Yves Barlette

Yves Barlette
MBS School of Business · Operations Information and Decisions

PhD-HDR in Information Systems - IS Security - Cybersecurity
Projects related to information security and coping-based theories.

About

100
Publications
84,847
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,744
Citations
Introduction
My research interests focus on information security behavior. I am member of the editorial review board of the International Journal of Information Management, Associate Editor of Communications of the Association for Information Systems, and editorial board member of the French Journal of Information systems.
Additional affiliations
September 1989 - August 2019
Montpellier Business School
Position
  • Professor (Associate)
Education
March 2019 - September 2020
Université de Montpellier
Field of study
  • Management Sciences - Information Systems
July 2001 - December 2006
Université de Montpellier
Field of study
  • Management Sciences - Information Systems

Publications

Publications (100)
Article
This conceptual paper addresses the capabilities offered by big data analytics (BDA), critical in turbulent environments, in the context of the Industry 4.0 revolution. BDA enhances organizational agility, as it is highly valuable for the identification of opportunities and threats (i.e., the sensing process of agility); however, with the exception...
Article
Full-text available
The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to the provision and use of personal mobile devices and applications for both private and business purposes. This bottom-up phenomenon, not initiated by managers, corresponds to a reversed IT adoption logic that simultaneously entails business opportunities and threats. Ma...
Article
The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 • C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot...
Article
Full-text available
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistinguishable from that produced by a human, are applicable across a wide range of contexts. The technology presents opportunities as well as, often ethical and legal, challenges, and has the potential for both positive and negative impacts f...
Article
Currently, health care institutions are confronted with practices related to Shadow IT (SIT) that allow employees to improve their efficiency through tools that complement corporate-provided IT resources. Although SIT practices can be beneficial, they also create additional vulnerabilities and access points for cyberthreats in institutions where pa...
Conference Paper
Full-text available
Le comportement des employés est crucial en sécurité de l’information (SSI). Si de nombreuses recherches ont porté sur les comportements de coping orientés-problème (PFC), les comportements orientés-émotion (EFC) restent peu étudiés, et les recherches précédentes n’ont pas pu distinguer de manière satisfaisante leur nature inadéquate (dysfonctionne...
Conference Paper
Si l’utilisation des systèmes d’IA (SIA) en SSI peut s’avérer bénéfique en améliorant l’identification et la classification des logiciels malveillants, la détection et la prévention de la cybercriminalité, leur utilisation offensive ou corrompue, capable de porter atteinte à des données sensibles concernant les individus, peut entraîner des conséqu...
Article
Shadow IT (SIT) is characterized as (1) the use of unapproved IT resources by employees for the purpose of working more efficiently and (2) usage lacking malicious intent that nevertheless violates company rules and creates additional vulnerabilities that increase the risk of information security incidents. We examine SIT usage behaviors based on c...
Article
Full-text available
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistin- guishable from that produced by a human, are applicable across a wide range of contexts. The technology presents opportunities as well as, often ethical and legal, challenges, and has the potential for both positive and negative impacts...
Article
Full-text available
Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistinguishable from that produced by a human, are applicable across a wide range of contexts. The technology presents opportunities as well as, often ethical and legal, challenges, and has the potential for both positive and negative impacts f...
Presentation
Full-text available
De la création d’un article quantitatif à sa publication : processus et stratégies
Conference Paper
Full-text available
Le comportement des employés face aux atouts et risques du Shadow IT Résumé L'utilisation du Shadow IT (SIT) est caractérisée ainsi : (1) l'usage par les employés de ressources informatiques non approuvées dans le but de travailler plus efficacement et (2) un usage sans intention malveillante, mais qui enfreint les règles de l'entreprise et crée de...
Conference Paper
Les institutions de santé assistent aujourd’hui au développement des pratiques liées à l’informatique parallèle ou Shadow IT (SIT), soit l’utilisation d’outils informatiques (notamment appareils et applications) sans l’approbation des directions informatiques. Malgré les avantages avérés de ces pratiques, la SIT est synonyme de vulnérabilités d’aut...
Presentation
I. Creating an article Theoretical Model / Ctrl Vars - Field Paper creation Paper structure Miscellaneous remarks II. The publishing process Journal Choice / Paper Level Value criteria From submission to publication: docs, actors, deadlines Pipeline strategy III. Research IDs and Citations
Chapter
Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context...
