussed that the theory has been supported in unitary and domestic environments and received less support in more complex environments where different institutional demands exist and where strategic choices are important. One of the research streams in this literature involves the interorganizational issues. This stream of research is critical from MNCs perspective since these companies feel pressure from two different sides: global integration and local orientation (Westney, 1983). This dual pressure is also discussed by Rosenzweig and Singh (1991) as the subsidiaries of a multinational enterprise try to keep the isomorphism with their local environments and at the same time keep the internal consistency within the enterprise. Gomez and Werner (2004) also considered the effects of double sided pressure on MNCs and investigated how similarities in management styles of parent and subsidiary companies have an effect on the performance of the subsidiaries. This study has the advantage of having all the subsidiaries in one country, and therefore, substituting the potential confounding effect of national culture. Their results were consistent with the literature and emphasized the point that management styles should be congruent with the national culture in which the subsidiary resides. Scott (1995) defined three pillars of the institutional theory as regulative pillar - the rules and laws to ensure stability of societies, normative pillar - the similarities between the value creation of organizations and the societal values, and cognitive pillar - the degree of consistency between organizations and existing structures of the society (Kostova and Zaheer, 1999; Busenitz et al., 2000). Following this framework, Kostova (1996, 1999) developed the institutional distance construct. The institutional distance can be considered as an alternative explanation of MNC behavior to the cultural distance. The institutional distance is the extent of dissimilarities between host and home organizations. In other words, it is the difference among the regulatory, normative and cognitive institutions of two countries (Kostova, 1996). According to the findings of Kostova and Zaheer (1999), the larger the institutional distance, the more difficult it is for the MNC to establish and maintain its legitimacy in the host country. Another effect of institutional distance is on the recipient s

7 (subsidiary) motivation. On their study, Jensen and Szulanski (2004) found significant negative relationship between the institutional distance and the recipient s motivation. Kostova and Roth (2002) further refined Scott s (1995) three pillars to introduce the concept of institutional profile. They posited that the institutional profile of a host country may affect the adoption of practices at a foreign subsidiary through the direct institutional pressure on the subsidiary to adopt the practice (p. 217). Adoption of practices may also be accomplished through subsidiary s employees since institutional theorists advocate that people in organizations are sources of the institutional elements. As discussed, subsidiaries experience institutional duality because they feel pressure to reside in parent company s institutional environment and also to create isomorphism with their own environment. Kostova and Roth (2002) discuss that this relational context between the parent and subsidiary company also influences the adoption of practices. These institutional factors are considered in the IS literature as well. For instance, Munir (2002) discussed the normative and cognitive factors within the technology transfer context. He defined three aspects of technology transfer: choosing the right technology, developing managerial and technical expertise, and accommodating technology into the organization. From the security policies and MNC perspective, the last aspect carries more weight. In most cases, security policies are supported with technological infrastructure such as use of firewalls, intrusion detection systems, etc. The normative influences will require managerial control when more knowledge-intensive technology is being imported to environments characterized by less knowledge-intensive technology since complex technologies tend to conflict with existing management practices (Munir, 2002; Hansen et al., 1999). Overall, security policies have to fit to the existing institutional character of the organizations in order to be successfully enforced. Since security policies outline several practices such as disciplining computer abusers, participation to formal training and awareness programs, regular third party audits and several new hardware and software implementations (Barman, 2002; Siponnen, 2000; Thomson and von Solms, 1998), a misfit between subsidiaries regulatory environment and requirements of the parent company s security policies will be problematic. Similar to these arguments, Hu et al. (2007) reported the effect of all three institutional forces on the initiatives to implement information systems security practices and protocols in a MNC. This leads to our next proposition; P2: High institutional distance between the parent company and its subsidiaries will have a negative effect on the process of enforcing information security policies to the subsidiary companies. 2.3 Stickiness and Knowledge Transfer Process During the knowledge transfer, parent companies recreate the complex and ambiguous routines in new settings. Szulanski (1996) argues that stickiness of organizational practices increases the difficulties of the transfer process. Prior research suggests four issues as important factors that contribute to the difficulty of knowledge transfer; characteristics of the knowledge transferred, characteristics of the source, characteristics of the recipient, and characteristics of the context (Szulanski, 1996). After studying 122 knowledge transfers with respect to these four characteristics, Szulanski (1996) concluded that the origins of stickiness are the lack of absorptive capacity of the recipient, causal ambiguity, and the arduous relationship between the source and the recipient. In their study, Ko et al. (2005) investigated the antecedents of knowledge transfer from consultants to clients in enterprise system implementations. The data were gathered from 96 enterprise resource planning projects including 80 client organizations and 38 consulting firms. The antecedents were grouped into three factors: communication, knowledge and motivational. Their results were also parallel to Szulanski s findings. Additional to knowledge factors such as arduous relationship, absorptive capacity and shared understanding, Ko et al. (2005) found that direct effects of both

8 source s and recipient s intrinsic motivations, source credibility and indirect effects of communication encoding and decoding competence are also important determinants of the knowledge transfer. Current understanding of transfer process suggests four stages: initiation, implementation, ramp-up and integration. Szulanski (2000) posits that organizations experience different types of stickiness in each stage. His findings show that motivation and perceived reliability are important factors during the first three stages, and absorptive capacity and causal ambiguity are important predictors of stickiness when all the stages are put together and the knowledge transfer is considered as a whole. In the context of information security, the effect of stickiness will be most visible on the technological requirements of security policies. Configurations of hardware and software programs for large scale networks require advanced knowledge and experience. This type of knowledge is considered tacit and therefore hard to document, replicate or transfer. Moreover, slightly different configurations of computers may prevent adaptation of the same solution in different computer networks. Considering this local solution issue and the tacitness of information security context, transferring security policies from one organization to another would be considered as sticky. This leads to our last proposition. P3: The stickiness of the information security practices will have a negative effect on the process of enforcing information security policies to the subsidiary companies. 3 Discussion While information security and globalization can be considered as two sides of the same coin, the lack of cross-cultural studies in the information security literature is worrisome. Our goal is to provide a framework as a starting point to fulfil this important gap. This study focuses on the cultural and institutional differences of MNCs and their subsidiaries and outlines how these differences affect the MNCs strategy to enforce information security policies to their subsidiaries in different cultural settings. Regarding the cultural differences, we proposed that high cultural distance will have a negative effect on the process of enforcing security policies to the subsidiaries. Parallel to this, we also proposed that differences in national economy and high institutional distance will have negative effects on this process as well. Lastly, we proposed that the stickiness of the IS security context will have an inherited detrimental effect on the efforts of enforcing these policies. The practical implications of the study are also vital. For instance, neglecting the cultural and institutional differences may result in loss of resources, high employee turnover, and even increased security breaches. Moreover, if it is not executed properly, the transfer of such policies may increase the dual pressure on the subsidiary, which in return may hinder their performance. Table 1 outlines these factors and how they relate to MNCs efforts in enforcing information security policies to their subsidiaries. One limitation of the study is the fact that the business context of the MNC may affect the salience of the information security policies. Companies in certain industries may need more security than others to protect their company specific information such as patents, source codes, manufacturing processes, etc. On the other hand, this study opens many directions for future research. One direction can be the investigation of the subsidiary absorptive capacity. As discussed above, Szulanski (1996) posits that the lack of absorptive capacity is one of the most important impediments to knowledge transfer. Minbaeva et al. (2003) also found significant relation between the absorptive capacity of the subsidiary and the knowledge transfer within the MNC. Future studies can consider either controlling the effect of subsidiary s capacity or including the effects of capacity into the context.

9 Cultural factors Power distance Uncertainty avoidance Masculinity/Femininity Sample requirements from information security policies Access control to certain files Regular security audits Use of anti-virus software Individualism/Collectivism Use of computer monitoring National economy Institutional factors Regulative Normative Cognitive Stickiness Implementation of advanced hardware or software Certain level of encryption required for storing confidential information Security certification Skilled employee Security of wireless infrastructure Potential issues In high power distance cultures, it is harder for IT employees to limit managers rights. Subsidiaries that are in low uncertainty cultures can have harder time to comply with rigid requirements of the parent company. Adoption of performance hindering software can be problematic in high masculinity cultures due to their focus on career advancement. Monitoring employee behavior can result in negative effect on employee morale, satisfaction, and performance in subsidiaries that reside in individualistic cultures. Availability of hardware and localization of software can be limited for subsidiaries that reside in developing or undeveloped countries. Countries of the subsidiaries can lack the regulations that exist in the parent company s country. Lack of availability of certain certifications or institutions in subsidiaries countries can limit subsidiaries to conform with normative factors. Lack of education in computer science and related fields in the subsidiaries country can limit the efforts to comply with the requirements of the security policy. Designing a secure and reliable wireless network requires unique considerations such as interference from the environment, size and shape of the buildings, etc. Due to these localized differences, achieving success using the same solution can be limited. Table 1. Factors that affect MNCs efforts in enforcing information security policies to their subsidiary companies. Another opportunity to take this study one step further is to investigate the effect of the MNC s structure. Barlett and Ghosahal s (1999) work introduced four different models of MNC: multinational, international, global and transnational. Each model has different configuration of assets and capabilities, role of foreign subunits, and development and diffusion of knowledge (Kostova and Roth, 2003). Therefore, the effectiveness of enforcing information security policies can be contingent

10 on the different characteristics of these four configuration models. In order to test the propositions and conduct the suggested future studies, a case study can be conducted to a multinational company with subsidiaries in different cultural, economical, and institutional settings. References Abdul-Gader, A.H. (1997). Information systems strategies for multinational companies in Arab Gulf countries. International Journal of Information Management, 17(1), Anakwe, U.P., Igbaria, M. and Anandarajan, M. (2000). Management practices across cultures: Role of support in technology usage. Journal of International Business Studies, 31(4), Bace, R.G. (2002). Vulnerability assessment and intrusion detection systems. In S. Bosworth and M. E. Kabay (Eds.), Computer Security Handbook. 4th ed. New York: John Wiley & Sons, Inc. Bartlett, C.A. and Ghoshal, S. (1989). Managing Across Borders: The Transnational Solution. Boston: Harvard Business School Press. Barman, S. (2002). Writing Information Security Policies. Indianapolis: New Riders. Busenitz, L.W., Gomez, C. and Spencer, J.W. (2000). Country institutional profiles: Unlocking entrepreneurial phenomena. Academy of Management Journal, 43(5), Brussin, D. (2002). Firewall and proxy servers. In S. Bosworth and M. E. Kabay (Eds.), Computer Security Handbook. 4th ed. New York: John Wiley & Sons, Inc. Checchi, R.M., Po-An Hsieh, J.J. and Straub, D.W. (2003). Public IT policies in less developed countries: A critical assessment of the literature and a reference fframework. Journal of Global Information Technology Management, 6(4), Cobb, C. (2002). Antivirus technology. In S. Bosworth and M. E. Kabay (Eds.), Computer Security Handbook. 4th ed. New York: John Wiley & Sons, Inc. Dewan, S., Ganley, S. and Kraemer, K.L. (2004). Across the digital divide: A cross-country analysis of the determinants of IT penetration. Personal Computing Industry Center, UC Irvine. Dhillon, G. (1999). Managing and controlling computer misuse. Information Management & Computer Security, 7(4), 171. Ehikhamenor, F.A. (2002). Socio-economic factors in the application of information and communication technologies in Nigerian print media. Journal of the American Society for Information Science and Technology, 53(7), Ford, D.P., Connelly, C.E. and Meister, D.B. (2003). Information systems research and Hofstede s Culture s Consequences: An uneasy and incomplete partnership. IEEE Transactions on Engineering Management, 50(1), Giacobbe-Miller, J.K., Miller, D.J., Zhang, W. and Victorov, V.I. (2003). Country and organizationallevel adaptation to foreign workplace ideologies: a comparative study of distributive justice values in China, Russia and the United States. Journal of International Business Studies, 34, Gomez, C. and Werner, S. (2004). The effect of institutional and strategic forces on management style in subsidiaries of U.S. MNCs in Mexico. Journal of Business Research, 57(10), Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Richardson, R. (2004) CSI/FBI Computer Crime and Security Survey. Hansen, M., Nohria, N. and Tierney, T. (1999). What s your strategy for managing knowledge? Harvard Business Review, Hofstede, G. (1980). Culture's Consequences: International Differences in Work Related Values. Beverly Hills, CA: Sage. Hofstede, G. (1997). Cultures and Organizations: Software of the Mind. New York: McGraw Hill. Hofstede, G. (2001). Culture's Consequences: International Differences in Work Related Values. 2nd ed. Thousand Oaks, Ca: Sage. Hofstede, G. and Peterson, M.F. (2000). National culture and organization culture. In N. Ashkanasy, C. Wilderom, and M. F. Peterson (Eds.), Handbook of Organizational Culture and Climate: Thousan Oaks, CA: Sage.

