31
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions

Pages 25-49 | Published online: 10 Sep 2014

  • Alexander, K., Dhumale, R., & Eatwell, J. (2004). Global governance of financial systems. The international regulation of systemic risk. New York: Oxford University Press Inc, USA.
  • Azad, B., Faraj, S., & Goh J. F. (2010). What Shapes Global Diffusion of e-Government: Comparing the Influence of National Governance Institutions. Journal of Global Information Management, 18 (2), 85–104.
  • Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49 (6), 70–75.
  • Bertort, J. C., Jaeger, J. T., & Grimes, J. M. (2001). Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27, 264–271.
  • Bia, M., & Kalika, M. (2007). Adopting an ICT code of conduct: an empirical study of organizational factors. Journal of Enterprise Information Management, 20 (4), 432–446.
  • Chang, A. J-T., & Yeh, Q-J. (2006). On security preparations against possible IS threats across industries. Information Management & Computer Security, 14 (4), 343–360.
  • Chao, S-C., Chen, K., & Lin, C-H. (2006). Capturing industry experience for an effective information security assessment. International Journal of Information Systems and Change Management, 1 (4), 421–438.
  • Chen, C. C., Medlin, B. D., & Shaw, R. S. (2008). A cross-cultural investigation of situational information security awareness programs. Information Management & Computer Security, 16 (4), 360–376.
  • Chaturvedi, M., Gupta, M. Mehta, S., & Valeri, L. (2000). Fighting the wily hacker: modeling information security issues for online financial institutions using the SEAS environment. In Leite Gouvêa (Ed.), Proceedings of Internet Society (INET 2000), 18–21 July, 2000, Yokohama, Japan. Retrieved Jan. 14, 2009 from: http://www.isoc.org/inet2000/cdproceedings/7a/7a_4.htm.
  • Chung, W., Chen, H. Chang, W., & Chou, S. (2006). Fighting cybercrime: A review and Taiwanese experience. Decision Support Systems, 41 (3), 669–682.
  • Cohn, E. S., Bucolo, D., Rebellon, C. J., & Van Gundy, K. (2010). An integrated model of legal and moral reasoning and rule-violating behavior: The role of legal attitudes. Law and Human Behavior, 34 (4), 295–309.
  • DTT-Global Security Survey (2005). The Global Security Survey, 2004, Deloitte Touche Tohmatsu (DTT).Retrieved Jan 14, 2009 from: ://www.deloitte.com/assets/Dcom-Argentina/Local%20Assets/Documents/global_security.pdf
  • DTT-Global Security Survey (2008). The Global Security Survey, 2007, Deloitte Touche Tohmatsu (DTT).Retrieved January 14, 2009 from: http://www.deloitte.com/assets/Dcom-Shared%20Assets/Documents/dtt_gfsi_G1obalSecuritySurvey_20070901.pdf
  • DTT-Global Security Survey (2009). The Global Security Survey, 2008, Deloitte Touche Tohmatsu (DTT). Retrieved June 20 from: https://www.deloitte.com/assets/Dcom-Serbia/Local%20Assets/Documents/rs_gfsi_globalsecuritysurvey_0901%282%29._pdf
  • EDS (2007). Eight Financial Services Security Concerns.Retrieved May 10, 2008 from: Http://www.eds.com/news/features/3620/. (2007).
  • Goodhue, D. L., & Straub, D. W. (1991). Security concerns of system users: a study of the perceptions of the adequacy of security, Information and Management, 20 (1), 13–22.
  • Gust, C., & Marquez, J. (2004). International comparisons of productivity growth: the role of information technologies and regulatory practices. Labour Economics, 11 (1), 33–38.
  • Ifinedo, P., & Nahar, N. (2006). Do top and mid-level managers view enterprise resource planning (ERP) systems success measures differently? International Journal of Management and Enterprise Development, 3 (6), 6, 618–635.
  • Ifinedo (2009a). Information technology security concerns in global financial services institutions: Do socio-economic factors differentiate perceptions? International Journal of Information Security and Privacy, 3 (2), 68–83.
