메뉴 건너뛰기




Volumn 28, Issue 4, 2011, Pages 284-293

Information security risks in enabling e-Government: The impact of IT vendors

Author keywords

E government; Information systems security; Outsourcing; Systems thinking; Value focused thinking

Indexed keywords


EID: 84855759711     PISSN: 10580530     EISSN: None     Source Type: Journal    
DOI: 10.1080/10580530.2010.514212     Document Type: Article
Times cited : (12)

References (42)
  • 2
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(44), 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.44 , pp. 375-414
    • Baskerville, R.1
  • 3
    • 84855791493 scopus 로고    scopus 로고
    • Best practices in IT risk management
    • Baskerville, R. (2005). Best practices in IT risk management. Cutter Benchmark Review, 5(12), 5-12.
    • (2005) Cutter Benchmark Review , vol.5 , Issue.12 , pp. 5-12
    • Baskerville, R.1
  • 5
    • 84905579112 scopus 로고    scopus 로고
    • A Systems Perspective on Security Risk Identification: Methodology and Illustrations from City Councils
    • Washington, DC, USA, ISCRAM
    • Berghmans, P., Van Den Eede, G, & Van de Walle, B. (2008). A Systems Perspective on Security Risk Identification: Methodology and Illustrations from City Councils. Proceedings of the 5 International ISCRAM Conference, Washington, DC, USA, ISCRAM.
    • (2008) Proceedings of the 5 International ISCRAM Conference
    • Berghmans, P.1    van den Eede, G.2    van de Walle, B.3
  • 7
    • 84934979622 scopus 로고
    • Public management information systems: Theory and prescription (Special issue)
    • Bozeman, B., & Bretschneider, S. (1986). Public management information systems: Theory and prescription (Special issue). Public Administration Review, 46, 475-487.
    • (1986) Public Administration Review , vol.46 , pp. 475-487
    • Bozeman, B.1    Bretschneider, S.2
  • 8
    • 38049073364 scopus 로고    scopus 로고
    • Achieving advanced electronic government services: An examination of obstacles and implications from an international perspective
    • Bloomington, IN
    • Brown, M. M., & Brudney, J. L. (2001). Achieving advanced electronic government services: An examination of obstacles and implications from an international perspective, The National Public Management Research Conference, Bloomington, IN.
    • (2001) The National Public Management Research Conference
    • Brown, M.M.1    Brudney, J.L.2
  • 10
    • 1642413541 scopus 로고    scopus 로고
    • IT Doesn't Matter
    • Carr, N. G. (2003). IT Doesn't Matter. Harvard Business Review, 81(5), 5-12.
    • (2003) Harvard Business Review , vol.81 , Issue.5 , pp. 5-12
    • Carr, N.G.1
  • 11
    • 70549101146 scopus 로고    scopus 로고
    • Outsourcing, bureaucracy and public value: Reappraising the notion of the contract state
    • Cordella, A., & Willcocks, L. (2009). Outsourcing, bureaucracy and public value: Reappraising the notion of the "contract state". Government Information Quarterly, 27, 82-88.
    • (2009) Government Information Quarterly , vol.27 , pp. 82-88
    • Cordella, A.1    Willcocks, L.2
  • 12
    • 21344439470 scopus 로고    scopus 로고
    • Outsourcing in the private and public sectors: An unpredictable IT strategy
    • Currie, W. (1996). Outsourcing in the private and public sectors: An unpredictable IT strategy. European Journal of Information Systems, 4, 226-236.
    • (1996) European Journal of Information Systems , vol.4 , pp. 226-236
    • Currie, W.1
  • 13
    • 27544496330 scopus 로고    scopus 로고
    • IT Governance Structures, Processes and Relational Mechanisms: Achieving IT/Business Alignment in aMajor Belgian Financial Group
    • Waikoloa, Big Island Hawaii, Jan 3-6, 2005
    • De Haes, S., & Van Grembergen, W. (2005). IT Governance Structures, Processes and Relational Mechanisms: Achieving IT/Business Alignment in aMajor Belgian Financial Group. Proceedings of the 38th Annual Hawaii International Conference, Waikoloa, Big Island Hawaii, Jan 3-6, 2005.