11 Hu, Q., Hart, P. and Cooke, D. (2007). The role of external and internal influences on information systems security A neo-institutional perspective. Journal of Strategic Information Systems, 16, Igbaria, M. (1992). An examination of microcomputer usage in Taiwan. Information and Management, 22, Igbaria, M., Tor, G. and Gordon, B.D. (1995). Testing the determinants of microcomputer usage via a structural equation model. Journal of Management Information Systems, 13(1), Jensen, R. and Szulanski, G. (2004). Stickiness and the adaptation of organizational practices in crossborder knowledge transfers. Journal of International Business Studies, 35(6), Kabay, M.E. (2002). Developing security policies. In S. Bosworth and M. E. Kabay (Eds.), Computer Security Handbook. 4th ed. New York: John Wiley & Sons, Inc. Ko, D., Kirsch, L.J. and King, W.R. (2005). Antecedents of knowledge transfer from consultants to clients in enterprise system implementations. MIS Quarterly, 29(1), Kogut, B. and Singh, H. (1988). The effect of national culture on the choice of entry mode. Journal of International Business Studies, 19(3), Kostova, T. (1996). Success of the transnational transfer of organizational practices within multinational companies. University of Minnesota, Minneapolis. Kostova, T. (1999). Transnational transfer of strategic organizational practices: A contextual perspective. Academy of Management Review, 24(2), Kostova, T. and Roth, K. (2002). Adoption of an organizational practice by subsidiaries of multiniational corporations: institutional and relational effects. Academy of Management Journal, 45(1), Kostova, T. and Roth, K. (2003). Social capital in multinational corporations and a micro-macro model of its formulation. Academy of Management Review, 28(2), Kostova, T. and Zaheer, S. (1999). Organizational legitimacy under conditions of complexity: The case of the multinational enterprise. Academy of Management Review, 24(1), Levine, D. E. (2002). Monitoring and control systems. In S. Bosworth, & M. E. Kabay (Eds.), Computer Security Handbook. 4th ed. New York: John Wiley & Sons, Inc. Liu, W. (2004). The cross-national transfer of HRM practices in MNCs: An integrative research model. International Journal of Manpower, 25(6), Minbaeva, D., Pederson, T., Bjorkman, I., Fey, C.F. and Park, H.J MNC knowledge transfer, subsidiary absorptive capacity, and HRM. Journal of International Business Studies, 34, Munir, K.A. (2002). Being different: How normative and cognitive aspects of institutional environments influence technology transfer. Human Relations, 55(12), Pavlia, P.C. (1998). Research issues in global information technology management. Information Resource Management Journal, 11(2), Rosenzweig, P.M. and Singh, J.V. (1991). Organizational environments and the multinational enterprise. Academy of Management Review, 16(2), Sandhu, R. (2002). Identification and authentication. In S. Bosworth, & M.E. Kabay (Eds.), Computer Security Handbook. 4th ed. New York: John Wiley & Sons, Inc. Scott, W.R. (1995). Institutions and Organizations. Thousand Oaks; CA: SAGE. Shenkar, O. (2001). Cultural Distance Revisited: Towards a more rigorous conceptualization and measurement of cultural differences. Journal of International Business Studies, 32(3), Siponen, M.T. (2000). Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice. Information Management & Computer Security, 8(5), Sirmon, D.G. and Lane, P.J. (2004). A model of cultural differences and international alliance performance. Journal of International Business Studies, 35(5), Straub, D., Keil, M. and Brenner, W. (1997). Testing the technology acceptance model across cultures: A three country study. Information and Management, 33, Straub, D.W. and Welke, J.R. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441.

12 Szulanski, G. (1996). Exploring internal stickiness: Impediments to the transfer of best practice within the firm. Strategic Management Journal, 17, Szulanski, G. (2000). The Process of Knowledge Transfer: A diachronic analysis of stickiness. Organizational Behavior and Human Decision Processes, 82(2), Thompson, M.E. and von Solms, B. (1998). Information security awareness: Educating our users effectively. Information Management & Computer Security, 6(4), Wakefield, R.L. (2004). Network security and password policies. The CPA Journal, 74(7), 6. Westney, D.E. (1993). Institutionalization Theory and the Multinational Corporation. New York: St. Martin's Press. Whitman, M.E. (2004). In defense of the realm: Understanding the threats to information security. International Journal of Information Management, 24, Xu, D. and Shenkar, O. (2002). Institutional distance and the multinational enterprise. Academy of Management Review, 27(4),

Value-Focused Assessment of Information System Security in Organizations

Value-Focused Assessment of Information System Security in Organizations Association for Information Systems AIS Electronic Library (AISeL) ICIS 2001 Proceedings International Conference on Information Systems (ICIS) 12-31-2001 Value-Focused Assessment of Information System

More information

Knowledge Structure in International Marketing: A Multi Method Bibliometric Analysis

Knowledge Structure in International Marketing: A Multi Method Bibliometric Analysis Supplemental Appendices For Knowledge Structure in International Marketing: A Multi Method Bibliometric Analysis Saeed Samiee Brian R. Chabowski Journal of the Academy of Marketing Science THE FOLLOWING

More information

Critical Success Factors of Collaboration for Public Service

Critical Success Factors of Collaboration for Public Service Critical Success Factors of Collaboration for Public Service Different factors affect the performance of these collaboration projects. These factors are related either to the project's macro, meso or micro

More information

An Integrative Model of Clients' Decision to Adopt an Application Service Provider

An Integrative Model of Clients' Decision to Adopt an Application Service Provider Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) December 2003 An Integrative Model of Clients' Decision to Adopt

More information

Business Process Agility

Business Process Agility Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 Robyn L. Raschke Arizona State University, robyn.raschke@asu.edu

More information

Motivating Employees to Comply with Information Security Policies

Motivating Employees to Comply with Information Security Policies Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2016 Proceedings Midwest (MWAIS) Spring 5-19-2016 Motivating Employees to Comply with Information Security Policies David Sikolia

More information

Explaining MNC s Knowledge Transfer Using Two Gaps Model

Explaining MNC s Knowledge Transfer Using Two Gaps Model , pp.116-122 http://dx.doi.org/10.14257/astl.2015.114.23 Explaining MNC s Knowledge Transfer Using Two Gaps Model Wang-Fang Ph. D. Candidate, School of Business, Pusan National University Geumjung-gu,

