391
Views
24
CrossRef citations to date
0
Altmetric
Research Article

Conceptualising improvisation in information systems security

&
Pages 592-607 | Received 08 Nov 2010, Accepted 03 Jan 2012, Published online: 19 Dec 2017

References

  • AlbrechtsenEHovdenJImproving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention studyComputers & Security20102943244510.1016/j.cose.2009.12.005
  • BackhouseJDhillonGStructures of responsibility and security of information systemsEuropean Journal of Information Systems1996512910.1057/ejis.1996.7
  • BaskervilleRSemantic database prototypesJournal of Information Systems19933211914410.1111/j.1365-2575.1993.tb00119.x
  • BaskervilleRInformation warfare: a comparative framework for business information securityJournal of Information System Security2005112350
  • BaskervilleRPortougalVA possibility theory framework for security evaluation in national infrastructure protectionJournal of Database Management200314211310.4018/jdm.2003040101
  • BenbasatIGoldsteinDKMeadMThe case research strategy in studies of information systemsMIS Quarterly198711336938610.2307/248684
  • BirchGDWMcevoyNARisk analysis for information systemsJournal of Information Technology199271445310.1057/jit.1992.7
  • BishopMComputer Security, Art and Science2002
  • Björck F (2004) ) Institutional theory: a new perspective for research into IS/IT security in organisations, HICSS. Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7, Vol 7, pp 70186b.
  • BolandRJNewmanMPentlandBTHermeneutical exegesis in information systems design and useInformation and Organization201020112010.1016/j.infoandorg.2009.09.001
  • ChoobinehJDhillonGGrimailaMRManagement of information security: challenges and research directionsCommunications of the Association for Information Systems2007143958971
  • CiborraCThe platform organization: recombining strategies, structures and surprisesOrganization Science19967210310810.1287/orsc.7.2.103
  • CiborraCA Theory of Information Systems Based on Improvisation, in Rethinking Management Information Systems1999
  • CrossanMMSorrentiMMaking sense of improvisation advancesStrategic Management199714155180
  • Cunha MP (2004) Management improvisation. FEUNL Working Paper No. 460. Available at SSRN: http://ssrn.com/abstract=882455.
  • DhillonGBackhouseJCurrent directions in IS security research: toward socio-organisational perspectivesInformation Systems Journal200111212715310.1046/j.1365-2575.2001.00099.x
  • DohertyNMarplesCSuhaimiAThe relative success of alternative approaches to strategic information systems planning: an empirical analysisJournal of Strategic Information Systems1999826328310.1016/S0963-8687(99)00024-4
  • EisenhardtKMBuilding theories from case study researchAcademy of Management Review1989144532550
  • GadamerHGPhilosophical Hermeneutics1976
  • GroverVSegarsAHAn empirical evaluation of stages of strategic information systems planning: patterns of process design and effectivenessInformation and Management200542576177910.1016/j.im.2004.08.002
  • HuQPaul HartPCookeDThe role of external and internal influences on information systems security – a neo-institutional perspectiveJournal of Strategic Information Systems200716215317210.1016/j.jsis.2007.05.004
  • ISO/IEC (2005) Information technology – security techniques – information security management systems – requirements. [WWW document] http://www.iso.org/iso/catalogue_detail?csnumber=42103.
  • KimWJeongOKimCSoJThe dark side of the internet: attacks, costs and responsesInformation Systems20113667570510.1016/j.is.2010.11.003
  • KleinHMyersMA set of principles for conducting and evaluating interpretive field studies in information systemsMIS Quarterly1999231679410.2307/249410
  • KopplRWhitmanDGRational-choice hermeneuticsJournal of Economic Behavior & Organisation200455129531710.1016/j.jebo.2003.07.006
  • LedererASethiVSeven guidelines for strategic information systems planningInformation Strategy: The Executive's Journal19981512329
  • Levi-StraussCStructural Anthropology1963
  • Levin M and Rolfsen M (2004) Arbeid i Team. Læring og utvikling i team. Fagbokforlaget, Bergen.
  • McgannSTLyytinenKThe improvisation effect: a case study of user improvisation and its effects on information system evolutionProceedings of the 29th International Conference on Information Systems (ICIS)2008
  • MinzbergHThe Rise and Fall of Strategic Planning1994
  • MinzbergHQuinnJThe Strategy Process: Concepts Contexts and Cases1996
  • MoormanCMinerAOrganisational improvisation and organisational memoryAcademy of Management Review1998234698723
  • MoormanCMinerAThe convergence of planning and execution: improvisation in new product developmentJournal of Marketing19986112010.2307/1251740
  • National Institute of Standards and Technology (NIST) (2003) US department of commerce. Risk Management Guide for Information Technology Systems’ Special Publication 800–830, [WWW document] http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
  • NewkirkHELedererALThe effectiveness of strategic information systems planning under environmental uncertaintyInformation & Management200643448150110.1016/j.im.2005.12.001
  • RortyRConsequences of Pragmatism1982
  • SaastamoinenHOn the handling of exceptions in information systemsComputer Science, Economics and Statistics1995
  • SchaeferRThe epistemology of computer securityACM SIGSOFT Software Engineering Notes200934612010.1145/1457516.1457528
  • SchegloffESacksHOpening up closingsEthnomethodology1974
  • SegarsAGroverVProfiles of strategic information systems planningInformation Systems Research199910319923210.1287/isre.10.3.199
  • SegarsAGroverVTengJStrategic information systems planning: planning system components, internal co-alignment, and implications for planning effectivenessDecision Sciences199829230334410.1111/j.1540-5915.1998.tb01579.x
  • SiponenMIivariJSix design theories for IS security policies and guidelinesJournal of the Association for Information Systems200677445472
  • SpagnolettiPRescaAThe duality of information security management: fighting against predictable and unpredictable threatsJournal of Information System Security2008434662
  • StollCThe Cuckoo's Egg, Tracking A Spy Through the Maze of Computer Espionage1990
  • TrauthEMJessupLMUnderstanding computer-mediated discussions: positivist and interpretive analyses of group support system useMIS Quarterly2000241437910.2307/3250979
  • Von SolmsBInformation security – the fourth waveComputers & Security200625316516810.1016/j.cose.2006.03.004
  • Von SolmsBVon SolmsRFrom information security to…business security?Computer and Security Journal200524427127310.1016/j.cose.2005.04.004
  • WalshamGDoing interpretive researchEuropean Journal of Information Systems200615332033010.1057/palgrave.ejis.3000589
  • WeickKImprovisation as a mindset for organisational analysisOrganisation Science19989554355510.1287/orsc.9.5.543
  • WinklerIZen and the Art of Information Security2007
  • YinRKCase Study Research, Design and Methods1994

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.