17
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach

Pages 3-30 | Published online: 07 Jul 2014

References

  • Abraham, S. 2011. “Information Security Behavior: Factors and Research Directions,” in Proceedings of the Seventeenth Americas Conference on Information Systems, August 4-7, Michigan: AIS, pp. 1–13.
  • Ajzen, I., and Fishbein, M. 1980. Understanding Attitudes and Predicting Social Behavior. Englewood Cliff, NJ: Prentice Hall.
  • Allan, G. 2003. “A Critique of Using Grounded Theory as a Research Method,” Electronic Journal of Business Research Methods (2:1), pp. 1–10.
  • Bigot, A., Chrisment, C., Dkaki, T., Hubert, G., and Mothe, J. 2011. “Fusing Different Information Retrieval Systems According to Query-topics: A Study Based on Correlation in Information Retrieval Systems and TREC Topics,” Information Retrieval (14), pp. 617–648.
  • Camp, R.C. 1989. Benchmarking: The Search for Industry Best Practices that Lead to Superior Performance. Milwaukee, WI: ASQC Quality Press.
  • Chesney, T. 2006. “The Effect of Communication Medium on Research Participation Decisions,” Journal of Computer-mediated Communication (11), pp. 877–883.
  • Cohen, J. A. 1960. “A Coefficient of Agreement for Nominal Scales,” Educational and Psychological Measurement (20), pp. 37–46.
  • CSI (2010/2011). Computer Crime and Security Survey. Computer Security Institute Website: (http://www.gocsi.com; accessed April 4, 2013).
  • Csrc.nist.gov. 2002. Federal Information Security Management Act of 2002 (Title III of E-Gov). National Institute of Standards and Technology Website (http://csrc.nist.gov/drivers/documents/FISMA-final.pdf; accessed August 1, 2013).
  • Denning, P. J. 1992. “Passwords,” American Scientist (80), pp. 117–120.
  • Diaz, P., Aedo, A., and Ribagorda, A. 1998. “A Security Model for the Design of Hypermedia Systems,” in Proceedings of the TC11 14th International Conference on Information Security, pp. 251–260.
  • Dillman, D. A. 2000. Mail and Internet Surveys: The Tailored Design Method, 2nd edition. New York, NY: Wiley.
  • Galea, S. and Tracy, M. 2007. “Participation Rates in Epidemiologic Studies,” AEP(17:9), pp. 643–653.
  • Greenacre, M. J. 1989. “The Geometric Interpretation of Correspondence Approach,” Journal of the American Statistical Association (82), pp. 437–447.
  • Groves, R. M., Presser, S., and Dipko, S. 2004. “The Role of Topic Interest in Survey Participation Decisions,” Public Opinion Quarterly(68:1), pp. 2–31.
  • Groves, R. M., Cialdini, R. B., and Couper, M. P. 1992. “Understanding the Decision to Participate in a Survey,” Public Opinion Quarterly(56:4), pp. 475–495.
  • Groves, R. and Couper, M. 1998. Nonresponse in Household Interview Surveys. New York: John Wiley and Sons.
  • Groves, R. M., Singer, E., and Corning, A. 2000. “Leverage-Saliency Theory of Survey Participation,” Public Opinion Quarterly(64), pp. 299–308.
  • Halpern, S. D., Karlawish, J. H. T., Casarett, D., Berlin, J. A., and Asch, D. A. 2004.“Empirical Assessment of Whether Moderate Payments are Undue or Unjust Inducements for Participation in Clinical Trials,” Archives of Internal Medicine (164), pp. 801–803.
  • Hrebiniak, L. G. and Snow, C. C. 1980.“Research Notes: Industry Differences in Environmental Uncertainty and Organizational Characteristics Related to Uncertainty,” Academy of Management Journal(23:4), pp.750–759.
  • Ivy, J. 2001. “Higher Education Institution Image: A Correspondence Analysis Approach,” The International Journal of Educational Management (15:6/7), pp. 276–282.
  • Jick, T. D. 1979. “Mixing Qualitative and Quantitative Methods: Triangulation in Action,” Administrative Science Quarterly (24:4), pp. 602–611.
  • Johnson, A. M. 2009. “Business and Security Executives Views of Information Security Investment Drivers: Results From a Delphi Study,” Journal of Information Privacy & Security (5:1), pp. 3–27.
  • Jowkar A. and Didegah, F. 2010. “Evaluating Iranian Newspapers' Web Sites Using Correspondence Analysis,” Library Hi Tech, (28:1), pp. 119–130.
  • Kotulic, A. G., and Clark, J. G. 2004. “Why There Aren't More Information Security Research Studies,” Information & Management(41:5), pp. 597–607.
  • Krippendorff, K. 1980. Content Analysis: An Introduction to Its Methodology. Beverly Hills, CA: Sage Publications.
  • Lambrinoudakis, C. 2000. “Smart Card Technology for Deploying a Secure Information Management Framework,” Information Management & Computer Security (8:4), pp. 173–183.
  • Landry, R. and Amara, N. 2012. “Elucidation and Enhancement of Knowledge and Technology Transfer Business Models,” VINE: The Journal of Information and Knowledge Management Systems (42:1), pp. 94–116.
  • Leach, J. 2003. “Improving User Security Behavior,” Computers & Security (22:8), pp. 685–692.
  • Luftman, J., and Derksen, B. 2012. “Key Issues for IT Executives 2012: Doing More with Less,” MIS Quarterly Executively (11:4), pp. 207–218.
