2010
DOI: 10.2307/25750687
|View full text |Cite
|
Sign up to set email alerts
|

Circuits of Power: A Study of Mandated Compliance to an Information Systems Security "De Jure" Standard in a Government Organization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
86
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(86 citation statements)
references
References 54 publications
0
86
0
Order By: Relevance
“…Several authors have proposed that IS security standards (Smith, 2010), trust (Teo et al, 2008), or interoperability (Otjacques et al, 2007) are essential to government IS services' delivery. In addition, several authors have also proposed that perceived usefulness and ease of use (Davis, 1989), compatibility (Taylor & Todd, 1995), trust (Gefen, 2000;Gefen et al, 2003), interactivity (Jiang et al, 2010;McMillan & Hwang, 2002;Sicilia et al, 2005), external and interpersonal influences (Bhattacherjee, 2000;Bhattacherjee & Sanford, 2006;Montoya, Massey, & Khatri, 2010), self efficacy (Devaraj et al, 2008;Wu & Lederer, 2009), and facilitating conditions (Gallivan et al, 2003;Venkatesh et al, 2008) are essential to IS services acceptance.…”
Section: M-government Services and Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Several authors have proposed that IS security standards (Smith, 2010), trust (Teo et al, 2008), or interoperability (Otjacques et al, 2007) are essential to government IS services' delivery. In addition, several authors have also proposed that perceived usefulness and ease of use (Davis, 1989), compatibility (Taylor & Todd, 1995), trust (Gefen, 2000;Gefen et al, 2003), interactivity (Jiang et al, 2010;McMillan & Hwang, 2002;Sicilia et al, 2005), external and interpersonal influences (Bhattacherjee, 2000;Bhattacherjee & Sanford, 2006;Montoya, Massey, & Khatri, 2010), self efficacy (Devaraj et al, 2008;Wu & Lederer, 2009), and facilitating conditions (Gallivan et al, 2003;Venkatesh et al, 2008) are essential to IS services acceptance.…”
Section: M-government Services and Related Studiesmentioning
confidence: 99%
“…They may gain more of a following from mobile communication than non-mobile services' delivery. Several authors have proposed that information systems (IS) security standard (Smith, 2010), trust (Teo, Srivastava, & Jiang, 2008), or interoperability (Otjacques, Hitzelberger, & Feltz, 2007) are essential to governmental IS services' delivery. To date, research has primarily been aimed at non-mobile services' delivery.…”
Section: Introductionmentioning
confidence: 99%
“…The need for protection against cyber-crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud was long identified (Smith, Winchester, Bunker, & Jamieson, 2010). A security breach can lead to loss of customer trust that might last years.…”
Section: K M Moorningmentioning
confidence: 99%
“…Senior managers often lack commitment to ISS [4], [10][11][12], but can be motivated to support ISS by internal or external influences [4]. Internal influences are less effective at motivating senior management to commit to ISS [4].…”
Section: Introductionmentioning
confidence: 99%