Project Commitment in the Context of Information Security

被引:2
作者
Koskosas, Ioannis [1 ]
Sariannidis, Nikolaos [2 ,3 ]
机构
[1] Univ Western Macedonia, Kozani, Greece
[2] Technol Educ Inst Western Macedonia, Kozani, Greece
[3] Technol Educ Inst Western Macedonia, Sch Management & Econ, Dept Financial Applicat, Kozani, Greece
关键词
Goal Setting; Information Security; Interpretive Epistemology; Organizational Behavior; Project Commitment;
D O I
10.4018/jitpm.2011070102
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
This research investigates the role of project commitment in the context of information systems security. In doing so, the research adopts a psychological point of view by exploring and discussing the concept of project commitment in setting information security goals. Information security can be viewed as the efficient control of uncertainty arising from malicious acts intended to exploit valuable assets, and in the context of information systems the valuable assets under consideration are data. Data were collected by using an interpretive approach through in-depth interviews and observation within a single case study in Greece. The contribution of this research to interpretive information-systems consists of the study of project commitment and goal theory in an information security-management context, and its grounding within an interpretive epistemology. Ultimately, this research promotes an interdisciplinary and interorganizational theory that fosters a dialogue transcending industry-specific contexts and explores different management practices that can improve security project commitment and management in its real life context.
引用
收藏
页码:17 / 29
页数:13
相关论文
共 61 条
[1]  
[Anonymous], 2009, COMPUTER WEEKLY
[2]   Negative self-efficacy and goal effects revisited [J].
Bandura, A ;
Locke, EA .
JOURNAL OF APPLIED PSYCHOLOGY, 2003, 88 (01) :87-99
[3]   RESPONSES TO FAILURE - THE EFFECTS OF CHOICE AND RESPONSIBILITY ON IMPRESSION MANAGEMENT [J].
CALDWELL, DF ;
OREILLY, CA .
ACADEMY OF MANAGEMENT JOURNAL, 1982, 25 (01) :121-136
[4]   Case study research: A multi-faceted research approach for IS [J].
Cavaye, ALM .
INFORMATION SYSTEMS JOURNAL, 1996, 6 (03) :227-242
[5]   INFORMATION REQUESTS IN THE CONTEXT OF ESCALATION [J].
CONLON, EJ ;
PARKS, JM .
JOURNAL OF APPLIED PSYCHOLOGY, 1987, 72 (03) :344-350
[6]   YOURS, MINE, AND OURS - FACILITATING GROUP PRODUCTIVITY THROUGH THE INTEGRATION OF INDIVIDUAL AND GROUP GOALS [J].
CROWN, DF ;
ROSSE, JG .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1995, 64 (02) :138-150
[7]  
Denzin N., 1998, LANDSCAPE QUALITATIV
[8]  
Dhillon G., 2001, Information security management: global challenges in the new millennium, P1
[9]   Value-focused assessment of information system security in organizations [J].
Dhillon, Gurpreet ;
Torkzadeh, Gholamreza .
INFORMATION SYSTEMS JOURNAL, 2006, 16 (03) :293-314
[10]   BUILDING THEORIES FROM CASE-STUDY RESEARCH [J].
EISENHARDT, KM .
ACADEMY OF MANAGEMENT REVIEW, 1989, 14 (04) :532-550