  • Ma, Q, and Pearson, J. M. 2005. “ISO 17799: ‘Best Practices’ in Information Security Management,” Communications of the Association for Information Systems (15), pp. 577–591.
  • Mauri, A. J. and Michaels, M. P. 1998. “Firm and Industry Effects Within Strategic Management: An Empirical Examination,” Strategic Management Journal (19), pp. 211–219.
  • Maynard, D. W., Freese, J., and Schaeffer, N. C. 2010. “Calling for Participation, Requests, Blocking Moves, and Rational (Inter)action in Survey Introductions,” American Sociological Review (75:5), pp. 791–814.
  • Mayring, P. 2000. “Qualitative Content Analysis,” Forum: Qualitative Social Research 1(2), article 20, (http://www.qualitative-research.net/index.php/fqs/article/view/1089/2386: accessed July 31, 2013).
  • Moore, G. C., and Benbasat, I. 1991. “Development of An Instrument to Measure the Perceptions of Adopting an Information Technology Innovation,” Information Systems Research (2:3), pp. 192–222.
  • National Research Council. 1979. Privacy and Confidentiality as Factors in Survey Response. Washington, DC: National Academy Press.
  • Oksenberg, L., Coleman, L, and Cannell, C. F. 1986. “Interviewers' Voices and Refusal Rates in Telephone Surveys,” Public Opinion Quarterly(50:1), pp. 97–111.
  • Preloran, M. H., Browner, C. H., and Lieber, E. (2001). “Strategies for Motivating Latino Couples' Participation in Qualitative Health Research and Their Effects on Sample Construction,” American Journal of Public Health(91:11), pp. 1832–1841.
  • Rainer, R. J., Marshall, T. E., Knapp, K. J., and Montgomery, G. H. 2007. “Do Information Security Professionals and Business Managers View Information Security Issues Differently?” Information Systems Security (16:2), pp. 100–108.
  • Remenyi, D. 1992. “Researching Information Systems: Data Analysis Methodology Using Content and Correspondence Analysis,” Journal of Information Technology (7), pp. 76–86.
  • Roose, H., Lievens, J., and Waege, H. 2007. “The Joint Effect of Topic Interest and Follow-up Procedures on the Response in a Mail Questionnaire,” Sociological Methods & Research (35:3), pp. 410–428.
  • Sabherwal, R. and Chan, Y. E. 2001. “Alignment Between Business and IS Strategies: A Study of Prospectors, Analyzers, and Defenders,” Information Systems Research (12:1), pp. 11–33.
  • Saint-Germain, R. 2005. “Information Security Management Best Practice Based on ISO/IEC 17799,” The Information Management Journal(July/August), pp. 60–66.
  • Sanginga, P. C., Tumwine, J., and Lilja, N. K. 2006. “Patterns of Participation in Farmers' Research Groups: Lessons From the Highlands of Southwestern Uganda,” Agriculture and Human Values (23), pp. 501–512.
  • Schleifer, S. 1986. “Trends in Attitudes Towards and Participation in Survey Research,” Public Opinion Quarterly (50), pp. 17–26.
  • Shaughnessy, J., Zechmeister, E., and Jeanne, Z. 2011. Research Methods in Psychology, 9th edition. New York, NY: McGraw Hill.
  • Singer, E., and Kohnke-Aguirre, L. (1979). “Interviewer Expectation Effects: A Replication and Extension,” Public Opinion Quarterly (43:2), pp. 245–260.
  • Siponen, M. T. and Oinas-Kukkonen, H. 2007. “A Review of Information Security Issues and Respective Research Contributions,” Database for Advances in Information Systems (38:1), pp. 60–80.
  • Slusky, L., and Partow-Navid, P. 2012. “Students Information Security Practices and Awareness,” Journal of Information Privacy & Security (8:4), pp. 3–26.
  • Spears, J. L., and Barki, H. 2010. “User Participation in Information Systems Security Risk Management,” MIS Quarterly (34:3), pp. 503–522.
  • SPSS 1998. Perceptual Mapping Using SPSS Categories. Chicago, IL: SPSS.
  • Steeh, C. 1981. “Trends in Nonresponse Rates,” Public Opinion Quarterly(45), pp. 40–57.
  • Tai, L A., and Phelps, R. 2000. “CEO and CIO Perceptions of Information Systems Strategy: Evidence from Hong Kong,” European Journal of Information Systems(9:3), pp. 163–172.
  • Teece, D.J. 1998. “Capturing Value from Knowledge Assets: The New Economy, Markets for Know-how, and Intangible Assets,” California Management Review (40), pp. 55–79.
  • Venkatraman, S., and Delpachitra, I. 2008. “Biometrics in Banking Security: A Case Study,” Information Management & Computer Security (16:4), pp. 415–430.
  • Webb, E.J., Campbell, D. T., Schwartz, R. D. and Sechrest, L. 1966. Unobtrusive Measures: Non-reactive Research In the Social Sciences. Chicago: Rand McNally.
  • Yavas, U. and Shemwell, D. J. 1996. “Bank Image: Exposition and Illustration of Correspondence Analysis,” International Journal of Bank Marketing(14:1), pp. 15–21.
  • Zairi, M, and Sinclair, D. 1995. “Business Process Reengineering and Process Management: A Survey of Current Practice and Future Trends in Integrated Management,” Management Decision (33:3), pp. 3–16.
  • Zhang, L. and Amos, C. 2012. “A Model of End Users' Web Threats Information Processing,” Journal of Information Privacy & Security (8:3), pp. 15–36.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.