Reference Hub6
Theorizing Information Security Success: Towards Secure E-Government

Theorizing Information Security Success: Towards Secure E-Government

Kimberley Dunkerley, Gurvirender Tejay
Copyright: © 2010 |Volume: 6 |Issue: 3 |Pages: 11
ISSN: 1548-3886|EISSN: 1548-3894|EISBN13: 9781609609160|DOI: 10.4018/jegr.2010070103
Cite Article Cite Article

MLA

Dunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success: Towards Secure E-Government." IJEGR vol.6, no.3 2010: pp.31-41. http://doi.org/10.4018/jegr.2010070103

APA

Dunkerley, K. & Tejay, G. (2010). Theorizing Information Security Success: Towards Secure E-Government. International Journal of Electronic Government Research (IJEGR), 6(3), 31-41. http://doi.org/10.4018/jegr.2010070103

Chicago

Dunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success: Towards Secure E-Government," International Journal of Electronic Government Research (IJEGR) 6, no.3: 31-41. http://doi.org/10.4018/jegr.2010070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.