https://doi.org/10.1057/palgrave.rm.8250035 ·
Journal: Risk Management, 2008, №1, p.56-75
Publisher: Springer Science and Business Media LLC
Author: Ioannis V Koskosas
List of references
- Andersen, K.V. (1998). EDI and Data Networking in the Public Sector: Governmental Action, Diffusion, and Impacts. Boston: Kluwer Academic Publishers.
https://doi.org/10.1007/978-1-4615-5487-5 - Backhouse, J. and Dhillon, G. (1996). Structures of Responsibility and Security of Information Systems. European Journal of Information Systems. Vol. 5, No. 1, pp 2–9.
https://doi.org/10.1057/ejis.1996.7 - Bandura, A. (1997). Self-Efficacy: The Exercise of Control. New York: W.H. Freeman Publishing.
- Benbasat, I., Goldstein, D.K. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems. MIS Quarterly. Vol. 11, No. 3, pp 369–386.
https://doi.org/10.2307/248684 - Boss, R.W. (1980). Trust and Managerial Problem Solving Revisited. Group and Organization Studies. Vol. 3, pp 331–342.
https://doi.org/10.1177/105960117800300306 - Burnham, B. (1996). The Internet's Impact on Retail Banking, Booz-Allen Hamilton Third Quarter ( http://www.strategy-business.com/briefs/96301 ).
- Cavaye, A.L. (1996). Case Study Research: A Multi-Faceted Research Approach for IS. Information Systems Journal. Vol. 6, No. 3, pp 227–242.
https://doi.org/10.1111/j.1365-2575.1996.tb00015.x - Coleman, J. (1990). Foundations of Social Theory. Cambridge: Harvard University Press.
- Davis, J., Schhorman, F.D., Mayer, R. and Tan, H. (2000). Trusted Unit Manager and Business Unit Performance: Empirical Evidence of a Competitive Advantage. Strategic Management Journal. Vol. 21, pp 563–576.
https://doi.org/10.1002/(SICI)1097-0266(200005)21:5<563::AID-SMJ99>3.0.CO;2-0 - De Dreu, C., Giebels, E. and Van de Vliert, E. (1998). Social Motives and Trust in Integrative Negotiation: The Disruptive Effects of Punitive Capability. Journal of Applied Psychology. Vol. 83, pp 408–423.
https://doi.org/10.1037/0021-9010.83.3.408 - Denzin, N.K. (1989). The Research Act, 3rd edn. Englewood Cliffs, NJ: Prentice-Hall.
- Denzin, N. and Lincoln, Y. (1998). Major Paradigms and Perspectives. In Denzin, N.Y.K. and Lincoln, Y.S. (eds) Strategies of Qualitative Inquiry. Thousand Oaks: Sage Publication.
- DeVito, J.A. (1988). Human Communication, 4th edn. New York: Harper & Row, Inc.
- Eisenhardt, K.M. (1989). Building Theories from Case Study Research. Academy of Management Review. Vol. 14, No. 4, pp 532–550.
https://doi.org/10.5465/amr.1989.4308385 - Forcht, K. and Wex, R. (1996). Doing Business on the Internet: Marketing and Security Aspects. Information Management and Computer Security. Vol. 4, No. 4, pp 3–9.
https://doi.org/10.1108/09685229610130477 - Flick, U. (1992). Triangulation Revisited: Strategy of Validation or Alternative? Journal for the Theory of Social Behaviour. Vol. 22, pp 175–198.
https://doi.org/10.1111/j.1468-5914.1992.tb00215.x - Gambetta, D. (1998). Trust: Making and Breaking Cooperative Relations. Cambridge: UK, Basil Blackwell.
- Gore, A. (1999). Putting People First in the Information Age. In Lee, A. (ed) Masters of the Wired World. London: Financial Times Pitman Publishing, pp 31–36.
- Groth, E. (1991). Communicating with Consumers About Food Safety and Risk Issues. Food Technology. Vol. 45, No. 5, pp 248–253.
- Herriot, R.E. and Firestone, W.A. (1983). Multisite Qualitative Policy Research: Optimizing Description and Generalizability. Educationa Researcher. Vol. 12, No. 3, pp 14–19.
https://doi.org/10.3102/0013189X012002014 - Hwang, P. and Burgers, W. (1997). Properties of Trust: An Analytical View. Organizational Bahaviour and Human Decision Processes. Vol. 69, pp 67–73.
https://doi.org/10.1006/obhd.1996.2673 - Janesick, V. (2000). The Choreography of Qualitative Research Design. in Denzin, N.K. and Lincoln, Y.S. (eds) Handbook of Qualitative Research. Thousand Oaks, CA: Sage.
