Access the full text.
Sign up today, get DeepDyve free for 14 days.
Kenneth Knapp, T. Marshall, R. Rainer, F. Ford (2006)
Information security: management's effect on culture and policyInf. Manag. Comput. Secur., 14
W. Baker, Linda Wallace (2007)
Is Information Security Under Control?: Investigating Quality in Information Security ManagementIEEE Security & Privacy, 5
Kwo-Shing Hong, Y. Chi, L. Chao, Jih-Hsing Tang (2006)
An empirical study of information security policy on information security elevation in TaiwanInf. Manag. Comput. Secur., 14
D. Straub, R. Welke (1998)
Coping With Systems Risk: Security Planning Models for Management Decision MakingMIS Q., 22
Allen Johnston, Ronald Hale (2009)
Improved security through information security governanceCommun. ACM, 52
Mark Chan, Irene Woon, A. Kankanhalli (2005)
Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant BehaviorJournal of Information Privacy and Security, 1
M. Whitman (2004)
In defense of the realm: understanding the threats to information securityInt. J. Inf. Manag., 24
C. Vroom, R. Solms (2004)
Towards information security behavioural complianceComput. Secur., 23
Kongkiti Phusavat, P. Anussornnitisarn (2008)
Implications from divide issues on the Royal Thai Government's e-learning programmeElectron. Gov. an Int. J., 5
J. D'Arcy, A. Hovav (2007)
Deterring internal information systems misuseCommun. ACM, 50
Susan Haugen (2005)
E-government, cyber-crime and cyber-terrorism: a population at riskElectron. Gov. an Int. J., 2
A. Arora, Dennis Hall, C. Pinto, Dwayne Ramsey, Rahul Telang (2004)
Measuring the risk-based value of IT security solutionsIT Professional, 6
M. Johnson, E. Goetz (2007)
Embedding Information Security into the OrganizationIEEE Security & Privacy, 5
E. Loukis, D. Spinellis (2001)
Information systems security in the Greek public sectorInf. Manag. Comput. Secur., 9
S. Chang, C. Ho (2006)
Organizational factors to the effectiveness of implementing information security managementInd. Manag. Data Syst., 106
Saggi Nevo, Henry Kim (2006)
How to compare and analyse risks of internet voting versus other modes of votingElectron. Gov. an Int. J., 3
G. Mentzas, Kostas Kafentzis, Panos Georgolios (2007)
Knowledge services on the semantic webCommun. ACM, 50
J. Ryoo, T. Oh, Seungjae Shin, Young Choi (2009)
A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systemsElectron. Gov. an Int. J., 6
C. Foltz (2004)
Cyberterrorism, computer crime, and realityInf. Manag. Comput. Secur., 12
M. Biehl (2007)
Success factors for implementing global information systemsCommunications of the ACM, 50
Andrew Kotulic, J. Clark (2004)
Why there aren't more information security research studiesInf. Manag., 41
A. Ghapanchi, A. Albadvi, B. Zarei (2008)
A framework for e-government planning and implementationElectron. Gov. an Int. J., 5
A. Kankanhalli, H. Teo, B. Tan, K. Wei (2003)
An integrative study of information systems security effectivenessInt. J. Inf. Manag., 23
Qingxiong Ma, Allen Johnston, J. Pearson (2008)
Information security management objectives and practices: a parsimonious frameworkInf. Manag. Comput. Secur., 16
M. Siponen (2000)
A conceptual foundation for organizational information security awarenessInf. Manag. Comput. Secur., 8
H. Rainey, Barry Bozeman (2000)
Comparing Public and Private Organizations: Empirical Research and the Power of the A PrioriJournal of Public Administration Research and Theory, 10
Dionysis Kefallinos, M. Lambrou, E. Sykas (2006)
Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI caseElectron. Gov. an Int. J., 3
S. Chang, Chin-Shien Lin (2007)
Exploring organizational culture for information security managementInd. Manag. Data Syst., 107
G. Garson (2006)
Public Information Technology and E-Governance: Managing the Virtual State
M. Sumner (2009)
Information Security Threats: A Comparative Analysis of Impact, Probability, and PreparednessInformation Systems Management, 26
Information security has been consistently rated as one of the most important management challenges that public sector organisations face. However, information security is perhaps the most understudied area of public sector information systems. This article examines the relationship between management support for information security and some of the most important issues faced in information security. This research conducted a survey of information resource managers in Texas state agencies in the USA, to examine the issue of management support for information security. Management support for information security was evident in five of six noted factors in the information security literature. Management support is a critical success factor for information security adoption, and public sector organisations should work on strategies to inform management of its importance.
Electronic Government, an International Journal – Inderscience Publishers
Published: Jan 1, 2009
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.