Cultural and organisational commitment in the context of e-banking
暂无分享,去创建一个
[1] Zbigniew H. Przasnyski,et al. On Information Systems Project Abandonment: An Exploratory Study of Organizational Practices , 1991, MIS Q..
[2] Uwe Flick,et al. Triangulation Revisited: Strategy of Validation or Alternative? , 1992 .
[3] John McCumber. Assessing and Managing Security Risk in IT Systems: A Structured Methodology , 2004 .
[4] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[5] Joseph S. Valacich,et al. Virtual Team Trust: Instrument Development and Validation in an IS Educational Environment , 2003, Inf. Resour. Manag. J..
[6] R. Keeney,et al. The Value of Internet Commerce to the Customer , 1999 .
[7] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[8] Wanda J. Orlikowski,et al. Technological frames: making sense of information technology in organizations , 1994, TOIS.
[9] John Leach,et al. Improving user security behaviour , 2003, Comput. Secur..
[10] R. Yin. Yin, Robert K., Case Study Research: Design and Methods, 2nd ed. Newbury Park, CA: Sage, 1994. , 1994 .
[11] Izak Benbasat,et al. An Empirical Investigation of Factors Influencing the Success of Customer-Oriented Strategic Systems , 1990, Inf. Syst. Res..
[12] Vj. Janesick. The choreography of qualitative research design , 2000 .
[13] Mikko T. Siponen,et al. A Critical Assessment of IS Security Research between 1990-2004 , 2007, ECIS.
[14] A. Clark,et al. Enterprise Security Architecture: A Business-Driven Approach , 2005 .
[15] T. H. Kwon,et al. Unifying the fragmented models of information systems implementation , 1987 .
[16] G. Dhillon. Challenges in Managing Information Security in the New Millennium , 2001 .
[17] Peter Moran,et al. Contingent Organization as a Network Theory: The Culture- Performance Contingency Function , 1994 .
[18] J. Kotter,et al. Corporate Culture and Performance , 1992 .
[19] Hervé Debar,et al. Security information management as an outsourced service , 2006, Inf. Manag. Comput. Secur..
[20] Michael Workman,et al. Gaining Access with Social Engineering: An Empirical Study of the Threat , 2007, Inf. Secur. J. A Glob. Perspect..
[21] Ioannis V. Koskosas. Goal Setting and Trust in a Security Management Context , 2008, Inf. Secur. J. A Glob. Perspect..
[22] Henry C. Lucas,et al. Implementation: The Key to Successful Information Systems , 1981 .
[23] Angèle L. M. Cavaye,et al. Case study research: a multi‐faceted research approach for IS , 1996, Inf. Syst. J..
[24] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[25] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[26] Varun Grover,et al. Recognizing the politics of MIS , 1988, Inf. Manag..
[27] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[28] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[29] Abhinav Rastogi,et al. Secure Coding: Building Security into the Software Development Life Cycle , 2004, Inf. Secur. J. A Glob. Perspect..
[30] Rossouw von Solms,et al. Information Security Governance: A model based on the Direct-Control Cycle , 2006, Comput. Secur..
[31] David Gefen,et al. Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..
[32] E. A. Locke,et al. Goal setting and task performance: 1969–1980. , 1981 .
[33] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[34] Marie Wilson,et al. Shared cognition : mapping commonality and individuality , 1999 .
[35] Peter Weill,et al. An Assessment of the Contingency Theory of Management Information Systems , 1989, J. Manag. Inf. Syst..
[36] Mikko T. Siponen,et al. Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.
[37] Joseph G. Rosse,et al. Yours, Mine, and Ours: Facilitating Group Productivity through the Integration of Individual and Group Goals , 1995 .
[38] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[39] E. A. Locke,et al. Building a practically useful theory of goal setting and task motivation. A 35-year odyssey. , 2002, The American psychologist.