Yves BarletteMBS School of Business · Operations Information and Decisions
Yves Barlette
PhD-HDR in Information Systems - IS Security - Cybersecurity
Projects related to information security and coping-based theories.
About
100
Publications
84,847
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,744
Citations
Introduction
My research interests focus on information security behavior. I am member of the editorial review board of the International Journal of Information Management, Associate Editor of Communications of the Association for Information Systems, and editorial board member of the French Journal of Information systems.
Additional affiliations
September 1989 - August 2019
Education
March 2019 - September 2020
July 2001 - December 2006
Publications
Publications (100)
This conceptual paper addresses the capabilities offered by big data analytics (BDA), critical in turbulent environments, in the context of the Industry 4.0 revolution. BDA enhances organizational agility, as it is highly valuable for the identification of opportunities and threats (i.e., the sensing process of agility); however, with the exception...
The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to the provision and use of personal mobile devices and applications for both private and business purposes. This bottom-up phenomenon, not initiated by managers, corresponds to a reversed IT adoption logic that simultaneously entails business opportunities and threats. Ma...
The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 • C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot...
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistinguishable from that produced by a human, are applicable across a wide range of contexts. The technology presents opportunities as well as, often ethical and legal, challenges, and has the potential for both positive and negative impacts f...
Currently, health care institutions are confronted with practices related to Shadow IT (SIT) that allow employees to improve their efficiency through tools that complement corporate-provided IT resources. Although SIT practices can be beneficial, they also create additional vulnerabilities and access points for cyberthreats in institutions where pa...
Le comportement des employés est crucial en sécurité de l’information (SSI). Si de nombreuses recherches ont porté sur les comportements de coping orientés-problème (PFC), les comportements orientés-émotion (EFC) restent peu étudiés, et les recherches précédentes n’ont pas pu distinguer de manière satisfaisante leur nature inadéquate (dysfonctionne...
Si l’utilisation des systèmes d’IA (SIA) en SSI peut s’avérer bénéfique en améliorant l’identification et la classification des logiciels malveillants, la détection et la prévention de la cybercriminalité, leur utilisation offensive ou corrompue, capable de porter atteinte à des données sensibles concernant les individus, peut entraîner des conséqu...
Shadow IT (SIT) is characterized as (1) the use of unapproved IT resources by employees for the purpose of working more efficiently and (2) usage lacking malicious intent that nevertheless violates company rules and creates additional vulnerabilities that increase the risk of information security incidents. We examine SIT usage behaviors based on c...
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistin- guishable from that produced by a human, are applicable across a wide range of contexts. The technology presents opportunities as well as, often ethical and legal, challenges, and has the potential for both positive and negative impacts...
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistinguishable from that produced by a human, are applicable across a wide range of contexts. The technology presents opportunities as well as, often ethical and legal, challenges, and has the potential for both positive and negative impacts f...
De la création d’un article quantitatif à sa publication : processus et stratégies
Le comportement des employés face aux atouts et risques du Shadow IT Résumé L'utilisation du Shadow IT (SIT) est caractérisée ainsi : (1) l'usage par les employés de ressources informatiques non approuvées dans le but de travailler plus efficacement et (2) un usage sans intention malveillante, mais qui enfreint les règles de l'entreprise et crée de...
Les institutions de santé assistent aujourd’hui au développement des pratiques liées à l’informatique parallèle ou Shadow IT (SIT), soit l’utilisation d’outils informatiques (notamment appareils et applications) sans l’approbation des directions informatiques. Malgré les avantages avérés de ces pratiques, la SIT est synonyme de vulnérabilités d’aut...
I. Creating an article
Theoretical Model / Ctrl Vars - Field
Paper creation
Paper structure
Miscellaneous remarks
II. The publishing process
Journal Choice / Paper Level
Value criteria
From submission to publication: docs, actors, deadlines
Pipeline strategy
III. Research IDs and Citations
Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context...
