You are here

BİLİŞİM SİSTEMLERİNDE RİSK YÖNETİMİ BENİMSEME MODELİ

INFORMATION SYSTEMS RISK MANAGEMENT ADOPTION MODEL

Journal Name:

Publication Year:

Abstract (2. Language): 
Asorganizationsbecomeusinginformationtechnology(IT )moreextensive,I Trisk managementisturningouttobemorecrucialforthecontinuityo ftheorganizations. Oneimportantaspecto fI Triskmanagementi sthecommitmento fuserstoI T securitystandardsandcontrols.Thispaperaimstofindtheleadingfactorsthat affecttheusers'attitudeandbehaviourtowardsI Triskmanagementprocedures.As theresulto ftheresearch,besidesthebasicfactorso fTechnologyAcceptance Model,riskperception,organizationalfactorsandsecurityknowledgeand consciousnesshavebeenfoundtobeeffective.
Abstract (Original Language): 
Bilişimteknolojileri(BT )kurumlartarafındandahayaygınkullanırhalegeldikçe, BTrisklerininyönetimidekurumlarındevamıiçingiderekartandüzeydeönemli olmuştur.BTrisklerininyönetilmesindeönemlibirnoktada,çalışanların kullandıklarıBTgüvenliğiileilgil ikontrolvestandartlarabağlılığıdır.Bu çalışmanınamacı,kullanıcılarınBTriskleriyönetimiuygulamalarınakarşı tutumların ıvedavranışlarınıetkileyenfaktörleribelirlemektir.Araştırmasonucunda TeknolojiKabullenmeModelinintemeldeğişkenleriyanısıra,riskalgılaması, kurumsalfaktörlervegüvenlikkonusundakikişiselbilg ivebilincinetkiliolduğu bulunmuştur.
143-164

REFERENCES

References: 

AJZEN,Icek,1991,"TheTheoryof
PlannedBehavior",Organizational
BehaviorandHumanDecision
Processes,50(2),s:179-211.
AKÇAÖZ,H .,ÖZKAN,B.,2005,
"DeterminingRiskSourcesand
StrategiesAmongFarmersof
ContrastingRiskAwareness:ACase
StudyForÇukurovaRegionof
Turkey",JournalofArid
Environments,62(4),s:661-675.
ATKINSON,William,2005,
"IntegratingRiskManagement&
Security",RiskManagement,52(10)
s:32.
BAJAJ,A,NIDUMOLU ,S.R.,1998,
"AFeedbackModelToUnderstand
InformationSystemUsage",
Information&Management,33(4),
s:213-224.
BRODERICK,Stuart.,2001,
"InformationSecurityRisk
Management-WhenShouldItBe
Managed?",InformationSecurity
TechnicalReport,6(3),s:12-18.
JONES,A.B.,HUBONA,G.S.,2005,
"IndividualDifferencesandUsage
Behavior:RevisitingATechnology
AcceptanceModelAssumption",
ACMSIGMISDatabase,36(2),s:58-77.
CAELLI,WilliamJ.,2002,"Trusted
...or...Trustworthy:TheSearchForA
NewParadigmForComputerand
NetworkSecurity",Computers&
Security,21(5),s:413-420.
ComputerSecurityInstitute,CSI-ComputerCrimeandSecuritySurvey,
2007.
COOPER,R.,ZMUD ,R.W.,1990,
"InformationTechnology
ImplementationResearch:A
TechnologicalDiffusionApproach",
ManagementScience,36(2),s:123-139.
COVIN,J.G.,SLEVIN,D.P.,
HEELEY,M.B.,2001,"Strategic
DecisionMakingInAnIntuitiveVs.
TechnocraticMode:Structuraland
EnvironmentalConsiderations",
JournalofBusinessResearch,52(1),
s:51-67.
CUNNINGHAM,ScottM.,1967,
TheMajorDimensionsofPerceived
Risk.,RiskTakingandInformation
HandlingI nConsumerBehavior,
Boston,HarvardUniversityPress.
DAVIS,FredD.,1989,"Perceived
Usefulness,PerceivedEaseOfUse,
andUserAcceptanceofInformation
Technologies",MISQuarterly,1 3
(3),s:319-340.
DevletİstatistikKurumu,Bilişim
TeknolojileriKullanımıAraştırması,
Kasım2007.
FEATHERMAN,M.S.,PAVLOU,
P.A.,2003,"PredictingE-Services
Adoption:APerceivedRiskFacets
Perspective",InternationalJournal
ofHuman-ComputerStudies,59(4),
s:451-474.
FISHBEIN,M .,AJZEN,I .,1975,
Belief,Attitude,Intentionand
Behavior:AnIntroductionTo
TheoryandResearch,MA ,Addison-WesleyPub.Co.
GALLIVAN ,MichaelJ.,2001,
"OrganizationalAdoptionand
AssimilationofComplex
16 2
TechnologicalInnovations:
DevelopmentandApplicationofA
NewFramework",ACMSIGMIS
Database,32(3),s:51-85.
GERBER,M .,VO NSOLMS,R.,
2005,"ManagementofRiskInThe
InformationAge",Computers&
Security,24(1),s:16-30.
HUANG,E.,CHUANG,M.H.,
2004,"ExtendingTheTheoryof
PlannedBehaviourAsAModelTo
ExplainPost-MergerEmployee
BehaviourofIsUse",ComputersIn
HumanBehavior,23(1),s:240-257.
InternationalDataCorporation,
WorldwideI tSpending2007-2011
ForecastUpdate:November2007.
JAEGER,C.C.,RENN,O.,ROSA,
E.A.,WEHLER,T.,2001,Risk,
Certainty,andRationalAction,
Londra,Earthscan.
JARVENPAA ,S.L.,IVES,B.,1991,
"ExecutiveInvolvementand
ParticipationInTheManagementof
It",MISQuarterly,1 5(2),s:205-227.
KANKANHALLI ,A.,TEO,H .,
TAN ,B.C.Y.,WEI,K.,2003,"An
IntegrativeStudyofInformation
SystemsSecurityEffectiveness",
InternationalJournalofInformation
Management,23(2),s:139-154.
KNAPP,K.J.,MARSHALL,T.E.,
RAINER,R.K.Jr.,FORD,F.N.,
2005,"ManagerialDimensionsIn
InformationSecurity-ATheoretical
ModelofOrganizational
Effectiveness",AResearchReport
PreparedForThe(Isc)2
Constituency.
KOSKOSAS,I.V .,PAUL,R.J.,
2004,"TheInterrelationshipand
EffectofCultureandRisk
CommunicationInSettingInternet
BankingSecurityGoals",Icec'04,
SixthInternationalConferenceOn
ElectronicCommerce.
KUTSCH,E.,HALL ,M. ,2005,
"InterveningConditionsOnThe
ManagementofProjectRisk:Dealing
WithUncertaintyInInformation
TechnologyProjects",International
JournalofProjectManagement,23
(8),s:591-599
KWAK ,Y.H .,LAPLACE,K.S.,
2005,"ExaminingRiskToleranceIn
Project-DrivenOrganization",
Technovation,25(6),s:691-695.
LUFTMAN ,J.,MCLEAN,E.R.,
2004,"KeyIssuesForItExecutives",
MISQuarterlyExecutive,3(2),s:89-104.
PABLO,AmyL.,1997,"Reconciling
PredictionsofDecisionMaking
UnderRisk",JournalofManagerial
Psychology,1 2(1),s:4-20.
SCHLIENGER,T.,TEUFEL,S. ,
2003,"AnalyzingInformationSecurity
Culture:IncreasedTrustByAn
AppropriateInformationSecurity
Culture",ProceedingsofThe14th
InternationalWorkshopOn
DatabaseandExpertSystems
Applications.
SIEGRIST,Michael,2000,"The
InfluenceofTrustandPerceptionsof
RisksandBenefitsOnTheAcceptance
ofGeneTechnology",RiskAnalysis,
20(2),s:195-204.
STEWART,Andrew,2004,"OnRisk:
PerceptionandDirection",
Computers&Security,23(5),s:362-370.
TENEYUCA,David,2001,
"OrganizationalLeader'sUseofRisk
16 3
ManagementForInformation
Technology",InformationSecurity
TechnicalReport,6(3),s:54-59.
VA NDERHEIJDEN,H.,
VERHAGEN,T.,CREEMERS,M .,
2003,"UnderstandingOnline
PurchaseIntentions-Contributions
FromTechnologyandTrust
Perspectives",EuropeanJournalof
InformationSystems,1 2(1),s:41-48.
VENKATESH,V .,DAVIS,F.D.,
2000,"ATheoreticalExtensionofThe
TechnologyAcceptanceModel:Four
LongitudinalFieldStudies",
ManagementScience,46(2),s:186-204.
VENKATESH,V .,MORRIS,M.G.,
DAVIS,G.B.,DAVIS,F.D.,2003,
"UserAcceptanceofInformation
Technology:TowardAUnifiedView",
MISQuarterly,27(3),s:425-478.
VIJAYASARATHY,LeoR.,2004,
"PredictingConsumerİntentionsTo
UseOn-LineShopping:TheCaseFor
AnAugmentedTechnology
AcceptanceModel",Information&
Management,41(6),s:747-762.
VO NNEUMANN,J.,
MORGENSTERN,O.,1953,Theory
ofGamesandEconomicBehavior,
Abd,PrincetonUniversityPress,3rd
Ed.
VO NSOLMS,Basie,2005,
"InformationSecurityGovernance:
CobitOrIso17799OrBoth?",
Computers&Security,24(2),s:99-104.
WARD,P.,SMITH,C.L,2002,"The
DevelopmentofAccessControl
PoliciesForInformationTechnology
Systems",Computers&Security,21
(4),s:356-371.
WEBER,ElkeU. ,2001,"Personality
andRiskTaking",International
EncyclopediaofTheSocial&
BehavioralSciences,İngiltere,
ElsevierScienceLimited,s:11274-11276.
WILEMON,D.L.,CICERO,J.P.,
1970,"TheProjectManager—
AnomaliesandAmbiguities",The
AcademyofManagementJournal,
1 3(3),s:269-282.

Thank you for copying data from http://www.arastirmax.com