26
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

The Organizational Contexts, Controls and Implementation of E-Business

&
Pages 114-124 | Received 14 Aug 2009, Accepted 18 Nov 2009, Published online: 11 Dec 2015

References

  • Broadbent, M., Weil, P., Clair, D.S. “The implications of information technology infrastructure for business process redesign,” MIS Quarterly (23:2), 1999, 159–182.
  • Brungs, A., Jamieson, R. “Identification of legal issues for computer forensics,” Information Systems Management, 2005, 57–66.
  • Computer Security Institute (CSI), CSI/FBI computer crime and security survey, http://www.gocsi.com/forms/csi_survey.jhtml, 2008.
  • Dhillon, G., Backhouse, J. “Risks in the use of information technology within organizations,” International Journal of Information Management (16:1), 1996, 65–74.
  • Ezingeard, J.N., McFadzean, E., Birchall, D. “A model of information assurance benefits,” Information Systems Management, Spring, 2005, 20–29.
  • Hair, J.F., Anderson, R.E., Tatham, R.L., Grablowsky, B.J. Multivariate Data Analysis, Tulsa, OK; PPC Books, 1979.
  • Hart, P.J., Saunders, C.S. “Emerging electronic partnerships: Antecedents and dimensions of EDI use from the supplier's perspective,” Journal of Management Information Systems (14:4), Spring 1998, 87–111.
  • Huizingh, E.K.R.E. “The content and design of Web sites: An empirical study,” Information & Management 37, 2000, 123–134.
  • ISACA (Information Systems Audit and Control Association), COBIT Control Practices: Guidance to Achieve Control Objectives for Successful IT Governance, 2nd edition, 2009.
  • Kankanhalli, A., Teo, H.H., Tan, B.C.Y., Wei, K.K. “An integrative study of information systems security effectiveness,” International Journal of Information Management (23), 2003, 139–154.
  • Keller, S., Powell, A., Horstmann, B., Predmore, C., Crawford, M. “Information security threats and practices in small business,” Information Systems Management, 2005, 7–19.
  • Khalfan, A.M. “Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors,” International Journal of Information Management (24), 2004, 29–42.
  • Kirsch, L.J. “Deploying common systems globally: The dynamics of control,” Information Systems Research (15:4), 2004, 374–395.
  • Kotulic, A.G., Clark, J.G. “Why there aren't more information security research studies,” Information & Management (41), 2004, 597–607.
  • Lederer, A.L., Mirchandani, D.A., Sims, K. “The link between information strategy and electronic commerce,” Journal of Organizational Computing and Electronic Commerce (7:1), 1997, 17–34.
  • Lee, S., Ahn, H. “Fuzzy cognitive map based on structural equation modeling for the design of controls in business-to-consumer e-commerce web-based systems,” Expert Systems With Applications (36:7), 2009, 10447–10460.
  • Lee, S., Han, I. “The impact of organizational contexts on EDI controls,” International Journal of Accounting Information Systems 1, 2000, 153–177.
  • Lee, S., Han, I., Kym, H. “The impact of EDI controls on EDI implementation,” International Journal of Electronic Commerce (2:4), Summer 1998, 71–98.
  • Lee, S., Kim, K. “Factors affecting the Implementation Success of Internet based Information Systems,” Computers in Human Behavior (23:4), July 2007, 1853–1880.
  • Lee, Y., Kozar, K.A. “Investigating factors affecting the adoption of anti-spyware systems,” Communication of the ACM (48:8), 2005, 72–78.
  • Lee, S.M., Lee, S.G., Yoo, S. “An integrative model of computer abuse based on social control and general deterrence theories,” Information & Management (41), 2004, 707–718.
  • Massetti, B., Zmud, R.W. “Measuring the extent of EDI usage in complex organizations: Strategies and illustrative examples,” MIS Quarterly (20:3), September 1996, 331–345.
  • McGowan, M.K., Madey, G.R. “The influence of organization structure and organizational learning factors on the extent of EDI implementation in U.S. firms,” Information Resources Management Journal (11:2), Summer 1998, 17–27.
  • Merchant, K.A. Control in Business Organizations, Boston: Pitman Publishing, 1985.
  • Nolan, R.L. Managing the crises in data processing, Harvard Business Review, March-April 1979, 115–126.
  • Nunnally, J.C. Psychometric Theory, New York:McGraw-Hill, 1978.
  • Premkumar, G., Ramamurthy, K. “The role of interorganizational and organizational factors on the decision mode for adoption of interorganizational systems,” Decision Sciences (26:3), 1995, 303–336.
  • Ramamurthy, K., Premkumar, G. “Determinants and outcomes of electronic data interchange diffusion,” IEEE Transactions on Engineering Management (42:4), November 1995, 332–351.
  • Sia, S.K., Neo, B.S. Reengineering effectiveness and the redesign of organization control: A case study of the Inland Revenue Authority of Singapore, Journal of Management Information Systems (14:1), Summer 1997, 69–92.
  • Siponen, T. M. “On the role of human mortality in information system security: From the problems of descriptivism to non-descriptive foundations,” Information Resources Management Journal (14:4), 2001, 15–23.
  • Spiller, P., Lohse, G.L. “A classification of Internet retail stores,” International Journal of Electronic Commerce (2:2), Winter 1997-1998, 29–56.
  • Suh, B., Han, I. “The impact of customer trust and perception of security control on the acceptance of electronic commerce,” International Journal of Electronic Commerce (7:3), 2003, 135–161.
  • Teo, T.S.H., Tan, M., Buk, W.K. “A contingency model of Internet adoption in Singapore,” International Journal of Electronic Commerce (2:2), 1997, 95–118.
  • Thong, J.Y.L. “An integrated model of information systems adoption in small businesses,” Journal of Management Information Systems (15:4), 1999, 187–214.
  • Weber, R. Information Systems Control and Audit, Prentice Hall Inc., Upper Saddle River, New Jersey, 1999.
  • Whitman, M.E. In defense of the realm: Understanding the threats to information security, International Journal of Information Management (24), 2004, 43–57.
  • Wybo, M. “The IT sales cycle as a source of context in IS implementation theory,” Information & Management (44:4), June 2007, 397-407
  • Yeh, Q-J., Chang, A.J-T. “Threats and countermeasures for information system security: A cross-industry study,” Information & Management (44:5), 2007, 480–491.
  • Zviran, M., Haga, W.J. “Password security: An empirical study,” Journal of Management Information Systems (15:4), 1999, 161–185.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.