La shadow IT (SIT) présente de nombreuses opportunités mais aussi des dangers pour les
employés et leurs entreprises. Notre but est d’étudier ce phénomène nouveau et encore peu
exploré. Pour améliorer la gestion des pratiques en matière de SIT, des recherches
récentes suggèrent qu'une meilleure connaissance des comportements des employés est
nécess...
Cette HDR a pour but de mettre en exergue la trajectoire académique donnant du sens aux 14 années qui ont suivi l’obtention de ma thèse en décembre 2006, au travers des principaux travaux présentés lors de conférences, des chapitres et ouvrages écrits et des 11 articles publiés dans des revues classées FNEGE/CNRS.
Depuis le début et encore à ce jou...
D'ici fin 2020, 30% des cyberattaques réussies contre les entreprises porteront sur leurs ressources Shadow IT (SIT) (Gartner, 2016). Cependant, l’introduction de la SIT doit être gérée, car son développement dans les entreprises est lié aux opportunités qu’elle offre (Gartner, 2017). Cette dualité inhérente aux opportunités et menaces que la SIT p...
Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees’ perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context...
This research addresses the determinants of CEOs’ actions regarding the information security (ISS) of small and medium enterprises (SMEs). This article aims to (a) identify factors influencing CEOs’ ISS actions, (b) examine the relevance of protection motivation theory (PMT) in explaining top management support (TMS, i.e., supportive actions) and (...
Cet article méthodologique a vocation à fournir aux chercheurs, qui utilisent des équations structurelles basées sur les moindres carrés partiels (PLS-SEM), un guide méthodologique leur permettant d’optimiser la rédaction de leurs articles de recherche. En plus de fournir les indicateurs et seuils de validité les plus récents, cet article propose l...
The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small- and medium-sized enterprises (SMEs).
Desi...
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the b...
Cette recherche est centrée sur le BYOD-Bring Your Own Device, soit l’usage d’équipements mobiles personnels (ordinateurs portables, tablettes et smartphones) pour travailler. Le BYOD permet de travailler autrement, facilitant ainsi la génération d’innovations managériales. Pourtant, des risques existent, particulièrement en contexte hospitalier, c...
Purpose - This paper presents the benefits and potential dangers of "bring your own device" (BYOD)-related practices. It aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small and medium-sized enterprises (SMEs).
Design/methodology/app...
Despite prior research on the ‘Bring Your Own Device’ (BYOD) phenomenon, little attention has been paid to perceptions of opportunities/threats associated with the implementation of BYOD by CEOs. This quantitative study is based on the coping model of user adaptation (CMUA). We enriched this model with quantitative constructs for assessing the CEOs...
Past research in the area of behavioral information security has mainly focused on large company employees. However, SMEs constitute a relevant field of study, as they represent more than 99 percent of European companies and are subject to rapidly increasing security threats. In addition, within SMEs, CEOs play a vital role in protecting their info...
Past research in the area of behavioral information security has mainly focused on large company employees. However, SMEs constitute a relevant field of study, as they represent more than 99 percent of European companies and are subject to rapidly increasing security threats. In addition, within SMEs, CEOs play a vital role in protecting their info...
This study focuses on security paradox situations related to the BYOD phenomenon (i.e. “bring your own device”, provision and use of personal devices such as smartphones, tablets, laptops for business purposes) in SMEs. We aim at identifying such “security paradox” situations in order to highlight discrepancies between the individuals’ security con...
This study focuses on BYOD practices (i.e. “bring your own device”, provision and use at work of personal devices such as smartphones, tablets, laptops) in SMEs. In this paper, we aim to identify the "security paradox" which is parallel to the risks faced by individuals and their security concerns about their personal data. After reviewing the lite...
Face aux turbulences internes comme externes auxquelles les entreprises sont aujourd’hui confrontées, quel est le rôle des technologies numériques ? Doit-on percevoir ces technologies numériques comme une source de turbulences, ou comme une ressource nécessaire ?
Les désordres numériques, entendus comme l’émergence de pratiques et d'usages pas tou...
