African Journal of
Business Management

  • Abbreviation: Afr. J. Bus. Manage.
  • Language: English
  • ISSN: 1993-8233
  • DOI: 10.5897/AJBM
  • Start Year: 2007
  • Published Articles: 4194

Full Length Research Paper

The effects of organizational learning on the security of banking’s information system in Indonesia

Said Herry Safrizal
  • Said Herry Safrizal
  • Politeknnik Negeri Lhokseumawe, Indonesia.
  • Google Scholar
Marjulin
  • Marjulin
  • Politeknnik Negeri Lhokseumawe, Indonesia.
  • Google Scholar


  •  Received: 14 November 2019
  •  Accepted: 17 January 2020
  •  Published: 30 November 2020

References

Baderi F (2014). Low Quality of Indonesian Human Resources - New Government Challenges. 

View

 

Albrechtsen E (2015). Major accident prevention and management of information systems security in technology-based work processes. Journal of Loss Prevention in the Process Industries 36:84-91.
Crossref

 
 

Anderson JM (2003). Why we need a new definition of information security. Computers and Security 22(4):308-313.
Crossref

 
 

Baldwin TT, Danielson C, Wiggenhorn W (1997). The evolution of learning strategies in organizations: From employee development to business redefinition. Academy of Management Perspectives 11(4):47-58.
Crossref

 
 

Baker WE, Sinkula JM (1999). Learning orientation, market orientation, and innovation: Integrating and extending models of organizational performance. Journal of Market-focused Management 4(4):295-308.
Crossref

 
 

Bartnes M, Moe NB, Heegaard PE (2016). The future of information security incident management training: A case study of electrical power companies. Computers and Security 61:32-45.
Crossref

 
 

Bodnar GH, Hopwood WS (2006). Accounting Information Systems, Tenth Edition. Upper Saddle River, New Jersey 07458: Pearson Education Inc.

 
 

Bodnar GH, Hopwood WS (2010). Accounting Information System (10th edition). United State America: Pearson Education Inc.

 
 

Boydell T, Leary M (1996). Identifying training needs (training essentials). London: CIPD.

 
 

Chaston I, Badger B, Sadler‐Smith E (1999). Organisational learning: research issues and application in SME sector firms. International Journal of Entrepreneurial Behavior and Research 5(4):191-203.
Crossref

 
 

Cho V (2007). A study of the impact of organizational learning on information system effectiveness. International Journal of Business and Information 2(1):127-158.

 
 

Christensen T, Lægreid P, Røvik KA (2007). Organization theory and the public sector: Instrument, culture and myth. Routledge.

 
 

Cleveland J, Plastrik P (1995). Learning, learning organizations, and TQM. Total Quality Management--Implications for Higher Education", College and University Personnel Association, (Forthcoming 1994).

 
 

Coghlan D, Rashford NS (2006). Organizational change and strategy: An interlevel dynamics approach. Routledge.
Crossref

 
 

Cox J (2012). Information systems user security: A structured model of the knowing-doing gap. Computers in Human Behavior 28(5):1849-1858.
Crossref

 
 

Curtis G, Cobham D (2008). Business information systems: Analysis, design and practice. Pearson Education.

 
 

Davis CE (1996). Perceived security threats to today's accounting information systems: a survey of CISAs. IS Audit and Control Journal 3:38-41.

 
 

Dhillon G, Backhouse J (2000) Information system security management in the new millennium. Journal Communications of the ACM 43(7):125-128.
Crossref

 
 

Dhillon G (1995) Interpreting the Management of Information Systems Security: Doctoral dissertation. London School of Economics and Political Science.

 
 

Dhillon G, Torkzadeh G (2006). Value‐focused assessment of information system security in organizations. Information Systems Journal 16(3):293-314.
Crossref

 
 

EroÄŸlu Åž, Çakmak T (2016). Enterprise information systems within the context of information security: a risk assessment for a health organization in Turkey. Procedia Computer Science 100:979-986.
Crossref

 
 

Feng N, Wang HJ, Li M (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences 256:57-73.
Crossref

 
 

Garfinkel S (1995). PGP: Pretty Good Privacy: O'Reilly and Associates, Inc.

