Princely Ifinedo

Princely Ifinedo
Brock University · Department of Finance, Operations, and Information Systems

PhD; MBA; MSc; BSc; Diploma in Education; CISM

About

152
Publications
92,191
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,145
Citations
Additional affiliations
June 2007 - present
Cape Breton University
Position
  • Professor (Associate)

Publications

Publications (152)
Article
Full-text available
The popular narrative about the origins and migrations of the Ukwuani and Ndosumili, also called the Ukwuani/Ndosumili sub-ethnic group of Southern Nigeria, accentuates Benin (Bini or Edo) links while downplaying Igbo connections. This paper aims to ascertain whether Ukwuani/Ndosumili is Edoid or Igboid in origin. Data used for the study came from...
Article
Full-text available
Purpose-This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches. Design/methodology/approach-A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO)...
Article
Full-text available
Purpose This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches. Design/methodology/approach A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO)...
Chapter
Full-text available
The purpose of this study is to understand how sociotechnical factors shape the development of electronic government payment portal in developing countries. E-Government research on payment has focused more on post development phases such as adoption, implementation and use. As a result, little is known about the development phases. To address this...
Conference Paper
Full-text available
Developing countries, due to their poor GDP per capita and general poverty level, depend on remittances to better the lots of individuals with remittances, which is seen as an approach to poverty reduction. As a developing nation, Nigeria is the highest recipient of remittance in Sub-Saharan Africa, yet the country's poverty rate is still alarming....
Article
Full-text available
Employee engagement in nonmalicious information security violations (NISVs) is a threat to organizations. The Social Cognitive Theory was used to investigate the effects of personal and environmental factors on the intention to engage in NISVs. Data of 204 working professionals in Germany were used for analysis. Key results showed that personal goa...
Article
Full-text available
Organizations whose employees participate in risky cybersecurity behaviors (RCySecB) could suffer disastrous consequences either directly or indirectly from actions linked to such behaviors. This study used conceptualizations facilitated by Attribution Theory to examine the effects of dispositional factors (self-control and knowledge of IS security...
Article
Full-text available
Employee engagement in unhygienic cyber practices (UCP) is a concern for organizations across the world. This study explores the effects of personal cognitive and environmental factors in decreasing workers' engagement in UCP in a developing country. The study employs a simplified version of the theory of reciprocal determinism (triadic reciprocali...
Article
Full-text available
This study discusses MBA students' perceptions of challenges and attitudes toward using a unified communication and collaboration software, that is, Microsoft Teams (MST) in a Canadian university during the early days of the COVID-19 pandemic. An online survey of students' perceptions of relevant issues was conducted. One hundred thirty-nine (139)...
Article
Full-text available
This paper examines and uncovers the key drivers of e-participation progress or growth over the years, globally and regionally. The authors used fixed-effects regression model on a panel data of variables gathered by reputable world organizations for an 8-year period – one of the largest examined to date. They tested a research model including GDP...
Conference Paper
Full-text available
Employee participation in unhygienic cyber practices is a growing concern in organizations across the globe. Using the social cognitive theory, this study used relevant factors classified under personal cognitive or personal factors (i.e., self-efficacy and self-regulation) and environmental factor (i.e., security, education, training, and awarenes...
Conference Paper
Full-text available
Understanding workers' participation in nonmalicious, end-user computing and information security deviant behavior: Insights from social cognitive theory Princely Ifinedo (Brock University) Abstract Organizations suffer from employee engagements in nonmalicious, end-user computing and information security deviant behavior (NECISDB) (e.g., visiting...
Chapter
Full-text available
Participation or engagement in unhygienic cyber practices could ultimately harm an organization’s information and communication technologies, if unchecked. This present study used concepts from the theory of planned behavior and organizational control theory to examine the effects of factors such as attitude, subjective norms, organizational facili...
Article
Full-text available
Employees' engagement in nonmalicious, counterproductive computer security behaviors (CCSB) poses a threat to organizations' information systems (IS) resources and assets. In order to understand CCSB, there is a need to propose theoretical foundations to research the phenomenon and to offer useful tools to help organizations assess such behaviors i...
Article
Full-text available
Weblogs (or blogs) are increasingly being used in higher educational contexts. Not much is known about the factors that influence students’ continued usage intention of weblogs. This study uses the expectation-confirmation model (ECM) as its background theoretical framework, and explores the roles of antecedent factors of perceived fit and perceive...
