648
Views
4
CrossRef citations to date
0
Altmetric
Articles

The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru

&

References

  • Abu-Musa, A. A. (2003). The perceived threats to the security of computerized accounting information systems. The Journal of American Academy of Business, 3(1), 9–20.
  • Abu-Musa, A. A. (2005). Investigating the perceived threats of computerized accounting information systems in developing countries: An empirical study on Saudi organizations. Journal of King Saud University – Computer and Information Sciences, 18, 1–26. doi: 10.1016/S1319-1578(06)80001-7
  • Aladwani, A. M. (2001). Change management strategies for successful ERP implementation. Business Process Management Journal, 7(3), 266–275. doi: 10.1108/14637150110392764
  • Belanger, F., & Hiller, J. S. (2006). A framework for e-government: Privacy implications. Business Process Management Journal, 12(1), 48–60.
  • Barman, S. (2002). Writing IS security policies. Indianapolis, IN: New Riders Publishing.
  • Bhatnagar, A., Misra, S., & Rao, H. R. (2000). On risk, convenience, and Internet shopping behavior. Communications of the ACM, 43(11), 98–105. doi: 10.1145/353360.353371
  • Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in beliefs and attitude towards information technology usage: A theoretical model and longitudinal test. MIS Quarterly, 28(2), 229–254.
  • Blumstein, A. (1978). Introduction in deterrence and incapacitation: Estimating the effects of criminal sanctions on crime rates. Washington, DC: National Academy of Sciences.
  • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.
  • Carstensen, P. H., & Vogelsang, L. (2001, June 27–29). Design of web-based information systems – New challenges for systems development? Proceedings of the ninth European conference on information systems, Bled, Slovenia.
  • Cavusoglu, H., Son, J., & Benbasat, I. (2009). Information security control resources in organizations: A multidimensional view and their key drivers (Working Paper). Vancouver: Sauder School of Business, University of British Columbia.
  • Cenfetelli, R. T., & Bassellier, G. (2009). Interpretation of formative measurement in information systems research. MIS Quarterly, 33(4), 689–707.
  • CEPLAN. (2010). KSP mission to CEPLAN Peru. Lima: Author.
  • Choi, M.-S., Levy, Y., & Hovav, A. (2013, December 14). The role of users computer self-efficacy, cyber security counter measures awareness and cyber security skills influence on computer misuse. Proceedings of the pre-ICIS workshop on information security and privacy (WISP2013), Milan, Italy.
  • D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124. doi: 10.1111/j.1540-5915.2012.00383.x
  • D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A Deterrence Approach. Information Systems Research, 20(1), 79–98. doi: 10.1287/isre.1070.0160
  • Forcht, K. A. (1994). Computer security management. Danvers, MA: Boyd & Fraser.
  • Furnell, S. M., Gaunt, P. N., Holben, R. F., Sanders, P. W., Stockel, C. T., & Warren, M. J. (1996). Assessing staff attitudes towards information security in a European healthcare establishment. Medical Informatics, 21(2), 105–112. doi: 10.3109/14639239608995012
  • Gibbs, J. P. (1975). Crime, punishment and deterrence. New York: Elsevier.
  • Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47. doi: 10.1080/07421222.1997.11518141
  • Hartono, E., Holsapple, C. W., Kim, K.-Y., & Simpson, J. T. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62(June), 11–21.
  • Hertzberg, F., Mausner, B., & Synderman, B. (1959). The motivation to work (2nd ed.). New York: Wiley.
  • Hofstede, G. (2001). Culture's consequences: Comparing values behaviors, institutions, and organizations across nations. Thousand Oaks, CA: Sage Publications.
  • Hovav, A., & D'Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea. Information & Management, 49(2), 99–110. doi: 10.1016/j.im.2011.12.005
  • Hovland, C., Janis, I. L., & Kelly, H. (1953). Communication and persuasion. New Haven, CT: Yale University Press.
  • Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory Princely. Computers & Security, 31, 83–95. doi: 10.1016/j.cose.2011.10.007
  • Johnston, A. C., & Warkentin, N. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566.
  • Kankanhalli, A., Teo, H. H., Tan, B. C. Y., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23, 139–154. doi: 10.1016/S0268-4012(02)00105-6
  • Khan, A. R., & Qureshi, M. S. (2009). Web-based information system for blood donation. Digital Content Technology and its Applications, 3(2), 137–142.
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564. doi: 10.1016/j.dss.2007.07.001
  • Knapp, K. J., Morris, R. F., Marshall, T. E., & Byrd, T. A. (2009). Information security policy: An organizational-level process model. Computers and Security, 28(7), 493–508. doi: 10.1016/j.cose.2009.07.001
  • Kritzinger, E., & Smith, E. (2008). Information security management: An information security retrieval and awareness model for industry. Computers and Security, 27, 224–231. doi: 10.1016/j.cose.2008.05.006
  • Ku, C. Y., Chang, Y. W., & Yen, D. C. (2009). National information security policy and its implementation: A case study in Taiwan. Telecommunications Policy, 33, 371–384. doi: 10.1016/j.telpol.2009.03.002
  • Lee, A., & Levy, Y. (2014). The effect of information quality on trust in e-government systems’ transformation. Transforming Government: People, Process and Policy, 8(1), 76–100. doi: 10.1108/TG-10-2012-0011
