THE ORGANIZATIONAL CONTEXTS, CONTROLS AND IMPLEMENTATION OF E-BUSINESS

被引:0
作者
Lee, Sangjae [2 ]
Ahn, Hyunchul [1 ]
机构
[1] Kookmin Univ, Seoul 136702, South Korea
[2] Sejong Univ, Seoul 143747, South Korea
关键词
business-to-consumer information systems (B2CIS); organizational contexts; controls; implementation of B2CIS; INFORMATION-TECHNOLOGY; SECURITY; THREATS; IMPACT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A control framework for successful business-to-consumer information systems (B2CIS) implementation was developed based on IS controls and implementation studies. Our research model suggests that top management support, system compatibility, IS infrastructure, IS expertise, and perceived importance of IS security affect four control modes: controls for system continuity, access controls, communication controls and informal controls. Furthermore, it posits that B2CIS controls affect B2CIS implementation, which has three dimensions: volume, sophistication, and information contents. Empirical tests indicated that IS infrastructure and perceived importance of IS security affect the usage of four modes of B2CIS controls, while system compatibility affects the usage of all these control modes except communication controls. The controls for system continuity are the most important controls for B2CIS implementation. This study provides insights into the adequacy of security measures undertaken under specific organizational circumstances for systems implementation.
引用
收藏
页码:114 / 124
页数:11
相关论文
共 39 条
[1]   The implications of information technology infrastructure for business process redesign [J].
Broadbent, M ;
Weill, P ;
St Clair, D .
MIS QUARTERLY, 1999, 23 (02) :159-182
[2]   Identification of legal issues for computer forensics [J].
Brungs, A ;
Jamieson, R .
INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) :57-66
[3]  
Computer Security Institute (CSI), 2008, CSI FBI COMP CRIM SE
[4]   Risks in the use of information technology within organizations [J].
Dhillon, G ;
Backhouse, J .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 1996, 16 (01) :65-74
[5]   A model of information assurance benefits [J].
Ezingeard, JN ;
McFadzean, E ;
Birchall, D .
INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) :20-29
[6]  
Hair JF., 1979, Multivariate data analysis: With readings
[7]  
Hart P. J., 1998, Journal of Management Information Systems, V14, P87
[8]   The content and design of Web sites: an empirical study [J].
Huizingh, EKRE .
INFORMATION & MANAGEMENT, 2000, 37 (03) :123-134
[9]  
ISACA (Information Systems Audit and Control Association), 2009, COBIT CONTR PRACT GU
[10]   An integrative study of information systems security effectiveness [J].
Kankanhalli, A ;
Teo, HH ;
Tan, BCY ;
Wei, KK .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2003, 23 (02) :139-154