Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism
暂无分享,去创建一个
[1] D. Dougherty,et al. Sustained product innovation in large, mature organizations: Overcoming innovation-to-organization problems. , 1996 .
[2] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[3] James D. Westphal,et al. Customization or Conformity? An Institutional and Network Perspective on the Content and Consequences of TQM Adoption , 1997 .
[4] Maarten A. Hajer,et al. Setting the Stage , 2005, Strategy and Command.
[5] D. Jiménez-Jiménez,et al. Innovation or imitation? The role of organizational culture , 2011 .
[6] Anthony M. Cresswell,et al. Interorganizational Information Integration in the Criminal Justice Enterprise: Preliminary Lessons from State and County Initiatives , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[7] Volkert J. Batelaan. Organizational Culture and Strategy: A Study of Cultural Influences on the Formulation of Strategies, Goals, and Objectives in Two Companies , 1993 .
[8] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[9] Eldon Y. Li,et al. Do organizational citizenship behaviors lead to information system success?: Testing the mediation effects of integration climate and project management , 2008, Inf. Manag..
[10] Jeffrey E. Kottemann,et al. E-Government and Related Indices: Telecommunications Infrastructure, Human Capital, Institutional Efficacy, and Online Services , 2015, Int. J. Electron. Gov. Res..
[11] Rossouw von Solms,et al. Towards an Information Security Competence Maturity Model , 2006 .
[12] K. Wei,et al. The role of institutional pressures and organizational culture in the firm's intention to adopt internet‐enabled supply chain management systems , 2010 .
[13] J. Hair. Multivariate data analysis , 1972 .
[14] Kai Wegrich,et al. Control Over Government: Institutional Isomorphism and Governance Dynamics in German Public Administration , 2005 .
[15] Omar E. M. Khalil,et al. e-Government readiness: Does national culture matter? , 2011, Gov. Inf. Q..
[16] Evangelos A. Kiountouzis,et al. Information systems security policies: a contextual perspective , 2005, Comput. Secur..
[17] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[18] Gwenda R. Greene. Assessing the Impact of Security Culture and the Employee-Organization Relationship on IS Security Compliance I , 2010 .
[19] B. Meglino,et al. The role of dispositional and situational antecedents in prosocial organizational behavior: An exami , 1994 .
[20] Alex Z. Kondra,et al. Institutional processes of organizational culture , 2009 .
[21] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[22] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[23] Kwok Kee Wei,et al. Organizational culture and leadership in ERP implementation , 2008, Decis. Support Syst..
[24] Seok-Jin Eom,et al. “Institutional Dimensions of e-Government Development , 2013 .
[25] Mark C. Suchman,et al. Legitimacy in Organizational Institutionalism , 2009 .
[26] Marguerite Schneider,et al. Phases of the Adoption of Innovation in Organizations: Effects of Environment, Organization and Top Managers , 2006 .
[27] Michael Parent,et al. Mimetic Isomorphism and Technology Evaluation: Does Imitation Transcend Judgment? , 2002, J. Assoc. Inf. Syst..
[28] Jacob Cohen. Statistical Power Analysis , 1992 .
[29] J. van Leeuwen,et al. Information Security , 2003, Lecture Notes in Computer Science.
[30] Yogesh Kumar Dwivedi,et al. A Conceptual Model for Examining E-Government Adoption in Jordan , 2012, Int. J. Electron. Gov. Res..
[31] Zhao Huang,et al. Usability and credibility of e-government websites , 2014, Gov. Inf. Q..
[32] D. Organ. Organizational Citizenship Behavior: It's Construct Clean-Up Time , 1997 .
[33] Manuel Pérez Cota,et al. Potential dimensions for a local e-Government services quality model , 2016, Telematics Informatics.
[34] Minqiang Li,et al. A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis , 2014, Inf. Sci..
[35] Sue Newell,et al. Understanding Project Survival in an ES Environment: A Sociomaterial Practice Perspective , 2010, J. Assoc. Inf. Syst..
[36] Soon Ae Chun,et al. Government information sharing and integration: Combining the social and the technical , 2009, Inf. Polity.
[37] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[38] Helle Zinner Henriksen,et al. The First Leg of E-Government Research: Domains and Application Areas 1998-2003 , 2005, Int. J. Electron. Gov. Res..