  • Lee, S., Shin, B., & Lee, H. (2007). Understanding post-adoption usage of mobile data services: The role of supplier-side variables. Journal of the Association for Information Systems, 10(12), 860–888.
  • Lian, J. W., & Lin, T. M. (2008). Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior, 24, 48–65. doi: 10.1016/j.chb.2007.01.002
  • Loch, K. D., Carr, H. H., & Warkentin, M. E. (1992). Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 16(2), 173–186. doi: 10.2307/249574
  • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19, 469–479. doi: 10.1016/0022-1031(83)90023-9
  • Martins, A., & Eloff, J. H. P. (2002, June 25–28). IS security culture. Proceedings of IFIP TC-11 17th international conference on IS security, Netherlands.
  • Maslow, A. H. (1954). Motivation and personality. New York: Harper & Row.
  • Nance, W. D., & Straub, D. W. (1988, November 30–December 3). An investigation into the use and usefulness of security software in detecting computer abuse. Proceedings of the ninth annual conference on information systems, Minneapolis, MN, USA.
  • Pearson, F. S., & Weiner, N. A. (1985). Toward an integration of criminological theories. Journal of Crime and Criminology, 76(1), 116–150. doi: 10.2307/1143355
  • Putri, F., & Hovav, A. (2014, June 9–11). Employee compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory. Proceedings of the 22nd European conference on information systems (ECIS), Tel-Aviv, Israel.
  • Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27, 241–253. doi: 10.1016/j.cose.2008.07.008
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 93–114. doi: 10.1080/00223980.1975.9915803
  • Ryan, S. D., & Bordoloi, B. (1997). Evaluating security threats in mainframe and client/server environments. Information & Management, 32(3), 137–146. doi: 10.1016/S0378-7206(97)00013-X
  • Saeed, K. A., & Abdinnour-Helm, S. (2008). Examining the effects of information system characteristics and perceived usefulness on post adoption usage of information systems. Information & Management, 45(3), 376–386. doi: 10.1016/j.im.2008.06.002
  • Schuessler, J. H. (2009). General deterrence theory: Assessing information systems security effectiveness in large versus small businesses. Unpublished manuscript, University of North Texas.
  • Siponen, M., & Vance, A. O. (2010). Neutralization: New insights into the problem of employee systems security policy violations. MIS Quarterly, 34(3), 487–502.
  • Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management and Computer Security, 8(1), 31–41. doi: 10.1108/09685220010371394
  • Smith, S., & Jamieson, R. (2006). Determining key factors in e-government information system security. Information Systems Management, 23(2), 21–32. doi: 10.1201/1078.10580530/45925.23.2.20060301/92671.4
  • Spicer, G. D. (2004). Information systems management maturity and information technology security effectiveness. Unpublished manuscript, University of Lethbridge, Alberta, Canada.
  • Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276. doi: 10.1287/isre.1.3.255
  • Straub, D. W., & Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly, 14(1), 45–62. doi: 10.2307/249307
  • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469. doi: 10.2307/249551
  • Swan, J. E., & Combs, L. J. (1976). Product performance and consumer satisfaction: A new concept. Journal of Marketing, 40(2), 25–33. doi: 10.2307/1251003
  • UN. (2012). United Nations e-government survey 2012. Retrieved from http://unpan1.un.org/intradoc/groups/public/documents/un/unpan048065.pdf
  • Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198. doi: 10.1016/j.im.2012.04.002
  • Wangwe, C. K., Eloff, M. M., & Venter, L. (2012). A sustainable information security framework for e-government – Case of Tanzania. Technological and Economic Development of Economy, 18(1), 117–131. doi: 10.3846/20294913.2012.661196
  • Weber, R. (1988). EDP auditing: Conceptual foundations and practice. New York: McGraw Hill.
  • Whitman, M. E. (2004). In defense of the realm: Understanding the threats to information security. International Journal of Information Management, 24(1), 43–57. doi: 10.1016/j.ijinfomgt.2003.12.003
  • Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence: A critical review. Law and Society, 20(4), 545–572. doi: 10.2307/3053466
  • Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monograph, 59, 329–349. doi: 10.1080/03637759209376276
  • Witte, K., Cameron, K. A., McKeon, J. M., & Berkowitz, J. M. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1, 317–342. doi: 10.1080/108107396127988
  • Wu, Y. (2014). Protecting personal data in e-government: A cross-country study. Government Information Quarterly, 31(1), 150–159. doi: 10.1016/j.giq.2013.07.003
  • Yao, J. T. (2008). An introduction to web-based support systems. Intelligent Systems, 17(1–3), 267–281.
  • Yeh, Q. Y., & Chang, A. J. T. (2007). Threats and countermeasures for information system security: A cross-industry study. Information and Management, 44(5), 480–491. doi: 10.1016/j.im.2007.05.003
  • Youn, J., & Hovav, A. (2013, April 10–12). What shapes information system misuse intention? The hidden role of leadership style and perceived organizational justice. Proceedings of the 12th annual security conference, Las Vegas, NV.
  • Zhao, J., & Zhao, S. Y. (2010). Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly, 27, 49–56. doi: 10.1016/j.giq.2009.07.004

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.