Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Guest editorial: Qualitative studies in information systems: A critical review and some guiding principles

S Sarker, X **ao, T Beaulieu - MIS quarterly, 2013 - JSTOR
Up until the mid-1990s, for a significant proportion of mainstream IS scholars, particularly
those in North America and Asia, research meant quantitative research, and studies not …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Distributed tuning of boundary resources

B Eaton, S Elaluf-Calderwood, C Sørensen, Y Yoo - MIS quarterly, 2015 - JSTOR
The digital age has seen the rise of service systems involving highly distributed,
heterogeneous, and resource-integrating actors whose relationships are governed by …

The digital undertow: How the corollary effects of digital transformation affect industry standards

S Scott, W Orlikowski - Information Systems Research, 2022 - pubsonline.informs.org
Scholarship on digital transformation has centered on how waves of digitalization have
moved through industries, producing strategic changes within and across firms and enabling …

Relative convenience, relative advantage, perceived security, perceived privacy, and continuous use intention of China's WeChat Pay: A mixed-method two-phase …

C Mombeuil, H Uhde - Journal of Retailing and Consumer Services, 2021 - Elsevier
Using a mixed-method two-phase design approach, this study explores the relative
convenience, relative advantages, perceived privacy, and perceived security of WeChat …

[HTML][HTML] Motives to standardize: Empirical evidence from Germany

K Blind, A Mangelsdorf - Technovation, 2016 - Elsevier
In this paper, we identify the strategic motives of German manufacturing companies in the
electrical engineering and machinery industry to be involved in standards development …

Positioning the institutional perspective in information systems research

M Mignerat, S Rivard - Journal of information technology, 2009 - journals.sagepub.com
In recent years, a number of studies have adopted institutional theory as a perspective for
examining Information Systems (IS)/Information Technology (IT)-related phenomena such as …

Information security management standards: Problems and solutions

M Siponen, R Willison - Information & management, 2009 - Elsevier
International information security management guidelines play a key role in managing and
certifying organizational IS. We analyzed BS7799, BS ISO/IEC17799: 2000, GASPP/GAISP …

A reflection on information systems strategizing: the role of power and everyday practices

M Marabelli, RD Galliers - Information Systems Journal, 2017 - Wiley Online Library
We review the IS strategizing literature and highlight its main strengths and weaknesses.
Strengths include an account given to the relevance of tensions between planned and …