2015
DOI: 10.1080/02681102.2014.979393
|View full text |Cite
|
Sign up to set email alerts
|

The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru

Abstract: This study analyzes the determinants of information security that influence the adoption of Web-based integrated information systems (IIS) by government agencies in Peru. The study introduces Web-based information systems designed to formulate strategic plans for the Peruvian government. A theoretical model is proposed to test the impact of organizational factors such as deterrent efforts, severity efforts, and preventive efforts and individual factors such as perceived information security threats and securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 47 publications
(125 reference statements)
0
4
0
2
Order By: Relevance
“…While Siponen (2000) point out, that this definition is steady with the view that security consciousness is a situation in which workers are conscious and are fully dedicated to the security objectives their organizations [26]. According to Kritzinger & Smith (2008), Information security awareness forms guarantees that all workers are conscious of their role and accountability with respect to information security since it is a part of information security management (Joo & Hovav, 2016)[27]- [30].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…While Siponen (2000) point out, that this definition is steady with the view that security consciousness is a situation in which workers are conscious and are fully dedicated to the security objectives their organizations [26]. According to Kritzinger & Smith (2008), Information security awareness forms guarantees that all workers are conscious of their role and accountability with respect to information security since it is a part of information security management (Joo & Hovav, 2016)[27]- [30].…”
Section: Literature Reviewmentioning
confidence: 99%
“…As the stage of ICT in Peru is quite low, this shortage of awareness is probable to be more significant. Therefore, intention of users to use and adopt the proposed IIS is likely to have a negative effected by perceived security threat [30], [32]- [34].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Asimismo, la confianza en un elemento clave en el uso de la Internet, y aunque no reemplaza las formas más tradicionales y personales de comunicación entre organizaciones e individuos, si ha sido reconocido como un elemento habilitador clave para la implementación eficiente y la adopción de innovaciones tecnológicas, como el gobierno electrónico (Rao, Perry y Frazer, 2003;Tegethoff et al, 2019;Warkentin, Gefen, Pavlou y Rose, 2002). La voluntad e intención de usar sistemas de gobierno electrónico en una organización se multiplica si se puede desarrollar una relación de confianza entre los sistemas y sus usuarios (Joo y Hovav, 2016). Según la Organización para la Cooperación y el Desarrollo Económicos (OCDE), la confianza es uno de los factores clave de éxito de cualquier política pública que depende de las respuestas de comportamiento de los ciudadanos, y es esencial para el desarrollo económico y social.…”
Section: Confianzaunclassified
“…Por consiguiente, la seguridad en línea puede considerarse como una de las variables fundamentales de los sistemas de gobierno electrónico, ya que de ella depende si los ciudadanos y las organizaciones tienen la intención de realizar transacciones con entidades públicas (Al-Sharafi, Abdullah Arshah, Abu-Shanab y Elayah, 2016;Bhattacharya, Gulla y Gupta, 2012;Flavián y Guinalíu, 2006). La voluntad e intención de usar sistemas de gobierno electrónico en una organización se multiplica si se puede garantizar la seguridad de la información (Joo y Hovav, 2016) Satisfacción del usuario "Every day we're saying, 'How can we keep the customer happy? How can we get ahead in innovation by doing this?…”
Section: Seguridad En Líneaunclassified
“…Most e-government implementations entail the design of web pages and services offered to citizens from these portals [10]. There are three types of said services: statics information, data consultation (mild interaction that may not imply personal data entry) and transactions (advanced interaction encompassing business transactions such as payments and personal data entry) [11], [20].…”
Section: Information Security Requirements In U-servicesmentioning
confidence: 99%