2018
DOI: 10.1007/s10796-018-9855-6
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 64 publications
0
8
0
Order By: Relevance
“…AT is a practice-based theory (Karanasios and Allen, 2018;Simeonova, 2018) and research often is undertaken in the natural (work) setting as a longitudinal case study (for example, Malaurent and Avison, 2016;Weeger and Haase, 2016;Marcandella and Guèye, 2018). Hence, research using AT may embrace a participative action research (PAR) model or canonical action research www.ejbrm.com 218 ©ACPIL (Malaurent and Avison, 2016) with the iterative design that is required by PAR or may use a Design Science research methodology (see Kang and Hovav, 2018).…”
Section: Research Methodology Must Include Taking Actionmentioning
confidence: 99%
See 1 more Smart Citation
“…AT is a practice-based theory (Karanasios and Allen, 2018;Simeonova, 2018) and research often is undertaken in the natural (work) setting as a longitudinal case study (for example, Malaurent and Avison, 2016;Weeger and Haase, 2016;Marcandella and Guèye, 2018). Hence, research using AT may embrace a participative action research (PAR) model or canonical action research www.ejbrm.com 218 ©ACPIL (Malaurent and Avison, 2016) with the iterative design that is required by PAR or may use a Design Science research methodology (see Kang and Hovav, 2018).…”
Section: Research Methodology Must Include Taking Actionmentioning
confidence: 99%
“…Recent examples of use reported in organisational and business sciences and published in various 'business journals' include its use for business intelligence (Kekwaletswe and Lesole, 2016), knowledge acquisition through process mapping (White and Cicmil, 2016) and the creation and evolution of new business ventures (Jones and Holt, 2008). The value of integrating AT into organisation studies, particularly those relating to organisational change and technology-mediated change has been noted (Harrington and Kearney, 2011;Kang and Hovav, 2018). Karanasios (2018) refers to Blackler ( 2009) when saying, "In the context of organizational research rather than the organizational being taken as the unit of analysis and organizational objectives prioritized, activity theory takes the activity system as the core unit and prioritizes 'objects' of organizational activities.…”
Section: At In Researchmentioning
confidence: 99%
“…The research in Information Systems Frontiers (ISF) particularly stressed the cyber risk assessment (Mukhopadhyay et al 2019), security risk mitigation (Ye et al 2006), IT security investment (Ezhei and Ladani 2018), information security policy (Kang and Hovav 2018), and security risk management (Lee and Lee 2012). In this regard, ISF's research also focuses more on the organization and employee aspect of cybersecurity issues.…”
Section: Cybersecurity Research Literaturementioning
confidence: 99%
“…Activity Theory is a practice‐based theory (Karanasios & Allen, 2018; Simeonova, 2018) and research is often undertaken in the natural (work) setting as a longitudinal case study (eg, Malaurent & Avison, 2016; Marcandella & Guèye, 2018; Weeger & Haase, 2016). Hence, research using Activity Theory may embrace a participatory action research (PAR) model or canonical action research (Malaurent & Avison, 2016) with the iterative design that is required by PAR or may use a Design Science research methodology (see Kang & Hovav, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hence, research using Activity Theory may embrace a participatory action research (PAR) model or canonical action research (Malaurent & Avison, 2016) with the iterative design that is required by PAR or may use a Design Science research methodology (see Kang & Hovav, 2018).…”
Section: Critique Of Is Research Using Activity Theorymentioning
confidence: 99%