Information System Security Goals

A large part of information systems security approaches is technical in nature with less consideration on people and organizational issues. To this end, there is a need to investigate other means of managing information systems security since most information systems security approaches although valuable they focus on technical oriented solutions, e.g. checklists, risk analysis, evaluation methods, and ignore the social aspects of risks and the informal structures of organizations. This research adopts a psychological-organizational point of view to information systems security by investigating the role and application of goals to informal structured organizations in the banking industry. The ultimate scope of this research is to investigate the importance of having an efficient goal setting structure in the context of information systems security in banking. The research contributes to interpretive information systems with the study of goal setting in a security management context.

[1]  Edwin A. Locke,et al.  Cognitive and motivational effects of participation: A mediator study , 1994 .

[2]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[3]  James Backhouse,et al.  Structures of responsibility and security of information systems , 1996 .

[4]  Wanda J. Orlikowski,et al.  Technological frames: making sense of information technology in organizations , 1994, TOIS.

[5]  Juergen Wegge,et al.  Participation in Group Goal Setting: Some Novel Findings and a Comprehensive Model as a New Ending to an Old Story , 2000 .

[6]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .

[7]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[8]  Hervé Debar,et al.  Security information management as an outsourced service , 2006, Inf. Manag. Comput. Secur..

[9]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[10]  Mikko T. Siponen,et al.  Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.

[11]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[12]  Edwin A. Locke,et al.  The Relationship of Team Goals, Incentives, and Efficacy to Strategic Risk, Tactical Implementation, and Performance , 2001 .

[13]  Henry L. Tosi A Theory of Goal Setting and Task Performance , 1991 .

[14]  Gerard H. Seijts,et al.  The Construct of Goal Commitment: Measurement And Relationships with Task Performance , 2000 .

[15]  John E. Hunter,et al.  The Discard of Study Evidence by Literature Reviewers , 1994 .

[16]  Michael Workman,et al.  Gaining Access with Social Engineering: An Empirical Study of the Threat , 2007, Inf. Secur. J. A Glob. Perspect..

[17]  Izak Benbasat,et al.  The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..

[18]  A. K. Majumder,et al.  International Journal of Advanced Science and Technology , 2013 .

[19]  Helen L. James,et al.  Managing information systems security: a soft approach , 1996, Proceedings of 1996 Information Systems Conference of New Zealand.

[20]  Patrick Finnegan,et al.  Challenging the hierarchical perspective on information systems: implications from external information analysis , 1999, J. Inf. Technol..

[21]  Joseph S. Valacich,et al.  Virtual Team Trust: Instrument Development and Validation in an IS Educational Environment , 2003, Inf. Resour. Manag. J..

[22]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[23]  Marie Wilson,et al.  Shared cognition : mapping commonality and individuality , 1999 .

[24]  Dwight D. Frink,et al.  A Review of the Influence of Group Goals on Group Performance , 1994 .

[25]  L. Weingart Impact of group goals, task component complexity, effort, and planning on group performance , 1992 .

[26]  Kalle Lyytinen,et al.  Information systems development and data modelling: conceptual and philosophical foundations , 1995 .

[27]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[28]  Jeffrey Katz Winning Through Innovation , 1997 .

[29]  Vj. Janesick The choreography of qualitative research design , 2000 .

[30]  E. A. Locke,et al.  NEGATIVE SELF-EFFICACY AND GOAL REVISITED , 2003 .

[31]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[32]  Karen A. Forcht,et al.  Doing business on the Internet: marketing and security aspects , 1996, Inf. Manag. Comput. Secur..

[33]  A. Elliot A Conceptual History of the Achievement Goal Construct. , 2005 .

[34]  W. Firestone,et al.  Multisite Qualitative Policy Research: Optimizing Description and Generalizability , 1983 .

[35]  David Gefen,et al.  Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..

[36]  John B. Miner,et al.  The Rated Importance, Scientific Validity, and Practical Usefulness of Organizational Behavior Theories: A Quantitative Review , 2003 .

[37]  Rossouw von Solms,et al.  Information Security Governance: A model based on the Direct-Control Cycle , 2006, Comput. Secur..

[38]  K. V. Andersen EDI and Data Networking in the Public Sector , 1998 .

[39]  John Leach,et al.  Improving user security behaviour , 2003, Comput. Secur..

[40]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[41]  Angèle L. M. Cavaye,et al.  Case study research: a multi‐faceted research approach for IS , 1996, Inf. Syst. J..

[42]  Douglas N. Jackson,et al.  Problems and solutions in human assessment : honoring Douglas N. Jackson at seventy , 2000 .

[43]  Robert D. Pritchard,et al.  Productivity Measurement and Improvement: Organizational Case Studies , 1995 .

[44]  Mikko T. Siponen,et al.  An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications , 2001 .

[45]  R. Keeney,et al.  The Value of Internet Commerce to the Customer , 1999 .

[46]  Joseph G. Rosse,et al.  Yours, Mine, and Ours: Facilitating Group Productivity through the Integration of Individual and Group Goals , 1995 .

[47]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[48]  W. L. Cron,et al.  The role of goal orientation following performance feedback. , 2001, The Journal of applied psychology.

[49]  E. A. Locke,et al.  Building a practically useful theory of goal setting and task motivation. A 35-year odyssey. , 2002, The American psychologist.

[50]  Abhinav Rastogi,et al.  Secure Coding: Building Security into the Software Development Life Cycle , 2004, Inf. Secur. J. A Glob. Perspect..

[51]  Robert Willison,et al.  A Critical assesment if IS Security Research Between , 2007 .