More information

CULTURAL DIFFERENCES IN THE WORK PLACE: A STUDY OF THE WORK ETHICS OF CHINESE AND AMERICANS

CULTURAL DIFFERENCES IN THE WORK PLACE: A STUDY OF THE WORK ETHICS OF CHINESE AND AMERICANS CULTURAL DIFFERENCES IN THE WORK PLACE: A STUDY OF THE WORK ETHICS OF CHINESE AND AMERICANS John E. Merchant, Ph.D. California State University Sacramento (merchant@csus.edu) Abstract While much has been

More information

Toward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia

Toward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 65 ( 2012 ) 833 838 International Congress on Interdisciplinary Business and Social Science 2012 (ICIBSoS 2012) Toward

More information

Strategic Role of Human Resource Management in Information Security Management

Strategic Role of Human Resource Management in Information Security Management Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-2010 Strategic Role of Human Resource Management in Information

More information

Certified Identity Governance Expert (CIGE) Overview & Curriculum

Certified Identity Governance Expert (CIGE) Overview & Curriculum Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,

More information

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector The Sector Skills Council for the Financial Services Industry National Occupational Standards Risk Management for the Financial Sector Final version approved April 2009 IMPORTANT NOTES These National Occupational

More information

Power of Human Resource Management in the booming Sri Lankan Economy*

Power of Human Resource Management in the booming Sri Lankan Economy* Power of Human Resource Management in the booming Sri Lankan Economy* By Professor Dr. Henarath H.D.N.P.Opatha BSc Bus Adm (Special) (USJ); MSc Bus Adm (HRM) (USJ); MBA (Birmingham); Dip PM&IR (CTC); Dip

More information

Can Firms Perform Without Good HR Practices and Inspiring Leaders?

Can Firms Perform Without Good HR Practices and Inspiring Leaders? Cornell University ILR School DigitalCommons@ILR Center for Advanced Human Resource Studies () 8-2013 Can Firms Perform Without Good HR Practices and Inspiring Leaders? Christopher J. Collins Cornell University,

More information

Cultural Differences and Information Technology Acceptance

Cultural Differences and Information Technology Acceptance Association for Information Systems AIS Electronic Library (AISeL) SAIS 2004 Proceedings Southern (SAIS) 3-1-2004 Cultural Differences and Information Technology Acceptance Amel B. Zakour ameluniv@yahoo.fr

More information

Information Security Governance and Internal Audits: A Processual Model

Information Security Governance and Internal Audits: A Processual Model Association for Information Systems AIS Electronic Library (AISeL) SAIS 2007 Proceedings Southern (SAIS) 3-1-2007 Information Security Governance and Internal Audits: A Processual Model Sushma Mishra mishras@vcu.edu

More information

Chapter. Culture and Multinational Management

Chapter. Culture and Multinational Management Chapter 2 Culture and Multinational Management What is Culture? Pervasive and shared beliefs, norms, values, and symbols that guide the everyday life of a group. Cultural norms: both prescribe and proscribe

More information

JAME Book Review. Author: Morten Huse. Cambridge University Press, pages, $45.00 Soft cover

JAME Book Review. Author: Morten Huse. Cambridge University Press, pages, $45.00 Soft cover JAME Book Review Boards, Governance and Value Creation: The Human Side of Corporate Governance Author: Morten Huse Cambridge University Press, 2007 392 pages, $45.00 Soft cover Reviewed by: Jonas Gabrielsson,

More information

INTERNATIONALIZATION OF COMPANIES WITH DIGITAL PRODUCTS

INTERNATIONALIZATION OF COMPANIES WITH DIGITAL PRODUCTS INTERNATIONALIZATION OF COMPANIES WITH DIGITAL PRODUCTS Digital internationalization tool Bachelor Thesis By: Klaus Andersen Supervisor: Jonas Hedman IT-University of Copenhagen, Global Business Informatics

More information

Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment

Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment Association for Information Systems AIS Electronic Library (AISeL) ECIS 2008 Proceedings European Conference on Information Systems (ECIS) 2008 Defining Internal Control Objectives for Information Systems

More information

Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States

Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States SIXTH EDITION BUSINESS IN CONTEXT AN INTRODUCTION TO BUSINESS AND IIS ENVIRONMENT DAVID NEEDLE /V CENGAGE Learning" Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States CONTENTS

More information

THIRD EDITION VOLUME 6. Edited by. Markus Vodosek, Deanne N. Den Hartog, and Jeanne M. McNett. German Graduate School of Management

THIRD EDITION VOLUME 6. Edited by. Markus Vodosek, Deanne N. Den Hartog, and Jeanne M. McNett. German Graduate School of Management WILEY ENCYCLOPEDIA OF MANAGEMENT THIRD EDITION VOLUME 6 INTERNATIONAL MANAGEMENT Edited by Markus Vodosek, Deanne N. Den Hartog, and Jeanne M. McNett German Graduate School of Management & Law (GGS), University

More information

A Model for Analyzing Organizational Performance of ERP Systems from a Resource-Based View

A Model for Analyzing Organizational Performance of ERP Systems from a Resource-Based View A Model for Analyzing Organizational Performance of ERP Systems from a Resource-Based View Shari S. C. Shang Department of MIS National Chengchi University, Taiwan sshang@nccu.edu.tw Tsung-Lin Wu Department

More information

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) Management Strategies of Enterprise Mobile Application in Mobile Internet Environment Mengli Li1, a, Xumei Zhang1,

More information

Collective Identity: Ethics and Self- Identifications

Collective Identity: Ethics and Self- Identifications Collective Identity: Ethics and Self- Identifications Mike Kallens, Associate General Counsel and Manager of Corporate Ethics and Compliance, Booz Allen Hamilton Skip Lowney, Senior Researcher, ECI Sept.