Conference Paper
Full-text available
La shadow IT (SIT) présente de nombreuses opportunités mais aussi des dangers pour les employés et leurs entreprises. Notre but est d’étudier ce phénomène nouveau et encore peu exploré. Pour améliorer la gestion des pratiques en matière de SIT, des recherches récentes suggèrent qu'une meilleure connaissance des comportements des employés est nécess...
Thesis
Full-text available
Cette HDR a pour but de mettre en exergue la trajectoire académique donnant du sens aux 14 années qui ont suivi l’obtention de ma thèse en décembre 2006, au travers des principaux travaux présentés lors de conférences, des chapitres et ouvrages écrits et des 11 articles publiés dans des revues classées FNEGE/CNRS. Depuis le début et encore à ce jou...
Conference Paper
D'ici fin 2020, 30% des cyberattaques réussies contre les entreprises porteront sur leurs ressources Shadow IT (SIT) (Gartner, 2016). Cependant, l’introduction de la SIT doit être gérée, car son développement dans les entreprises est lié aux opportunités qu’elle offre (Gartner, 2017). Cette dualité inhérente aux opportunités et menaces que la SIT p...
Article
Full-text available
Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees’ perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context...
Article
Full-text available
This research addresses the determinants of CEOs’ actions regarding the information security (ISS) of small and medium enterprises (SMEs). This article aims to (a) identify factors influencing CEOs’ ISS actions, (b) examine the relevance of protection motivation theory (PMT) in explaining top management support (TMS, i.e., supportive actions) and (...
Conference Paper
Full-text available
Cet article méthodologique a vocation à fournir aux chercheurs, qui utilisent des équations structurelles basées sur les moindres carrés partiels (PLS-SEM), un guide méthodologique leur permettant d’optimiser la rédaction de leurs articles de recherche. En plus de fournir les indicateurs et seuils de validité les plus récents, cet article propose l...
Article
The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small- and medium-sized enterprises (SMEs). Desi...
Article
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the b...
Article
Cette recherche est centrée sur le BYOD-Bring Your Own Device, soit l’usage d’équipements mobiles personnels (ordinateurs portables, tablettes et smartphones) pour travailler. Le BYOD permet de travailler autrement, facilitant ainsi la génération d’innovations managériales. Pourtant, des risques existent, particulièrement en contexte hospitalier, c...
Article
Purpose - This paper presents the benefits and potential dangers of "bring your own device" (BYOD)-related practices. It aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small and medium-sized enterprises (SMEs). Design/methodology/app...
Conference Paper
Full-text available
Despite prior research on the ‘Bring Your Own Device’ (BYOD) phenomenon, little attention has been paid to perceptions of opportunities/threats associated with the implementation of BYOD by CEOs. This quantitative study is based on the coping model of user adaptation (CMUA). We enriched this model with quantitative constructs for assessing the CEOs...
Article
Full-text available
Past research in the area of behavioral information security has mainly focused on large company employees. However, SMEs constitute a relevant field of study, as they represent more than 99 percent of European companies and are subject to rapidly increasing security threats. In addition, within SMEs, CEOs play a vital role in protecting their info...
Article
Full-text available
Past research in the area of behavioral information security has mainly focused on large company employees. However, SMEs constitute a relevant field of study, as they represent more than 99 percent of European companies and are subject to rapidly increasing security threats. In addition, within SMEs, CEOs play a vital role in protecting their info...
Conference Paper
Full-text available
This study focuses on security paradox situations related to the BYOD phenomenon (i.e. “bring your own device”, provision and use of personal devices such as smartphones, tablets, laptops for business purposes) in SMEs. We aim at identifying such “security paradox” situations in order to highlight discrepancies between the individuals’ security con...
Conference Paper
Full-text available
This study focuses on BYOD practices (i.e. “bring your own device”, provision and use at work of personal devices such as smartphones, tablets, laptops) in SMEs. In this paper, we aim to identify the "security paradox" which is parallel to the risks faced by individuals and their security concerns about their personal data. After reviewing the lite...
Book
Face aux turbulences internes comme externes auxquelles les entreprises sont aujourd’hui confrontées, quel est le rôle des technologies numériques ? Doit-on percevoir ces technologies numériques comme une source de turbulences, ou comme une ressource nécessaire ? Les désordres numériques, entendus comme l’émergence de pratiques et d'usages pas tou...
