메뉴 건너뛰기




Volumn 15, Issue 2, 2014, Pages 149-165

Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the technology organization environment framework

Author keywords

Case study; Centralized end to end identity and access management; Enterprise resource planning system; Identity and access management (IAM); Technology organization environment (TOE) framework

Indexed keywords


EID: 84900552182     PISSN: 14670895     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.accinf.2014.01.003     Document Type: Article
Times cited : (42)

References (61)
  • 1
    • 76649107801 scopus 로고    scopus 로고
    • The insider threat
    • Aldhizer G. The insider threat. Intern Audit 2008, 65(2):71-73.
    • (2008) Intern Audit , vol.65 , Issue.2 , pp. 71-73
    • Aldhizer, G.1
  • 2
    • 77249085149 scopus 로고    scopus 로고
    • How internet users' privacy concerns have evolved since 2002
    • Antón A., Earp J.B., Young J. How internet users' privacy concerns have evolved since 2002. IEEE Security and Privacy 2010, 8:21-27.
    • (2010) IEEE Security and Privacy , vol.8 , pp. 21-27
    • Antón, A.1    Earp, J.B.2    Young, J.3
  • 3
    • 73449102898 scopus 로고    scopus 로고
    • Costs of enterprise resource planning system implementation - and then some
    • Babey E. Costs of enterprise resource planning system implementation - and then some. New Dir High Educ 2006, 136:21-33.
    • (2006) New Dir High Educ , vol.136 , pp. 21-33
    • Babey, E.1
  • 4
    • 77954717694 scopus 로고    scopus 로고
    • Assurance for federated identity management
    • Baldwin A., Mont M.C., Beres Y., Shiu S. Assurance for federated identity management. J Computer Sec 2010, 18(4):519-550.
    • (2010) J Computer Sec , vol.18 , Issue.4 , pp. 519-550
    • Baldwin, A.1    Mont, M.C.2    Beres, Y.3    Shiu, S.4
  • 5
    • 34548482723 scopus 로고    scopus 로고
    • Enhancing IT governance practices: a model and case study of an organization's efforts
    • Bowen P.L., Cheung M.D., Rohde F.H. Enhancing IT governance practices: a model and case study of an organization's efforts. Int J Account Inf Syst 2007, 8:191-221.
    • (2007) Int J Account Inf Syst , vol.8 , pp. 191-221
    • Bowen, P.L.1    Cheung, M.D.2    Rohde, F.H.3
  • 7
    • 0041707991 scopus 로고    scopus 로고
    • Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems
    • Bradford M., Florin J. Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. Int J Account Inf Syst 2003, 4(3):205-225.
    • (2003) Int J Account Inf Syst , vol.4 , Issue.3 , pp. 205-225
    • Bradford, M.1    Florin, J.2
  • 8
    • 70449717568 scopus 로고    scopus 로고
    • The effect of ERP system implementations on the management of earnings and earnings release dates
    • Brazel J., Dang L. The effect of ERP system implementations on the management of earnings and earnings release dates. J Inf Syst 2008, 22(2):1-21.
    • (2008) J Inf Syst , vol.22 , Issue.2 , pp. 1-21
    • Brazel, J.1    Dang, L.2
  • 9
    • 33745692304 scopus 로고    scopus 로고
    • Toward a biometric security layer in accounting systems
    • Chandra A., Calderon T.G. Toward a biometric security layer in accounting systems. J Inf Syst 2003, 17(2):51-70.
    • (2003) J Inf Syst , vol.17 , Issue.2 , pp. 51-70
    • Chandra, A.1    Calderon, T.G.2
  • 10
    • 46749150468 scopus 로고    scopus 로고
    • Case study research in accounting
    • Cooper D.J., Morgan W. Case study research in accounting. Account Horizons 2008, 22(2):159-178.
    • (2008) Account Horizons , vol.22 , Issue.2 , pp. 159-178
    • Cooper, D.J.1    Morgan, W.2
  • 11
    • 84900555761 scopus 로고    scopus 로고
    • The adoption of single sign-on and multifactor authentication in organisations - a critical evaluation using TOE framework
    • D'Costa-Alphonso M., Lane M. The adoption of single sign-on and multifactor authentication in organisations - a critical evaluation using TOE framework. Issues Informing Sci Inf Technol 2010, 7:161-189.
    • (2010) Issues Informing Sci Inf Technol , vol.7 , pp. 161-189
