共查询到20条相似文献,搜索用时 15 毫秒
1.
Abstract. Information system (IS) security continues to present a challenge for executives and professionals. A large part of IS security research is technical in nature with limited consideration of people and organizational issues. The study presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of the values of people from an organizational perspective. It uses the value-focused thinking approach to identify 'fundamental' objectives for IS security and 'means' of achieving them in an organization. Data for the study were collected through in-depth interviews with 103 managers about their values in managing IS security. Interview results suggest 86 objectives that are essential in managing IS security. The 86 objectives are organized into 25 clusters of nine fundamental and 16 means categories. These results are validated by a panel of seven IS security experts. The findings suggest that for maintaining IS security in organizations, it is necessary to go beyond technical considerations and adopt organizationally grounded principles and values. 相似文献
2.
《Information Security Journal: A Global Perspective》2013,22(3):151-161
ABSTRACT Information security can be viewed as the efficient control of uncertainty arising from malicious acts intended to exploit valuable assets and in the context of information systems the valuable assets under consideration are data. A large part of information security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of information security in terms of a socio-organizational perspective. In doing so, it uses the goal-setting approach to identify any possible weaknesses in security management procedures in relation to trust among the members of information technology groups in communicating efficiently security risk messages. Data for the research were collected through in-depth interviews within three case studies. Interview results suggest that goal setting and trust are interrelated in managing information security. The research contributes to interpretive information systems with the study of goal setting and trust in a security management context. 相似文献
3.
Nicholas Evangelopoulos 《Information Systems Journal》2016,26(1):39-46
This study examines research published in the first 24 years of Information Systems Journal's (ISJ) publication history using a thematic space of all information systems (IS) research as the backdrop. To that end, abstracts from all contributing articles published in eight prominent IS journals in the period 1991–2014 were analysed to extract a latent semantic space of five broad research areas. A two‐dimensional projection of the results was used to create a two‐by‐two map, where one dimension represents the European vs. North American style of IS research and another dimension represents a micro vs. macro level of IS research. The ISJ is positioned in the ‘micro and European school’ quadrant. Over the course of the journal's first 24 years, research in the ISJ started with a relative focus on the IT artefact and IS development and gradually moved towards a more balanced position that includes a considerable amount of research on IT for teamwork and collaboration, as well as on IT and individuals. 相似文献
4.
This article analyses the scholarly output of Information Systems Journal (ISJ) in relation to its seven peer journals in the Association for Information Systems Senior Scholars' Basket of Eight journals (SSB8) since ISJ's inception in 1991. To do so, cluster analyses are generated using metadata (i.e. titles, keywords and abstracts) from the articles published. The analysis results reveal commonalties and some distinguishing differences between ISJ and its peer journals. The findings illuminate that ISJ has published articles in the area of information systems development at a much higher rate than its counterparts. The analyses also illustrate that ISJ has embraced broader philosophical and methodological underpinnings than other SSB8 journals. 相似文献
5.
Action research (AR) has for many years been promoted and practised as one way to conduct field studies within the information systems (IS) discipline. Based on a review of articles published in leading journals, we explore how IS researchers practise AR. Our review suggests that AR lends itself strongly towards pluralist approaches which facilitate the production of both theoretical and practical knowledge. First, on the level of each study we analyse how research and problem‐solving activities are mixed, in three ways: the research dominant, the problem‐solving dominant and the interactive approaches. Second, in the context of the wider research programme in which the study is situated, we analyse how AR is mixed with other research methods, in two ways: the dominant and the sequential approaches. We argue that these pluralist practices of mixing types of research activities and types of research methods provide IS action researchers with a rich portfolio of approaches to knowledge production. This portfolio helps them address the risks involved in AR to ensure their efforts contribute to the literature as well as to practical problem‐solving. 相似文献
6.
IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises. Industry type and organizational use of IT were seen as the two factors that affected the motivation of firms to adopt security countermeasures, but their implementation did not necessarily affect the threat perceptions of the managers. Analyses of responses suggested that the scope of the countermeasures adopted were not commensurate with the severity of the perceived threats. Among the threats, networks were rated as contributing the most severe threat and yet had the lowest level of protection, this was followed by threats due to personnel and administrative issues. We therefore addressed threat mitigation strategies, specifically in terms of the differences between industries. 相似文献
7.
This paper proposes qualitative comparative analysis (QCA) as a novel method to harness unstructured data sets such as publicly available reports and news articles. It shows how QCA and conventional qualitative IS research can complement each other. In particular, it demonstrates how qualitative IS research can combine typical qualitative coding techniques with a specific type of QCA, namely crisp‐set QCA (csQCA). The paper illustrates how QCA offers qualitative IS research an innovative approach to explicate the combination of conditions associated with particular outcomes. Drawing on an empirical study of green IS, it showcases the potential of QCA to harness large unstructured qualitative material and generate deeper insights about emerging IS phenomena. The paper also highlights how QCA can contribute to the data collection and analysis stages of qualitative IS research. 相似文献
8.
Joe Peppard 《Information Systems Journal》2001,11(3):249-270
Abstract. Much of the research literature advocates a strong information system (IS) organization-business relationship if the IS organization and, in particular, technology is to make a value-added contribution to the business. Although research also highlights that in many organizations this relationship is poor, little guidance is provided as to how this 'gap' might be bridged. The research reported in this paper is a longitudinal study of three organizations that are actively seeking to bridge the gap, improve the relationship and consequently the value that they derive from their IS investments. A process model containing six stages, illustrating the route to creating high performance from IS, is constructed from cross-case analysis of the collected data. The paper ends with conclusions and implications. 相似文献
9.
Citation analysis is an established technique in literature analysis. It can be used to reveal citation patterns and thus results stemming from the analysis, including co-citation patterns and groupings of researchers, even reveal paradigmatic schools within a certain field. In this article, twelve major MIS journals — six European and six American — are studied to find out whether there are any differences in author selection and referencing patterns. It was discovered that the American MIS community is much more self-sustaining than the European one, which relies heavily on work by American authors. This points either to the superiority of the American MIS community, or the under-appreciation of foreign research, or possibly both. On the European side, the result might be interpreted as a sign of low-quality research, lack of self-esteem and pride, or again both. Clear differences between the editorial policy of the journals can be discerned: some journals accept the American hegemony; some try to maintain a balance between contributions from different countries; and some favour European research. 相似文献
10.
Despite the significant advancements made in understanding the factors that drive employees' compliance and noncompliance behaviours with information security policy (ISP), less is known about how different factors interact to impact such behaviours. Having been drawn on the social information processing theory, this research develops an integrative model that investigates how ethical work climate, beliefs, and neutralization interact to jointly explain ISP noncompliance. The model is tested via a survey of a broad cross section of employees. Neutralization, perceived cost of compliance, and perceived cost of noncompliance are found to significantly impact ISP noncompliance. Egoistic, benevolent, and principled climates are found to differentially influence neutralization and individuals' cognitive beliefs about the cost and benefit of ISP compliance versus noncompliance. Neutralization appears to be a more important moderator of the belief‐noncompliance relationship than the principled climate. 相似文献
11.
Abstract. The field of information systems (IS) has evolved for more than three decades. Although many schools of thought have emerged and even become well established, few historical analyses of research paradigms and methodologies have been undertaken. One of the rare exceptions is Orlikowski & Baroudi (1991). Yet, the IS research community has evolved substantially since 1991 in many aspects. A variety of journal outlets have emerged and become well established. More attention has been paid to paradigmatic and methodological issues. Political and professional contexts have also changed noticeably. Therefore, it should be an opportune time for the field to ask: ‘What changes are manifested in journal publications?’‘Is the field making progress regarding pluralism in IS research?’‘How will the field's publications practices change in the future?’ The purpose of this paper is to investigate these questions and, in turn, reflect on the paradigmatic and methodological progress made since 1991. We examined 1893 articles published in eight major IS publication outlets between 1991 and 2001. Our findings suggest that the long‐term endeavours of interpretivist researchers might need to continue because the paradigmatic progress appears somewhat inconsequential; positivist research still dominates 81% of published empirical research. In particular, US journals, as opposed to European journals, tend to be more positivist, quantitative, cross‐sectional and survey oriented. With respect to research design, survey research is still the most widely used method (41%), although case studies have gained substantial recognition (36%). Further, the increase of qualitative research (30%), empirical studies (61%) and longitudinal cases (33%) at the expense of laboratory experiments (18%) might suggest that IS researchers have become more interested in obtaining scientific knowledge in real world settings. In summary, we suggest that the field has been dominated by the positivist paradigm, despite calls to the contrary. Indeed, if the field was to truly embrace pluralism, it would have to find ways to fundamentally change the publication practices of the journal system, including the current tenure and promotion system, which pose considerable obstacles for the acceptance of alternative paradigms. 相似文献
12.
John Mingers 《Information Systems Journal》2003,13(3):233-249
Abstract. It has commonly been argued that the use of different research methods within the information system (IS) discipline and within individual pieces of research will produce richer and more reliable results. This paper reports on a survey of the IS literature to discover the extent of multimethod research. The findings are that such work is relatively scarce, and where it occurs involves only a small set of traditional methods. Possible reasons for this are discussed. 相似文献
13.
Geoff Walsham 《Information Systems Journal》2005,15(2):111-117
Abstract. This short paper is a response to the article by McGrath in this issue which argues that information systems (IS) researchers need to be more explicit about 'being critical'. I accept her point, and I use this paper to offer a sketch of my personal journey in learning about criticality, and some thoughts from where I am now on various aspects of carrying out critical IS research. 相似文献
14.