Chapter
This study used the theory of planned behavior (TPB), which was extended to include relevant constructs such as computer self-efficacy, anxiety and habit, to investigate registered nurses' (RNs') adoption of healthcare information systems (HIS) in Nova Scotia, Canada. An analysis of data collected from 197 RNs in a cross-sectional survey showed tha...
Article
Full-text available
This study examines factors influencing students’ continuance intention to use blogs to learn in an undergraduate-level course. The research uses constructs from relevant theoretical frameworks, including the technology acceptance model, social cognitive theory, innovation diffusion theory, and expectation–confirmation model. A survey administered...
Article
Full-text available
The objective of this study was to investigate employees’ information systems security policy (ISSP) compliance behavioral intentions. Theoretical frameworks, including the Theory of Planned Behavior, the Social Bond Theory, and Organizational Climate (OC) perspective were integrated to facilitate this process. A survey of working professionals in...
Article
This study was designed to explore the effects or roles of usability factors (i.e., perceived ease of use, perceived usefulness, and satisfaction) and external support (i.e., teacher and peer support) on undergraduates’ use outcomes of Moodle in a blended learning environment. The research hypotheses derived from relevant constructs taken from the...
Conference Paper
Full-text available
This study examined factors influencing employees' participation in non-malicious, information systems security deviant behavior (N-ISSDB) (e.g., e.g., connecting computers to the Internet through an insecure wireless network, not disposing and destroying all unneeded sensitive documents and information on computer in a timely manner, and opening e...
Article
Full-text available
Background: This paper used the Theory of Planned Behavior (TPB), which was extended, to investigate nurses' adoption of healthcare information systems (HIS) in Nova Scotia, Canada. Methods: Data was collected from 197 nurses in a survey and data analysis was carried out using the partial least squares (PLS) technique. Results: In contrast to...
Article
Full-text available
Purpose Students’ use of blogging tools in learning environments is increasing across the world. The purpose of this paper is to contribute to the literature by examining the effects of relevant factors that engender satisfaction and positive impacts of the technology for learning. Design/methodology/approach A cross-sectional survey was used to c...
Conference Paper
Full-text available
Disastrous consequences tend to befall organizations whose employees participate in information systems security deviant behavior (ISSDB) (e.g., connecting computers to the Internet through an insecure wireless network and opening emails from unverified senders). Although organizations recognize that ISSDB poses a serious problem, understanding wha...
Conference Paper
Full-text available
Benign, non-malicious computer security practices that employees across the globe participate in can cause organizations serious problems just as much as malicious security acts. Not much research has been done in this aspect of information security management in Nigeria. It is worth noting that studies of cyber threats are readily available. In th...
Article
Full-text available
This study used the theory of planned behavior (TPB), which was extended to include relevant constructs such as computer self-efficacy, anxiety and habit, to investigate registered nurses' (RNs') adoption of healthcare information systems (HIS) in Nova Scotia, Canada. An analysis of data collected from 197 RNs in a cross-sectional survey showed tha...
Article
This study is designed to investigate factors influencing undergraduate students' continuance intention to use blogs for learning in a management information systems course. Constructs from three theoretical frameworks, i.e., social-cognitive theory, technology acceptance model, and motivation theory were used to guide the study. A cross-sectional...
Article
Full-text available
This study provides nascent information on university students' needs to adopt social networking sites (SNSs) pervasively. The study drew from the uses and gratifications theory (UGT) and social influence (SI) processes framework. Relevant hypotheses were formulated to test the proposed research model. Data was collected in a survey of university u...
Article
Full-text available
Objectives: The purpose of this study was to educate on the moderating effects of demographic (i.e., educational level and age) and individual characteristics (i.e., years of nursing experience and computer knowledge) on nurses' acceptance of information systems (IS). The technology acceptance model (TAM) with its constituent variables such as per...
Article
Full-text available
This study was designed to examine the impacts of employees’ cost–benefit analysis, deterrence considerations, and top management support and beliefs on information systems security policy (ISSP) compliance. Surveys of Canadian professionals’ perceptions were carried out. A research model was proposed and tested. The results confirmed that top mana...
Conference Paper
Full-text available
Employees' non-malicious counterproductive computer security behaviors (CCSB) at work could put organizations' information-related assets at risk, if unchecked. Using concepts from the social cognitive and organizational citizenship behavior (OCB) theoretical frameworks, this study examined the effects of observational learning/modeling, social sup...
Article
Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economi...
Conference Paper
Full-text available
Employees indulgence in counterproductive computer security behaviors (CCSB) is a growing phenomenon worldwide. Essentially, CCSB are ill-prescribed computer use practices and general information security behaviors that go against the legitimate interests of an organization. While research on such issues is beginning to emerge in the developed West...
