Determining factors determinants of bank employees’ reading habits of information security policies
Abstract
Keywords
Full Text:
PDFReferences
Abor, B (2001) Technological Innovations and Banking in Ghana: An Evaluation of Customers’ Perceptions. http://www.financialanalyst.org/Technological%20Innovations%20and%20Banking%20in%20Ghana%20-%20AAFM.doc. Retrieved 24 June, 2012.
Alu A.O, (2000) Effects of Information Technology on Customers Service in the Banking Industry in Nigeria. Information Technology Review. 3(1), 5-19.
Besnard, D., & Arief, B. (2004). Computer Security Impaired by legitimate users. Computers & Security, 23(3), 253-264.
Boon-Yun N, Kankanhalli A, Xu Y, C (2009) Studying Users Computer Security Behaviour: A health Belief Perspective Decision Supports Systems, 46, 815-825.
Checkly J, (1994) Electronic Banking Security: Banking System Security. Brain Welch (ed) P47. Basel Blackwell
Claburn, T. (2005, 2007). Spam cost billions. http://www.informationweek.com/story/showArti cle.jhtml?articleID=59300834. Retrieved 24 June, 2013
D'Arcy J, Hovav A, Galletta D. (2009) User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information System Research, 20(1), 79-98.
Daily Telegraph (2012) UBS fined £30m over Kweku Adoboli fraud failures. http://www.telegraph.co.uk/finance/financial-crime/9702513/UBS-fined-30m-over-Kweku-Adoboli-fraud-failures.html Retrieved 24 June 2012
Dinev T , Qing Hu (2007) "The Centrality of Awareness in the Formation of User Behavioural Intention toward Protective Information Technologies," Journal of the Association for Information Systems, 8(7), Article 23.
Dinev T, GooJ, Hu Q, Nam K (2008) User behaviour towards protective information technologies: the role of national cultural differences. Information Systems Journal, 19(4) 391–412.
Goguen, J. A., & Meseguer, J. (1982, April). Security Policies and Security Models. In IEEE Symposium on Security and privacy (Vol. 12) http://scholar.google.com/scholar?cluster=16438665001756746046&hl=en&as_sdt=0,5# Retrieved on 24 June 2013.
Hung S, Y, Chang C,M , Yu T,J (2006) Determinants of user acceptance of the e-Government services: The case of online tax filing and payment system. Government Information Quarterly, 23(1), 97–122.
Ibgaria M, Guimaraes T, Davis G, B (1995) Testing the determinants of Microcomputer Usage via a Structural Equation Model. Journal of Management Information Systems - Special section, 11(4), 87 – 114.
IMF (2007) Staff Country Report. Capital Markets P.25
Kankanhalli A, Teo H.H, Tan B.C.Y, Wei K.K (2003) An integrative study of information system security effectiveness, International Journal of Information Management 23
O’Leary T.J. Williams B.K, O’Leary L. (1989). McGraw Hill Microcomputing. Annual Edition McGraw Hill
Olson, I. M., & Abrams, M. D. (1995). Information security policy. Information Security–and Integrated Collection of Essays. http://www.acsac.org/secshelf/book001/07.pdf Retrieved on 24 June 2013.
Park, C. H., & Kim, Y. G. (2003). Identifying key factors affecting consumer purchase behavior in an online shopping context. International Journal of Retail & Distribution Management, 31(1), 16-29.
Rosenstock I.M (1974) The health belief model and preventive behaviour. Health education monographs
Santon J.M, Mastrangelo P.R, Stam K.R, Jolton J (2004).Behavioral Information Security:Two end-user survey studies of innovation and security practice, Proceedings of the Tenth America’s Conference on Information Systems, New York.
Stanton J.M, Stama K,R, Mastrangelo P, Jolton J (2005) Analysis of end user security behaviours. Computers & Security, 24(2), 124–133.
Timms, S., Porter C, Bead A (2004) Information System Security breaches Survey. UK Department of Trade and Industry Survey Report.
Vijayan J (2005) Targeting the enemy within. Computer World, 39(32), 23-26.
Yeniseya M.M, Ozokb A.A, Salvendycd (2005) Security Determinants in e-commerce among Turkish university students . Behaviour & Information Technology, 24(4), 259-274.
Yi-Shun Wang, Yu-Min Wang, Hsin-Hui Lin, Tzung-I Tang, (2003) Determinants of user acceptance of Internet banking: an empirical study, Emerald 14.
DOI: http://dx.doi.org/10.4301/s1807-17752014000300002
Copyright (c)