Article
Full-text available
In this paper, we present growing technological sector – additive manufacturing – and discuss its hidden potential as frugal innovation. Additive manufacturing, which is also known as three-dimensional (3D) printing, constitutes a recent manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D pri...
Conference Paper
Full-text available
Dans cette contribution, nous traitons la question de l’impact de l’agilité organisationnelle et de l’alignement stratégique T.I.-métiers sur la performance organisationnelle. Dans cette optique, nous avons réalisé une revue de la littérature récente portant sur l’agilité et l’alignement, ainsi que sur l’interaction agilité-alignement. Nous sommes...
Conference Paper
In this paper, we present a study on a growing technological sector – additive manufacturing. Additive manufacturing, also known as three-dimensional (3D) printing, is a novel manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D printing stands to completely transform manufacturing industry as...
Conference Paper
In this paper, we present a study on a growing technological sector – additive manufacturing. Additive manufacturing, also known as three-dimensional (3D) printing, is a novel manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D printing stands to completely transform manufacturing industry as...
Article
Full-text available
In this paper, we present a study on a growing technological sector – additive manufacturing. Additive manufacturing, also known as three-dimensional (3D) printing, presents a novel manufacturing process that builds layers to create a three-dimensional solid object from a digital model. 3D printing stands to completely transform manufacturing indus...
Conference Paper
Full-text available
In this paper we present two evolving concepts, Responsible Innovation and Open Innovation, aiming to deepen discussion on similarities and differences between the two. The idea for this conceptual pa-per is led by the need to elaborate the two concepts in order to allow easier alignment with organiza-tional strategies. We begin by presenting the d...
Article
Cette contribution a pour but de faire le point sur certains impacts stratégiques du Cloud Computing sur les organisations. Nous avons choisi de nous concentrer sur trois avantages stratégiques du Cloud : (1) les possibilités apportées aux PME et entreprises des pays émergents, (2) le développement de l'agilité et (3) de la capacité d'innovation or...
Article
Full-text available
In this paper we present research-in-progress regarding responsible innovation and integrated reverse logistics model. Reverse logistics model, in cohesion with other departments, such as Human Resources and Information Systems, produce an innovative service developed to increase efficiency in sustainability efforts and gain increased market value....
Conference Paper
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper, we present research-in-progress regarding IS and reverse logistics. Information Systems, in cohesion with clo...
Conference Paper
Full-text available
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper, we present research-in-progress regarding IS and Reverse Logistics. Information Systems, in cohesion with clo...
Conference Paper
In this paper, we bring state-of-the-art in the field of Responsible Innovation, aiming to deepen discussion on Responsible Innovation framework and its practical applicability. We begin by presenting the context in which the notion of Responsible Innovation was developed, continue with a brief overview of definitions, to finish with discussion abo...
Conference Paper
Full-text available
(Full paper, but we work on enriched versions for journals) This study presents an empirical investigation of factors affecting SMB CEOs decision to improve or not their company's information security (ISS). We developed a research model by adopting the protection motivation theory (PMT) to investigate the effect of threat and coping appraisal on p...
Conference Paper
In this paper we present research-in-progress regarding responsible innovation and integrated reverse logistics model. Reverse logistics model, in cohesion with other departments, such as Human Resources and Information Systems, produce an innovative service developed to increase efficiency in sustainability efforts and gain increased market value....
Article
Full-text available
This study presents an empirical investigation of factors affecting SMB CEOs decision to improve or not their company's information security (ISS). We developed a research model by adopting the protection motivation theory (PMT) to investigate the effect of threat and coping appraisal on protective actions. We conducted a questionnaire-based survey...
Chapter
Dans nombre de petites entreprises, le management des informations, de même que leur sécurité, qu’elles soient stratégiques ou non-essentielles à la survie de l’entreprise, comptables, commerciales ou autres, n'est pas assuré de manière satisfaisante. L’objet de ce chapitre est d’étudier le rôle joué par l'expert-comptable dans la prise de décision...
Conference Paper
Full-text available
Cette contribution a pour but de faire le point sur les technologies numériques (TN) qui provoquent des changements majeurs dont il faut tirer parti pour développer la performance des entreprises. La question de recherche traitée est : comment améliorer l'exploitation des TN afin de développer leur potentiel ? Dans une première partie, nous nous pr...