Conference Paper
Full-text available
End-user acceptance of information systems (IS), including enterprise systems (ES) is critically important for the success or effectiveness of such technologies for adopting organizations. While prior research has focused on such issues in the developed West, very little is known about workers' perceptions of ES acceptance or adoption in the develo...
Conference Paper
End-user acceptance of information systems (IS), including enterprise systems (ES) is critically important for the success or effectiveness of such technologies for adopting organizations. While prior research has focused on such issues in the developed West, very little is known about workers' perceptions of ES acceptance or adoption in the develo...
Conference Paper
Employees indulgence in counterproductive computer security behaviors (CCSB) is a growing phenomenon worldwide. Essentially, CCSB are ill-prescribed computer use practices and general information security behaviors that go against the legitimate interests of an organization. While research on such issues is beginning to emerge in the developed West...
Article
This research examined the impacts of organisational decisions’ locus, tasks structure, rules and procedures, organisational actors’ information technology (IT) skills/knowledge and IT department’s or function’s value perceptions on enterprise resource planning (ERP) system success. While such antecedent factors matter in the discourse, research on...
Article
This study investigated employees’ information systems security policy (ISSP) compliance behavioural intentions in organisations from the theoretical lenses of social bonding, social influence, and cognitive processing. Given that previous research on ISSP compliance has been based on deterrence theory, this study seeks to augment and diversify res...
Conference Paper
Full-text available
This study investigated the undergraduates' embedment with, and embracement of social networking sites (SNS) with a modified theory of planned behavior (TPB). It is recognized that social influence, perceived behavioral control, enjoyment, as well as embracement and embedment, are pertinent to the discourse. Data was collected from undergraduates i...
Conference Paper
Full-text available
This study used a cross-sectional survey to test the relationships among social cognitive variables and employees' counterproductive computer security behaviors (CCSB). We used data collected from 201 professionals in Canadian organizations. Components from social cognitive theory (SCT) including self-efficacy, observational learning, outcome expec...
Conference Paper
Full-text available
Organizations adopt enterprise resource planning (ERP) systems to improve information exchange across the enterprise. Research continues to show that adopting organizations do not achieve the intended objectives with the acquisition of such packages. Studies are needed to understand factors – contingent or otherwise – that may help increase knowled...
Conference Paper
Full-text available
This study investigated the effects of organizational decisions' locus, tasks structure, rules, information technology (IT) budget, and IT department's value perceptions on enterprise resource planning (ERP) system success. Although such contingent factors matter in the discourse, research on their effects is rare. To increase insight in the area,...
Article
Full-text available
Businesses operating in the Global Financial Services Industry (GFSI) know the importance of protecting information assets from ever-growing security threats and risks. This paper aims at shedding light on the relationships between four relevant contextual factors i.e. national legal infrastructure, transparency levels, ethical behavior of firms, a...
Chapter
Business organizations around the world engage in e-commerce (EC) and e-business to support business operations and enhance revenue generation from non-traditional sources. Studies focusing on EC adoption in Sub Saharan Africa (SSA) are just beginning to emerge in the extant information systems (IS) literature. The objective of this current study i...
Conference Paper
Full-text available
As indicated in the 2009 World Economic Forum Report, Sub-Saharan nations seriously lag behind the rest of the world by a significant margin in information and communication technology (ICT) diffusion. In this paper, we present evidences to show that ICT as use in other parts of the world cannot deliver the expected benefits in Sub-Sahara nations s...
Article
Full-text available
This research focuses on the drivers of e-government (E-gov) maturity in two comparable developing regions of the world i.e. Latin America and Sub-Saharan Africa (LA&SSA). E-gov maturity refers to the growth levels in a country's online services and its citizens' online participation in governance. To date, few researchers have focused on the drive...
Article
Full-text available
This research focuses on the determinants of e-government (E-gov) maturity in two comparable regions of the world i.e. Latin America and Sub-Saharan Africa (LA&SSA). E-gov maturity refers to the growth levels in a country’s online services and its citizens’ online participation in governance. To date, few researchers have focused on the determinant...
Article
Full-text available
This research investigated information systems security policy (ISSP) compliance by drawing upon two relevant theories i.e. the theory of planned behavior (TPB) and the protection motivation theory (PMT). A research model that fused constituents of the aforementioned theories was proposed and validated. Relevant hypotheses were developed to test th...