  • Ifinedo (2009b). Information technology security management concerns in global financial services institutions: Is national culture a differentiator? Information Management & Computer Security, 17 (5), 372–387.
  • infoLock Technologies (2006). Insider threat management. Retrieved Oct. 8, 2009 from: www.infolocktech.com/download/ITM_Whitepaper.pdf.
  • Information Security Industry Survey (1999). Information security magazine.Retrieved Jan 14, 2008 from: http://www.infosecuritymag.com/, July (1999).
  • ISACA (2006). Information Systems Audit and Control Association Manual, 2006 edition. Rolling Meadows, IL. ISACA Press
  • ISO/TR 13569 (2005). Financial services - Information Security Guidelines. http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber =3724.
  • Johnson, H. J. (2000). Global financial institutions and markets. New York: Blackwell Publishing.
  • Jung, B., Han, I. and Lee, S. (2001). Security threats to Internet: A Korean multi-industry investigation. Information and Management, 38 (8), 487–498.
  • Hoesing M. T. (2009). Virtualization security assessment. Information Security Journal: A Global Perspective, 18 (3), 124–130.
  • Kankanhalli, A., Teo, H. H., Tan, B. C. Y., & Wei, K-K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23 (2), 139–154.
  • Kovačić, Z. (2005). A brave new eWorld? An exploratory analysis of worldwide eGovernment readiness, level of democracy, corruption and globalization. International Journal of Electronic Government Research, 1 (3), 15–32.
  • Kritzinger, E., & Smith, E. (2008). Information security management: An information security retrieval and awareness model for industry. Computers & Security, 27 (5-6), 224–231.
  • Milberg, S., Burke, S., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38 (13), 65–74.
  • Milberg, S., Smith, H. J., & Burke, S. (2000). Information privacy: corporate management and national regulation. Organization Science, 11 (1), 35–57.
  • Moshirian, F. (2007). Financial services and a global single currency. Journal of Banking and Finance, 31 (1), 3–9.
  • Oxley, J. E., & Yeung, B. (2001). E-commerce readiness: institutional environment and international competitiveness. Journal of International Business Studies, 32 (4), 705–723.
  • Pontus, E. and Erik, J. (2008). Assessment of business process information security. International Journal of Business Process Integration and Management, 3 (2), 118–130.
  • PricewaterhouseCoopers (2008). The Global State of Information Security Survey 2008 http://www.pwc.com/extweb/home.nsf/docid/clcd6cc69c2676d4852574da007859_49
  • Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computer & Security, 27 (7-8), 241–253.
  • Reinhold, C., Frolick, M. N., & Okunoye, A. (2009). Managing your security future. Information Security Journal: A Global Perspective, 18 (3), 116–123.
  • Schatz, D. (2008). Setting priorities in your security program, In H. F. Tipton and K. Krause (Eds), Information Security Management Handbook. Boca Raton, FL.: Taylor & Francis Group.
  • Shih, C-F, Dedrick, J., & Kraemer, K. L. (2005). Rule of law and the international diffusion of E-commerce. Communications of the ACM, 48 (11), 57–62.
  • Sumner, M. (2009). Information security threats: A comparative analysis of impact, probability, and preparedness. Information Systems Management, 26 (1), 2–12.
  • Theoharidoua, M., Kokolakisb, S., Karydaa, M., & Kiountouzisa, E. (2005). The insider threat to information systems and the effectiveness of ISO 17799. Computers & Security, 24 (6), 472–484
  • Transparency International (2009). Corruption Perception Index - 2008.Retrieved Jun 20, 2009 from: http://www.transparency.org/.
  • Walker, T. (2008). Practical management of malicious insider threat - An enterprise CSIRT perspective. Information Security Technical Report, 13 (4), 225–234.
  • Whitten, D (2008). The chief information security officer: An analysis of the skills required for success. Journal of Computer Information Systems, 48 (3), 15–19
  • Willison, R. and Siponen, M. (2009). Overcoming the insider: Reducing employee computer crime through situational crime prevention. Communications of the ACM, 52 (9), 133–137.
  • World Economic Forum (2009). Global competitiveness for 2007-2008. http://www.weforum.org.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.