Conference Paper
Full-text available
In this paper we present research-in-progress regarding responsible innovation and integrated reverse logistics model. Reverse logistics model, in cohesion with other departments, such as Human Resources and Information Systems, produce an innovative service developed to increase efficiency in sustainability efforts and gain increased market value....
Conference Paper
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper we present research in progress regarding IS and reverse logistics. Information Systems, in cohesion with clos...
Book
Cet ouvrage constitue le quatrième volume de la revue « Management des Technologies Organisationnelles ». Comme les trois volumes précédents, celui-ci s’appuie sur les colloques organisés dans le champ du management des technologies organisationnelles par Montpellier Business School, la Chambre Professionnelle du Conseil Languedoc-Roussillon et le...
Chapter
Full-text available
Sustainability is becoming increasingly significant for business researchers and practitioners, where Information Systems (IS) and sustainable development open up a new field of interesting issues to be addressed by scholars. In this paper we present research in progress regarding IS and reverse logistics. Information Systems, in cohesion with clos...
Conference Paper
Full-text available
This paper discusses the impact of recent factors such as social networks, big data & analytics, cloud computing and mobility on the CIO's role. The research question addressed is: "What avenues for future research can we identify to better understand and support the evolving role of the CIO?" After a literature review regarding the CIO's role and...
Book
Cet ouvrage constitue le troisième volume de la série éditoriale « Management des Technologies Organisationnelles ». Après un premier numéro consacré à l’investigation de travaux de recherche conduits sur le thème du management et des technologies organisationnelles ; Puis un deuxième numéro centré sur la question de l’innovation organisationnelle...
Article
Full-text available
Social networks become more numerous, integrate more and more services and more and more members: consequently, they are increasingly working in the personal and professional lives of companies' employees. Social networks involve new issues, both for employees and companies. The objective of our work is to identify (1) the various potential risks o...
Chapter
Full-text available
Les systèmes d’information (S.I.) sont souvent rattachés aux innovations technologiques, à ce titre les medias présentent régulièrement les dernières innovations liées aux technologies de l'information et de la communication (TIC). Pourtant, les S.I. vont bien plus loin que cette simple vision. Si effectivement l'informatique, apparue dans les anné...
Conference Paper
Full-text available
This research explores the influence of the certified public accountant (CPA) in advice related to information management within microfirms. Our purpose is to identify the extent to which the accountant can be commissioned to provide information system-related advice to owner-managers. CPAs, especially in very small enterprises (VSEs), often lack s...
Conference Paper
Full-text available
Cette recherche a pour objet de comprendre le rôle joué par l’expert-comptable (EC) dans la gestion des informations de la TPE. Il s’agit de voir dans quelle mesure l’expert-comptable, pouvant être missionné pour apporter un conseil en système d’information aux dirigeants, intervient à ce niveau auprès d’eux. En effet ces derniers, d’autant plus en...
Article
Full-text available
This article focuses on the role of SME managers in IS security (ISS), as these companies often suffer from more important ISS problems than larger companies. Although many specialists and scholars agree on the importance of their role, SME managers sometimes show little involvement or little action regarding ISS, leading to potentially disastrous...
Article
Full-text available
Many studies exist on technical aspects of Information Systems' Security (ISS), but organizational issues have been neglected. This paper sets the focus on SMEs, which have often more important ISS problems than larger companies. More precisely, it focuses on SMEs' managers, as many specialists and scholars agree on the importance of this role. How...
Conference Paper
Full-text available
Cet article traite de la sécurité des systèmes d'information (SSI) des PME, qui ont des problèmes souvent plus importants en matière de SSI que les entreprises de plus grande taille. Il s'intéresse plus particulièrement aux dirigeants de PME, car de nombreux spécialistes et scientifiques s'accordent sur leur rôle majeur. Pourtant certains dirigeant...
Chapter
"La moitié des entreprises confrontées à un sinistre bloquant leur système d'information pendant plus de 10 jours ne s'en relèvent pas, cette "mortalité" monte à 93% dans les 5 ans qui suivent ce sinistre". Ces chiffres accablants soulignent l'importance de la sécurité des informations. L'objectif de ce chapitre est de vous sensibiliser et vous don...
Conference Paper
Full-text available
This research aims at understanding the role played by the certified public accountant (CPA) in VSE manager decision-making related to their information system (IS). Drawing from the assessment that (1) this expert has got the skills to give advice regarding IS to the manager, and that (2) the latter often lacks skills and time to look after it, th...
Conference Paper
Full-text available
Cet article traite de la sécurité des systèmes d'information (SSI) des PME, qui ont des problèmes souvent plus importants en matière de SSI que les entreprises de plus grande taille. Il s'intéresse plus particulièrement aux dirigeants de PME, car de nombreux spécialistes et scientifiques s'accordent sur leur rôle majeur. Pourtant certains dirigeant...
Chapter
Obtaining, storing and processing information is critical to an organizations success and profitability. Ongoing innovations in information technology challenge managers, practitioners, and researchers to create and adapt to new policies, strategies, and solutions for information management. Information Resources Management: Concepts, Methodologie...
Chapter
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementat...
Conference Paper
Full-text available
Many studies exist on the technical aspects of Information System's Security (ISS), but organizational issues have been neglected. On the one hand, this study identified main factors entailing SMEs' managers' involvement and action in ISS domain. On the other hand, barriers to action. A managers' typology has been identified: "Anxious", "Technical"...
Chapter
Full-text available
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementat...
Conference Paper
Full-text available
Many studies exist on the technical aspects of Information System's Security (ISS), but organizational issues have been neglected. On the one hand, this study identified main factors entailing SMEs' managers' involvement and action in ISS domain. On the other hand, barriers to action. A managers' typology has been identified: "Anxious", "Technical"...
Conference Paper
Full-text available
This literature review is dedicated to adoption and implementation of information systems security standards by companies. Standards provide good practices, better governance, compliance with laws and rules, and consistency between companies at international level. However, despite their contribution, level of adoption and implementation remains lo...
Article
Full-text available
Many studies exist on the technical aspects of Information System's security, but organizational issues have been neglected. After a literature review that highlights the weaknesses in this particular field, we examine I.T. acceptation and adoption models and other fields such as psychology and behavioral theories. The conceptual framework thus con...
Conference Paper
Full-text available
In this paper we attempt to find the reasons for low adoption of the international standard ISO/IEC 27001 on information security management. We benchmark ISO/IEC 27001 against the two other widely applied management system standards – ISO 9001 for quality management and ISO 14001 for environmental management We show that besides low adoption rates...
Conference Paper
Full-text available
This literature review is dedicated to adoption and implementation of information systems security standards by companies. Standards provide good practices, better governance, compliance with laws and rules, and consistency between companies at international level. However, despite their contribution, level of adoption and implementation remains lo...
Conference Paper
Full-text available
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standards. Further, we benchmark the recently published ISO 27001 IS security standard to ISO 9000 standard - a similar standard with a 20 years history - to develop expectation...
Conference Paper
Full-text available
Cette recherche a pour objet de mieux comprendre les comportements des acteurs dans la sécurité des S.I., en PME. Une revue de la littérature a mis en évidence les lacunes de ce domaine très particulier, ce qui a conduit à discuter de l'adaptation d'autres modèles consacrés aux comportements d'acceptation et/ou d'utilisation des T.I.C. et des trava...
Conference Paper
Full-text available
Cette contribution s'intéresse aux comportements sécuritaires des acteurs en PME. Après une revue de la littérature qui a mis en évidence les lacunes de ce domaine très particulier, nous avons discuté de l'adaptation de modèles consacrés aux comportements d'acceptation et/ou d'utilisation des T.I.C. et des travaux consacrés au succès de l'implantat...
Conference Paper
Full-text available
Ce document propose une adaptation au domaine de la sécurité des informations des modèles et théories établies en S.I., relatifs à l'implication des dirigeants et aux facteurs qui vont déclencher les comportements sécuritaires des acteurs. La problématique soulevée correspond aux échanges plus ou moins informels entre décideurs et acteurs : comment...
Article
Full-text available
Cette communication met l'accent sur les aspects organisationnels de la sécurité des informations. Elle insiste sur le rôle majeur des décideurs qui pourraient détenir la clé du problème, et la nécessité de les impliquer et de les amener à agir. Afin d'obtenir ceci, une information-formation et une sensibilisation des décideurs (I.F.S.) semble indi...
Chapter
Comment amener les acteurs des organisations à mieux respecter les règles et processus de sécurité grâce à l'éthique ? Nous avons choisi de nous intéresser aux valeurs et comportements éthiques d'une manière théorique. Dans une première partie, nous allons examiner les modèles applicables et leurs limites et dans une deuxième partie nous verrons qu...
