Cultural and organisational commitment in the context of e-banking

Although information security is critical for organisations to survive, a number of studies continue to report incidents of critical information loss. To this end, there is still an increasing interest to study information security from a non-technical perspective. In doing so, this research focuses on the effect of strong corporate cultures and organisational commitment as important aspects in managing information security through e-banking. That is, manipulating more effectively e-banking security development and management within organisations. Achieving the required level of e-banking security within organisations usually requires more than security awareness and control but also a better understanding of the organisations' culture in which e-banking security measures are developed and tailored to. In effect, organisations may have a clearer insight into how to commit more effectively to such security measures and ultimately, offer more secure e-banking services to their customers.

[1]  Zbigniew H. Przasnyski,et al.  On Information Systems Project Abandonment: An Exploratory Study of Organizational Practices , 1991, MIS Q..

[2]  Uwe Flick,et al.  Triangulation Revisited: Strategy of Validation or Alternative? , 1992 .

[3]  John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology , 2004 .

[4]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .

[5]  Joseph S. Valacich,et al.  Virtual Team Trust: Instrument Development and Validation in an IS Educational Environment , 2003, Inf. Resour. Manag. J..

[6]  R. Keeney,et al.  The Value of Internet Commerce to the Customer , 1999 .

[7]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[8]  Wanda J. Orlikowski,et al.  Technological frames: making sense of information technology in organizations , 1994, TOIS.

[9]  John Leach,et al.  Improving user security behaviour , 2003, Comput. Secur..

[10]  R. Yin Yin, Robert K., Case Study Research: Design and Methods, 2nd ed. Newbury Park, CA: Sage, 1994. , 1994 .

[11]  Izak Benbasat,et al.  An Empirical Investigation of Factors Influencing the Success of Customer-Oriented Strategic Systems , 1990, Inf. Syst. Res..

[12]  Vj. Janesick The choreography of qualitative research design , 2000 .

[13]  Mikko T. Siponen,et al.  A Critical Assessment of IS Security Research between 1990-2004 , 2007, ECIS.

[14]  A. Clark,et al.  Enterprise Security Architecture: A Business-Driven Approach , 2005 .

[15]  T. H. Kwon,et al.  Unifying the fragmented models of information systems implementation , 1987 .

[16]  G. Dhillon Challenges in Managing Information Security in the New Millennium , 2001 .

[17]  Peter Moran,et al.  Contingent Organization as a Network Theory: The Culture- Performance Contingency Function , 1994 .

[18]  J. Kotter,et al.  Corporate Culture and Performance , 1992 .

[19]  Hervé Debar,et al.  Security information management as an outsourced service , 2006, Inf. Manag. Comput. Secur..

[20]  Michael Workman,et al.  Gaining Access with Social Engineering: An Empirical Study of the Threat , 2007, Inf. Secur. J. A Glob. Perspect..

[21]  Ioannis V. Koskosas Goal Setting and Trust in a Security Management Context , 2008, Inf. Secur. J. A Glob. Perspect..

[22]  Henry C. Lucas,et al.  Implementation: The Key to Successful Information Systems , 1981 .

[23]  Angèle L. M. Cavaye,et al.  Case study research: a multi‐faceted research approach for IS , 1996, Inf. Syst. J..

[24]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[25]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[26]  Varun Grover,et al.  Recognizing the politics of MIS , 1988, Inf. Manag..

[27]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[28]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[29]  Abhinav Rastogi,et al.  Secure Coding: Building Security into the Software Development Life Cycle , 2004, Inf. Secur. J. A Glob. Perspect..

[30]  Rossouw von Solms,et al.  Information Security Governance: A model based on the Direct-Control Cycle , 2006, Comput. Secur..

[31]  David Gefen,et al.  Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..

[32]  E. A. Locke,et al.  Goal setting and task performance: 1969–1980. , 1981 .

[33]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[34]  Marie Wilson,et al.  Shared cognition : mapping commonality and individuality , 1999 .

[35]  Peter Weill,et al.  An Assessment of the Contingency Theory of Management Information Systems , 1989, J. Manag. Inf. Syst..

[36]  Mikko T. Siponen,et al.  Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.

[37]  Joseph G. Rosse,et al.  Yours, Mine, and Ours: Facilitating Group Productivity through the Integration of Individual and Group Goals , 1995 .

[38]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[39]  E. A. Locke,et al.  Building a practically useful theory of goal setting and task motivation. A 35-year odyssey. , 2002, The American psychologist.