1,023
Views
6
CrossRef citations to date
0
Altmetric
Regular Articles

Information Security Risks in Enabling e-Government: The Impact of IT Vendors

&
Pages 284-293 | Published online: 13 Oct 2011

REFERENCES

  • Aubert , B. A. , Party , M. and Rivard , S. 2005 . A framework for information technology outsourcing risk management . The DATABASE for Advances in Information Systems , 36 ( 4 ) : 8 – 29 .
  • Baskerville , R. 1993 . Information systems security design methods: Implications for information systems development . ACM Computing Surveys , 25 ( 44 ) : 375 – 414 .
  • Baskerville , R. 2005 . Best practices in IT risk management . Cutter Benchmark Review , 5 ( 12 ) : 5 – 12 .
  • Berghmans , P. , Lenaerts , M. and Van Roy , K. 2007 . “ Menselijke factoren in de informatieveiligheid van lokale besturen ” . In Praktijkgids management lokale besturen , Belgium : Kluwer .
  • Berghmans , P. , Van Den Eede , G and Van de Walle , B. 2008 . “ A Systems Perspective on Security Risk Identification: Methodology and Illustrations from City Councils ” . In Proceedings of the 5 International ISCRAM Conference , Washington, DC, USA : ISCRAM .
  • Blackley , J. A. and Leach , J. 1996 . Security considerations in outsourcing IT services . Information Security Technical Report , 1 ( 3 ) : 3 – 4 .
  • Bozeman , B. and Bretschneider , S. 1986 . Public management information systems: Theory and prescription (Special issue) . Public Administration Review , 46 : 475 – 487 .
  • Brown , M. M. and Brudney , J. L. 2001 . “ Achieving advanced electronic government services: An examination of obstacles and implications from an international perspective ” . In The National Public Management Research Conference Bloomington, IN
  • Buck–Lew , M. 1992 . To outsource or not? . International Journal of Information Management , 12 : 3 – 20 .
  • Carr , N. G. 2003 . IT Doesn't Matter . Harvard Business Review , 81 ( 5 ) : 5 – 12 .
  • Cordella , A. and Willcocks , L. 2009 . Outsourcing, bureaucracy and public value: Reappraising the notion of the “contract state” . Government Information Quarterly , 27 : 82 – 88 .
  • Currie , W. 1996 . Outsourcing in the private and public sectors: An unpredictable IT strategy . European Journal of Information Systems , 4 : 226 – 236 .
  • De Haes , S. and Van Grembergen , W. Jan 3–6, 2005 2005 . “ IT Governance Structures, Processes and Relational Mechanisms: Achieving IT/Business Alignment in a Major Belgian Financial Group ” . In Proceedings of the 38th Annual Hawaii International Conference , Jan 3–6, 2005 , Waikoloa : Big Island Hawaii .
  • Dhillon , G. and Backhouse , J. 2001 . Current directions in IS security research: Towards socio-organizational perspectives . Information Systems Journal , 11 ( 2 ) : 127
  • Dhillon , G. and Torkzadeh , G. 2006 . Value-focused assessment of information system security in organizations . Information Systems Journal , 16 ( 3 ) : 293 – 314 .
  • Dibbern , J. , Goles , T. , Hirschheim , R. and Jayatilaka , B. 2004 . Information systems outsourcing: A survey and analysis of the literature . ACM SIGMIS Database , 35 : 6 – 102 .
  • Emory , C. W. and Cooper , D. R. 1991 . Business research methods , Boston, MA : Irwin .
  • Earl , M. J. 1996 . The risk of outsourcing IT . Sloan Management Review , 37 ( 3 ) : 26 – 32 .
  • Fink , D. 1994 . A security framework for information systems outsourcing . Information Management & Computer Security , 2 : 3 – 8 .
  • Gaonjur , P. and Bokhoree , C. 2006 . Risk of insider threats in information technology outsourcing: Can deceptive techniques be applied? . Proceedings of Security and Management, 522. ,
  • ISO, B. (2005). “IEC 27002:2005.” Information technology. Security techniques. Code of practice for information security management http://www.iso.org/iso/catalogue_detail?csnumber=42103 (http://www.iso.org/iso/catalogue_detail?csnumber=42103)
  • Karyda , M. , Mitrou , E. and Quirchmayr , G. 2006 . A framework for outsourcing IS/IT security services . Information Management & Computer Security , 14 : 402 – 415 .
  • Keeney , R. 1992 . Value-focused thinking: A path to creative decision making , Cambridge, MA : Harvard University Press .
  • Khalfan , A. M. 2004 . Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors . International Journal of Information Management , 24 : 29 – 42 .
  • Lacity , M. and Hirschheim , R . 1993 . Information Systems Outsourcing , New York, NY : John Wiley & Sons .
  • Lacity , M. C. , Khan , S. A. and Willcocks , L. P. 2009 . A review of the IT outsourcing literature: Insights for practice . The Journal of Strategic Information Systems , 18 : 130 – 146 .
  • Moon , J. , Jung , G. , Chung , M. and Choe , Y. Jan 3–6, 2007 2007 . “ IT outsourcing for E-government: Lessons from IT outsourcing projects initiated by agricultural organizations of the Korean government ” . In Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007) , Jan 3–6, 2007 , Waikoloa : Big Island Hawaii .
  • Oscarson , P. 2007 . “ Actual and Perceived Information Systems Security ” . In [Doctoral dissertation] Linköping University , Department of Management and Engineering .
  • OWASP (2009). OWASP Top 10 Project. OWASP https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project (https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)
  • Prahalad , C. and Hamel , G. 1990 . The core competence of the corporation . Harvard Business Review , 68 ( 3 ) : 79 – 91 .
  • Reason , J. 1990 . Human error , Cambridge, , UK : Cambridge University Press .
  • Renn , O. 1998 . Three decades of risk research: Accomplishments and new challenges . Journal of Risk Research , 1 ( 1 ) : 49 – 71 .
  • Searle , J. R. 1995 . The construction of social reality , New York, NY : Penguin Books .
  • Sherwood , J. 1997 . Managing security for outsourcing contracts . Computers and Security , 16 : 603 – 609 .
  • Simon , H. A. 1960 . The new science of management decision , New York, NY : Wiley .
  • Siponen , M. T. 2000 . A conceptual foundation for organizational information security awareness . Information Management & Computer Security , 8 ( 1 ) : 31 – 41 .
  • Teece , D. J. 1986 . “ Firm boundaries, technological innovation and strategic management ” . In The economics of Strategic Planning , Edited by: Thomas , L. 187 – 199 . Lexington, MA : Lexington Books .
  • Vilvovsky , S. 2008 . “ Differences between public and private IT outsourcing: Common themes in the literature ” . In Proceedings of the 2008 international conference on Digital government research , Montreal, , Canada : Digital Government Society of North America .
  • United Nations (2008). e-Government Survey 2008, From e-Government to connected Governance. t unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN028607.pdf (http://unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN028607.pdf) (Accessed: 28 December 2009 ).
  • Willcocks , L. P. , Lacity , M. C. and Kern , T. 1999 . Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA . Journal of Strategic Information Systems , 8 : 285 – 314 .
  • Williamson , O. E. 1985 . The Economic Institutions of Capitalism , New York, NY : The Free Press .
  • Yildiz , M. 2007 . E-government research: Reviewing the literature, limitations, and ways forward . Government Information Quarterly , 24 : 646 – 665 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.