Conference Paper
Full-text available
Sécurisation des processus et processus de sécurisation dans les DotComs, Yves Barlette, p.10 L’organisation apprenante : un lieu de médiation, Eleni Boursinou, p.19 Vers une "virtualisation" des Organisations ?, Pierre Chometon et Dominique Drillon, p.25 Analyse systémique des séquences de transferts d’information dans une perspective de coopérati...
Conference Paper
Full-text available
La sécurité de l’information : les enjeux Damien Bruté de Rémur p7 Réflexions sur la communication publique entre PME et Commission Européenne en matière de sécurité de l’information Eleni Boursinou p22 ORBAC : un modèle de contrôle d’accès basé sur les organisations, Yves Deswarte, p30 Etude sur la sécurité du système d’information dans le milieu...
Conference Paper
Full-text available
Comment créer et conserver la confiance du consommateur dans le commerce électronique ?, Yves Barlette, p.7 Collecte des données personnelles et confiance; Valérie Belen, p.15 Information et Perception; Damien Bruté de Rémur et Claudia Nyffenegger, p.23 Vers une sécurisation de l'environnement informationnel par la promotion des activités d'intelli...
Conference Paper
Full-text available
Il y a une distorsion entre la sinistralité et les craintes des managers. Notre problématique sera de mieux comprendre quelles sont les pratiques des entreprises en matière de sécurité des informations afin de réduire cette distorsion. Une des solutions proposées pourrait être la sensibilisation des acteurs ? Il sera nécessaire de réaliser une étud...
Article
Full-text available
La communication met en relief la distorsion entre la sinistralité et les craintes des managers face aux intrusions. La sinistralité est tout d’abord confrontée aux risques évoqués afin de souligner le fait que les protections mises en place sont trop souvent inadaptées. Afin d’y remédier, nous montrons qu’il faut sensibiliser les acteurs aux enjeu...
Book
Full-text available
En guise d'introduction Damien Bruté de Rémur p4 La sécurité des informations : Quels Risques pour quelles entreprises ? Yves Barlette p11 L’équation de la sécurité, une analyse systémique des vulnérabilités de l’entreprise : vers un outil de gestion des risques Franck Bulinge p22 Comment contribuer à la sensibilisation des entreprises dans le doma...

Questions

Questions (5)
Question
Hello,
I need to use AMOS to assess a model containing second order constructs.
I am not very familiar with CB SEM: is it possible to create reflective-formative second order constructs? I can create reflective-reflective 2nd order constructs if not. Anyway, I do not know if there are any specificities compared with SMARTPLS in terms of specification (repeated indicators?) and reporting (e.g., validity). Could you advise me any good reference (article, book or video)? thank you!
Yves
Question
I conducted a quantitative study addressing 340 executives. The administration of the questionnaire was held by a panel company. The analyses were conducted using Smart-PLS.
A reviewer asked me: "Can you justify the sample size sufficiency for generalization of your model? What would be the boundary conditions for such generalizability?"
How can I answer this question? (any papers to advise?).
Do I need to ask the panel company "how many executives were targeted?" to obtain a ratio of 340/ targeted population? Or is this just a problem of statistical relevance given the complexity of the model?
Thank you for you help.
Question
Recently, I was desk-rejected from a top-tier journal because my ongoing work were previously published in the proceedings of a small conference. This conference was not protected by a copyright and the elements corresponding to self-plagiarism (15-20% of the paper) were some parts of the lit. review and the validation process of our theoretical model (measurement model, CMD assessment, etc.). However, our introduction, results, discussion and conclusion were brand new. These elements consitute for me the actual originality of a paper.
We had to dumbly rewrite the common parts before submitting to another journal.
So, except submitting lit reviews or conceptual papers to confs, or asking not to be included in the proceedings, what should I do?
Question
Hello,
A colleague of mine told me that I should not discuss non-significant results such as for example:
The variable "perceived severity" (of an information security disaster) has been found to be non-significant for SMB CEOs. In the discussion, I stated that it could correspond to a lack of awareness from CEOs about security problems and their consequences.
My colleague told me to remove this comment: is she right?
Thank you.
Question
Hello,
I thought PLS was only interesting when the sample is not very important compared to the number of items, but I saw papers with roughly 200 responses and 20 items using PLS. Maybe it's a problem of formative vs. reflective variables? Thank you for your help.

Network