In this paper, we present growing technological sector – additive manufacturing – and discuss its hidden potential as frugal innovation. Additive manufacturing, which is also known as three-dimensional (3D) printing, constitutes a recent manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D pri...
Dans cette contribution, nous traitons la question de l’impact de l’agilité organisationnelle et de l’alignement stratégique T.I.-métiers sur la performance organisationnelle. Dans cette optique, nous avons réalisé une revue de la littérature récente portant sur l’agilité et l’alignement, ainsi que sur l’interaction agilité-alignement. Nous sommes...
In this paper, we present a study on a growing technological sector – additive manufacturing. Additive manufacturing, also known as three-dimensional (3D) printing, is a novel manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D printing stands to completely transform manufacturing industry as...
In this paper, we present a study on a growing technological sector – additive manufacturing. Additive manufacturing, also known as three-dimensional (3D) printing, is a novel manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D printing stands to completely transform manufacturing industry as...
In this paper, we present a study on a growing technological sector – additive manufacturing. Additive manufacturing, also known as three-dimensional (3D) printing, presents a novel manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D printing stands to completely transform manufacturing indus...
In this paper we present two evolving concepts, Responsible Innovation and Open Innovation, aiming to deepen discussion on similarities and differences between the two. The idea for this conceptual pa-per is led by the need to elaborate the two concepts in order to allow easier alignment with organiza-tional strategies. We begin by presenting the d...
Cette contribution a pour but de faire le point sur certains impacts stratégiques du Cloud Computing sur les organisations. Nous avons choisi de nous concentrer sur trois avantages stratégiques du Cloud : (1) les possibilités apportées aux PME et entreprises des pays émergents, (2) le développement de l'agilité et (3) de la capacité d'innovation or...
In this paper we present research-in-progress regarding responsible innovation and integrated reverse logistics model. Reverse logistics model, in cohesion with other departments, such as Human Resources and Information Systems, produce an innovative service developed to increase efficiency in sustainability efforts and gain increased market value....
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper, we present research-in-progress regarding IS and reverse
logistics. Information Systems, in cohesion with clo...
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper, we present research-in-progress regarding IS and Reverse Logistics. Information Systems, in cohesion with clo...
In this paper, we bring state-of-the-art in the field of Responsible Innovation, aiming to deepen discussion on Responsible Innovation framework and its practical applicability. We begin by presenting the context in which the notion of Responsible Innovation was developed, continue with a brief overview of definitions, to finish with discussion abo...
(Full paper, but we work on enriched versions for journals) This study presents an empirical investigation of factors affecting SMB CEOs decision to improve or not their company's information security (ISS). We developed a research model by adopting the protection motivation theory (PMT) to investigate the effect of threat and coping appraisal on p...
In this paper we present research-in-progress regarding responsible innovation and integrated reverse logistics model. Reverse logistics model, in cohesion with other departments, such as Human Resources and Information Systems, produce an innovative service developed to increase efficiency in sustainability efforts and gain increased market value....
This study presents an empirical investigation of factors affecting SMB CEOs decision to improve or not their company's information security (ISS). We developed a research model by adopting the protection motivation theory (PMT) to investigate the effect of threat and coping appraisal on protective actions. We conducted a questionnaire-based survey...
Dans nombre de petites entreprises, le management des informations, de même que leur sécurité, qu’elles soient stratégiques ou non-essentielles à la survie de l’entreprise, comptables, commerciales ou autres, n'est pas assuré de manière satisfaisante. L’objet de ce chapitre est d’étudier le rôle joué par l'expert-comptable dans la prise de décision...
Cette contribution a pour but de faire le point sur les technologies numériques (TN) qui provoquent des changements majeurs dont il faut tirer parti pour développer la performance des entreprises. La question de recherche traitée est : comment améliorer l'exploitation des TN afin de développer leur potentiel ? Dans une première partie, nous nous pr...
