Full Length Research Paper
References
Baderi F (2014). Low Quality of Indonesian Human Resources - New Government Challenges. |
|
Albrechtsen E (2015). Major accident prevention and management of information systems security in technology-based work processes. Journal of Loss Prevention in the Process Industries 36:84-91. |
|
Anderson JM (2003). Why we need a new definition of information security. Computers and Security 22(4):308-313. |
|
Baldwin TT, Danielson C, Wiggenhorn W (1997). The evolution of learning strategies in organizations: From employee development to business redefinition. Academy of Management Perspectives 11(4):47-58. |
|
Baker WE, Sinkula JM (1999). Learning orientation, market orientation, and innovation: Integrating and extending models of organizational performance. Journal of Market-focused Management 4(4):295-308. |
|
Bartnes M, Moe NB, Heegaard PE (2016). The future of information security incident management training: A case study of electrical power companies. Computers and Security 61:32-45. |
|
Bodnar GH, Hopwood WS (2006). Accounting Information Systems, Tenth Edition. Upper Saddle River, New Jersey 07458: Pearson Education Inc. |
|
Bodnar GH, Hopwood WS (2010). Accounting Information System (10th edition). United State America: Pearson Education Inc. |
|
Boydell T, Leary M (1996). Identifying training needs (training essentials). London: CIPD. |
|
Chaston I, Badger B, Sadlerâ€Smith E (1999). Organisational learning: research issues and application in SME sector firms. International Journal of Entrepreneurial Behavior and Research 5(4):191-203. |
|
Cho V (2007). A study of the impact of organizational learning on information system effectiveness. International Journal of Business and Information 2(1):127-158. |
|
Christensen T, Lægreid P, Røvik KA (2007). Organization theory and the public sector: Instrument, culture and myth. Routledge. |
|
Cleveland J, Plastrik P (1995). Learning, learning organizations, and TQM. Total Quality Management--Implications for Higher Education", College and University Personnel Association, (Forthcoming 1994). |
|
Coghlan D, Rashford NS (2006). Organizational change and strategy: An interlevel dynamics approach. Routledge. |
|
Cox J (2012). Information systems user security: A structured model of the knowing-doing gap. Computers in Human Behavior 28(5):1849-1858. |
|
Curtis G, Cobham D (2008). Business information systems: Analysis, design and practice. Pearson Education. |
|
Davis CE (1996). Perceived security threats to today's accounting information systems: a survey of CISAs. IS Audit and Control Journal 3:38-41. |
|
Dhillon G, Backhouse J (2000) Information system security management in the new millennium. Journal Communications of the ACM 43(7):125-128. |
|
Dhillon G (1995) Interpreting the Management of Information Systems Security: Doctoral dissertation. London School of Economics and Political Science. |
|
Dhillon G, Torkzadeh G (2006). Valueâ€focused assessment of information system security in organizations. Information Systems Journal 16(3):293-314. |
|
EroÄŸlu Åž, Çakmak T (2016). Enterprise information systems within the context of information security: a risk assessment for a health organization in Turkey. Procedia Computer Science 100:979-986. |
|
Feng N, Wang HJ, Li M (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences 256:57-73. |
|
Garfinkel S (1995). PGP: Pretty Good Privacy: O'Reilly and Associates, Inc. |
|
Garvin DA (2000). Learning in Action: A Guide to Putting the Learning Organization to Work. Boston, Harvard Business School Press. |
|
Gephart MA, Marsick VJ (2016). Using Strategic Leverage Through Learning© to Address Organizational Challenges. In Strategic Organizational Learning. Springer, Berlin, Heidelberg. pp. 163-176. |
|
Hall JA (2011). Accounting Information Systems Seventh Edition: South Western Cengage Learning, a part of Cengage Learning USA |
|
Iï¬nedo P (2014). Information systems security policy compliance: An empirical study of the effects of socialization, influence, and cognition. Information and Management Journal 51:1. |
|
Yanuar RY (2015). Causes of Labor Productivity in Indonesia Low. Available at: |
|
Khandekar S (2005). Organizational learning in Indian organizations: a strategic HRM perspective. Journal of Small Business and Enterprise Development 12(2):211-226. |
|
Kim D, Solomon MG (2012). Fundamentals of information system security. Jones and Bartlett learning book and product are available through most bookstrores and online book sellers. |
|
Kofman F, Senge PM (1995). Communities of Commitment: The Heart of Learning Organizations, Learning Organizations Chawla S, Dan J (eds.), Renesh, Oregon Productivity Press. |
|
Kovacich GL (2016). The Information Systems Security officer's Guide: Butterworth-Heinemann. USA. |
|
Lachapelle E, Bislimi M (2013). ISO/IEC 27002. Information Technology Security Techniques Code Of Practice For Information Security Controls: International Standard ISO/IEC 27017. |
|
Laudon KC, Laudon JP (2012). Management Information Systems Managing the Digital Firm Twelfth edition. by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. |
|
Loch KD, Carr HH, Warkentin ME (1992). Threats to information systems: today's reality, yesterday's understanding. Mis Quarterly 1992:173-186. |
|
Marquardt MJ (2002). Building the Learning Organization. New York: McGraw-Hill Companies, Inc. |
|
Mattia A (2011). Utilizing a learning loop framework in IS security. International Journal of Business and Social Science 2:21. |
|
Rathore B (2004). Information Systems Security Assessment Framework (ISSAF). Open Information Systems Security Group. |
|
Schermerhorn JR, Hunt JG, Osborn RN, Uhl-Bien N (2010). Organizational Behavior (Elevent Edition). New York: John Wily and Sons. Available at: |
|
Schneider K, Knauss E, Houmb S, Islam S, Jürjens J (2012). Enhancing security requirements engineering by organizational learning. Requirements Engineering 17(1):35-56. |
|
Sekaran U, Bougie R (2016). Research methods for business: A skill building approach. John Wiley and Sons. |
|
Senge PM (1994). The fifth discipline: the art and practice of the learning organization, 2nd edn. Bantam Doubleday. |
|
Smith S, Jamieson R (2006). Determining key factors in e-government information system security. Information Systems Management 23(2):23-32. |
|
Spears JL, Barki H (2010). User participation in information systems security risk management. MIS Quarterly 34(3):503-522. |
|
Solic K, Ocevcic H, Golub M (2015). The information systems' security level assessment model based on an ontology and evidential reasoning approach. Computers and Security 55:100-112. |
|
Tan TC, Ruighaver AB, Ahmad A (2010). Information security governance: When compliance becomes more important than security. In: IFIP International Information Security Conference pp. 55-67. |
|
Todorov D (2007). Mechanics of user identification and authentication: Fundamentals of identity management. Auerbach Publications. |
|
Trcek D (2003). An integral framework for information systems security management. Journal Computers and Security 22(4):337-360. |
|
Warkentin M (2006). Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues: Managerial and Technical Issues. IGI Global. |
|
Wheelen TL, Hunger JD (1986). Strategic management and business policy. Addison-Wesley. |
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0