Information systems resources and information security
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-010-9232-6
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Curtis P. Armstrong & V. Sambamurthy, 1999. "Information Technology Assimilation in Firms: The Influence of Senior Leadership and IT Infrastructures," Information Systems Research, INFORMS, vol. 10(4), pages 304-327, December.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
- Mun Y. Yi & Fred D. Davis, 2003. "Developing and Validating an Observational Learning Model of Computer Software Training and Skill Acquisition," Information Systems Research, INFORMS, vol. 14(2), pages 146-169, June.
- E. Burton Swanson, 1994. "Information Systems Innovation Among Organizations," Management Science, INFORMS, vol. 40(9), pages 1069-1092, September.
- Sirkka L. Jarvenpaa & Dorothy E. Leidner, 1998. "An Information Company in Mexico: Extending the Resource-Based View of the Firm to a Developing Country Context," Information Systems Research, INFORMS, vol. 9(4), pages 342-361, December.
- Terry Anthony Byrd & Bruce R. Lewis & Douglas E. Turner, 2004. "The Impact of IT Personnel Skills on IS Infrastructure and Competitive IS," Information Resources Management Journal (IRMJ), IGI Global, vol. 17(2), pages 38-62, April.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 0. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
- Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
- Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
- Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.
- Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 2020. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 22(5), pages 1241-1264, October.
- Humayun Zafar & Myung S. Ko & Kweku-Muata Osei-Bryson, 2016. "The value of the CIO in the top management team on performance in the case of information security breaches," Information Systems Frontiers, Springer, vol. 18(6), pages 1205-1215, December.
- Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
- R. Ramesh & H. Raghav Rao, 2011. "Editorial," Information Systems Frontiers, Springer, vol. 13(4), pages 451-452, September.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Kevin Zhu & Kenneth L. Kraemer, 2005. "Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry," Information Systems Research, INFORMS, vol. 16(1), pages 61-84, March.
- V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
- Elbashir, Mohamed Z. & Collier, Philip A. & Davern, Michael J., 2008. "Measuring the effects of business intelligence systems: The relationship between business process and organizational performance," International Journal of Accounting Information Systems, Elsevier, vol. 9(3), pages 135-153.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Prasad, Acklesh & Heales, Jon, 2010. "On IT and business value in developing countries: A complementarities-based approach," International Journal of Accounting Information Systems, Elsevier, vol. 11(4), pages 314-335.
- Eun Hee Park & Jongwoo Kim & Lynn Wiles, 2023. "The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information," Information Technology and Management, Springer, vol. 24(2), pages 177-193, June.
- Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
- Abhay Nath Mishra & Ritu Agarwal, 2010. "Technological Frames, Organizational Capabilities, and IT Use: An Empirical Investigation of Electronic Procurement," Information Systems Research, INFORMS, vol. 21(2), pages 249-270, June.
- Derrick Huang, C. & Hu, Qing & Behara, Ravi S., 2008. "An economic analysis of the optimal information security investment in the case of a risk-averse firm," International Journal of Production Economics, Elsevier, vol. 114(2), pages 793-804, August.
- William J. Kettinger & Chen Zhang & Kuo-Chung Chang, 2013. "Research Note —A View from the Top: Integrated Information Delivery and Effective Information Use from the Senior Executive's Perspective," Information Systems Research, INFORMS, vol. 24(3), pages 842-860, September.
- Zhang, Cheng & Dhaliwal, Jasbir, 2009. "An investigation of resource-based and institutional theoretic factors in technology adoption for operations and supply chain management," International Journal of Production Economics, Elsevier, vol. 120(1), pages 252-269, July.
- Kevin Zhu & Kenneth L. Kraemer & Sean Xu, 2006. "The Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on E-Business," Management Science, INFORMS, vol. 52(10), pages 1557-1576, October.
- Robert G. Fichman, 2004. "Real Options and IT Platform Adoption: Implications for Theory and Practice," Information Systems Research, INFORMS, vol. 15(2), pages 132-154, June.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
- ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
- Hilal Atasoy & Rajiv D. Banker & Paul A. Pavlou, 2016. "On the Longitudinal Effects of IT Use on Firm-Level Employment," Information Systems Research, INFORMS, vol. 27(1), pages 6-26, March.
- Xuan Yang & Xiao Li & Daning Hu & Harry Jiannan Wang, 2021. "Differential impacts of social influence on initial and sustained participation in open source software projects," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 72(9), pages 1133-1147, September.
- Severin Oesterle & Arne Buchwald & Nils Urbach, 2022. "Investigating the co-creation of IT consulting service value: empirical findings of a matched pair analysis," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(2), pages 571-597, June.
- Gediminas Adomavicius & Jesse Bockstedt & Alok Gupta, 2012. "Modeling Supply-Side Dynamics of IT Components, Products, and Infrastructure: An Empirical Analysis Using Vector Autoregression," Information Systems Research, INFORMS, vol. 23(2), pages 397-417, June.
- Lin Jia & Xiuwei Song & Dianne Hall, 2022. "Influence of Habits on Mobile Payment Acceptance: An Ecosystem Perspective," Information Systems Frontiers, Springer, vol. 24(1), pages 247-266, February.
More about this item
Keywords
IS resources; Information security; Information confidentiality; Information integrity; Information availability;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:13:y:2011:i:4:d:10.1007_s10796-010-9232-6. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.