335
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Online Security Performances and Information Security Disclosures

References

  • APWG, “Global Phishing Survey: Trends and Domain Name Use 1H2012”, available at: http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_1H2012.pdf, 2012 (accessed 18 March 2013).
  • Bose, I., and Chung, A., “Assessing anti-phishing preparedness: A study of online banks in Hong Kong”, Decision Support Systems (45:4), 2008, pp. 897–912.
  • Chang, I.-C., Hwang, H.-G., Hung, M.-C., Lin, M.-H. and Yen, D.C., “Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department”, Decision Support Systems (44:1), 2007, pp. 350–359.
  • Chau, P. Y. K., and Tam, K. Y., “Factors affecting the adoption of open systems: An exploratory study”, MIS Quarterly (21:1), 1997, pp. 1–21.
  • Clarkson, M. P., Li, Y., Richardson, D. G. and Vasvari, P. F., “Revisiting the relation between environmental performance and environmental disclosure: An empirical analysis”, Accounting, Organizations and Society (22), 2008, pp. 303–327.
  • Cohen, J., Statistical Power Analysis for the Behavioral Sciences, 2nd ed. Lawrence Erlbaum, Hillsdale, NJ, 1988, pp. 26.
  • Criado-Jimenez, I., Fernandez-Chulian, M., Husillos-Carques, F. J. and Larrinaga-Gonzalez, C., “Compliance with Mandatory Environmental Reporting in Financial Statements: The Case of Spain (2001–2003)”, Journal of Business Ethics (79:3), 2008, pp. 245–262.
  • Dinev, T. and Hu, Q., “The centrality of awareness in the formation of user behavioral intention toward protective information technologies”, Journal of the Association for Information Systems (8:7), 2007, pp. 386–408.
  • Dye, R.A., “Disclosure of Nonproprietary Information”, Journal of Accounting Research (23:1), 1985, pp. 123–145.
  • Faul, F., Erdfelder, E., Buchner, A. and Lang, A. G., “Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses”, Behavior Research Methods (41), 2009, pp. 1149–1160.
  • FFIEC, “Authentication in an Internet Banking Environment”, available at: http://www.ffiec.gov/pdf/authentication_guidance.pdf, 2005 (accessed 10 September 2012).
  • FFIEC, “Supplement to Authentication in an Internet Banking Environment”, available at: http://www.ffiec.gov/pdf/Auth-ITS-Final%206-22-11%20(FFIEC%20Formated).pdf, 2011 (accessed 10 September 2012).
  • Frankel, R., Johnson, M., Skinner, D. J., “An empirical examination of conference calls as a voluntary disclosure medium”, Journal of Accounting Research (37:1), 1999, pp. 133–150.
  • Goodhue, D. L. and Straub, D., “Security concerns of system users: A study of perceptions of the adequacy of security measures”, Information & Management (20:1), 1991, pp. 13–27.
  • Gordon, L.A., Loeb, M. P. and Sohail, T., “Market value of voluntary disclosures concerning information security”, MIS Quarterly (34:3), 2010, pp. 567–594.
  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. L., Multivariate Data Analysis with Readings, Prentice Hall, Englewood Cliffs, NJ, 2010, pp. 661.
  • Hasnah, H., Dato, D. N. I., Jeyaraman, K. and Ong, H. C., “Determinants of internal control characteristics influencing voluntary and mandatory disclosures: A Malaysian perspective”, Managerial Auditing Journal (25:2), 2010, pp. 140–159.
  • Holt, P. T., “The effects of internal audit role and reporting relationships on investor perceptions of disclosure credibility”, Managerial Auditing Journal (27:9), 2012, pp. 878–898.
  • Hsu, C., Lee, J.-N. and Straub, D. W., “Institutional Influences on IS Security Innovations”, Information Systems Research (23:3), 2012, pp. 918–939.
  • Jeyaraj, A., Rottman, J. and Lacity, M., “A review of the predictors, linkages, and biases in IT innovation adoption research”, Journal of Information Technology (21), 2006, pp. 1–23.
  • Kim, C., Tao, W., Shin, N., Kim, K.-S., “An empirical study of customers' perceptions of security and trust in e-payment systems”, Electronic Commerce Research and Applications (9:1), 2010, pp. 84–95.
  • Kotulic, A. G., and Clark, J. G., “Why there aren't more information security research studies”, Information & Management (41:5), 2004, pp. 597–607.
  • Krippendorff, K., Content analysis: An introduction to its methodology, Sage Publications, Thousand Oaks, CA, 2013.
  • Kuan, K. Y. K. and Chau, P. Y. K., “A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework”, Information and Management (38:8), 2001, pp. 507–521.
  • Laux, D., Luse, A., Mennecke, B. and Townsend, A. M., “Adoption of biometric authentication systems: Implications for research and practice in the deployment of end-user security systems”, Journal of Organizational Computing and Electronic Commerce (21:3), 2011, pp. 221–245.
  • Lee, S., and Ahn, H., “The organizational contexts, controls and implementation of e-business”, The Journal of Computer Information Systems (51:1), 2010, pp. 114–124.
  • Lee, O. K., Wang, M., Lim, K. H. and Peng, Z., “Knowledge Management Systems Diffusion in Chinese Enterprises: A Multistage Approach Using the Technology-Organization-Environment Framework”, Journal of Global Information Management (17:1), 2009, pp. 70–84.
  • Lee, Y. and Larsen K.R., “Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software”, European Journal of Information Systems (18), 2009, pp. 177–187.
  • Li, D., Lai, F. and Wang, J., “E-Business Assimilation in China's International Trade Firms: The Technology-Organization-Environment Framework”, Journal of Global Information Management (18:1), 2010, pp. 39–65.
  • Lim, N., Yeow, P. H. P. and Yuen, Y. Y., “An Online Banking Security Framework and a Cross-Cultural Comparison”, Journal of Global Information Technology Management (13:3), 2010, pp. 39–62.
  • Low, C., Chen, Y. and Wu, M., “Understanding the determinants of cloud computing adoption”, Industrial Management and Data Systems (111:7), 2011, pp. 1006–1023.
  • Mao, Z., Florencio, D. and Herley, C., Painless migration from passwords to two-factor authentication. Retrieved from http://research.microsoft.com/apps/pubs/default.aspx?id=155648, 2011 (Accessed 25 August, 2012)
  • Mercer M., “How do investors assess the credibility of management disclosures”, Accounting Horizons (18:3), 2004, pp. 185–196.
  • Network World, “Banks: Hackers more aggressive in attacking customer accounts”, available at: http://www.networkworld.com/news/2012/061412-banks-hackers-260208.html, 2012 (accessed 25 March 2013).
  • Ray, S., Ow, T. and Kim, S. S., “Security assurance: How online service providers can influence security control perceptions and gain trust”, Decision Science (42:2), 2011, pp. 391–412.
  • Swanson, E.B., “Information systems innovation among organizations”, Management Science (40:9), 1994, pp. 1069–1092.
  • Tanaka, H., Matsuura, K. and Sudoh, O., “Vulnerability and information security investment: An empirical analysis of e-local government in Japan”, Journal of Accounting and Public Policy (24:1), 2005, pp. 37–59.
  • Thong, J. Y. L., “An integrated model of information systems adoption in small businesses”, Journal of Management Information Systems (15:44), 1999, pp. 187–214.
  • Tornatzky, L. G. and Fleischer, M., The processes of technological innovation, Lexington Books, Lexington, MA, 1990, pp. 161–174.
  • Verrecchia, R.E., “Discretionary disclosure”, Journal of Accounting and Economics (5), 1983, pp. 179–194.
  • Wang, T., Kannan, N. K. and Ulmer, R. J., “The association between the disclosure and the realization of information security risk factors”, Information Systems Research (24:2), 2013, pp. 201–218.
  • Yeh, Q.-J., and Chang, A. J.-T., “Technology-push and need-pull roles in information system security diffusion”, International Journal of Technology Management (54:2/3), 2011, pp.321–343.
  • Yuen, Y.Y., Yeow, H.P.P., Lim, N. and Saylani, N., “Internet banking adoption: Comparing developed and developing countries”, The Journal of Computer Information Systems (51:1), 2010, pp. 52–61.
  • Zhu, K., Kraemer, K. L. and Xu, S., “Electronic business adoption by European firms: A cross-country assessment of the facilitators and inhibitors”, European Journal of Information Systems (12:4), 2003, pp. 251–268.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.