 
 

Garvin DA (2000). Learning in Action: A Guide to Putting the Learning Organization to Work. Boston, Harvard Business School Press.

 
 

Gephart MA, Marsick VJ (2016). Using Strategic Leverage Through Learning© to Address Organizational Challenges. In Strategic Organizational Learning. Springer, Berlin, Heidelberg. pp. 163-176.
Crossref

 
 

Hall JA (2011). Accounting Information Systems Seventh Edition: South Western Cengage Learning, a part of Cengage Learning USA

 
 

Ifinedo P (2014). Information systems security policy compliance: An empirical study of the effects of socialization, influence, and cognition. Information and Management Journal 51:1.
Crossref

 
 

Yanuar RY (2015). Causes of Labor Productivity in Indonesia Low. Available at: 

View

 
 

Khandekar S (2005). Organizational learning in Indian organizations: a strategic HRM perspective. Journal of Small Business and Enterprise Development 12(2):211-226.
Crossref

 
 

Kim D, Solomon MG (2012). Fundamentals of information system security. Jones and Bartlett learning book and product are available through most bookstrores and online book sellers.

 
 

Kofman F, Senge PM (1995). Communities of Commitment: The Heart of Learning Organizations, Learning Organizations Chawla S, Dan J (eds.), Renesh, Oregon Productivity Press.

 
 

Kovacich GL (2016). The Information Systems Security officer's Guide: Butterworth-Heinemann. USA.

 
 

Lachapelle E, Bislimi M (2013). ISO/IEC 27002. Information Technology Security Techniques Code Of Practice For Information Security Controls: International Standard ISO/IEC 27017.

 
 

Laudon KC, Laudon JP (2012). Management Information Systems Managing the Digital Firm Twelfth edition. by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458.

 
 

Loch KD, Carr HH, Warkentin ME (1992). Threats to information systems: today's reality, yesterday's understanding. Mis Quarterly 1992:173-186.
Crossref

 
 

Marquardt MJ (2002). Building the Learning Organization. New York: McGraw-Hill Companies, Inc.

 
 

Mattia A (2011). Utilizing a learning loop framework in IS security. International Journal of Business and Social Science 2:21.

 
 

Rathore B (2004). Information Systems Security Assessment Framework (ISSAF). Open Information Systems Security Group.

 
 

Schermerhorn JR, Hunt JG, Osborn RN, Uhl-Bien N (2010). Organizational Behavior (Elevent Edition). New York: John Wily and Sons. Available at: 

View

 
 

Schneider K, Knauss E, Houmb S, Islam S, Jürjens J (2012). Enhancing security requirements engineering by organizational learning. Requirements Engineering 17(1):35-56.
Crossref

 
 

Sekaran U, Bougie R (2016). Research methods for business: A skill building approach. John Wiley and Sons.

 
 

Senge PM (1994). The fifth discipline: the art and practice of the learning organization, 2nd edn. Bantam Doubleday.

 
 

Smith S, Jamieson R (2006). Determining key factors in e-government information system security. Information Systems Management 23(2):23-32.
Crossref

 
 

Spears JL, Barki H (2010). User participation in information systems security risk management. MIS Quarterly 34(3):503-522.
Crossref

 
 

Solic K, Ocevcic H, Golub M (2015). The information systems' security level assessment model based on an ontology and evidential reasoning approach. Computers and Security 55:100-112.
Crossref

 
 

Tan TC, Ruighaver AB, Ahmad A (2010). Information security governance: When compliance becomes more important than security. In: IFIP International Information Security Conference pp. 55-67.
Crossref

 
 

Todorov D (2007). Mechanics of user identification and authentication: Fundamentals of identity management. Auerbach Publications.
Crossref

 
 

Trcek D (2003). An integral framework for information systems security management. Journal Computers and Security 22(4):337-360.
Crossref

 
 

Warkentin M (2006). Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues: Managerial and Technical Issues. IGI Global.
Crossref

 
 

Wheelen TL, Hunger JD (1986). Strategic management and business policy. Addison-Wesley.