Social change and the future of information systems development
Critical issues in information systems research
The productivity paradox of information technology
Communications of the ACM
Interpreting Information Systems in Organizations
Interpreting Information Systems in Organizations
Technical opinion: Information system security management in the new millennium
Communications of the ACM
A public sector case study on evaluating and managing the benefits of IS/IT
Technologies & methodologies for evaluating information technology in business
Information and Management
Structural equation model for EDI controls: Controls design perspective
Expert Systems with Applications: An International Journal
Using case-based reasoning for the design of controls for internet-based information systems
Expert Systems with Applications: An International Journal
Information and Management
The relationship among formal EDI controls, knowledge of EDI controls, and EDI performance
Information Technology and Management
Metrics for characterizing the form of security policies
The Journal of Strategic Information Systems
IT/IS implementation risks and their impact on firm performance
International Journal of Information Management: The Journal for Information Professionals
International Journal of Information Management: The Journal for Information Professionals
Gaining benefits from IS/IT implementation: Interpretations from case studies
International Journal of Information Management: The Journal for Information Professionals
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
Information Resources Management Journal
Hi-index | 0.02 |
Information systems researchers and practitioners alike have always felt the need to minimize systemic risks arising out of the use of information technology. Research has identified the confidentiality, integrity and availability of information as vital concepts. However, in developing counter-measures to threats in these three areas the focus has been on questions such as computer viruses, hacking, system failures and access control. Thus the primary concern has been for the technical installations and their functionality. In contrast this research sees information technology usage in terms of the integrity and the wholeness of systems, social as well as technical. It argues that by maintaining the integrity of information systems, the risks associated with information technology usage can be minimized.