    • (2005) Proceedings of the 38th Annual Hawaii International Conference
    • de Haes, S.1    van Grembergen, W.2
  • 14
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Towards socio-organizational perspectives. Information Systems Journal, 11(2), 127.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127
    • Dhillon, G.1    Backhouse, J.2
  • 15
    • 33744830087 scopus 로고    scopus 로고
    • Value-focused assessment of information system security in organizations
    • Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal, 16(3), 293-314.
    • (2006) Information Systems Journal , vol.16 , Issue.3 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 16
    • 27344447595 scopus 로고    scopus 로고
    • Information systems outsourcing: A survey and analysis of the literature
    • Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004) Information systems outsourcing: A survey and analysis of the literature. ACM SIGMIS Database, 35, 6-102.
    • (2004) ACM SIGMIS Database , vol.35 , pp. 6-102
    • Dibbern, J.1    Goles, T.2    Hirschheim, R.3    Jayatilaka, B.4
  • 18
    • 0003113895 scopus 로고    scopus 로고
    • The risk of outsourcing IT
    • Earl, M. J. (1996). The risk of outsourcing IT. Sloan Management Review, 37(3), 26-32.
    • (1996) Sloan Management Review , vol.37 , Issue.3 , pp. 26-32
    • Earl, M.J.1
  • 19
    • 0642264602 scopus 로고
    • A security framework for information systems outsourcing
    • Fink, D. (1994). A security framework for information systems outsourcing. Information Management & Computer Security, 2, 3-8.
    • (1994) Information Management & Computer Security , vol.2 , pp. 3-8
    • Fink, D.1
  • 20
    • 66149159220 scopus 로고    scopus 로고
    • Risk of insider threats in information technology outsourcing: Can deceptive techniques be applied?
    • Gaonjur, P., & Bokhoree, C. (2006). Risk of insider threats in information technology outsourcing: Can deceptive techniques be applied? Proceedings of Security and Management, 522.
    • (2006) Proceedings of Security and Management , vol.522
    • Gaonjur, P.1    Bokhoree, C.2
  • 21
    • 84904291635 scopus 로고    scopus 로고
    • "IEC 27002:2005." Information technology. Security techniques
    • Retrieved from
    • ISO, B. (2005). "IEC 27002:2005." Information technology. Security techniques. Code of practice for information security management. Retrieved from http://www.iso.org/iso/catalogue_detail?csnumber=42103.
    • (2005) Code of Practice for Information Security Management
    • Iso, B.1
  • 24
    • 1242265180 scopus 로고    scopus 로고
    • Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors
    • Khalfan, A. M. (2004). Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors. International Journal of Information Management, 24, 29-42.
    • (2004) International Journal of Information Management , vol.24 , pp. 29-42
    • Khalfan, A.M.1
  • 27
    • 39749085754 scopus 로고    scopus 로고
    • IT outsourcing for Egovernment: Lessons from IT outsourcing projects initiated by agricultural organizations of the Korean government
    • Waikoloa, Big Island Hawaii, Jan 3-6, 2007
    • Moon, J., Jung, G., Chung, M., & Choe, Y. (2007). IT outsourcing for Egovernment: Lessons from IT outsourcing projects initiated by agricultural organizations of the Korean government. Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007), Waikoloa, Big Island Hawaii, Jan 3-6, 2007.
    • (2007) Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007)
    • Moon, J.1    Jung, G.2    Chung, M.3    Choe, Y.4
  • 28
    • 82955172801 scopus 로고    scopus 로고
    • [Doctoral dissertation] Linköping University, Department of Management and Engineering
