The determinants affecting on the investment proposals adoption
Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen vaikuttavat tekijät määritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekijöiden tunnistamisen ohella tutkimusmenetelmän vaikutus tuloksiin on käsitelty. Useita suosituksia ilmiön jatkotutkimukselle sekä tutkimusmenetelmän kehittämiselle on esitetty. Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical study approaches the underinvestment challenge through existing information technology and information system studies. Three main categories were recognized to affect on investment pro-posals adaption in a company context. However, the main contribution for these study is the discussion of the leveragability of the research method for examing the phenomenon from this specific perspective. Among the findings related to key determinants affecting on investment proposals, the impact of the research method for the findings are considered. Several suggestions for further research of investment studies and the development of the research method are discussed.
Keywords
Metadata
Show full item recordCollections
- Pro gradu -tutkielmat [29740]
License
Related items
Showing items with similar title or keywords.
-
Personal use of technology at work : a literature review and a theoretical model for understanding how it affects employee job performance
Jiang, Heming; Siponen, Mikko; Tsohou, Aggeliki (Taylor & Francis, 2023)Employee personal use of technology at work (PUTW)—defined as employees’ activities using organisational or personal IT resources for non-work-related purposes while at work—is increasingly common in organisations. Our ... -
Omission of Quality Software Development Practices : A Systematic Literature Review
Ghanbari, Hadi; Vartiainen, Tero; Siponen, Mikko (Association for Computing Machinery (ACM), 2018)Software deficiencies are minimized by utilizing recommended software development and quality assurance practices. However, these recommended practices (i.e., quality practices) become ineffective if software professionals ... -
Dual Information Systems : A Review Of Factors Affecting Their Use
Köse, Dicle Berfin; Hamari, Juho (Association for Information Systems, 2019)More and more information systems (IS) are designed to address a blend of hedonic and utilitarian purposes, and hence become what information system scholars call today “dual systems.” The aim of this research is chiefly ... -
Making the most of information technology & systems usage: A literature review, framework and future research agenda
Shaikh, Aijaz A.; Karjaluoto, Heikki (Pergamon, 2015)This detailed literature review has considered a relatively large quantity (152 total) of scholarly empirical publications, conference proceedings, books and popular market reports published over the last 15 years, i.e., ... -
Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future
Haag, Steffi; Siponen, Mikko; Liu, Fufan (ACM, 2021)Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison ...