International Business Management

Year: 2015
Volume: 9
Issue: 4
Page No. 524 - 531

Applying Need Pull and Technology Push Theory to Organizational Information Security Management

Authors : Geuna Kim and Sanghyun Kim

References

Babatunde, D.A. andM.H. Selamat, 2012. Investigating information security management and its influencing factors in the nigerian banking industry: A conceptual model. Int. J. Soc. Sci. Econ. Art, 2: 55-59.

Bentler, P.M., 1990. Comparative fit indexes in structural models. Psychol. Bull., 107: 238-246.
CrossRef  |  PubMed  |  Direct Link  |  

Browne, M.W. and R. Cudeck, 1993. Alternative Ways of Assessing Model Fit. In: Testing Structural Equation Models, Bollen, K.A. and J.S. Long (Eds.). SAGE Publication, Newbury Park, USA., ISBN-13: 9780803945074, pp: 136-162.

Cavusoglu, H., B. Mishra and S. Raghunathan, 2004. A model for evaluating IT security investments. Commun. ACM, 47: 87-92.
CrossRef  |  Direct Link  |  

Chau, P.Y.K. and K.Y. Tam, 2000. Organizational adoption of open systems: A technology-push, need-pull perspective. Inform. Manag., 37: 229-239.
CrossRef  |  Direct Link  |  

Chidamer, S.R.and H.B. Kon, 1994. A research retrospective of innovation inception and success: The technology-push, demand-pull question. Int. J. Tech. Manag., 9: 94-112.

Chin, W., 1998. The Partial Least Squares Approach for Structural Equation Modeling. In: Modern Methods for Business Research, Marcoulides, G.A. (Ed.). Lawrence Erlbaum Associates, New Jersey, pp: 295-336.

Cooper, R.B. and R.W. Zmud, 1990. Information technology implementation research: A technological diffusion approach. Manage. Sci., 36: 123-139.
CrossRef  |  Direct Link  |  

Dhillon, G.and J. Backhouse, 2000. Information system security management in the new millennium. Commun. ACM, 43: 125-128.
CrossRef  |  Direct Link  |  

Fornell, C. and D.F. Larcker, 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res., 18: 39-50.
CrossRef  |  Direct Link  |  

Furnell, S.M., M. Gennatou and P.S. Dowland, 2002. A prototype tool for information security awareness and training. Logist. Inform. Manage., 15: 352-357.
Direct Link  |  

Grover, V.and M.D. Goslar, 1993. The initiation, adoption and implementation of telecommunications technologies in U.S. organizations. J. Manage. Inform. Syst., 10: 141-163.
Direct Link  |  

Hsu, C., J.N. Lee and D.W. Straub, 2012. Institutional influences on information systems security innovations. Inform. Syst. Res., 23: 1-22.
Direct Link  |  

Kankanhalli, A., H.H. Teo, B.C.Y. Tan and K.K. Wei, 2003. An integrative study of information systems security effectiveness. Int. J. Inform. Manage., 23: 139-154.
CrossRef  |  Direct Link  |  

Lee, C.P. and J.P. Shim, 2007. An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. Eur. J. Inform. Syst., 16: 712-724.
CrossRef  |  Direct Link  |  

Markus, M.L. and J.Y. Mao, 2004. Participation in development and implementation-updating an old, tired concept for today's IS contexts. J. Assoc. Inform. Syst., 5: 514-544.

Munro, H. and H. Noori, 1988. Measuring commitment to new manufacturing technology: Integrating technological push and marketing pull concepts. IEEE Trans. Eng. Manage., 35: 63-70.
CrossRef  |  Direct Link  |  

Myers, S. and D.G. Marquis, 1969. Successful Industrial Innovations: A Study of Factors Underlying Innovation in Selected Firms. National Science Foundation, Washington, DC., USA., Pages: 117.

Rogers, E.M., 2003. Diffusion of Innovations. 5th Edn., Free Press, New York, USA., pp: 27-30.

Schon, D.A., 1967. Technology and Change: The New Heraclitus. 1st Edn., Dell Publishing, New York, ISBN-10: 0080124925, pp: 270.

Shih, H.P., 2006. Technology-push and communication-pull forces driving message-based coordination performance. J. Strat. Inform. Syst., 15: 105-123.
CrossRef  |  Direct Link  |  

Siponen, M.T., 2001. Five dimensions of information security awareness. Comput. Soc., 31: 24-29.
CrossRef  |  

Spears, J.L. and H. Barki, 2010. User participation in information systems security risk management. MIS Q., 34: 503-522.

Templeton, G.F., B.R. Lewis and C.A. Snyder, 2002. Development of a measure for the organizational learning construct. J. Manage. Inform. Syst., 19: 175-218.
Direct Link  |  

Teo, T.S.H., V.K.G. Lim and R.Y.C. Lai, 1999. Intrinsic and extrinsic motivation in internet usage. Omega, 27: 25-37.
CrossRef  |  Direct Link  |  

Utterback, J.M., 1974. Innovation in industry and the diffusion of technology. Science, 183: 620-626.
CrossRef  |  Direct Link  |  

Whitman, M.E., 2004. In defense of the realm: Understanding the threats to information security. Int. J. Inform. Manag., 24: 43-57.
CrossRef  |  Direct Link  |  

Wixom, B.H. and H.J. Watson, 2001. An empirical investigation of the factors affecting data warehousing success. MIS Quart., 25: 17-41.
CrossRef  |  Direct Link  |  

Yeh, Q.J. and A.J.T. Chang, 2007. Threats and countermeasures for information system security: A cross-industry study. Inform. Manag., 44: 480-491.
CrossRef  |  Direct Link  |  

Zhang, J., B.J. Reithel and H. Li, 2009. Impact of perceived technical protection on security behaviors. Inform. Manage. Comput. Secur., 17: 330-340.
Direct Link  |  

Zhu, K., K.L. Kraemer and S. Xu, 2006. The process of innovation assimilation by firms in different countries: A technology diffusion perspective on e-business. Manage. Sci., 52: 1557-1576.
CrossRef  |  Direct Link  |  

Zmud, R.W., 1982. Diffusion of modern software practices: Influence of centralization and formalization. Manage. Sci., 28: 1421-1431.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved