The determinants affecting on the investment proposals adoption
Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen vaikuttavat tekijät määritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekijöiden tunnistamisen ohella tutkimusmenetelmän vaikutus tuloksiin on käsitelty. Useita suosituksia ilmiön jatkotutkimukselle sekä tutkimusmenetelmän kehittämiselle on esitetty. Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical study approaches the underinvestment challenge through existing information technology and information system studies. Three main categories were recognized to affect on investment pro-posals adaption in a company context. However, the main contribution for these study is the discussion of the leveragability of the research method for examing the phenomenon from this specific perspective. Among the findings related to key determinants affecting on investment proposals, the impact of the research method for the findings are considered. Several suggestions for further research of investment studies and the development of the research method are discussed.
Keywords
Metadata
Show full item recordCollections
- Pro gradu -tutkielmat [29766]
License
Related items
Showing items with similar title or keywords.
-
Personal use of technology at work : a literature review and a theoretical model for understanding how it affects employee job performance
Jiang, Heming; Siponen, Mikko; Tsohou, Aggeliki (Taylor & Francis, 2023)Employee personal use of technology at work (PUTW)—defined as employees’ activities using organisational or personal IT resources for non-work-related purposes while at work—is increasingly common in organisations. Our ... -
Omission of Quality Software Development Practices : A Systematic Literature Review
Ghanbari, Hadi; Vartiainen, Tero; Siponen, Mikko (Association for Computing Machinery (ACM), 2018)Software deficiencies are minimized by utilizing recommended software development and quality assurance practices. However, these recommended practices (i.e., quality practices) become ineffective if software professionals ... -
Making the most of information technology & systems usage: A literature review, framework and future research agenda
Shaikh, Aijaz A.; Karjaluoto, Heikki (Pergamon, 2015)This detailed literature review has considered a relatively large quantity (152 total) of scholarly empirical publications, conference proceedings, books and popular market reports published over the last 15 years, i.e., ... -
Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process
Kohli, Rajiv; Sarker, Suprateek; Siponen, Mikko; Karjalainen, Mari (Association for Information Systems, 2022)Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how ... -
Is human the weakest link in information security? : systematic literature review
Jalkanen, Jaakko (2019)Tämä pro gradu -tutkielma tutkii ihmisen roolia tietoturvassa sekä esittää tunnetuimpia tietoturvaheikkouksia. Tutkielma on toteutettu systemaattisen kirjallisuuskatsauksen keinoin ja siinä etsitään vastausta ...