In this paper we present research-in-progress regarding responsible innovation and integrated reverse logistics model. Reverse logistics model, in cohesion with other departments, such as Human Resources and Information Systems, produce an innovative service developed to increase efficiency in sustainability efforts and gain increased market value....
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper we present research in progress regarding IS and reverse logistics. Information Systems, in cohesion with clos...
Cet ouvrage constitue le quatrième volume de la revue « Management des Technologies Organisationnelles ». Comme les trois volumes précédents, celui-ci s’appuie sur les colloques organisés dans le champ du management des technologies organisationnelles par Montpellier Business School, la Chambre Professionnelle du Conseil Languedoc-Roussillon et le...
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper we present research in progress regarding IS and reverse logistics. Information Systems, in cohesion with clos...
This paper discusses the impact of recent factors such as social networks, big data & analytics, cloud computing and mobility on the CIO's role. The research question addressed is: "What avenues for future research can we identify to better understand and support the evolving role of the CIO?" After a literature review regarding the CIO's role and...
Cet ouvrage constitue le troisième volume de la série éditoriale « Management des Technologies Organisationnelles ». Après un premier numéro consacré à l’investigation de travaux de recherche conduits sur le thème du management et des technologies organisationnelles ; Puis un deuxième numéro centré sur la question de l’innovation organisationnelle...
Social networks become more numerous, integrate more and more services and more and more members: consequently, they are increasingly working in the personal and professional lives of companies' employees. Social networks involve new issues, both for employees and companies. The objective of our work is to identify (1) the various potential risks o...
Les systèmes d’information (S.I.) sont souvent rattachés aux innovations technologiques, à ce titre les medias présentent régulièrement les dernières innovations liées aux technologies de l'information et de la communication (TIC). Pourtant, les S.I. vont bien plus loin que cette simple vision. Si effectivement l'informatique, apparue dans les anné...
This research explores the influence of the certified public accountant (CPA) in advice related to information management within microfirms. Our purpose is to identify the extent to which the accountant can be commissioned to provide information system-related advice to owner-managers. CPAs, especially in very small enterprises (VSEs), often lack s...
Cette recherche a pour objet de comprendre le rôle joué par l’expert-comptable (EC) dans la gestion des informations de la TPE. Il s’agit de voir dans quelle mesure l’expert-comptable, pouvant être missionné pour apporter un conseil en système d’information aux dirigeants, intervient à ce niveau auprès d’eux. En effet ces derniers, d’autant plus en...
This article focuses on the role of SME managers in IS security (ISS), as these companies often suffer from more important ISS problems than larger companies. Although many specialists and scholars agree on the importance of their role, SME managers sometimes show little involvement or little action regarding ISS, leading to potentially disastrous...
Many studies exist on technical aspects of Information Systems' Security (ISS), but organizational issues have been neglected. This paper sets the focus on SMEs, which have often more important ISS problems than larger companies. More precisely, it focuses on SMEs' managers, as many specialists and scholars agree on the importance of this role. How...
Cet article traite de la sécurité des systèmes d'information (SSI) des PME, qui ont des problèmes souvent plus importants en matière de SSI que les entreprises de plus grande taille. Il s'intéresse plus particulièrement aux dirigeants de PME, car de nombreux spécialistes et scientifiques s'accordent sur leur rôle majeur. Pourtant certains dirigeant...
"La moitié des entreprises confrontées à un sinistre bloquant leur système d'information pendant plus de 10 jours ne s'en relèvent pas, cette "mortalité" monte à 93% dans les 5 ans qui suivent ce sinistre". Ces chiffres accablants soulignent l'importance de la sécurité des informations. L'objectif de ce chapitre est de vous sensibiliser et vous don...
This research aims at understanding the role played by the certified public accountant (CPA) in VSE manager decision-making related to their information system (IS). Drawing from the assessment that (1) this expert has got the skills to give advice regarding IS to the manager, and that (2) the latter often lacks skills and time to look after it, th...
Cet article traite de la sécurité des systèmes d'information (SSI) des PME, qui ont des problèmes souvent plus importants en matière de SSI que les entreprises de plus grande taille. Il s'intéresse plus particulièrement aux dirigeants de PME, car de nombreux spécialistes et scientifiques s'accordent sur leur rôle majeur. Pourtant certains dirigeant...
Obtaining, storing and processing information is critical to an organizations success and profitability. Ongoing innovations in information technology challenge managers, practitioners, and researchers to create and adapt to new policies, strategies, and solutions for information management.
Information Resources Management: Concepts, Methodologie...
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementat...
Many studies exist on the technical aspects of Information System's Security (ISS), but organizational issues have been neglected. On the one hand, this study identified main factors entailing SMEs' managers' involvement and action in ISS domain. On the other hand, barriers to action. A managers' typology has been identified: "Anxious", "Technical"...
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards.
A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementat...
Many studies exist on the technical aspects of Information System's Security (ISS), but organizational issues have been neglected. On the one hand, this study identified main factors entailing SMEs' managers' involvement and action in ISS domain. On the other hand, barriers to action. A managers' typology has been identified: "Anxious", "Technical"...
This literature review is dedicated to adoption and implementation of information systems security standards by companies. Standards provide good practices, better governance, compliance with laws and rules, and consistency between companies at international level. However, despite their contribution, level of adoption and implementation remains lo...
Many studies exist on the technical aspects of Information System's security, but organizational issues have been neglected. After a literature review that highlights the weaknesses in this particular field, we examine I.T. acceptation and adoption models and other fields such as psychology and behavioral theories. The conceptual framework thus con...
In this paper we attempt to find the reasons for low adoption of the international standard ISO/IEC 27001 on information security management. We benchmark ISO/IEC 27001 against the two other widely applied management system standards – ISO 9001 for quality management and ISO 14001 for environmental management We show that besides low adoption rates...
This literature review is dedicated to adoption and implementation of information systems security standards by companies. Standards provide good practices, better governance, compliance with laws and rules, and consistency between companies at international level. However, despite their contribution, level of adoption and implementation remains lo...
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standards. Further, we benchmark the recently published ISO 27001 IS security standard to ISO 9000 standard - a similar standard with a 20 years history - to develop expectation...
Cette recherche a pour objet de mieux comprendre les comportements des acteurs dans la sécurité des S.I., en PME. Une revue de la littérature a mis en évidence les lacunes de ce domaine très particulier, ce qui a conduit à discuter de l'adaptation d'autres modèles consacrés aux comportements d'acceptation et/ou d'utilisation des T.I.C. et des trava...
Cette contribution s'intéresse aux comportements sécuritaires des acteurs en PME. Après une revue de la littérature qui a mis en évidence les lacunes de ce domaine très particulier, nous avons discuté de l'adaptation de modèles consacrés aux comportements d'acceptation et/ou d'utilisation des T.I.C. et des travaux consacrés au succès de l'implantat...
Ce document propose une adaptation au domaine de la sécurité des informations des modèles et théories établies en S.I., relatifs à l'implication des dirigeants et aux facteurs qui vont déclencher les comportements sécuritaires des acteurs. La problématique soulevée correspond aux échanges plus ou moins informels entre décideurs et acteurs : comment...
Cette communication met l'accent sur les aspects organisationnels de la sécurité des informations. Elle
insiste sur le rôle majeur des décideurs qui pourraient détenir la clé du problème, et la nécessité de les
impliquer et de les amener à agir. Afin d'obtenir ceci, une information-formation et une sensibilisation
des décideurs (I.F.S.) semble indi...
Comment amener les acteurs des organisations à mieux respecter les règles et processus de sécurité grâce à l'éthique ?
Nous avons choisi de nous intéresser aux valeurs et comportements éthiques d'une manière théorique. Dans une première partie, nous allons examiner les modèles applicables et leurs limites et dans une deuxième partie nous verrons qu...
