Toward an Integrated Theory of IT-related Risk Control

In business today, awareness of risk is growing, and risk management is increasingly seen as a critical practical discipline (Teach 1997). Further, risk is being defined broadly to include anything that could have a significant negative effect on the business.

[1]  Peter G. Neumann,et al.  Computer-related risks , 1994 .

[2]  E. Clemons Using Scenario Analysis to Manage the Strategic Risks of Reengineering , 1995 .

[3]  Chris Sauer,et al.  Why information systems fail: a case study approach , 1993 .

[4]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[5]  Christine M. Pearson,et al.  From crisis prone to crisis prepared: a framework for crisis management , 1993, Risk Management.

[6]  S. Sitkin,et al.  Explaining the Limited Effectiveness of Legalistic “Remedies” for Trust/Distrust , 1993 .

[7]  F. W. McFarlan,et al.  Portfolio approach to information systems , 1989 .

[8]  M. Markus,et al.  The Enterprise System Experience— From Adoption to Success , 2000 .

[9]  Dietrich Dörner,et al.  The Logic Of Failure: Recognizing And Avoiding Error In Complex Situations , 1997 .

[10]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[11]  Gordon B. Davis,et al.  Management information systems : conceptual foundations, structure, and development , 1985 .

[12]  M. Rogers,et al.  Control in an Age of Empowerment , 1995 .

[13]  Wanda J. Orlikowski,et al.  Improvising Organizational Transformation Over Time: A Situated Change Perspective , 1996, Inf. Syst. Res..

[14]  C. Handy Trust and the virtual organization , 1999 .

[15]  Barry M. Staw,et al.  ORGANIZATIONAL ESCALATION AND EXIT: LESSONS FROM THE SHOREHAM NUCLEAR POWER PLANT , 1993 .

[16]  Sarma R. Nidumolu The Effect of Coordination and Uncertainty on Software Project Performance: Residual Performance Risk as an Intervening Variable , 1995, Inf. Syst. Res..

[17]  H. J. Smith,et al.  Managing Privacy: Information Technology and Corporate America , 1994 .

[18]  RICHAFID BASKERVILLE,et al.  Information systems security design methods: implications for information systems development , 1993, CSUR.

[19]  Bennet P. Lientz,et al.  Software Maintenance Management: A Study of the Maintenance of Computer Application Software in 487 Data Processing Organizations , 1980 .

[20]  D. L. Simms,et al.  Normal Accidents: Living with High-Risk Technologies , 1986 .

[21]  Robert A. Simons,et al.  Levers of Control: How Managers Use Innovative Control Systems to Drive Strategic Renewal , 1994 .

[22]  Paul A. Strassmann,et al.  The Business Value of Computers: An Executive's Guide , 1990 .

[23]  D. L. Simms,et al.  Normal Accidents: Living with High-Risk Technologies , 1986 .

[24]  Peter L Block,et al.  Stewardship: Choosing Service over Self-Interest , 1993 .

[25]  Kalle Lyytinen,et al.  Information systems failures—a survey and classification of the empirical literature , 1988 .

[26]  Michael R. Vitale,et al.  The Growing Risks of Information Systems Success , 1986, MIS Q..

[27]  Sia Siew Kien,et al.  Reengineering Effectiveness and the Redesign of Organizational Control: A Case Study of the Inland Revenue Authority of Singapore , 1997, J. Manag. Inf. Syst..

[28]  Amy L. Pablo,et al.  Reconceptualizing the Determinants of Risk Behavior , 1992 .