[39] Anthony M. Cresswell,et al. Information systems development as emergent socio-technical change: a practice approach , 2005, Eur. J. Inf. Syst..
[40] Shane R. Thye,et al. Supervisor Support in the Work Place: Legitimacy and Positive Affectivity , 2000, The Journal of social psychology.
[41] J. I. Criado,et al. Building the Digital Government in Regions: Success Factors and Institutional Barriers in Spanish Comunidades Autónomas , 2010 .
[42] Daniel D. Joseph,et al. Stability of fluid motions , 1976 .
[43] Sonja Wiley-Patton,et al. Building Legitimacy for IT Innovations: The Case of Computerized Physician Order Entry Systems , 2010, J. Assoc. Inf. Syst..
[44] Rossouw von Solms,et al. Towards information security behavioural compliance , 2004, Comput. Secur..
[45] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[46] Yuehua Wu,et al. Protecting personal data in E-government: A cross-country study , 2014, Gov. Inf. Q..
[47] N. Doherty,et al. Aligning the information security policy with the strategic information systems plan , 2006, Comput. Secur..
[48] Pamela S. Tolbert,et al. Institutional Sources of Change in the Formal Structure of Organizations: The Diffusion of Civil Service Reform, 1880-1935 , 1983 .
[49] L. Tost,et al. An Integrative Model of Legitimacy Judgments , 2011 .
[50] Antonio Cordella,et al. E-government and organizational change: Reappraising the role of ICT and bureaucracy in public service delivery , 2015, Gov. Inf. Q..
[51] David H. Coursey,et al. Models of E-Government: Are They Correct? An Empirical Assessment , 2008 .
[52] Theresa A. Pardo,et al. E-government success factors: Mapping practical tools to theoretical foundations , 2005, Gov. Inf. Q..
[53] Subhash Sharma,et al. An exploration of the moderating role of buyer corporate culture in industrial buyer-seller relationships , 2002 .
[54] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[55] Ilídio Barreto,et al. To Conform or to Perform? Mimetic Behaviour, Legitimacy-Based Groups and Performance Consequences , 2006 .
[56] Mark Perry,et al. Improving the process of E-Government initiative: An in-depth case study of web-based GIS implementation , 2009, Gov. Inf. Q..
[57] Andreas Hartmann,et al. The role of organizational culture in motivating innovative behaviour in construction firms , 2006 .
[58] Sung-joon Yoon,et al. The effect of customer citizenship in corporate social responsibility (CSR) activities on purchase intention: the important role of the CSR image , 2018, Social Responsibility Journal.
[59] Andreas Eckhardt,et al. Influential Factors for E-Government Success in the Middle East: Case Study Evidence from Saudi Arabia , 2015, Int. J. Electron. Gov. Res..
[60] Heather A. Haveman. Follow the leader: Mimetic isomorphism and entry into new markets , 1993 .
[61] Sehl Mellouli,et al. E-government in outlying regions: A manager's perspective , 2013, Inf. Polity.
[62] Caroline J. Tolbert,et al. Institutions, Policy Innovation, and E-Government in the American States , 2008 .
[63] Robert Goodwin,et al. User acceptance of SMS-based e-government services: Differences between adopters and non-adopters , 2011, Gov. Inf. Q..
[64] Janet K. Tinoco,et al. The Transfer of Military Culture to Private Sector Organizations: A Sense of Duty Emerges , 2013 .
[65] E. Burton Swanson,et al. Special issue on institutional theory in information systems research: contextualizing the IT artefact , 2009, J. Inf. Technol..
[66] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[67] Anat Hovav,et al. Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea , 2012, Inf. Manag..
[68] Eirik Albrechtsen,et al. Implementation and effectiveness of organizational information security measures , 2008, Inf. Manag. Comput. Secur..
[69] Mark G Ehrhart,et al. Organizational citizenship behavior in work groups: a group norms approach. , 2004, The Journal of applied psychology.
[70] Peter Frumkin,et al. Institutional Isomorphism and Public Sector Organizations , 2004 .
[71] José Ramón Gil-García,et al. Digital government transformation and internet portals: The co-evolution of technology, organizations, and institutions , 2014, Gov. Inf. Q..
[72] Jan Terje Karlsen,et al. What Characterizes Successful It Projects , 2005, Int. J. Inf. Technol. Decis. Mak..
