Special SectionGuest Editorial: the challenge of managing information security
References (0)
Cited by (10)
Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the technology organization environment framework
2014, International Journal of Accounting Information SystemsCitation Excerpt :Establishing policies and processes to support the implementation and security of ERP can be challenging, yet our findings suggest such governance is necessary and greatly influences CIAM. For example, when involved in an ERP implementation or upgrade, IT managers should ensure that adequate funds are included for CIAM implementation or upgrade and not leave security as an “afterthought” (Dhillon, 2004). Although we gained much insight from this study, there are limitations.
The impact of social constructivism on ERP systems security: A critical social review
2014, Proceedings of 12th Australian Information Security Management Conference, AISM 2014Shaping security behaviour through discipline and agility: Implications for information security management
2011, Information Management and Computer SecurityOperations in financial services - An overview
2010, Production and Operations ManagementDo information security policies reduce the incidence of security breaches: An exploratory analysis
2008, Social and Human Elements of Information Security: Emerging Trends and CountermeasuresMastering the art of corroboration: A conceptual analysis of information assurance and corporate strategy alignment
2007, Journal of Enterprise Information Management
Copyright © 2004 Elsevier Ltd. All rights reserved.