- Klimoski, R.J. and Karol, B. (1976). The Impact of Trust on Creative Problem Solving Groups. Journal of Psychology. Vol. 61, pp 630–633.
- Kosiur, D. (1997). Understanding Electronic Commerce. Redmond, WA: Microsoft Press.
- Krimsky, S. and Plough, A. (1988). Environmental Hazards: Communicating Risks as a Social Process. Dover, MA: Auburn House Publishing.
- Lagoutte, V. (1996). The Direct Banking Challenge, Unpublished Honours Thesis, Middlesex University.
- Larson, C. and LaFasto, F. (1989). Teamwork. Newbury Park, CA: Sage.
- Locke, E.A. and Latham, G.P. (1990). A Theory of Goal Setting and Task Performance. Englewood Cliffs, NJ: Prentice-Hall.
- Markus, M.L. (1989). Case Selection in a Disconfirmatory Case Study. In Cash, J.I. and Lawrence, P.R. (eds) The Information Systems Research Challenge: Qualitative Research Methods, Harvard Business School Research Colloquium,Cambridge, MA: Harvard Business School, pp 20–26.
- Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995). An Integrative Model of Organizational Trust. Academy of Management Review. Vol. 20, pp 709–734.
https://doi.org/10.5465/amr.1995.9508080335 - Miles, M.B. and Huberman, A.M. (1994). Qualitative Data Analysis: An Expanded Sourcebook. Newbury Park, CA: Sage Publications.
- Mitchell, T.R., Kenneth, R.T. and George-Falvy, J. (2000). Goal Setting: Theory and Practice. In Cooper, C.L. and Locke, E.A. (eds) Industrial and Organizational Psychology: Linking Theory with Practice. Oxford: Blackwell Publishers Ltd. (First Published 2000).
- National Research Council (1989). Improving Risk Communication, Report of the Committee on Risk Perception and Communication, Commission on Behavioural and Social Sciences and Education, National Research Council.Washington, DC: National Academy Press.
- Orlikowski, W. and Baroudi, J.J. (1991). Studying Information Technology in Organizations: Research Approaches and Assumptions. Information Systems Research. Vol. 2, No. 1, pp 1–28.
https://doi.org/10.1287/isre.2.1.1 - Otway, H. and Wynne, B. (1989). Risk Communication: Paradigm and Paradox. Risk Analysis. Vol. 9, No. 2, pp 141–145.
https://doi.org/10.1111/j.1539-6924.1989.tb01232.x - Porta, R., Lopez-de-Silanes, F., Shleifer, A., Vishny, R. (1996). Trust in Large Organizations, NBER Working Paper.
https://doi.org/10.3386/w5864 - Putnam, L.L. (1983). The Interpretive Perspective: An Alternative to Functionalism. In Putnam, L.L. and Pacanowsky, M.E. (eds) Communication and Organization. Beverly Hills, CA: Sage, pp 31–54.
- Rousseau, D., Sitkin, S., Burt, R. and Camerer, C. (1998). Not So Different After All: A Cross-Discipline View of Trust. Academy of Management Review. Vol. 23, pp 387–392.
https://doi.org/10.5465/AMR.1998.926617 - Sandman, P. (1987). Risk Communication: Facing Public Outrage. EPA Journal. Vol. 13, No. 9, pp 21–22.
- Seijts, G.H. and Latham, G.P. (2000). The Construct of Goal Commitment: Measurement and Relationships with Task Performance. In Goffin, R. and Helmes, E. (eds) Problems and Solutions in Human Assessment: Honoring Douglas N. Jackson at Seventy. Dordrecht, The Netherlands: Kluwer Academic Publishers, pp 315–332.
https://doi.org/10.1007/978-1-4615-4397-8_14 - Siponen, M.T. (2000). A Conceptual Foundation for Organizational Information Security Awareness. Information Management and Computer Security. Vol. 8, No. 1, pp 31–41.
https://doi.org/10.1108/09685220010371394 - Slovic, P. (1990). The Legitimacy of Public Perceptions of Risk. Journal of Pesticide Reform. Vol. 10, No. 1, pp 13–15.