[73] Alessandro Carretta,et al. Corporate culture and performance in European banking , 2008 .
[74] M. Erez,et al. A Dynamic, Multi‐Level Model of Culture: From the Micro Level of the Individual to the Macro Level of a Global Culture , 2004 .
[75] L. Burns,et al. Adoption and abandonment of matrix management programs: effects of organizational characteristics and interorganizational networks. , 1993, Academy of Management journal. Academy of Management.
[76] Richard Heeks,et al. Analyzing e-government research: Perspectives, philosophies, theories, methods, and practice , 2007, Gov. Inf. Q..
[77] Hiroyuki Matsuura,et al. Achieving a Carbon Neutral Society without Industry Contraction in the Five Major Steel Producing Countries , 2016 .
[78] Vishanth Weerakkody,et al. E-government adoption: A cultural comparison , 2008, Inf. Syst. Frontiers.
[79] Detmar W. Straub,et al. Institutional Influences on Information Systems Security Innovations , 2012, Inf. Syst. Res..
[80] Tom L. Roberts,et al. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..
[81] T. S. Bateman,et al. Job Satisfaction and the Good Soldier: The Relationship Between Affect and Employee “Citizenship” , 1983 .
[82] Izak Benbasat,et al. Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective , 2003, MIS Q..
[83] Paul T. Jaeger,et al. Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies , 2010, Gov. Inf. Q..
[84] Jacqueline A-M. Coyle-Shapiro,et al. A psychological contract perspective on organizational citizenship behavior , 2002 .
[85] J. Pfeffer,et al. Organizational Legitimacy , 1975 .
[86] M. Feeley,et al. Judicial Policy Making and Litigation Against the Government , 2003 .
[87] J. Ramon Gil-Garcia,et al. Using Partial Least Squares in Digital Government Research , 2008 .
[88] Henrich R. Greve,et al. Innovations as Catalysts for Organizational Change: Shifts in Organizational Cognition and Search , 2000 .
[89] Nan Zhou,et al. Institutional Forces and Organizational Culture in China: Effects on Change Schemas, Firm Commitment and Job Satisfaction , 2002 .
[90] Mete Yildiz,et al. Big questions of e-government research , 2012, Inf. Polity.
[91] John Rohrbaugh,et al. A Spatial Model of Effectiveness Criteria: Towards a Competing Values Approach to Organizational Analysis , 1983 .
[92] Wendy L. Currie,et al. Institutional isomorphism and change: the national programme for IT – 10 years on , 2012, J. Inf. Technol..
[93] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[94] Mirko Vintar,et al. E-government and organisational transformation of government: Black box revisited? , 2014, Gov. Inf. Q..
[95] Bradley J. Alge,et al. Information privacy in organizations: empowering creative and extrarole performance. , 2006, The Journal of applied psychology.
[96] Laurie J. Kirsch,et al. If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security , 2009, Eur. J. Inf. Syst..
[97] Mark C. Suchman. Managing Legitimacy: Strategic and Institutional Approaches , 1995 .
[98] George Alexander Boyne,et al. Escape from the Iron Cage? Organizational Change and Isomorphic Pressures in the Public Sector , 2007 .
[99] A. Erez,et al. The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. , 2002, The Journal of applied psychology.
[100] Gianluca Misuraca,et al. Understanding the e-government paradox: Learning from literature and practice on barriers to adoption , 2014, Gov. Inf. Q..
[101] Mete Yildiz,et al. E-government research: Reviewing the literature, limitations, and ways forward , 2007, Gov. Inf. Q..
[102] C. Weare,et al. Institutional Motivations in the Adoption of Innovations: The Case of E-Government , 2011 .
[103] Michael Tyworth,et al. Organizational identity and information systems: how organizational ICT reflect who an organization is , 2014, Eur. J. Inf. Syst..
[104] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[105] Hui Zhang,et al. Diffusion of e-government: A literature review and directions for future directions , 2014, Gov. Inf. Q..
[106] Marianne W. Lewis,et al. PRODUCT DEVELOPMENT TENSIONS: EXPLORING CONTRASTING STYLES OF PROJECT MANAGEMENT , 2002 .
[107] Zahir Irani,et al. e-Government: past, present and future , 2007, Eur. J. Inf. Syst..