More information

An Evaluation of Performance Appraisals in the U.S. and China and Recommendations for Multinational Businesses

An Evaluation of Performance Appraisals in the U.S. and China and Recommendations for Multinational Businesses Proceedings of the National Conference On Undergraduate Research (NCUR) 2014 University of Kentucky, Lexington, KY April 3-5, 2014 An Evaluation of Performance Appraisals in the U.S. and China and Recommendations

More information

International Business 8e. By Charles W.L. Hill

International Business 8e. By Charles W.L. Hill International Business 8e By Charles W.L. Hill Chapter 3 Differences in Culture What Is Cross-Cultural Literacy? Cross-cultural literacy is an understanding of how cultural differences across and within

More information

Stand: Semester / Term: Duration: Module No.: 1 Semester DLMMANE. Regularly offered in: Module Type(s): Compulsory WS, SS

Stand: Semester / Term: Duration: Module No.: 1 Semester DLMMANE. Regularly offered in: Module Type(s): Compulsory WS, SS Module Title: Management (English) Module No.: DLMMANE Semester / Term: -- Duration: 1 Semester Module Type(s): Compulsory Regularly offered in: WS, SS Workload: 300 h Credit Points: 10 Admission Requirements:

More information

DRAFT ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance

DRAFT ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance INTERNATIONAL STANDARD ISO/IEC 27003 First edition 2010-02-01 Information technology Security techniques Information security management system implementation guidance Technologies de l'information Techniques

More information

Adoption of Information Security as Decisionmaking under Uncertainty: A Behavioural Economics Approach

Adoption of Information Security as Decisionmaking under Uncertainty: A Behavioural Economics Approach Association for Information Systems AIS Electronic Library (AISeL) ECIS 2015 Research-in-Progress Papers ECIS 2015 Proceedings Spring 5-29-2015 Adoption of Information Security as Decisionmaking under

More information

Standards for Social Work Practice with Groups, Second Edition

Standards for Social Work Practice with Groups, Second Edition Social Work with Groups ISSN: 0160-9513 (Print) 1540-9481 (Online) Journal homepage: http://www.tandfonline.com/loi/wswg20 Standards for Social Work Practice with Groups, Second Edition Association for

More information

National cultures and the knowledge sharing process in International Joint Ventures

National cultures and the knowledge sharing process in International Joint Ventures National cultures and the knowledge sharing process in International Joint Ventures Bachelor Thesis Department of Organization and Strategy Tilburg University, 2010 Author R.D. Haken S688375 Supervisor

More information

The leadership competencies valued across cultures: getting things done.

The leadership competencies valued across cultures: getting things done. The leadership competencies valued across cultures: getting things done. Worldwide, people appreciate leaders of any cultural background if they deliver results. Engineering Introductionre-engineered It

More information

Cultural Intelligence and Cultural Diversity

Cultural Intelligence and Cultural Diversity Jong-Youl Hong HanKuk University of Foreign Studies, ImunRo 107, Seoul, Korea herr_hong@hufs.ac.kr Abstract Today, in order to achieve an effective result in a globalized business environment, an understanding

More information

EPCOR Utilities Inc. Ethics Policy

EPCOR Utilities Inc. Ethics Policy ETHICS POLICY Contents 1. APPLICATION... 2 2. POLICY REQUIREMENTS... 2 Fundamental Principles... 2 Respectful Workplace... 2 Use of EPCOR Property and Resources... 2 Appropriate Use of Technology and Electronic

More information

Organizational Commitment. Schultz, 1

Organizational Commitment. Schultz, 1 Organizational Commitment Schultz, 1 Schultz, 2 Organizational Commitment Organizational commitment has an important place in the study of organizational behavior. This is in part due to the vast number

More information

Creating an International Workforce: IHRM orientation and staffing strategy. Alhajie Saidy Khan LAIBS

Creating an International Workforce: IHRM orientation and staffing strategy. Alhajie Saidy Khan LAIBS International and Comparative Human Resource Management Creating an International Workforce: IHRM orientation and staffing strategy Alhajie Saidy Khan LAIBS Lecture outline The context for international

More information

ASSESSING THE IMPACT OF SUPPLY CHAIN MANAGEMENT SOFTWARE ON COMPANY PERFORMANCE

ASSESSING THE IMPACT OF SUPPLY CHAIN MANAGEMENT SOFTWARE ON COMPANY PERFORMANCE Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2002 Proceedings Americas Conference on Information Systems (AMCIS) December 2002 ASSESSING THE IMPACT OF SUPPLY CHAIN MANAGEMENT

More information

Project Manager Management Competency vs. Technical Competency. Which Is More Important to Overall Project Management Success?

Project Manager Management Competency vs. Technical Competency. Which Is More Important to Overall Project Management Success? Publications 4-2014 Project Manager Management Competency vs. Technical Competency. Which Is More Important to Overall Project Management Success? Barry Jon Bauer Embry-Riddle Aeronautical University,

More information

Procedia - Social and Behavioral Sciences 109 ( 2014 ) Anca Francisca Cruceru a *, Daniel Moise b

Procedia - Social and Behavioral Sciences 109 ( 2014 ) Anca Francisca Cruceru a *, Daniel Moise b Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 109 ( 2014 ) 155 159 2 nd World Conference On Business, Economics And Management - WCBEM2013 Customer Relationships

More information

MARKETING AND SUPPLY CHAIN MANAGEMENT

MARKETING AND SUPPLY CHAIN MANAGEMENT MSC Marketing and Supply Chain MARKETING AND SUPPLY CHAIN MANAGEMENT MSC Department of Marketing and Supply Chain The Eli Broad College of Business and The Eli Broad Graduate School of 293 Cooperative

More information

FOURTH EDITION. BUSINESS REVIEW BOOKS Management. Patrick J. Montana. Bruce H. Charnov BARRON'S

FOURTH EDITION. BUSINESS REVIEW BOOKS Management. Patrick J. Montana. Bruce H. Charnov BARRON'S BUSINESS REVIEW BOOKS Management FOURTH EDITION Patrick J. Montana Professor of Management Fordham University Schools of Business Bruce H. Charnov Associate Professor of Management Frank G. Zarb School

More information

CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 04/29/2016

CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 04/29/2016 CREDIT CARD MERCHANT PROCEDURES MANUAL Effective Date: 04/29/2016 Updated: April 29, 2016 TABLE OF CONTENTS Introduction... 1 Third-Party Vendors... 1 Merchant Account Set-up... 2 Personnel Requirements...

More information

Improving Change Management Application through Cultural Awareness and Adaptation

Improving Change Management Application through Cultural Awareness and Adaptation Improving Change Management Application through Cultural Awareness and Adaptation By Rashelle Esparza and Robert Stise, Prosci Percent of respondents Abstract Prosci research explored the impact that culture

More information

DIFFUSION OF THE INTERNET HOSTS

DIFFUSION OF THE INTERNET HOSTS Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2002 Proceedings Americas Conference on Information Systems (AMCIS) December 2002 DIFFUSION OF THE INTERNET HOSTS Yi-Cheng Ku Fortune

More information

The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service

The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service Saleh Alumaran, Giampaolo Bella and Feng Chen Software Technology Research Laboratory

More information

INTERNATIONAL BUSINESS and GLOBALIZATION

INTERNATIONAL BUSINESS and GLOBALIZATION INTERNATIONAL BUSINESS and GLOBALIZATION Dr. Bett Mickels WorldWideTeams Consulting Hsiuping University of Science and Technology International Business and Globalization Agenda Globalization characteristics

More information

What is an International Joint Venture? The Odd Case of the International Herald Tribune

What is an International Joint Venture? The Odd Case of the International Herald Tribune World Journal of Social Sciences Vol. 5. No. 2. April 2015 Issue. Pp. 1 9 What is an International Joint Venture? The Odd Case of the International Herald Tribune H. Marc Porter* International Joint Ventures

More information

IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.

IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. ACM CCECC Serving computing education communities since 1991. Information Technology Metrics IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. Lists appropriate

More information

McGraw-Hill/Irwin. Copyright 2011 by the McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill/Irwin. Copyright 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Copyright 2011 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Organizing for Innovation McGraw-Hill/Irwin Copyright 2011 by the McGraw-Hill Companies, Inc. All rights

More information

chapter 2 corporate strategy and strategic HRM

chapter 2 corporate strategy and strategic HRM STUDENT SUMMARY NOTES chapter 2 corporate strategy and strategic HRM Chapter overview Chapter 2 discusses the concept of strategic HRM (SHRM) and explores various themes associated with SHRM. It also introduces

More information

//DATA INNOVATION FOR DEVELOPMENT GUIDE DATA INNOVATION RISK ASSESSMENT TOOL

//DATA INNOVATION FOR DEVELOPMENT GUIDE DATA INNOVATION RISK ASSESSMENT TOOL CHECKLIST Rationale for the checklist: Large-scale social or behavioural data may not always contain directly identifiable personal data and/or may be derived from public sources. Nevertheless, its use

More information

Quantifying the Value of Software Asset Management

Quantifying the Value of Software Asset Management 1 Executive Summary Over the past few decades, employees have come to rely more and more heavily on software solutions to automate and enhance a variety of core business activities from sales order entry

More information

Effectiveness Assessment Tool for High-Performance Social Change Organizations: An Overview

Effectiveness Assessment Tool for High-Performance Social Change Organizations: An Overview Working Paper #1 Effectiveness Assessment Tool for High-Performance Social Change Organizations: An Overview Cheyanne Scharbatke-Church A high-performance social change organization is one that considers

More information

CULTURAL VALUES AND COGNITIVE MORAL DEVELOPMENT OF ACCOUNTING ETHICS: A CROSS-CULTURAL STUDY

CULTURAL VALUES AND COGNITIVE MORAL DEVELOPMENT OF ACCOUNTING ETHICS: A CROSS-CULTURAL STUDY SOCIAL BEHAVIOR AND PERSONALITY, 2008, 36(7), 883-892 Society for Personality Research (Inc.) CULTURAL VALUES AND COGNITIVE MORAL DEVELOPMENT OF ACCOUNTING ETHICS: A CROSS-CULTURAL STUDY Yi-Hui Ho and

More information

BBK3363 International Business Environment by Dr Khairul Anuar. L1: Managing in a Global Environment

BBK3363 International Business Environment by Dr Khairul Anuar. L1: Managing in a Global Environment BBK3363 International Business Environment by Dr Khairul Anuar L1: Managing in a Global Environment 1 Topics under International Business Environment The International Business Environment The Competitive

More information

Towards a Theoretical Model for Strategic Alliance, and Partner Selection Among Small Medium Enterprises (SMES): A Research Agenda

Towards a Theoretical Model for Strategic Alliance, and Partner Selection Among Small Medium Enterprises (SMES): A Research Agenda Science Journal of Business and Management 2016; 4(1): 1-7 Published online February 17, 2016 (http://www.sciencepublishinggroup.com/j/sjbm) doi: 10.11648/j.sjbm.20160401.11 ISSN: 2331-0626 (Print); ISSN:

More information

Expatriate Work Adjustment and Job Performance of Expatriates: A Case Study of Nokia and ZTE Companies Khikmatullo Kudratov Professor Liu Cheng

Expatriate Work Adjustment and Job Performance of Expatriates: A Case Study of Nokia and ZTE Companies Khikmatullo Kudratov Professor Liu Cheng International Journal of Humanities & Social Science Studies (IJHSSS) A Peer-Reviewed Bi-monthly Bi-lingual Research Journal ISSN: 2349-6959 (Online), ISSN: 2349-6711 (Print) Volume-III, Issue-III, November

More information

BS&A Software Application Design Approach

BS&A Software Application Design Approach BS&A Software Application Design Approach At BS&A, our software is designed with the primary objective of creating an easy and productive customer experience. We place the utmost importance on providing

More information

STRATEGY FOR VALUE CREATION AND APPROPRIATION IN A GLOBAL CONTEXT

STRATEGY FOR VALUE CREATION AND APPROPRIATION IN A GLOBAL CONTEXT STRATEGY FOR VALUE CREATION AND APPROPRIATION IN A GLOBAL CONTEXT Lee, Chung-Shing Pacific Lutheran University Ho, Jonathan C. Yuan Ze University ABSTRACT The development and growth of Taiwan's industries,

More information

Chapter. International Human Resource Management

Chapter. International Human Resource Management Chapter 11 International Human Resource Management Human Resource Management (HRM) Human Resource Management (HRM): deals with the overall relationship of the employee with the organization Basic HRM functions:

More information

CHAPTER 3: INTERNATIONAL MANAGEMENT AND GLOBALIZATION Multiple Choice Questions

CHAPTER 3: INTERNATIONAL MANAGEMENT AND GLOBALIZATION Multiple Choice Questions CHAPTER 3: INTERNATIONAL MANAGEMENT AND GLOBALIZATION Multiple Choice Questions 1. According to Steve Radewych is the process of closing high-cost manufacturing plants and opening others in regions of

More information

TQM Implementation for Effective Project Management

TQM Implementation for Effective Project Management TQM Implementation for Effective Project Management Ion STANCIU Faculty of Tourism and Commercial Management Email: Ion_stanciu@hotmail.com Bogdănel DRĂGUŢ Faculty of Tourism and Commercial Management

More information

THE FIVE PHASES IN THE TRANSFER OF HR POLICIES AND PRACTICES WITHIN MNCS

THE FIVE PHASES IN THE TRANSFER OF HR POLICIES AND PRACTICES WITHIN MNCS Working Paper WP no 724 January, 2008 THE FIVE PHASES IN THE TRANSFER OF HR POLICIES AND PRACTICES WITHIN MNCS Lourdes Susaeta José R. Pin IESE Business School University of Navarra Avda. Pearson, 21 08034

