Open Access. Powered by Scholars. Published by Universities.®

Business Law, Public Responsibility, and Ethics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business Law, Public Responsibility, and Ethics

How To Cultivate Compassion As A Tool For Everyday Leadership, Paula Webster Dec 2015

How To Cultivate Compassion As A Tool For Everyday Leadership, Paula Webster

Mindfulness Studies Theses

In this two-party thesis study, the need for compassion in our world is presented up front. Upon this foundation of the need for compassion, the building blocks that together comprise compassionate everyday leader are placed: leaders and leadership, mindful leadership, defining the everyday leader, mindfulness, compassion, and how to cultivate compassion. The evolution of broad concepts of leadership are reviewed, from a control-based approach to a more mindful leadership, social-intelligence based approach. In a mindful leadership approach, qualities of self-awareness are cultivated within and then manifest in relation to the leadership process. Everyday leadership is a more expansive and inclusive …


Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou Jan 2015

Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou

CCE Theses and Dissertations

An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …