Open Access. Powered by Scholars. Published by Universities.®
Business Law, Public Responsibility, and Ethics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 2 of 2
Full-Text Articles in Business Law, Public Responsibility, and Ethics
How To Cultivate Compassion As A Tool For Everyday Leadership, Paula Webster
How To Cultivate Compassion As A Tool For Everyday Leadership, Paula Webster
Mindfulness Studies Theses
In this two-party thesis study, the need for compassion in our world is presented up front. Upon this foundation of the need for compassion, the building blocks that together comprise compassionate everyday leader are placed: leaders and leadership, mindful leadership, defining the everyday leader, mindfulness, compassion, and how to cultivate compassion. The evolution of broad concepts of leadership are reviewed, from a control-based approach to a more mindful leadership, social-intelligence based approach. In a mindful leadership approach, qualities of self-awareness are cultivated within and then manifest in relation to the leadership process. Everyday leadership is a more expansive and inclusive …
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
CCE Theses and Dissertations
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …