Browsing by Author "Dyrendahl, Sofia"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item ADOPTING AGILE. A different interpretation of the proliferation of agile approaches from the perspective of management fashion theory and institutional theory(2020-02-13) Dyrendahl, Sofia; Robertsson, Julia; University of Gothenburg/Department of Business Administration; Göteborgs universitet/Företagsekonomiska institutionenThis study is a critical review of the term agile in order to place it in the literature of strategy theories. A study of people with agile knowledge’s view on an agile approach have been conducted to examine the development of agile as a management fashion. To support the management fashion theory, institutional theory has been used to further understand and explain why agile is seen as a fashion. This explanation is later used to understand the agile approach’s proliferation, which is used to answer the research question: why do organizations choose to adopt an agile approach? The study suggests that the agile approach has been diffused and decontextualized for it to fit into other industries than software development. Within its organizational field, it is being spread through mass media, a common language and interdependencies in complex environments.Item Faculty Reflections on University Information Security Policy(2021-11-30) Dyrendahl, Sofia; Institutionen för tillämpad informationsteknologi; Department of Applied Information TechnologyEmployee noncompliance of information security policy (ISP) is causing organizations more and more money in the battle against cybersecurity threats. Three popular theories within employee compliance and ISP research were used to create a conceptual framework to help explain the employees’ reflections, namely: protection motivation theory, deterrence theory and neutralization theory. A case study with faculty members from University of Gothenburg was conducted to see how the faculty members reflect when it comes to the ISP at their workplace and their own protection behavior. Semi-structured interviews were held digitally with six participants. The result indicate that faculty members rarely reflect on their protection behavior, they were unaware what the ISP was and even though they believed the threat of a cyberattack was medium to high, they still engaged in behavior they know could expose the university to unnecessary risk. This research can help the university and other government agencies to structure their Security Education, Training and Awareness (SETA) to match the employees’ behavior on IT security and help bring awareness of the knowledge and ideas employees have of information security.