Does Security Impact E-procurement Performance? Testing a Model of Direct and Moderated Effects
暂无分享,去创建一个
[1] Powell E. Robinson,et al. The Impact of E-Replenishment Strategy on Make-to-Order Supply Chain Performance , 2005, Decis. Sci..
[2] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[3] Detmar W. Straub,et al. Validation in Information Systems Research: A State-of-the-Art Assessment , 2001, MIS Q..
[4] Andrew B. Whinston,et al. An Empirical Investigation of Net-Enabled Business Value , 2004, MIS Q..
[5] Robin L. Dillon,et al. Including technical and security risks in the management of information systems: A programmatic risk management model , 2005, Syst. Eng..
[6] R. Narasimhan,et al. Perspectives on risk management in supply chains , 2009 .
[7] Michael A. Roberto,et al. Lessons from Everest: The Interaction of Cognitive Bias, Psychological Safety, and System Complexity , 2002 .
[8] S. Snell,et al. Integrated Manufacturing and Job Design: Moderating Effects of Organizational Inertia , 1991 .
[9] Lawrence A. Gordon,et al. Market Value of Voluntary Disclosures Concerning Information Security , 2010, MIS Q..
[10] G. Day. The Capabilities of Market-Driven Organizations , 1994 .
[11] Richard L. Daft,et al. Measures of Perrow's Work Unit Technology: An Empirical Assessment and a New Scale , 1983 .
[12] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[13] Richard Baskerville,et al. Power and Practice in Information Systems Security Research , 2008, ICIS.
[14] Detmar W. Straub,et al. Current Technological Impediments to Business-to-Consumer Electronic Commerce , 1999, Commun. Assoc. Inf. Syst..
[15] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .
[16] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[17] M. Lindell,et al. Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.
[18] T. S. Lee,et al. Pooling Data Across Transparently Different Groups of Key Informants: Measurement Equivalence and Survey Research , 2008, Decis. Sci..
[19] C. Wisner. A STRUCTURAL EQUATION MODEL OF SUPPLY CHAIN MANAGEMENT STRATEGIES AND FIRM PERFORMANCE , 2003 .
[20] Godwin J. Udo,et al. Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..
[21] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[22] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[23] Jerry C. Wei,et al. Impact of eBusiness technologies on operational performance: The role of production information integration in the supply chain , 2007 .
[24] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[25] Ram L. Kumar,et al. A Framework for Assessing the Business Value of Information Technology Infrastructures , 2004, J. Manag. Inf. Syst..
[26] Sunder Kekre,et al. Strategic and Operational Benefits of Electronic Integration in B2B Procurement Processes , 2002, Manag. Sci..
[27] Laura Lally,et al. Information Technology as a Target and Shield in the Post 9/11 Environment , 2005, Inf. Resour. Manag. J..
[28] Michelle D. Lane,et al. Exploring the barriers to the adoption of e‐auctions for sourcing , 2006 .
[29] Kyung Kyu Kim,et al. An Assessment of Electronic Information Transfer in B2B Supply-Channel Relationships , 2005, J. Manag. Inf. Syst..
[30] Ramesh Kolluru,et al. Security and trust management in supply chains , 2001, Inf. Manag. Comput. Secur..
[31] Varun Grover,et al. Examining the Impact of Interorganizational Systems on Process Efficiency and Sourcing Leverage in Buyer-Supplier Dyads , 2005, Decis. Sci..
[32] Rajiv Kohli,et al. Measuring Information Technology Payoff: A Meta - Analysis of Structural Variables in Firm - Level Empirical Research , 2003, Inf. Syst. Res..
[33] Ganesh Vaidyanathan,et al. A five-factor framework for analyzing online risks in e-businesses , 2003, CACM.
[34] Roger G. Schroeder,et al. Generic manufacturing strategies: an empirical test of two configurational typologies , 2001 .
[35] A. S. Carr,et al. The relationship between information technology use and buyer-supplier relationships: an exploratory analysis of the buying firm's perspective , 2002, IEEE Trans. Engineering Management.
[36] Germaine H. Saad,et al. Managing Disruption Risks in Supply Chains , 2005 .
[37] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[38] P. Bentler,et al. Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .
[39] Laura B. Cardinal,et al. RETROSPECTIVE REPORTS IN ORGANIZATIONAL RESEARCH: A REEXAMINATION OF RECENT EVIDENCE , 1997 .
[40] Stefan Einarsson. Human error in high hazard systems: Do we treat the problem in an appropriate way? , 1999 .
[41] James C. Anderson,et al. Some Methods for Respecifying Measurement Models to Obtain Unidimensional Construct Measurement , 1982 .
[42] Joseph P. Cannon,et al. An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .
[43] P. Pavlou,et al. Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .
[44] K. B. Hendricks,et al. An Empirical Analysis of the Effect of Supply Chain Disruptions on Long‐Run Stock Price Performance and Equity Risk of the Firm , 2005 .
[45] Robert W. Zmud,et al. A Contingency Approach to Software Project Coordination , 2002, J. Manag. Inf. Syst..
[46] Robin L. Dillon,et al. Including technical and security risks in the management of information systems: A programmatic risk management model , 2005 .
[47] Jayashankar M. Swaminathan,et al. Models for Supply Chains in E-Business , 2003, Manag. Sci..
[48] K. Eisenhardt. Agency Theory: An Assessment and Review , 1989 .
[49] J. Mentzer,et al. Logistics Service Quality as a Segment-Customized Process , 2001 .