    • D'Costa-Alphonso, M.1    Lane, M.2
  • 12
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 1989, 13(3):319-339.
    • (1989) MIS Q , vol.13 , Issue.3 , pp. 319-339
    • Davis, F.D.1
  • 13
    • 84936823933 scopus 로고
    • User acceptance of computer technology: a comparison of two theoretical models
    • Davis F.D., Bagozzi R.P., Warshaw P.R. User acceptance of computer technology: a comparison of two theoretical models. Manag Sci 1989, 35(8):982-1003.
    • (1989) Manag Sci , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 14
    • 3943076943 scopus 로고
    • The context for change: organization, technology, and environment
    • Lexington Books, New York (NY), F. Tornatzky (Ed.)
    • DePietro R., Wiarda E., Fleischer M. The context for change: organization, technology, and environment. The processes of technological innovation 1990, 151-175. Lexington Books, New York (NY). F. Tornatzky (Ed.).
    • (1990) The processes of technological innovation , pp. 151-175
    • DePietro, R.1    Wiarda, E.2    Fleischer, M.3
  • 15
    • 1242287852 scopus 로고    scopus 로고
    • Guest Editorial: the challenge of managing information security
    • Dhillon G. Guest Editorial: the challenge of managing information security. Int J of Info Mgmt 2004, 24:3-4.
    • (2004) Int J of Info Mgmt , vol.24 , pp. 3-4
    • Dhillon, G.1
  • 16
    • 0036696722 scopus 로고    scopus 로고
    • Knowledge management in practice: three contemporary case studies
    • Dilnutt R. Knowledge management in practice: three contemporary case studies. Int J Account Inf Syst 2002, 3:75-81.
    • (2002) Int J Account Inf Syst , vol.3 , pp. 75-81
    • Dilnutt, R.1
  • 17
    • 84900562627 scopus 로고    scopus 로고
    • The impact of governance on identity management programs
    • Available:. Accessed:29.09.2013]
    • Etges R. The impact of governance on identity management programs. ISACA J 2011, 5:1-4. [Available:http://www.isaca.org/Journal/Past-Issues/2011/Volume-5/Pages/The-Impact-of-Governance-on-Identity-Management-Programs.aspx. Accessed:29.09.2013].
    • (2011) ISACA J , vol.5 , pp. 1-4
    • Etges, R.1
  • 18
    • 0004180877 scopus 로고
    • University of North Carolina Press, Chapel Hill (NC), J. Feagin, A. Orum, G. Sjoberg (Eds.)
    • A case for case study 1991, University of North Carolina Press, Chapel Hill (NC). J. Feagin, A. Orum, G. Sjoberg (Eds.).
    • (1991) A case for case study
  • 19
    • 70349243055 scopus 로고    scopus 로고
    • Estimating the market impact of security breach announcements on firm values
    • Goel S., Shawky H.A. Estimating the market impact of security breach announcements on firm values. Inf Manag 2009, 46:404-410.
    • (2009) Inf Manag , vol.46 , pp. 404-410
    • Goel, S.1    Shawky, H.A.2
  • 20
    • 79961163255 scopus 로고    scopus 로고
    • A review of ERP research: a future agenda for accounting information systems
    • Grabski S.V., Leech S.A., Schmidt P.J. A review of ERP research: a future agenda for accounting information systems. J Inf Syst 2011, 25:37-78.
    • (2011) J Inf Syst , vol.25 , pp. 37-78
    • Grabski, S.V.1    Leech, S.A.2    Schmidt, P.J.3
  • 21
    • 84900526925 scopus 로고    scopus 로고
    • Managing identities in hybrid worlds
    • Gregory P.H. Managing identities in hybrid worlds. Info Sec. 2013, 15(3):14-19. [http://media.techtarget.com/deu/april_ism_109109.html].
    • (2013) Info Sec. , vol.15 , Issue.3 , pp. 14-19
    • Gregory, P.H.1
  • 22
    • 84900547467 scopus 로고    scopus 로고
    • Making the case for enterprise IAM centralized access control
    • Griffeth D. Making the case for enterprise IAM centralized access control. Technical guide on managing identities and access control 2010, 3-4. [http://viewer.media.bitpipe.com/1276198763_637/1293124694_93/1217_ISM_eB_ManagingIdentityAccess.pdf].
    • (2010) Technical guide on managing identities and access control , pp. 3-4
    • Griffeth, D.1
  • 23
    • 0034240041 scopus 로고    scopus 로고
    • Design and specification of role based access control policies