Article
Full-text available
Information systems (IS) offer healthcare practitioners a variety of benefits. As such, the acceptance of such technologies by healthcare professionals is an important topic of interest to both practitioners and researchers. IS acceptance has been widely researched in the extant literature, however, studies focusing on perspectives of healthcare pr...
Chapter
Full-text available
The issues of gender disparity in the usage of information technology (IT), as well as self-efficacy, have received considerable interest and attention among researchers in recent times. Prior research has identified that gender differences and self-efficiency affect the attitude towards adoption and use of technology. In general, females are belie...
Chapter
This study examines the influence of national IT policies, socio-economic and cultural factors on the network readiness of African countries. The capability and level of preparation of a nation to participate in and benefit from information and communication technologies (ICT) for socio-development is assessed by the network readiness index. Prior...
Book
Full-text available
No aspect of business, public, or private lives in developed economies can be discussed today without acknowledging the role of information and communication technologies (ICT). A shortage of studies still exists, however, on how ICTs can help developing economies. Leveraging Developing Economies with the Use of Information Technology: Trends and T...
Article
Full-text available
Business organizations around the world engage in e-commerce (EC) and e-business to support business operations and enhance revenue generation from non-traditional sources. Studies focusing on EC adoption in Sub Saharan Africa (SSA) are just beginning to emerge in the extant information systems (IS) literature. The objective of this current study i...
Article
External expertise and adequate levels of internal computer skills and knowledge are essential factors that can contribute to the success of complex information technology (IT) systems, including enterprise resource planning (ERP). Studies examining the effects of external expertise and in-house or internal computer/IT knowledge on the success of E...
Article
Full-text available
This study examines the influences of relevant environmental factors on E-government (E-gov) maturity in transition economies and developing countries (TEDC). Countries from Eastern Europe, Sub-Saharan Africa, Latin American and South Asia were selected for the study. Prior research has investigated E-gov growth, development, and diffusion across b...
Article
Practitioners in Global Financial Services Institutions (GFSI) know that they must concern themselves with protecting customer data and thwart emerging threats in their industry. The objective of this study is to provide a level of understanding and insight not apparent in a recent survey that investigated Information Technology (IT) security conce...
Conference Paper
Full-text available
This research examines the impact or influence of six (6) relevant factors on E-gov growth in Transition Economies of Central and Eastern Europe (TECEE). A 5-year panel data of sixteen (16) TECEE categorized as Leaders and Followers was used for data analysis in conjunction with the Ordinary Least Squares (OLS) technique. To test the influence of t...
Article
Full-text available
Small and medium enterprises (SMEs) around the world engage in e-commerce and e-business to support business operations as well as to enhance revenue generation from nontraditional sources. Internet and e-business technologies (IEBT) are the pillars of e-commerce and e-business. Despite the universal appeal of IEBT, it has been reported that the ad...
Article
Purpose The purpose of this paper is to highlight key information system (IS) issues in Estonian organizations for the mid‐2000s. This research is a follow‐up to an initial effort in the country in 1993, in which a similar theme was investigated. The primary objective of this present study was to compare and contrast the findings in the previous st...
Article
Full-text available
The literature shows that contingency factors such as organizational culture and structure, organization size, top management support, external expertise, and internal support are critical for the effectiveness of Enterprise Research Planning (ERP) systems in adopting organizations. Research on the effect of in-house computer and information techno...
Article
Full-text available
Purpose This study aims at contributing to the discussion related to what causes Canadian small and medium‐size enterprises (SMEs) to be reticent about accepting internet and e‐business technologies (IEBT) in their operations. The research also seeks to gain an understanding of the relative importance of each of the selected factors in the research...
Article
Full-text available
Our research focuses on the possible determinants of eGovernment (E-gov) maturity in the Transition Economies of Central and Eastern Europe (TEECE). E-gov maturity, in this research, refers to the growth levels in a country's online services and its citizens' online participation in governance. Our study of the extant literature indicated that few...
Article
This paper examines the relationships between three contextual factors i.e. transparency levels, information and communication technologies (ICT) use laws, and national legal systems efficiency and information security concerns in the global financial services institutions (GFSI). This research essentially seeks to expand the breadth of knowledge p...
Chapter
This study investigates the relationships between the contextual factor of national culture and information security concerns in the global financial services industry (GFSI). Essentially, this study attempts to expand the breath of information provided in the recent 2009 Deloitte Touche Tohmatsu (DTT) survey, which reported such issues in the fina...
