2008
DOI: 10.1002/sdr.405
|View full text |Cite
|
Sign up to set email alerts
|

Dynamics of organizational information security

Abstract: In recent times, it has become evident that information security is not

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2010
2010
2025
2025

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 44 publications
0
10
0
1
Order By: Relevance
“…Dutta and Roy [38] used similar approaches to simulate human factors. However they focus on the transaction level and they view Value as a reservoir rather than as a mechanism to determine action.…”
Section: Simulation Studies For Information Securitymentioning
confidence: 97%
“…Dutta and Roy [38] used similar approaches to simulate human factors. However they focus on the transaction level and they view Value as a reservoir rather than as a mechanism to determine action.…”
Section: Simulation Studies For Information Securitymentioning
confidence: 97%
“…Evidently, most studies largely focus on economic aspects of IT security decisions by proposing a valueat-risk or return on (security) investment approach (ROSI) [e.g., [33][34][35]. This is also reflected by the slight surplus of predominantly normative studies (56%) based on mathematical modelling (64% proportionately) [2,6,10,33,34,[36][37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52][53][54]. Whereas two studies pursue a purely qualitative approach [20,55] and six are purely conceptual [56][57][58][59][60][61], eleven studies employ a combination of several approaches [4,14,33,35,37,39,40,41,48,51,62] and three are based on panel data [3,…”
Section: Literature Analysismentioning
confidence: 99%
“…The investment nuances that are most often considered in these specific investment studies, but also in publications that pursue a more generic approach, are the specific area or content and the optimal level of investment [4,10,33,34,47,53,56,60,62]. Only a single study is dedicated towards to the decision regarding the source or origin of the investment [48] and a total of six studies consider the fundamental decision whether to invest at all [31,38,44,47,54,55].…”
Section: Literature Analysismentioning
confidence: 99%
“…V návaznosti na System Dynamics Review, vědeckého promotora Systémové dynamiky, je možné pozorovat šest oblastí, ve kterých dochází k vědecké kooperaci informačních a komunikačních technologií a Systémové dynamiky. Jedná se o oblasti informační bezpečnosti, komunikace informací, komunikačních sítí, sdílení znalostí, e-mailové komunikace a v neposlední řadě již zmíněné analýzy informačního systému (Georgantzas & Katsamakas, 2008;Kanungo & Jain, 2008;Luna-Reyes et al, 2008;Otto & Simon, 2008;Pavlov, Plice & Melville, 2008;Dutta & Roy, 2008). Další výzkum je možné koncipovat do analýz, nakolik se Systémová dynamika integruje a je využívána při ICT projektech -nejen za účelem nastavení systémového rámce, optimalizace procesů, ale i k efektivnějšímu přenosu informací a tvorby znalostí.…”
Section: Diskuze Mezinárodních Souvislostíunclassified