Information technology security management concerns in global financial services institutions: Is national culture a differentiator?
暂无分享,去创建一个
[1] J. Eatwell,et al. Global Governance of Financial Systems: The International Regulation of Systemic Risk , 2005 .
[2] Sanjay K. Singh,et al. An analysis of the cultural motivations for transborder data flow legislation , 1995, Inf. Technol. People.
[3] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..
[4] S. Jong,et al. Cross-country differences in ICT adoption: A consequence of Culture? , 2006 .
[5] Princely Ifinedo,et al. IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[6] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[7] Princely Ifinedo. Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions? , 2009, Int. J. Inf. Secur. Priv..
[8] G. Hofstede. Culture′s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations , 2001 .
[9] Hazel J. Johnson. Global Financial Institutions and Markets , 1999 .
[10] Yining Chen,et al. Straight through Processing Technology in Global Financial Market: Readiness Assessment and Implementation , 2003, J. Glob. Inf. Manag..
[11] C. Geertz,et al. The Interpretation of Cultures , 1973 .
[12] D GopalRam,et al. Global software piracy , 2000 .
[13] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[14] Kallol Kumar Bagchi,et al. Global software piracy , 2006, Commun. ACM.
[15] Allen N. Berger,et al. The Effects of Geographic Expansion on Bank Efficiency , 2000 .
[16] James Backhouse,et al. Opportunities for computer crime: considering systems risk from a criminological perspective , 2006, Eur. J. Inf. Syst..
[17] Quey-Jen Yeh,et al. Threats and countermeasures for information system security: A cross-industry study , 2007, Inf. Manag..
[18] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[19] Derek Schatz. Setting Priorities in Your Security Program , 2008 .
[20] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[21] E. Waarts,et al. The Influence of National Culture on the Adoption Status of Innovations:: An Empirical Study of Firms Across Europe , 2005 .
[22] Michelle Baddeley,et al. Globalisation, Regionalism and Economic Activity , 2003 .
[23] Harold F. Tipton,et al. Information security management handbook, Sixth Edition , 2003 .
[24] Ingoo Han,et al. Security threats to Internet: a Korean multi-industry investigation , 2001, Inf. Manag..
[25] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[26] S. E. Kruck,et al. Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use , 2008, Int. J. Inf. Secur. Priv..
[27] Bernard C. Y. Tan,et al. Dimensions of national culture and corporate adoption of IT infrastructure , 2001, IEEE Trans. Engineering Management.
[28] J. Eatwell,et al. Global Governance of Financial Systems , 2005 .
[29] Fariborz Moshirian. Global Financial Services and a Global Single Currency , 2007 .
[30] Neil F. Doherty,et al. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis , 2005, Inf. Resour. Manag. J..
[31] Scott Shane,et al. Cultural influences on national rates of innovation , 1993 .
[32] Atreyi Kankanhalli,et al. Cross-cultural differences and information systems developer values , 2004, Decis. Support Syst..
[33] Felix B. Tan,et al. Beyond Models of National Culture in Information Systems Research , 2002, J. Glob. Inf. Manag..
[34] Princely Ifinedo,et al. An empirical study of ERP success evaluations by business and IT managers , 2007, Inf. Manag. Comput. Secur..
[35] David McPhee. Information Technology Infrastructure Library and Security Management Overview , 2008 .
[36] Jim Q. Chen,et al. A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness , 2008, J. Glob. Inf. Manag..
[37] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[38] H. Raghav Rao,et al. Electronic Banking and Information Assurance Issues: Surveys and Synthesis , 2004, J. Organ. End User Comput..
[39] John H. Bodley. Cultural Anthropology: Tribes, States, and the Global System , 1994 .
[40] Allen N. Berger,et al. Efficiency of financial institutions: International survey and directions for future research , 1997 .