Recognizing the politics of MIS
Information and Management
Unifying the fragmented models of information systems implementation
Critical issues in information systems research
An assessment of the contingency theory of management information systems
Journal of Management Information Systems
Technological frames: making sense of information technology in organizations
ACM Transactions on Information Systems (TOIS) - Special issue on social science perspectives on IS
Implementation: The Key to Successful Information Systems
Implementation: The Key to Successful Information Systems
Strategic Information Systems: Competition through Information Technologies
Strategic Information Systems: Competition through Information Technologies
The Value of Internet Commerce to the Customer
Management Science
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
Enterprise Security Architecture: A Business-Driven Approach
Enterprise Security Architecture: A Business-Driven Approach
Gaining Access with Social Engineering: An Empirical Study of the Threat
Information Systems Security
Goal Setting and Trust in a Security Management Context
Information Security Journal: A Global Perspective
Trust and TAM in online shopping: an integrated model
MIS Quarterly
Virtual Team Trust: Instrument Development and Validation in an IS Educational Environment
Information Resources Management Journal
Hi-index | 0.00 |
Although information security is critical for organisations to survive, a number of studies continue to report incidents of critical information loss. To this end, there is still an increasing interest to study information security from a non-technical perspective. In doing so, this research focuses on the effect of strong corporate cultures and organisational commitment as important aspects in managing information security through e-banking. That is, manipulating more effectively e-banking security development and management within organisations. Achieving the required level of e-banking security within organisations usually requires more than security awareness and control but also a better understanding of the organisations' culture in which e-banking security measures are developed and tailored to. In effect, organisations may have a clearer insight into how to commit more effectively to such security measures and ultimately, offer more secure e-banking services to their customers.