Chapter
The Internet is a global network of interconnected computers using multiple Internet protocols (IP). Increasingly, it is being used to enhance business operation by both small and medium-sized enterprises (SMEs) and large organizations around the world (Bunker and MacGregor, 2002; Turban, Lee, King, & Chung, Lee, J., King, D. & Chung 2004). One rea...
Article
Enterprise resource planning (ERP) systems implementation success factors have been widely researched; however, few have investigated ERP post-implementation success in organizational contexts. The paucity of research into ERP system success evaluations partly motivates this research. To that end, the objective of this study is twofold. First, it p...
Article
Full-text available
A review of the literature shows that few have investigated the relationships among organisational culture, information technology (IT) resources, on the one hand and enterprise resource planning (ERP) system success, on the other. This study is designed to fill this gap in research. Surveys were conducted for two Northern European countries. Respo...
Chapter
This study investigates the relationships between the contextual factor of national culture and information security concerns in the global financial services industry (GFSI). Essentially, this study attempts to expand the breath of information provided in the recent 2009 Deloitte Touche Tohmatsu (DTT) survey, which reported such issues in the fina...
Article
Full-text available
Purpose The purpose of this paper is to add a layer of understanding to a previous survey of information technology (IT) security concerns and issues in global financial services institutions (GFSI). Design/methodology/approach This paper uses data obtained from a secondary source. The dimensions of national culture used in this paper come from Ho...
Article
The spread of internet and e-business technologies (IEBT) globally is attracting the attention of both practitioners and researchers. Needless to say, IEBT have enabled businesses (both large and small) to improve their reach and enhance productivity. The literature has shown that the acceptance of such technologies lags behind in small-and medium-...
Article
This paper explores the relationships between contextual factors i.e. transparency and regulatory (legal) environments and security concerns (threats, risk, and vulnerabilities) in the financial services industry. The industry is chosen for illustration purposes and for its relevance in global economic development. The research uses a secondary dat...
Article
Full-text available
Purpose The purpose of this paper is to examine the impact of some organizational information technology (IT) factors (i.e. IT assets, employees' IT skills, IT resources, and satisfaction with legacy IT systems) and their interacting effects with two contingency factors (i.e. organization's size and structure) on enterprise resource planning (ERP)...
Article
Full-text available
Current literature abounds with evidence of how developed economies utilize information and communication technologies (ICT) for socioeconomic development. On the other hand, less developed economies, including those in Africa continue to struggle with the use and diffusion of ICT. Such research, often under the theme of the digital divide, usually...
Chapter
Full-text available
The Internet is a global network of interconnected computers using multiple Internet protocols (IP). Increasingly, it is being used to enhance business operation by both small and medium-sized enterprises (SMEs) and large organizations around the world (Bunker and MacGregor, 2002; Turban, Lee, King, & Chung, Lee, J., King, D. & Chung 2004). One rea...
Chapter
The use of information communication technologies (ICT) especially the Internet by small- and medium-sized enterprises (SMEs) is on the increase in many regions of the world, including Africa. Nevertheless, empirical evidence from Sub-Saharan Africa (SSA) regarding the factors that affect the adoption of e-business is scarce. In that regard, the ma...
Conference Paper
Financial services institutions (FSIs) around the globe know they must proactively work toward protecting customer data and thwarting emerging security threats. Deloitte Touche Tohmatsu (DTT), an international firm that provides audit, consulting, and financial advisory services has used its networks and reach to investigate security and privacy is...
Article
Purpose – The purpose of this paper is to investigate the impact of such contingency factors as top management support, business vision, and external expertise, on the one hand, and enterprise resource planning (ERP) system success, on the other. Design/methodology/approach – A conceptual model was developed and relevant hypotheses formulated. Sur...
Conference Paper
The Network Readiness Index (NRI) was developed to measure the propensity for countries (and regions) to exploit information and communications technology (ICT) for development and growth. Much has been written about the influences of economic and non-economic factors on ICT diffusion in developed societies. Studies examining the impact of relevant...
Conference Paper
This study examines the impacts of relevant factors on the acceptance of internet and e-business technologies in Atlantic Canada’s SMEs (small- and medium-sized enterprises). A research framework was developed and nine hypotheses formulated to test the relationships. A survey was conducted and a total of 162 valid responses were obtained from busin...
Chapter
In this study, we investigate the influence of two external influences i.e., Ease of finding and Computer anxiety on the technology acceptance model (TAM) and the continuance intention of using a popular course management system (CMS): WebCT. The study used a sample of 72 students that have experience using the software. The students came from four...

Network

Cited By