Sécurisation des processus et processus de sécurisation dans les DotComs, Yves Barlette, p.10
L’organisation apprenante : un lieu de médiation, Eleni Boursinou, p.19
Vers une "virtualisation" des Organisations ?, Pierre Chometon et Dominique Drillon, p.25
Analyse systémique des séquences de transferts d’information dans une perspective de coopérati...
La sécurité de l’information : les enjeux Damien Bruté de Rémur p7
Réflexions sur la communication publique entre PME et Commission Européenne en matière de sécurité de l’information Eleni Boursinou p22
ORBAC : un modèle de contrôle d’accès basé sur les organisations, Yves Deswarte, p30
Etude sur la sécurité du système d’information dans le milieu...
Comment créer et conserver la confiance du consommateur dans le commerce électronique ?, Yves Barlette, p.7
Collecte des données personnelles et confiance; Valérie Belen, p.15
Information et Perception; Damien Bruté de Rémur et Claudia Nyffenegger, p.23
Vers une sécurisation de l'environnement informationnel par la promotion des activités d'intelli...
Il y a une distorsion entre la sinistralité et les craintes des managers. Notre problématique sera de mieux comprendre quelles sont les pratiques des entreprises en matière de sécurité des informations afin de réduire cette distorsion. Une des solutions proposées pourrait être la sensibilisation des acteurs ? Il sera nécessaire de réaliser une étud...
La communication met en relief la distorsion entre la sinistralité et les craintes des managers face aux intrusions. La sinistralité est tout d’abord confrontée aux risques évoqués afin de souligner le fait que les protections mises en place sont trop souvent inadaptées. Afin d’y remédier, nous montrons qu’il faut sensibiliser les acteurs aux enjeu...
En guise d'introduction Damien Bruté de Rémur p4
La sécurité des informations : Quels Risques pour quelles entreprises ? Yves Barlette p11
L’équation de la sécurité, une analyse systémique des vulnérabilités de l’entreprise : vers un outil de gestion des risques Franck Bulinge p22
Comment contribuer à la sensibilisation des entreprises dans le doma...
Questions
Questions (5)
Hello,
I need to use AMOS to assess a model containing second order constructs.
I am not very familiar with CB SEM: is it possible to create reflective-formative second order constructs? I can create reflective-reflective 2nd order constructs if not. Anyway, I do not know if there are any specificities compared with SMARTPLS in terms of specification (repeated indicators?) and reporting (e.g., validity). Could you advise me any good reference (article, book or video)? thank you!
Yves
I conducted a quantitative study addressing 340 executives. The administration of the questionnaire was held by a panel company. The analyses were conducted using Smart-PLS.
A reviewer asked me: "Can you justify the sample size sufficiency for generalization of your model? What would be the boundary conditions for such generalizability?"
How can I answer this question? (any papers to advise?).
Do I need to ask the panel company "how many executives were targeted?" to obtain a ratio of 340/ targeted population? Or is this just a problem of statistical relevance given the complexity of the model?
Thank you for you help.
Recently, I was desk-rejected from a top-tier journal because my ongoing work were previously published in the proceedings of a small conference. This conference was not protected by a copyright and the elements corresponding to self-plagiarism (15-20% of the paper) were some parts of the lit. review and the validation process of our theoretical model (measurement model, CMD assessment, etc.). However, our introduction, results, discussion and conclusion were brand new. These elements consitute for me the actual originality of a paper.
We had to dumbly rewrite the common parts before submitting to another journal.
So, except submitting lit reviews or conceptual papers to confs, or asking not to be included in the proceedings, what should I do?
Hello,
A colleague of mine told me that I should not discuss non-significant results such as for example:
The variable "perceived severity" (of an information security disaster) has been found to be non-significant for SMB CEOs. In the discussion, I stated that it could correspond to a lack of awareness from CEOs about security problems and their consequences.
My colleague told me to remove this comment: is she right?
Thank you.
Hello,
I thought PLS was only interesting when the sample is not very important compared to the number of items, but I saw papers with roughly 200 responses and 20 items using PLS. Maybe it's a problem of formative vs. reflective variables? Thank you for your help.
Network
Cited