[108] Mohammad Muzahid Akbar,et al. ORGANIZATIONAL CITIZENSHIP BEHAVIOR: ITS NATURE AND ANTECEDENTS , 2004 .
[109] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[110] R. Bies,et al. Organizational Citizenship Behavior: The Good Soldier Syndrome , 1989 .
[111] Sandra Nutley,et al. Getting Research into Practice: Making a Reality of Evidence-Based Practice: Some Lessons from the Diffusion of Innovations , 2000 .
[112] Anol Bhattacherjee,et al. Beginning SAP R/3 Implementation at Geneva Pharmaceuticals , 2000, Commun. Assoc. Inf. Syst..
[113] John T. Snead,et al. E-government research in the United States , 2014, Gov. Inf. Q..
[114] H. Erkutlu. The moderating role of organizational culture in the relationship between organizational justice and organizational citizenship behaviors , 2011 .
[115] Andrew J. Flanagin. Social pressures on organizational website adoption , 2000 .
[116] G. Zsidisin,et al. An institutional theory perspective of business continuity planning for purchasing and supply management , 2005 .
[117] J. Ramon Gil-Garcia,et al. Using institutional theory and dynamic simulation to understand complex e-Government phenomena , 2011, Gov. Inf. Q..
[118] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[119] Jan H. P. Eloff,et al. Information Security Policy - What do International Information Security Standards say? , 2002, ISSA.
[120] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[121] Fred Luthans,et al. After the bubble burst: How small high-tech firms can keep in front of the wave , 2001 .
[122] Dorothy E. Leidner,et al. Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..
[123] Frank Dobbin,et al. In Search of Identity and Legitimation , 2006 .
[124] D. Organ. Organizational citizenship behavior: The good soldier syndrome. , 1988 .
[125] L. Elaine Halchin,et al. Electronic government: Government capability and terrorist resource , 2004, Gov. Inf. Q..
[126] Thomas E. Uher,et al. Risk management in the conceptual phase of a project , 1999 .
[127] Tino Schuppan,et al. E-Government Innovations and Work Transformations: Implications of the Introduction of Electronic Tools in Public Government Organizations , 2014, Int. J. Electron. Gov. Res..
[128] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[129] Michel Lander,et al. Structure! Agency! (And Other Quarrels): Meta-Analyzing Institutional Theories of Organization , 2009 .
[130] Kenneth K. Boyer,et al. Innovation-supportive culture: The impact of organizational values on process innovation , 2007 .
[131] Mazen Kamal Qteishat,et al. ASSESSING E-GOVERNMENT SERVICE DELIVERY (GOVERNMENT TO CITIZEN) , 2012 .
[132] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[133] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[134] Qing Hu,et al. The Institutionalization of IT Budgeting: Empirical Evidence from the Financial Sector , 2006, Inf. Resour. Manag. J..
[135] Unpan. Benchmarking E-government: A Global Perspective , 2022 .
[136] Fredrik Björck,et al. Institutional Theory: A New Perspective for Research into IS/IT Security in Organisations , 2004, HICSS.
[137] Paul Benjamin Lowry,et al. The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..
[138] Dong-Her Shih,et al. An implementation framework for E-Government 2.0 , 2015, Telematics Informatics.
[139] Myeonggil Choi. Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing , 2016 .
[140] Song Woon-ho,et al. A Comparative Study on the Information Security Strategy of Korean I-Government with Defense-in-Depth Strategy of DoD , 2005 .
[141] Ignacio J. Martinez-Moyano,et al. Exploring E-Government Evolution: The Influence of Systems of Rules on Organizational Action , 2005 .
[142] M. Lynne Markus,et al. Technochange management: using IT to drive organizational change , 2004, J. Inf. Technol..
[143] Jensen J. Zhao,et al. Opportunities and threats: A security assessment of state e-government websites , 2010, Gov. Inf. Q..
[144] Rossouw von Solms,et al. A framework for the governance of information security , 2004, Comput. Secur..
[145] W. Vandenabeele,et al. Toward a public administration theory of public service motivation , 2007 .
[146] L. V. Dyne,et al. Helping and Voice Extra-Role Behaviors: Evidence of Construct and Predictive Validity , 1998 .
[147] Jin Chen,et al. E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view , 2013, Eur. J. Inf. Syst..
[148] W. Powell,et al. The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .
[149] 정회경,et al. 전자정부 정보보호관리체계(G-ISMS)를 활용한 공공기관 정보보호 거버넌스 수립방안 , 2013 .
[150] José Ramón Gil-García,et al. Enacting State Websites: A Mixed Method Study Exploring E-Government Success in Multi-Organizational Settings , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[151] Luis F. Luna-Reyes,et al. Key factors and processes for digital government success , 2013, Inf. Polity.
[152] M. Markus,et al. The Enterprise System Experience— From Adoption to Success , 2000 .
[153] Avan R. Jassawalla,et al. Cultures that support product-innovation processes , 2002 .
[154] F. Birkin,et al. Organizational Legitimacy and Stakeholder Information Provision1 , 1996 .
[155] F. Nelson Ford,et al. Information Security Effectiveness: Conceptualization and Validation of a Theory , 2007, Int. J. Inf. Secur. Priv..
[156] Wanda J. Orlikowski,et al. Technology and Institutions: What Can Research on Information Technology and Research on Organizations Learn from Each Other? , 2001, MIS Q..
[157] Brian P. Niehoff,et al. Organizational Citizenship Behaviors: Their Relationship to Organizational Effectiveness , 2000 .
[158] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[159] Thomas Barnebeck Andersen,et al. E-Government as an anti-corruption strategy , 2009, Inf. Econ. Policy.
[160] Cheolho Yoon,et al. The effects of organizational citizenship behaviors on ERP system success , 2009, Comput. Hum. Behav..
[161] John W. Meyer,et al. Institutional Environments and Organizations: Structural Complexity and Individualism , 1994 .
[162] P. Ahmed. Culture and climate for innovation , 1998 .
[163] Harald Baldersheim,et al. Innovation in E-government: Analysis of municipal web pages in the Nordic countries , 2008, Inf. Polity.
[164] Åke Grönlund,et al. Sustainable eGovernance? Practices, problems and beliefs about the future in Swedish eGov practice , 2016, Gov. Inf. Q..
[165] E. O'Connor,et al. Gaining Advanced Manufacturing Technologies' Benefits: The Roles of Organization Design and Culture , 1992 .
[166] Adegboyega Ojo,et al. Being smart: Emerging technologies and innovation in the public sector , 2014, Gov. Inf. Q..
[167] L. J. Williams,et al. Job Satisfaction and Organizational Commitment as Predictors of Organizational Citizenship and In-Role Behaviors , 1991 .
[168] M. Dickson,et al. Societal Culture and Industrial Sector Influences on Organizational Culture , 2016 .
[169] G. Hofstede,et al. Measuring organizational cultures: A qualitative and quantitative study across twenty cases. , 1990 .
[170] Alan Lawton,et al. Developments: Coping with Ambiguity: Reconciling External Legitimacy and Organizational Implementation in Performance Measurement , 2000 .
[171] Scott B. MacKenzie,et al. Organizational Citizenship Behaviors and Sales Unit Effectiveness , 1994 .
[172] H. Rao. The Social Construction of Reputation: Certification Contests, Legitimation, and the Survival of Organizations in the American Automobile Industry: 1895–1912 , 1994 .
[173] Qing Hu,et al. The role of external and internal influences on information systems security - a neo-institutional perspective , 2007, J. Strateg. Inf. Syst..
[174] Hsiu-Yen Hsu,et al. Organizational learning culture's influence on job satisfaction, organizational commitment, and turnover intention among R&D professionals in Taiwan during an economic downturn. , 2009 .
[175] Rhoda C. Joseph. A structured analysis of e-government studies: Trends and opportunities , 2013, Gov. Inf. Q..
[176] Seongcheol Kim,et al. An institutional analysis of an e-government system for anti-corruption: The case of OPEN , 2009, Gov. Inf. Q..
[177] José Ramón Gil-García,et al. Exploring the success factors of state website functionality: an empirical investigation , 2005, DG.O.
[178] S. Rodrigues. The Political Dynamics of Organizational Culture in an Institutionalized Environment , 2006 .
[179] James M. Higgins,et al. Want Innovation? Then Use Cultural Artifacts that Support It , 2002 .
[180] Carol W. Hsu,et al. Frame misalignment: interpreting the implementation of information systems security certification in an organization , 2009, Eur. J. Inf. Syst..