Abstract
In business today, awareness of risk is growing, and risk management is increasingly seen as a critical practical discipline (Teach 1997). Further, risk is being defined broadly to include anything that could have a significant negative effect on the business.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35505-4_33
Chapter PDF
Similar content being viewed by others
Keywords
- Risk Management
- Harvard Business Review
- Risk Control
- Enterprise Resource Planning
- Enterprise Resource Planning System
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bashein, B. J., Markus, M. L., and Finley, J. B. Safety Nets: Secrets of Effective Information Technology Controls. Morristown, NJ: Financial Executives Research Foundation, Inc., 1997.
Baskerville, R. “Information Systems Security Design Methods: Implications for Information Systems Development,” ACM Computing Surveys (25:4), 1993, pp. 375–414.
Block, P. Stewardship: Choosing Service Over Self-Interest. San Francisco: Berrett-Koehler Publishers, 1993.
Bulkeley, W. M. “A Cautionary Network Tale: Fox-Meyer’s High-Tech Gamble,” Wall Street Journal Interactive Edition, November 18, 1996.
Clemons, E. K. “Using Scenario Analysis to Manage the Strategic Risks of Reengineering,” Sloan Management Review (36:4), 1995, pp. 61–71.
Davis, G., and Olson, M. Management Information Systems: Conceptual Foundations, Structure and Development. New York: McGraw-Hill, 1985.
Dörner, D. The Logic of Failure: Recognizing and Avoiding Error in Complex Situations. Reading, MA: Addison-Wesley, 1989.
Handy, C. “Trust and the Virtual Organization,” Harvard Business Review (73: 3 ), 1995, pp. 40–50.
Keil, M. “Identifying and Preventing Runaway Systems Projects,” American Programmer (8: 3 ), 1995, pp. 16–22.
Lientz, B. P., and Swanson, E. B. Software Maintenance Management: A Study of the Maintenance of Computer Applications in 487 Data Processing Organizations. Reading, MA: Addison-Wesley, 1980.
Lyytinen, K., and Hirschheim, R. “Information Systems Failures: A Survey and Classification of the Empirical Literature,” in Oxford Surveys in Information Technology, P. I. Zorkoczy (ed.), 4. Oxford: Oxford University Press, 1987, pp. 257–309.
Markus, M. L., and Keil, M. “If We Build It They Will Come: Designing Information Systems That Users Want To Use,” Sloan Management Review, Summer, 1994, pp. 11–25.
Markus, M. L., and Tanis, C. “The Enterprise Systems Experience-From Adoption to Success,” in Framing the Domains of IT Research: Glimpsing the Future Through the Past, R. W. Zmud (ed.). Cincinnati, OH: Pinnaflex, 2000.
McFarlan, F. W. “Portfolio Approach to Information Systems,” Harvard Business Review (59:5), 1988, pp. 142–150.
Neumann, P. G. Computer Related Risks. New York: The ACM Press, 1995.
Nidumolu, S. “The Effect of Coordination Uncertainty on Software Project Performance: Residual Performance Risk as an Intervening Variable,” Information Systems Research (6: 3 ), 1995, pp. 191–219.
Orlikowski, W. J. “The Duality of Technology: Rethinking the Concept of Technology in Organizations,” Organization Science (3:3), 1992, pp. 398–427.
Orlikowski, W. J. “Improvising Organizational Transformation Over Time: A Situated Change Perspective,” Information Systems Research (7:1), 1996, pp. 63–92.
Pearson, C. M., and Mitroff, I. I. “From Crisis Prone to Crisis Prepared: A Framework for Crisis Management,” The Academy of Management Executive (7:1), 1993, pp. 48–59.
Perrow, C. Normal Accidents: Living With High-Risk Technologies. New York: Basic Books, 1984.
Sauer, C. Why Information Systems Fail: A Case Study Approach. London: McGraw-Hill, 1993.
Sia, S. K., and Neo, B. S. “Reengineering Effectiveness and the Redesign of Organizational Control: A Case Study of the Inland Revenue Authority of Singapore,” Journal of Management Information Systems (14: 1 ), 1997, pp. 69–92.
Simons, R. “Control in an Age of Empowerment,” Harvard Business Review (73: 2 ), 1995a, pp. 80–88.
Simons, R. Levers of Control: How Managers Use Innovative Control Systems to Drive Strategic Renewal. Boston: Harvard Business School Press, 1995b.
Sitkin, S. B., and Pablo, A. L. “Reconceptualizing the Determinants of Risk Behavior,” Academy of Management Review (17:1), 1992, pp. 9–3 8.
Sitkin, S. B., and Roth, N. L., “Explaining the Limited Effectiveness of Legalistic `Remedies’ for Trust/Distrust,” Organization Science (4: 3 ), 1993, pp. 367–392.
Smith, H. J. Managing Privacy: Information Technology and Corporate America. Chapel Hill, NC: The University of North Carolina Press, 1994.
Staw, B. M. “Organizational Escalation and Exit: Lessons From the Shoreham Nuclear Power Plant,” Academy of Management Journal (36:4), 1993, pp. 701–732.
Strassmann, P. A. The Business Value of Computers: An Executive’s Guide. New Cannan, CT: The Information Economics Press, 1990.
Straub, D. W., and Welke, R. J. “Coping with Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly (22: 4 ), 1998, pp. 441–469.
Straub, D. W., and Nance, W. D. “Discovering and Disciplining Computer Abuse in Organizations: A Field Study,” MIS Quarterly (14:1), 1990, pp. 45–60.
Teach, E. “Microsoft’s Universe of Risk,” CFO, March 1997, pp. 69–72.
Vitale, M. R. “The Growing Risks of Information Systems Success,” MIS Quarterly (10:4), 1986, pp. 327–334.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Markus, M.L. (2000). Toward an Integrated Theory of It-Related Risk Control. In: Baskerville, R., Stage, J., DeGross, J.I. (eds) Organizational and Social Perspectives on Information Technology. IFIP — The International Federation for Information Processing, vol 41. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35505-4_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-35505-4_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6107-8
Online ISBN: 978-0-387-35505-4
eBook Packages: Springer Book Archive