73 research outputs found

    Critical analysis of information security culture definitions

    Get PDF
    This article aims to advance the understanding of information security culture through a critical reflection on the wide-ranging definitions of information security culture in the literature. It uses the hermeneutic approach for conducting literature reviews. The review identifies 16 definitions of information security culture in the literature. Based on the analysis of these definitions, four different views of culture are distinguished. The shared values view highlights the set of cultural value patterns that are shared across the organization. An action-based view highlights the behaviors of individuals in the organization. A mental model view relates to the abstract view of the individual’s thinking on how information security culture must work. Finally, a problem-solving view emphasizes a combination of understanding from shared value-based and action-based views. The paper analyzes and presents the limitations of these four views of information security culture definitions

    Determinants of eGovernment maturity in the transition economies of central and eastern europe

    No full text
    Our research focuses on the possible determinants of eGovernment (E-gov) maturity in the Transition Economies of Central and Eastern Europe (TEECE). E-gov maturity, in this research, refers to the growth levels in a country's online services and its citizens' online participation in governance. Our study of the extant literature indicated that few have discussed the determinants of E-gov maturity in TEECE. Studies from differing parts of the world are needed for theory development. Building on a prior framework, we used the contingency theory and the resource-based view perspective to guide our discourse. In particular, we examined the relationships between macro-environmental factors such as national wealth, technological infrastructure, rule of law, and so forth on E-gov maturity. A 5-year panel data of 16 TECEE selected from two main groupings was used for analysis in conjunction with structural equation modeling technique; the data consisted of 80 observations or data points. The data analysis underscored the relevance of such factors as technological infrastructure, rule of law, and human capital development as possible determinants of E-gov maturity in TEECE. National wealth was found to be an enabler in the research conceptualization. The implications of our study's findings for research and policy making are discussed
    • 

    corecore