2016
DOI: 10.1108/ics-11-2016-091
|View full text |Cite
|
Sign up to set email alerts
|

Inter-organisational information security: a systematic literature review

Abstract: Purpose The purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in which this knowledge has been brought about. Design/methodology/approach The results are based on a literature review of inter-organisational information security research published between 1990 and 2014. Findings The authors conclude that existing research has focused on a limited set of research topics. A majority of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 75 publications
0
16
0
Order By: Relevance
“…However, only a few studies have investigated employees' actual behavior in this context (Cram et al, 2017;Karlsson et al, 2016;McCole et al, 2010;Gozman and Willcocks, 2019;Amankwah-Amoah and Wang, 2019). Theories in the literature include protection motivation theory (Rogers, 1983), general deterrence theory (Beccaria, 1963;Gibbs, 1975), rational choice theory (Paternoster and Simpson, 1996), neutralization theory (Siponen and Vance, 2010;Sykes and Matza, 1957), theory of reasoned action (Fishbein and Ajzen, 1975), theory of planned behavior (Ajzen, 1985) and social cognitive theory (Bandura, 1986).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…However, only a few studies have investigated employees' actual behavior in this context (Cram et al, 2017;Karlsson et al, 2016;McCole et al, 2010;Gozman and Willcocks, 2019;Amankwah-Amoah and Wang, 2019). Theories in the literature include protection motivation theory (Rogers, 1983), general deterrence theory (Beccaria, 1963;Gibbs, 1975), rational choice theory (Paternoster and Simpson, 1996), neutralization theory (Siponen and Vance, 2010;Sykes and Matza, 1957), theory of reasoned action (Fishbein and Ajzen, 1975), theory of planned behavior (Ajzen, 1985) and social cognitive theory (Bandura, 1986).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Third, ISG papers have low "research maturity". Following Karlsson et al (2016), the research papers are classified by maturity; from emergent to mature (Figure 1). Figure 2 shows that over time, the ISG literature has become more mature.…”
Section: Information Security Governancementioning
confidence: 99%
“…However, from an overall analysis of the extant literature, it appears that research on information risk and security has been dominated by technical aspects (Karlsson et al , 2016), and information security management was treated as a technical issue (Singh et al , 2013). Hence, the majority of the attention was given to technological solutions (Soomro et al , 2016).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Nevertheless, from the reviewed literature, it appears that information risk management efforts are generally focussed within the boundaries of the organization or, on a much lesser scale, on inter-organizational dyadic connections between companies (Karlsson et al , 2016). Hence, the literature advocates for a more holistic approach to information risk management (Soomro et al , 2016).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation