Computer abuse and security: Update on an empirical pilot study
ACM SIGSAC Review
Information systems security: management success factors
Computers and Security
Computer security policy: important issues
Computers and Security
Organization context and information systems success: a contingency approach
Journal of Management Information Systems
Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Development of security policies
Computers and Security
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Password security: an empirical study
Journal of Management Information Systems
Preventive and deterrent controls for software piracy
Journal of Management Information Systems
Threats and countermeasures for information system security: A cross-industry study
Information and Management
Preventing application software piracy: An empirical investigation of technical copy protections
The Journal of Strategic Information Systems
Global e-business: firm size, credibility and desirable modes of payment
International Journal of Business Information Systems
Human, organizational, and technological factors of IT security
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Computers in Human Behavior
Voice enabling mobile financial services with multimodal transformation
International Journal of Mobile Communications
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
International Journal of Human-Computer Studies
Information Systems Research
Expert Systems with Applications: An International Journal
National information security policy and its implementation: A case study in Taiwan
Telecommunications Policy
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers
Journal of Management Information Systems
Expert Systems with Applications: An International Journal
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
An information systems security risk assessment model under uncertain environment
Applied Soft Computing
Information systems resources and information security
Information Systems Frontiers
Information and Management
A causal knowledge-based expert system for planning an Internet-based stock trading system
Expert Systems with Applications: An International Journal
Institutional Influences on Information Systems Security Innovations
Information Systems Research
The effects of multilevel sanctions on information security violations: A mediating model
Information and Management
Why aren't organizations adopting virtual worlds?
Computers in Human Behavior
Modifying smartphone user locking behavior
Proceedings of the Ninth Symposium on Usable Privacy and Security
Fuzzy Assessment of Health Information System Users' Security Awareness
Journal of Medical Systems
Perceived information security of internal users in Indian IT services industry
Information Technology and Management
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
As organizations become increasingly dependent on information systems (IS) for strategic advantage and operations, the issue of IS security also becomes increasingly important. In the interconnected electronic business environment of today, security concerns are paramount. Management must invest in IS security to prevent abuses that can lead to competitive disadvantage. Using the literature on security practices and organizational factors, this study develops an integrative model of IS security effectiveness and empirically tests the model. The data were collected through a survey of IS managers from various sectors of the economy. Small and medium-sized enterprises were found to engage in fewer deterrent efforts compared to larger organizations. Organizations with stronger top management support were found to engage in more preventive efforts than organizations with weaker support from higher management. Financial organizations were found to undertake more deterrent efforts and have stiffer deterrent severity than organizations in other sectors. Moreover, greater deterrent efforts and preventive measures were found to lead to enhanced IS security effectiveness. Implications of these findings for further research and practice are discussed.