Information & Management (I&M) has been consistently regarded as one of the top academic journals in information systems (IS). In a spirit of introspection, this article profiles research published in I&M: we identified the most productive authors and universities associated with most research publications in I&M during the past 13 years (1992–2005). Based on a more detailed analysis of publications during the past 7 years, we determined the subject areas most often investigated and the research methodologies most often employed. Finally, we identified best practices by way of reporting the topics and methodologies used by the highly published authors. Our results indicate that while IS research is clearly dominated by US based universities, international researchers are beginning to make inroads. Furthermore, while the survey methodology is still dominant, interest in utilizing other methodologies is on the rise. Our findings should have implications for researchers, journal editors, universities, and research institutions. 相似文献
15.
Since their early development, computers have had a profound impact on how we conduct modern scientific research. The disciplines of mathematics and operations research are perhaps the earliest to be dramatically transformed by information technology. However, over the years, computing technologies have provided many new opportunities for information processing, problem solving and knowledge creation. In this paper, we explore the potential of data mining technology for providing support for systematic theory testing based on Peirce's theory of abduction. We propose a data mining approach to abducting and evaluating hypotheses based on Peirce's scientific method. We believe that this approach could assist scientist to more efficiently explore alternative hypotheses for existing theories. We demonstrate our approach with empirical observations collected using instruments from the well known user performance area of information systems research. 相似文献
16.
《Information & Management》2020,57(2):103167
Interest in studying information systems discontinuance has been increasing lately, yet there is no consensus on what it means. To improve the situation, we conduct a comprehensive review of current literature on IS discontinuance and identify 55 studies published during 1991–2017 that specifically focus on the topic. Our conceptual analysis disentangles the process, content, and context of the phenomenon, revealing that over the course of a typical IS lifecycle, IS discontinuance may materialize at least in five distinct forms: rejection, regressive discontinuance, quitting, temporary discontinuance, and replacement. After elaborating their distinctions, we discuss their theoretical, methodological, and practical implications. 相似文献
17.
Dorothy E. Leidner Janice Lo David Preston 《The Journal of Strategic Information Systems》2011,20(4):419-437
Given the important impact that an IS strategy has on the potential value IS brings to an organization, we develop and test a model of IS Strategy and Firm Performance. Our survey-based study provides strong evidence that firms with defined IS strategies (either IS Innovator or IS Conservative) perform better than those without defined IS strategies. Organizations without a clearly defined IS strategy actually experienced a negative relationship with firm performance. These organizations should realize the potentially negative outcomes of such a lack of strategy and work to extricate themselves before a consistent pattern of investing in IS without clear organizational benefit develops. Furthermore, the study suggests that the IS Innovator strategy is, in particular, associated with more superior firm performance than the IS Conservative strategy under conditions of environmental dynamism. Organizational leaders need to consider the external environments under which their organizations are operating and evaluate the influence those environments may have on their IS strategy’s ability to impact performance. Post hoc analysis results also reveal a fourth potential IS strategy, one that strives for ambidexterity. Ambidextrous firms were found to be associated with the most superior performance, leading to a potential extension of the existing IS strategy typology and a call for future research. 相似文献
18.
Abstract. This paper identifies factors that affected over 200 information system (IS) process innovation adoption decisions in three organizational environments over a period that spanned four decades. The analysis is based on Rogers's (1995) theory of Diffusion of Innovations (DOI). The results show that several DOI factors strongly affect IS process innovation adoption. These include user need recognition, availability of technological infrastructure, past experience, own trials, autonomous work, ease of use, learning by doing and standards. Yet, a large number of IS process innovation adoptions followed no discernible pattern. 相似文献
19.
In this study, the effects of IS strategic leadership on organizational outcomes are examined from the perspective of CIO strategic roles. A field survey is conducted that collects data from 110 matched pairs of CIOs and business executives within organizations. Our findings suggest that strategic leadership significantly affects both organizational benefits and information system quality. Further, we found that IS quality significantly mediates the relationship between IS strategic leadership and organizational benefits. We also note that IS vision significantly moderates the relationship between IS strategic leadership and IS quality, although it does not moderate the relationship between IS strategic leadership and organizational benefits or the relationship between IS quality and organizational benefits. 相似文献
20.
Fifteen years ago, DeLone and McLean published their original model of IS success, which received considerable attention in the literature. Given the widespread acceptance of the model, we conducted a meta-analysis to determine whether the model had been validated by research studies reported in the literature. By aggregating the results of 52 empirical studies that examined relationships within the IS success model at the individual level of analysis, we found support for the relationships that encompass the model. We also offer insights on IS success based on the findings of our work. 相似文献