    • Oscarson, P. (2007). Actual and Perceived Information Systems Security. [Doctoral dissertation] Linköping University, Department of Management and Engineering.
    • (2007) Actual and Perceived Information Systems Security
    • Oscarson, P.1
  • 29
    • 84876677497 scopus 로고    scopus 로고
    • OWASP Top 10 Project
    • OWASP, Retrieved from
    • OWASP (2009). OWASP Top 10 Project. OWASP. Retrieved from https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
    • (2009) OWASP
  • 30
    • 0003106484 scopus 로고
    • The core competence of the corporation
    • Prahalad, C., & Hamel, G. (1990). The core competence of the corporation. Harvard Business Review, 68(3), 79-91.
    • (1990) Harvard Business Review , vol.68 , Issue.3 , pp. 79-91
    • Prahalad, C.1    Hamel, G.2
  • 31
    • 0004223940 scopus 로고
    • Cambridge, UK: Cambridge University Press
    • Reason, J. (1990). Human error. Cambridge, UK: Cambridge University Press.
    • (1990) Human Error
    • Reason, J.1
  • 32
    • 85014614766 scopus 로고    scopus 로고
    • Three decades of risk research: Accomplishments and new challenges
    • Renn, O. (1998). Three decades of risk research: Accomplishments and new challenges. Journal of Risk Research, 1(1), 49-71.
    • (1998) Journal of Risk Research , vol.1 , Issue.1 , pp. 49-71
    • Renn, O.1
  • 34
    • 0031337118 scopus 로고    scopus 로고
    • Managing security for outsourcing contracts
    • Sherwood, J. (1997). Managing security for outsourcing contracts. Computers and Security, 16, 603-609.
    • (1997) Computers and Security , vol.16 , pp. 603-609
    • Sherwood, J.1
  • 36
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 37
    • 0003234820 scopus 로고
    • Firm boundaries, technological innovation and strategic management
    • In L. Thomas (Ed.), Lexington, MA: Lexington Books
    • Teece, D. J. (1986). Firm boundaries, technological innovation and strategic management. In L. Thomas (Ed.), The economics of Strategic Planning (pp. 187-199), Lexington, MA: Lexington Books.
    • (1986) The Economics of Strategic Planning , pp. 187-199
    • Teece, D.J.1
  • 38
    • 79952761898 scopus 로고    scopus 로고
    • Differences between public and private IT outsourcing: Common themes in the literature
    • Montreal, Canada, Digital Government Society of North America
    • Vilvovsky, S. (2008). Differences between public and private IT outsourcing: Common themes in the literature, Proceedings of the 2008 international conference on Digital government research, Montreal, Canada, Digital Government Society of North America.
    • (2008) Proceedings of the 2008 International Conference on Digital Government Research
    • Vilvovsky, S.1
  • 39
    • 84900609028 scopus 로고    scopus 로고
    • e-Government Survey 2008
    • United Nations, Retrieved December 28t 2009 from
    • United Nations (2008). e-Government Survey 2008, From e-Government to connected Governance. Retrieved December 28t 2009 from unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN028607.pdf.
    • (2008) From E-Government to Connected Governance
  • 40
    • 0012597186 scopus 로고    scopus 로고
    • Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA
    • Willcocks, L. P., Lacity, M. C., & Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA. Journal of Strategic Information Systems, 8, 285-314.
    • (1999) Journal of Strategic Information Systems , vol.8 , pp. 285-314
    • Willcocks, L.P.1    Lacity, M.C.2    Kern, T.3
  • 42
    • 34250180194 scopus 로고    scopus 로고
    • E-government research: Reviewing the literature, limitations, and ways forward
    • Yildiz, M. (2007). E-government research: Reviewing the literature, limitations, and ways forward. Government Information Quarterly, 24, 646-665.
    • (2007) Government Information Quarterly , vol.24 , pp. 646-665
    • Yildiz, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.