More information

Towards a conceptual framework for the relationship between subsidiary staffing strategy and subsidiary performance

Towards a conceptual framework for the relationship between subsidiary staffing strategy and subsidiary performance The International Journal of Human Resource Management, Vol. 20, No. 6, June 2009, 1291 1308 Towards a conceptual framework for the relationship between subsidiary staffing strategy and subsidiary performance

More information

SW 701 Foundation Field Practicum. Learning Contract Supplement: A Guide to Completing the Learning Contract

SW 701 Foundation Field Practicum. Learning Contract Supplement: A Guide to Completing the Learning Contract SW 701 Foundation Field Practicum Learning Contract Supplement: A Guide to Completing the Learning Contract Welcome to Practicum! Practicum is a time for blending classroom lecture and assignments to actual

More information

Chapter. Multinational and Entry Mode Strategies

Chapter. Multinational and Entry Mode Strategies Chapter 6 Multinational and Entry Mode Strategies Multinational Strategies: Dealing with the Global-Local Dilemma The Global-Local Dilemma: MNCs face: pressures to respond to the unique needs of the markets

More information

Strategic HR Challenges

Strategic HR Challenges Strategic HR Challenges Human Resource Management 1 Lecture Outline Human Resource Basic Concepts Human Resource Management challenges Environmental Challenges Organizational Challenges Individual Challenges

More information

Presentation Objectives

Presentation Objectives The Impact of Organizational Social Context: Training Impacting Context or Context Impacting Training? 11th Annual National Services Training and Evaluation Symposium (May, 2008) Anthony Hemmelgarn, Ph.D.

More information

THE ANTITRUST COMPLIANCE PROGRAMME OF THE ITALCEMENTI GROUP

THE ANTITRUST COMPLIANCE PROGRAMME OF THE ITALCEMENTI GROUP THE ANTITRUST COMPLIANCE PROGRAMME OF THE ITALCEMENTI GROUP 1 This document is intended to provide you with the presentation of the Antitrust Compliance Programme ( A.C.P. ) devised and organised, with

More information

THREE-YEAR STRATEGIC PLAN UPDATE v1

THREE-YEAR STRATEGIC PLAN UPDATE v1 THREE-YEAR STRATEGIC PLAN UPDATE v1 FY2017-FY2019 OUR STRATEGY To develop future professionals through relevant and accessible credentialing programs 100% Member Market Penetration To deliver member value

More information

The Company seeks to comply with both the letter and spirit of the laws and regulations in all jurisdictions in which it operates.

The Company seeks to comply with both the letter and spirit of the laws and regulations in all jurisdictions in which it operates. 1. Policy Statement CRC HEALTH GROUP, INC. CRC HEALTH CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS It is the policy of CRC Health Group to conduct its business affairs honestly and in an ethical manner.

More information

Program Planning Guide Business Administration, Human Resource Management Track, Associate in Applied Science Degree (A25120)

Program Planning Guide Business Administration, Human Resource Management Track, Associate in Applied Science Degree (A25120) Program Planning Guide Business Administration, Human Resource Management Track, Associate in Applied Science Degree (A25120) Program Length: 6 Semesters Career Pathway Options: Associate in Applied Science

More information

ROCKY MOUNTAIN PERFORMANCE EXCELLENCE POSITION DESCRIPTION FOR THE EXECUTIVE/MANAGING DIRECTOR

ROCKY MOUNTAIN PERFORMANCE EXCELLENCE POSITION DESCRIPTION FOR THE EXECUTIVE/MANAGING DIRECTOR ROCKY MOUNTAIN PERFORMANCE EXCELLENCE POSITION DESCRIPTION FOR THE EXECUTIVE/MANAGING DIRECTOR ABOUT THE ORGANIZATION: Rocky Mountain Performance Excellence (RMPEx) is a Colorado nonprofit corporation

More information

Personal Selling and Sales Management

Personal Selling and Sales Management Personal Selling and Sales Management Chapter 17 McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives LO1 LO2 LO3 LO4 LO5 LO6 LO7 LO8 LO9 The role

More information

MBA REQUIRED (CORE) COURSES

MBA REQUIRED (CORE) COURSES MBA REQUIRED (CORE) COURSES ACCT 720 - Strategic Cost Management Study of the role of cost management methods in aiding managers in all of their planning, controlling and evaluating activities; focus on

More information

Items Description of Module Subject Name Human Resource Management Paper Name Performance and Compensation Management Module Title Performance

Items Description of Module Subject Name Human Resource Management Paper Name Performance and Compensation Management Module Title Performance Items Description of Module Subject Name Human Resource Management Paper Name Performance and Compensation Management Module Title Performance Management in International Context Module Id Module No. -

More information

and high technology companies and in nonprofit organizations. Teams are how work gets done.

and high technology companies and in nonprofit organizations. Teams are how work gets done. SELF-MANAGING TEAMS (Forthcoming in Encyclopedia of Group Processes and Intergroup Relations, J.M.Levine and M.A.Hogg (editors). Thousand Oaks, CA: Sage Publications, 2009.) Teams or work groups are a

More information

Procedia - Social and Behavioral Sciences 156 ( 2014 ) Pavel Lebedev a *

Procedia - Social and Behavioral Sciences 156 ( 2014 ) Pavel Lebedev a * Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 156 ( 2014 ) 580 584 19th International Scientific Conference; Economics and Management 2014, ICEM 2014,

More information

Rules, Procedures, and Internal Controls Manual BRAM Bradesco Asset Management

Rules, Procedures, and Internal Controls Manual BRAM Bradesco Asset Management Rules, Procedures, and Internal Controls Manual BRAM Bradesco Asset Management MP_8231_0070 01 27/06/2016 1 / 12 Table of contents 1. OBJECTIVE... Erro! Indicador não definido. 2. DEFINITIONS... Erro!

