2018
DOI: 10.3390/su10051555
|View full text |Cite
|
Sign up to set email alerts
|

Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism

Abstract: This study investigated information systems security (ISS) as one of the important issues of e-government for sustainable development. ISS is becoming increasingly important in the discourse on information technology-related organizational transformation, and governments need to undergo organizational transformation to establish an effective ISS system for advancing e-government capacity which plays a vital role in achieving sustainability. Furthermore, ISS breaches are becoming the norm rather than the except… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
4

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 102 publications
0
7
0
4
Order By: Relevance
“…Masocha and Fatoki [20] find that coercive isomorphism, through policies, laws, standards, and regulations, is a significant driver of small businesses adopting, for example, initiatives related to sustainability. There are two other isomorphic types; one is mimetic, based on mimicking successful organizational structures and initiatives, and the other is normative, whereby expert views and influence become widely adopted [21].…”
Section: Talloires Application and Theorymentioning
confidence: 99%
See 2 more Smart Citations
“…Masocha and Fatoki [20] find that coercive isomorphism, through policies, laws, standards, and regulations, is a significant driver of small businesses adopting, for example, initiatives related to sustainability. There are two other isomorphic types; one is mimetic, based on mimicking successful organizational structures and initiatives, and the other is normative, whereby expert views and influence become widely adopted [21].…”
Section: Talloires Application and Theorymentioning
confidence: 99%
“…It was the Talloires Declaration that signaled political engagement and subsequent strategic and structural aspects of organizational change. The latter comment about measurement as a way to build networks and effectively carry change through to multiple institutions is a further example of both normative and coercive isomorphism [21].…”
Section: Structural Changes and Actionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Вже зазаз деякі країни для електронних транзакцій через портал електронного самоврядування, такі як, наприклад, отримання водійського посвідчення, вимагають конфіденційної інформації та аутентифікації, хоча такі дані також можуть бути модифіковані. У роботі [8] пропонується хороше рішення, яке зберігає автентифікацію, конфіденційність, цілісність та незмінність даних на різних рівнях як найважливіші характеристики захищених даних, однак у дослідженні розглядається лише окремий додаток, який піддається ризику, і не розглядається можливість впливу на зазначені компоненти з боку інших компонентів інфраструктури.…”
Section: рис 1 структура безпеки електронного урядуunclassified
“…A abordagem institucional foi utilizada recentemente em trabalhos sobre o tema (Tejay & Barton, 2013;Anthony et al, 2014;Lopes & Sá-Soares, 2014;Alkalbani, Deng & Kam, 2015;Angst, Block, D'Arcy, & Kelley, 2017;Alkalbani et al, 2017;Hou et al, 2018;Choi, Lee, & Hwang, 2018), mas, se analisados em conjunto, esses trabalhos são inconclusivos quanto aos mecanismos institucionais que pressionam as organizações a adoptarem medidas de Segurança da Informação, pois apontam para pressões normativas e miméticas (Tejay & Barton, 2013), coercitivas (AlKalbani et al, 2015Hou et al, 2018), miméticas e coercitivas (Anthony et al, 2014;Alkalbani et al, 2017), e coercitivas e normativas (Kam et al, 2013;Lopes & Sá-Soares, 2014;Choi et al, 2018). Além disso, os trabalhos abordam principalmente medidas formais (Williams et al, 2013;Kam et al, 2013;Lopes & Sá-Soares, 2014;Anthony et al, 2014;Angst et al, 2017;Alkalbani et al, 2017;Hou et al, 2018;Choi et al, 2018), dando pouca atenção às medidas informais e técnicas.…”
Section: Modelo De Pesquisaunclassified