- Straub, D.W. and Welke, R.J. (1998). Coping with Systems Risks: Security Planning Models for Management Decision Making. MIS Quarterly. Vol. 22, No. 4, pp 441–469.
https://doi.org/10.2307/249551 - Tan, M. and Teo, T.S.H. (2000). Factors Influencing the Adoption of Internet Banking. Journal of the Association for Information Systems. Vol. 1, No. 5, pp 217–245.
- Ternullo, G. (1997). Banking on the Internet: New Technologies, New Opportunities and New Risks, Boston Regional Outlook, Second Quarter ( http://www.fdic.gov/index.html ).
- U.S. Department of Commerce (1999). The Emerging Digital Economy II ( http://www.ecommerce.gov/ede/ ).
- Walsham, G. (1995). Interpretive Case Studies in IS Research: Nature and Method. European Journal of Information Systems. Vol. 4, No. 2, pp 74–81.
https://doi.org/10.1057/ejis.1995.9 - Wegge, J. (2000). Participation in Group Goal Setting: Some Novel Findings and a Comprehensive Model as a New Ending Ton at Old Story. Applied Psychology: in International Review. Vol. 49, No. 3, pp 498–516.
https://doi.org/10.1111/1464-0597.00028 - Yin, R.K. (1984). Case Study Research, Design and Methods. Newbury Park, CA: Sage Publications.
Publications that cite this publication
The drivers of E-banking entrepreneurship: an empirical study
Khaled Saleh Al-Omoush, Mohammad Khalid Al Attar, Isam Hamad Saleh, Ayman Abdalmajeed Alsmadi
https://doi.org/10.1108/ijbm-03-2019-0113
2019, International Journal of Bank Marketing, №2, p.485-500
Scopus
WoS
Crossref citations:0
A systematic framework for risk visualization in risk management and communication
Martin J Eppler, Markus Aeschimann
https://doi.org/10.1057/rm.2009.4 ·
2009, Risk Management, №2, p.67-89
Scopus
WoS
Crossref citations:17
Find all citations of the publication
About this publication
Number of citations | 3 |
Number of works in the list of references | 49 |
Journal indexed in Scopus | Yes |
Journal indexed in Web of Science | Yes |
ASJC classification
1408 | Strategy and Management |
2002 | Economics and Econometrics |
1403 | Business and International Management |
2003 | Finance |
Greetings, I am an expert well-versed in the topic of risk management, particularly in the context of the article published in the Risk Management journal in 2008, authored by Ioannis V Koskosas. My depth of knowledge is substantiated by an extensive understanding of the concepts and theories related to risk management and information systems, as evidenced by my familiarity with the references provided in the article.
The article in question delves into the multifaceted aspects of risk management, drawing insights from various disciplines such as information systems, organizational behavior, and strategic management. It is crucial to note that the references cited by Koskosas contribute significantly to the theoretical framework and empirical evidence presented in the article. Let's explore some key concepts and references used in the article:
-
EDI and Data Networking in the Public Sector (Andersen, 1998):
- Explores the impact of Electronic Data Interchange (EDI) and data networking in the public sector, shedding light on governmental actions, diffusion, and impacts.
-
Structures of Responsibility and Security of Information Systems (Backhouse and Dhillon, 1996):
- Examines the structures of responsibility and their relationship with the security of information systems, providing insights into the organizational dynamics.
-
Self-Efficacy: The Exercise of Control (Bandura, 1997):
- Bandura's work on self-efficacy is likely cited to understand how individuals perceive and exercise control in the context of risk management.
-
The Case Research Strategy in Studies of Information Systems (Benbasat et al., 1987):
- Discusses the case research strategy as an approach for studying information systems, which might be relevant for the methodology used in the article.
-
Trust and Managerial Problem Solving Revisited (Boss, 1980):
- Explores the relationship between trust and managerial problem-solving, providing insights into the role of trust in organizational decision-making.
-
Building Theories from Case Study Research (Eisenhardt, 1989):
- Eisenhardt's work focuses on building theories from case study research, which may have influenced the research methodology employed by Koskosas.
-
An Integrative Model of Organizational Trust (Mayer et al., 1995):
- Presents an integrative model of organizational trust, offering a theoretical foundation for understanding trust dynamics within organizations.
These references encompass a range of topics, from information systems and organizational behavior to trust dynamics and case study research methodologies. The interdisciplinary approach taken by Koskosas, drawing from established theories and empirical evidence, contributes to the credibility and robustness of the risk management discourse presented in the article.