More information

THE LIFE CYCLE OF THE EXPATRIATE WORK ASSIGNMENT: A SIMPLE MODEL FOR ENGINEERING EDUCATORS AND ENGINEERING STUDENTS

THE LIFE CYCLE OF THE EXPATRIATE WORK ASSIGNMENT: A SIMPLE MODEL FOR ENGINEERING EDUCATORS AND ENGINEERING STUDENTS THE LIFE CYCLE OF THE EXPATRIATE WORK ASSIGNMENT: A SIMPLE MODEL FOR ENGINEERING EDUCATORS AND ENGINEERING STUDENTS R. Andrew Schaffer Department of Organizational Leadership and Supervision Purdue School

More information

USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS

USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS USER ACCEPTANCE OF DIGITAL LIBRARY: AN EMPIRICAL EXPLORATION OF INDIVIDUAL AND SYSTEM COMPONENTS Ganesh Vaidyanathan, Indiana University South Bend, gvaidyan@iusb.edu Asghar Sabbaghi, Indiana University

More information

Structured literature review of Knowledge Sharing with TheoryMaps

Structured literature review of Knowledge Sharing with TheoryMaps Structured literature review of Knowledge Sharing with TheoryMaps Niels Kijl n.kijl@student.utwente.nl ABSTRACT In the last few years a lot of theories have been developed about why people share their

More information

EXECUTIVE SUMMARY 9. Executive summary

EXECUTIVE SUMMARY 9. Executive summary EXECUTIVE SUMMARY 9 Executive summary The global financial and economic crisis is keeping several countries in the spiral of low growth, high unemployment and lower potential output, putting public finances

More information

LIST OF TABLES. Table Applicable BSS RMF Documents...3. Table BSS Component Service Requirements... 13

LIST OF TABLES. Table Applicable BSS RMF Documents...3. Table BSS Component Service Requirements... 13 General Services Administration NS2020 Enterprise Infrastructure Solutions EIS RFP #QTA0015THA3003 Volume 2: Management BSS Risk Management Framework Plan LIST OF TABLES Table 8.2-1. Applicable BSS RMF

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Performance and Productivity: Team Performance Criteria and Threats to Productivity OVERVIEW This chapter is best discussed following a team exercise or case so that students have an opportunity to reflect

More information

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004 1. Introduction CODE OF BUSINESS CONDUCT AND ETHICS FRONTIER AIRLINES, INC. Adopted May 27, 2004 The Board of Directors adopted this Code of Business Conduct ( Code ) to establish basic legal and ethical

More information

EXPLORING A NEW AUDIT RISK FACTOR THE CIRCUMVENTION ASPECT

EXPLORING A NEW AUDIT RISK FACTOR THE CIRCUMVENTION ASPECT EXPLORING A NEW AUDIT RISK FACTOR THE CIRCUMVENTION ASPECT Stanley X. Lewis, Jr., Troy University J. Scott Magruder, The University of Southern Mississippi Eddy J. Burks, Troy University Carl Smolinski,

More information

Field Education Planning

Field Education Planning Dear Colleagues: Field Education Planning The purpose of this document is to inform you of the process and timeline of matching social work students with practicum agencies, and to identify the learning

More information

Texas Standards for High Quality Afterschool, Summer and Expanded Learning Programs Assessment Tool

Texas Standards for High Quality Afterschool, Summer and Expanded Learning Programs Assessment Tool Program: Date: Observer: Category 1: Safe Environments, Health and Nutrition: A high quality program offers a safe environment where youth have opportunities to practice healthy behaviors and have access

More information

Role and Style of the OD Practitioner-Chapter 4. Dr. Bernice R. Kennedy

Role and Style of the OD Practitioner-Chapter 4. Dr. Bernice R. Kennedy Role and Style of the OD Practitioner-Chapter 4 Dr. Bernice R. Kennedy Objectives Define the role on OD Practitioner. Identify your strength and areas of improvement as a potential practitioner. Experience

More information

SLA Defined Metrics as a Tool to Manage Outsourced Help Desk Support Services

SLA Defined Metrics as a Tool to Manage Outsourced Help Desk Support Services Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-5-2011 SLA Defined Metrics as a Tool to Manage Outsourced Help Desk Support Services David

More information

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004

IFAC Education Committee Meeting Agenda 8-C Stockholm, August 2004 INTERNATIONAL FEDERATION OF ACCOUNTANTS 545 Fifth Avenue, 14th Floor Tel: +1 (212) 286-9344 New York, New York 10017 Fax: +1 (212) 856-9420 Internet: http://www.ifac.org Agenda Item 8-C First Issued July

More information

Strategic Human Resource Management impact of Employees Morale : An Empirical Study of Taiwan Telcos Organization Transitions

Strategic Human Resource Management impact of Employees Morale : An Empirical Study of Taiwan Telcos Organization Transitions Strategic Human Resource Management impact of Employees Morale : An Empirical Study of Taiwan Telcos Organization Transitions Ming-Kuen Wang,Department of Transportation and Communication Management Science,

More information

Organizational. Behavior 15th Global Edition. Chapter1. Robbins and Judge. What Is Organizational Behavior? Copyright 2013 Pearson Education 1-1

Organizational. Behavior 15th Global Edition. Chapter1. Robbins and Judge. What Is Organizational Behavior? Copyright 2013 Pearson Education 1-1 Organizational Chapter1 Behavior 15th Global Edition Robbins and Judge What Is Organizational Behavior? 1-1 Chapter 1 Learning Objectives After studying this chapter you should be able to: Demonstrate

More information

CHAPTER 2 INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE

CHAPTER 2 INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE CHAPTER 2 INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE Management Information Systems, 10 th edition, By Raymond McLeod, Jr. and George P. Schell 2007, Prentice Hall, Inc. Presented by Prof. Dr. H. Deden

More information

Next Generation SHRM Research: From Covariation to Causation

Next Generation SHRM Research: From Covariation to Causation Cornell University ILR School DigitalCommons@ILR CAHRS Working Paper Series Center for Advanced Human Resource Studies (CAHRS) January 2003 Next Generation SHRM Research: From Covariation to Causation

More information

Chapter 1. Evolution of Human Resource Management and Human Resource Information Systems: The Role of Information Technology

Chapter 1. Evolution of Human Resource Management and Human Resource Information Systems: The Role of Information Technology Chapter 1 Evolution of Human Resource Management and Human Resource Information Systems: The Role of Information Technology HISTORICAL ERAS IN HRIS Pre-world War II Reactive, Caretaker role Record Keeping

More information

Code of Business Conduct and Ethics

Code of Business Conduct and Ethics CyberOptics is committed to the highest standards of legal and ethical business conduct. This Code of Business Conduct and Ethics summarizes the legal, ethical and regulatory standards that CyberOptics

More information

Human Resource Management (HRM)

Human Resource Management (HRM) Human Resource Management (HRM) 1 Human Resource Management (HRM) Courses HRM 5051. Human Resources Management Strategies. 3 Credit Hours. The effective management of HR practices has an enormous effect

More information