    • Hitchens M., Varadharajan V. Design and specification of role based access control policies. Software IEEE Proc 2000, 147(4):117-129.
    • (2000) Software IEEE Proc , vol.147 , Issue.4 , pp. 117-129
    • Hitchens, M.1    Varadharajan, V.2
  • 24
    • 84900533473 scopus 로고    scopus 로고
    • [Available: Accessed:20.08.13], InCommon
    • InCommon InCommon Federation [Available: http://www.incommonfederation.org/federation/. Accessed:20.08.13].
    • InCommon Federation
  • 25
    • 84900546273 scopus 로고    scopus 로고
    • [Available, Accessed:22.08.2013], Institute of Internal Auditors
    • Institute of Internal Auditors Global technology audit guide [Available, Accessed:22.08.2013]. http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/DownloadableDocuments/GTAG9IdentAccessMgmt.pdf.
    • Global technology audit guide
  • 26
    • 84900525397 scopus 로고    scopus 로고
    • [Available: Accessed:21.08.13], Internet2 Middleware Initiative
    • Internet2 Middleware Initiative Identity and access management [Available: http://www.internet2.edu/pubs/200703-IS-MW.pdf. Accessed:21.08.13].
    • Identity and access management
  • 29
    • 84900543939 scopus 로고    scopus 로고
    • Identity and access management: its role in Sarbanes-Oxley compliance
    • Kaur H. Identity and access management: its role in Sarbanes-Oxley compliance. ISACA J 2011, 6:1-6.
    • (2011) ISACA J , vol.6 , pp. 1-6
    • Kaur, H.1
  • 30
    • 63449130886 scopus 로고    scopus 로고
    • The changing face of identity management
    • Kho N. The changing face of identity management. Econtent 2009, 32(3):20-25.
    • (2009) Econtent , vol.32 , Issue.3 , pp. 20-25
    • Kho, N.1
  • 31
    • 37249058273 scopus 로고    scopus 로고
    • An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry
    • Lee C.P., Shim J.P. An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. Euro J Inf Syst 2007, 16(6):712-724.
    • (2007) Euro J Inf Syst , vol.16 , Issue.6 , pp. 712-724
    • Lee, C.P.1    Shim, J.P.2
  • 32
    • 34548228236 scopus 로고    scopus 로고
    • Segregation of duties in ERP
    • Lightle S.S., Vallario C.W. Segregation of duties in ERP. Intern Audit 2003, 60(5):27.
    • (2003) Intern Audit , vol.60 , Issue.5 , pp. 27
    • Lightle, S.S.1    Vallario, C.W.2
  • 34
    • 84892818245 scopus 로고    scopus 로고
    • Identity and access management: transforming e-security into a catalyst for competitive advantage
    • McQuaide B. Identity and access management: transforming e-security into a catalyst for competitive advantage. Inf Syst Control J 2003, 4.
    • (2003) Inf Syst Control J , pp. 4
    • McQuaide, B.1
  • 35
    • 34247495636 scopus 로고    scopus 로고
    • Antecedents and consequences of internet use in procurement: an empirical investigation of U.S. manufacturing firms
    • Mishra A.N., Konana P., Barua A. Antecedents and consequences of internet use in procurement: an empirical investigation of U.S. manufacturing firms. Inf Syst Res 2007, 18:103-120.
    • (2007) Inf Syst Res , vol.18 , pp. 103-120
    • Mishra, A.N.1    Konana, P.2    Barua, A.3
  • 36
    • 35748967138 scopus 로고    scopus 로고
    • Enterprise resource planning (ERP) systems: an empirical analysis of benefits
    • O'Leary D. Enterprise resource planning (ERP) systems: an empirical analysis of benefits. J Emerg Technol Account 2004, 1:63-72.
    • (2004) J Emerg Technol Account , vol.1 , pp. 63-72
    • O'Leary, D.1
  • 40
    • 70450256774 scopus 로고    scopus 로고
    • Breaking the code: how credit-card data went out the wireless door
    • p. A1 [Available:. Accessed:21.08.13]
    • Pereira J. Breaking the code: how credit-card data went out the wireless door. Wall Str J 2007, p. A1 [Available: http://online.wsj.com/article/SB117824446226991797.html. Accessed:21.08.13].
    • (2007) Wall Str J
    • Pereira, J.1
  • 41
    • 84885382276 scopus 로고    scopus 로고
    • Top 10 security and privacy topics for IT auditors
    • [Available: Accessed:20.08.13]
