References
- AlbrechtsenEHovdenJImproving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention studyComputers & Security20102943244510.1016/j.cose.2009.12.005
- BackhouseJDhillonGStructures of responsibility and security of information systemsEuropean Journal of Information Systems1996512910.1057/ejis.1996.7
- BaskervilleRSemantic database prototypesJournal of Information Systems19933211914410.1111/j.1365-2575.1993.tb00119.x
- BaskervilleRInformation warfare: a comparative framework for business information securityJournal of Information System Security2005112350
- BaskervilleRPortougalVA possibility theory framework for security evaluation in national infrastructure protectionJournal of Database Management200314211310.4018/jdm.2003040101
- BenbasatIGoldsteinDKMeadMThe case research strategy in studies of information systemsMIS Quarterly198711336938610.2307/248684
- BirchGDWMcevoyNARisk analysis for information systemsJournal of Information Technology199271445310.1057/jit.1992.7
- BishopMComputer Security, Art and Science2002
- Björck F (2004) ) Institutional theory: a new perspective for research into IS/IT security in organisations, HICSS. Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7, Vol 7, pp 70186b.
- BolandRJNewmanMPentlandBTHermeneutical exegesis in information systems design and useInformation and Organization201020112010.1016/j.infoandorg.2009.09.001
- ChoobinehJDhillonGGrimailaMRManagement of information security: challenges and research directionsCommunications of the Association for Information Systems2007143958971
- CiborraCThe platform organization: recombining strategies, structures and surprisesOrganization Science19967210310810.1287/orsc.7.2.103
- CiborraCA Theory of Information Systems Based on Improvisation, in Rethinking Management Information Systems1999
- CrossanMMSorrentiMMaking sense of improvisation advancesStrategic Management199714155180
- Cunha MP (2004) Management improvisation. FEUNL Working Paper No. 460. Available at SSRN: http://ssrn.com/abstract=882455.
- DhillonGBackhouseJCurrent directions in IS security research: toward socio-organisational perspectivesInformation Systems Journal200111212715310.1046/j.1365-2575.2001.00099.x
- DohertyNMarplesCSuhaimiAThe relative success of alternative approaches to strategic information systems planning: an empirical analysisJournal of Strategic Information Systems1999826328310.1016/S0963-8687(99)00024-4
- EisenhardtKMBuilding theories from case study researchAcademy of Management Review1989144532550
- GadamerHGPhilosophical Hermeneutics1976
- GroverVSegarsAHAn empirical evaluation of stages of strategic information systems planning: patterns of process design and effectivenessInformation and Management200542576177910.1016/j.im.2004.08.002
- HuQPaul HartPCookeDThe role of external and internal influences on information systems security – a neo-institutional perspectiveJournal of Strategic Information Systems200716215317210.1016/j.jsis.2007.05.004
- ISO/IEC (2005) Information technology – security techniques – information security management systems – requirements. [WWW document] http://www.iso.org/iso/catalogue_detail?csnumber=42103.
- KimWJeongOKimCSoJThe dark side of the internet: attacks, costs and responsesInformation Systems20113667570510.1016/j.is.2010.11.003
- KleinHMyersMA set of principles for conducting and evaluating interpretive field studies in information systemsMIS Quarterly1999231679410.2307/249410
- KopplRWhitmanDGRational-choice hermeneuticsJournal of Economic Behavior & Organisation200455129531710.1016/j.jebo.2003.07.006
- LedererASethiVSeven guidelines for strategic information systems planningInformation Strategy: The Executive's Journal19981512329
- Levi-StraussCStructural Anthropology1963
- Levin M and Rolfsen M (2004) Arbeid i Team. Læring og utvikling i team. Fagbokforlaget, Bergen.
- McgannSTLyytinenKThe improvisation effect: a case study of user improvisation and its effects on information system evolutionProceedings of the 29th International Conference on Information Systems (ICIS)2008
- MinzbergHThe Rise and Fall of Strategic Planning1994
- MinzbergHQuinnJThe Strategy Process: Concepts Contexts and Cases1996
- MoormanCMinerAOrganisational improvisation and organisational memoryAcademy of Management Review1998234698723
- MoormanCMinerAThe convergence of planning and execution: improvisation in new product developmentJournal of Marketing19986112010.2307/1251740
- National Institute of Standards and Technology (NIST) (2003) US department of commerce. Risk Management Guide for Information Technology Systems’ Special Publication 800–830, [WWW document] http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
- NewkirkHELedererALThe effectiveness of strategic information systems planning under environmental uncertaintyInformation & Management200643448150110.1016/j.im.2005.12.001
- RortyRConsequences of Pragmatism1982
- SaastamoinenHOn the handling of exceptions in information systemsComputer Science, Economics and Statistics1995
- SchaeferRThe epistemology of computer securityACM SIGSOFT Software Engineering Notes200934612010.1145/1457516.1457528
- SchegloffESacksHOpening up closingsEthnomethodology1974
- SegarsAGroverVProfiles of strategic information systems planningInformation Systems Research199910319923210.1287/isre.10.3.199
- SegarsAGroverVTengJStrategic information systems planning: planning system components, internal co-alignment, and implications for planning effectivenessDecision Sciences199829230334410.1111/j.1540-5915.1998.tb01579.x
- SiponenMIivariJSix design theories for IS security policies and guidelinesJournal of the Association for Information Systems200677445472
- SpagnolettiPRescaAThe duality of information security management: fighting against predictable and unpredictable threatsJournal of Information System Security2008434662
- StollCThe Cuckoo's Egg, Tracking A Spy Through the Maze of Computer Espionage1990
- TrauthEMJessupLMUnderstanding computer-mediated discussions: positivist and interpretive analyses of group support system useMIS Quarterly2000241437910.2307/3250979
- Von SolmsBInformation security – the fourth waveComputers & Security200625316516810.1016/j.cose.2006.03.004
- Von SolmsBVon SolmsRFrom information security to…business security?Computer and Security Journal200524427127310.1016/j.cose.2005.04.004
- WalshamGDoing interpretive researchEuropean Journal of Information Systems200615332033010.1057/palgrave.ejis.3000589
- WeickKImprovisation as a mindset for organisational analysisOrganisation Science19989554355510.1287/orsc.9.5.543
- WinklerIZen and the Art of Information Security2007
- YinRKCase Study Research, Design and Methods1994