Journal ArticleDOI
Technical opinion: Information system security management in the new millennium
Gurpreet Dhillon,James Backhouse +1 more
Reads0
Chats0
TLDR
This “Technical Opinion” focuses on understanding the nature of information security in the next millennium and suggests a set of principles that would help in managing information securityIn the future.Abstract:
R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process, store, and transmit digital data in most business sectors. This has transformed the way we conduct trade, deliver government services, and provide health care. Changes in communication and information technologies and particularly their confluence has raised a number of concerns connected with the protection of organizational information assets. Achieving consensus regarding safeguards for an information system, among different stakeholders in an organization, has become more difficult than solving many technical problems that might arise. This “Technical Opinion” focuses on understanding the nature of information security in the next millennium. Based on this understanding it suggests a set of principles that would help in managing information security in the future.read more
Citations
More filters
Journal ArticleDOI
Analysis of end user security behaviors
TL;DR: The authors' U.S. survey of non-malicious, low technical knowledge behaviors related to password creation and sharing showed that password ''hygiene'' was generally poor but varied substantially across different organization types (e.g., military organizations versus telecommunications companies) and documented evidence that good password hygiene was related to training, awareness, monitoring, and motivation.
Journal ArticleDOI
Avoidance of information technology threats: a theoretical perspective
Huigang Liang,Yajiong Xue +1 more
TL;DR: The technology threat avoidance theory (TTAT), which explains individual IT users' behavior of avoiding the threat of malicious information technologies, enhances the understanding of human behavior under IT threats and makes an important contribution to IT security research and practice.
Journal ArticleDOI
An integrative study of information systems security effectiveness
TL;DR: This study develops an integrative model of IS security effectiveness and empirically tests the model, finding greater deterrent efforts and preventive measures were found to lead to enhancedIS security effectiveness.
Journal ArticleDOI
Blockchains for Business Process Management - Challenges and Opportunities
Jan Mendling,Ingo Weber,Wil M. P. van der Aalst,Jan vom Brocke,Cristina Cabanillas,Florian Daniel,Søren Debois,Claudio Di Ciccio,Marlon Dumas,Schahram Dustdar,Avigdor Gal,Luciano García-Bañuelos,Guido Governatori,Richard Hull,Marcello La Rosa,Henrik Leopold,Frank Leymann,Jan C. Recker,Manfred Reichert,Hajo A. Reijers,Stefanie Rinderle-Ma,Andreas Solti,Michael Rosemann,Stefan Schulte,Munindar P. Singh,Tijs Slaats,Mark Staples,Barbara Weber,Matthias Weidlich,Mathias Weske,Xiwei Xu,Liming Zhu +31 more
TL;DR: In this paper, the challenges and opportunities of blockchain for business process management (BPM) are outlined and a summary of seven research directions for investigating the application of blockchain technology in the context of BPM are presented.
Journal ArticleDOI
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective*
Huigang Liang,Yajiong Xue +1 more
TL;DR: It is found that users’ IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy.
References
More filters
Book
Shaping the Future: Business Design Through Information Technology
TL;DR: In this paper, the authors provide managers with comprehensive and practical advice on their role in managing information technology as a business resource and describe the competitive, organizational, economic, and technical aspects of using information technology for business design.
Journal ArticleDOI
Shaping the Future. Business Design Through Information Technology
TL;DR: That's it, a book to wait for in this month; even you have wanted for long time for releasing this book shaping the future business design through information technology; you may not be able to get in some stress; but now, the authors are coming to give you excellent solution.
Journal ArticleDOI
Information systems and the organization of modern enterprise
Erik Brynjolfsson,Haim Mendelson +1 more
TL;DR: In this article, the authors address the relationship between information systems and changes in the organization of modern enterprise, both within and across firms, by considering two key variables: location of information and location of decision rights in organizations.
Journal ArticleDOI
Risks in the use of information technology within organizations
Gurpreet Dhillon,James Backhouse +1 more
TL;DR: This research argues that by maintaining the integrity of information systems, the risks associated with information technology usage can be minimized.
Related Papers (5)
Coping with systems risk: security planning models for management decision making
Current directions in IS security research: towards socio‐organizational perspectives
Gurpreet Dhillon,James Backhouse +1 more