    • Rai S., Chukwuma P. Top 10 security and privacy topics for IT auditors. ISACA J 2011, 6:1-5. [Available:http://www.isaca.org/Journal/Past-Issues/2010/Volume-2?pages?Top-10Security-and-Privacy-Topics-for-IT-Auditors1.aspx. Accessed:20.08.13].
    • (2011) ISACA J , vol.6 , pp. 1-5
    • Rai, S.1    Chukwuma, P.2
  • 43
    • 84900548025 scopus 로고    scopus 로고
    • [Available: Accessed: 20.08.13]
    • Romer H. Security inside out [Available:http://www.oracle.com/us/products/059502.pdf. Accessed: 20.08.13].
    • Security inside out
    • Romer, H.1
  • 45
    • 85029268502 scopus 로고    scopus 로고
    • ERP systems and management accounting change: opportunities or impact
    • Scapens R.W., Jazayeri M. ERP systems and management accounting change: opportunities or impact. Eur Account Rev 2003, 12(1):201-233.
    • (2003) Eur Account Rev , vol.12 , Issue.1 , pp. 201-233
    • Scapens, R.W.1    Jazayeri, M.2
  • 46
    • 84995946668 scopus 로고    scopus 로고
    • Security for enterprise resource planning systems
    • She W., Thuraisingham B. Security for enterprise resource planning systems. Inf Syst Security 2007, 16:152-163.
    • (2007) Inf Syst Security , vol.16 , pp. 152-163
    • She, W.1    Thuraisingham, B.2
  • 47
    • 0346698201 scopus 로고    scopus 로고
    • Sage Publications, Thousand Oaks (CA), N. Denzin, Y. Lincoln (Eds.)
    • Stake R.E. Handbook of qualitative research 2000, Sage Publications, Thousand Oaks (CA). 2nd ed. N. Denzin, Y. Lincoln (Eds.).
    • (2000) Handbook of qualitative research
    • Stake, R.E.1
  • 53
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Venkatesh V., Morris M.G., Davis G.B., Davis F.D. User acceptance of information technology: toward a unified view. MIS Q 2003, 27(3):425-478.
    • (2003) MIS Q , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 54
    • 70350127194 scopus 로고    scopus 로고
    • The imaginePA project: the first large-scale public sector ERP implementation
    • Wagner W., Antonucci Y.L. The imaginePA project: the first large-scale public sector ERP implementation. Inf Syst Manage 2009, 275-284.
    • (2009) Inf Syst Manage , pp. 275-284
    • Wagner, W.1    Antonucci, Y.L.2
  • 55
    • 14644433066 scopus 로고    scopus 로고
    • A flexible payment scheme and its role-based access control
    • Wang H., Cao J., Zhang Y. A flexible payment scheme and its role-based access control. IEEE Trans Knowl Data Eng 2005, 17(3):425-436.
    • (2005) IEEE Trans Knowl Data Eng , vol.17 , Issue.3 , pp. 425-436
    • Wang, H.1    Cao, J.2    Zhang, Y.3
  • 56
    • 41949138126 scopus 로고    scopus 로고
    • Biometrics in identity management systems
    • Wayman J.L. Biometrics in identity management systems. Security Privacy IEEE 2008, 6(2):30-37.
    • (2008) Security Privacy IEEE , vol.6 , Issue.2 , pp. 30-37
    • Wayman, J.L.1
  • 58
    • 3142546003 scopus 로고    scopus 로고
    • Information systems assurance for enterprise resource planning systems: unique risk considerations
    • Wright A., Wright S. Information systems assurance for enterprise resource planning systems: unique risk considerations. J Inf Syst 2002, 16:99-113.
    • (2002) J Inf Syst , vol.16 , pp. 99-113
    • Wright, A.1    Wright, S.2
  • 60
    • 18944378896 scopus 로고    scopus 로고
    • Post-adoption variation in usage and value of e-business by organizations: cross-country evidence from the retail industry
    • Zhu K., Kraemer K. Post-adoption variation in usage and value of e-business by organizations: cross-country evidence from the retail industry. Inf Syst Res 2005, 16(1):61-84.
    • (2005) Inf Syst Res , vol.16 , Issue.1 , pp. 61-84
    • Zhu, K.1    Kraemer, K.2
  • 61
    • 1442352635 scopus 로고    scopus 로고
    • Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors
    • Zhu K., Kraemer K., Sean Xu K. Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. Euro J Inf Syst 2003, 12(4):251-268.
    • (2003) Euro J Inf Syst , vol.12 , Issue.4 , pp. 251-268
    • Zhu, K.1    Kraemer, K.2    Sean Xu, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.