evaluation approach. Journal of American Academy of
Business, 2(1), 141-149.
Backhouse, J., Hsu, C. W., & Silva, L. 2006. Circuits of
power in creating de jure standards: Shaping an
international information systems security standard.
MIS Quarterly, 30(Special Issue), 413-438.
Barlette, Y., & Fomin, V. V. (2008, 7-10 January).
Exploring the suitability of IS security management
standards for SMEs. Paper presented at the 41st
Hawaii International Conference on System Sciences
(HICSS), Los Alamitos, Hawaii.
Björk, F. (2004). Institutional theory: A new perspective
for research into IS/IT security in organisations. Paper
presented at the 37th Hawaii International Conference
on System Sciences (HICSS), Big Island, Hawaii.
Bodas Freitas, I. M., & Iizuka, M. 2012. Openness to
international markets and the diffusion of standards
compliance in Latin America: A multi level analysis.
Research Policy, 41(1), 201-215.
Brooks, W. J., Warren, M. J., & Hutchinson, W. 2002. A
security evaluation criteria. Logistics Information
Management, 15(5/6), 377-384.
Caceres, G. H. R., & Teshigawara, Y. 2010. Security
guideline tool for home users based on international
standards. Information Management & Computer
Security, 18(2), 101-123.
Chang, E. S., Jain, A. K., Slade, D. M., & Tsao, S. L.
1999. Managing cyber security vulnerabilities in large
networks. Bell Labs Technical Journal, 4(4), 252-272.
Cousins, K. C., & Robey, D. 2005. The social shaping of
electroninc metals exchanges: An institutional theory
perspective. Information Technology & People, 18(3),
212-229.
DiMaggio, P. J., & Powell, W. W. 1983. The iron cage re-
visited: Institutional isomorphism and collective
rationality in organizational fields. American
Sociological Review, 48(2), 147-160.
Disterer, G. 2013. ISO/IEC 27000, 27001 and 27002 for
Information Security Management. Journal of
Information Security, 4(2), 92-100.
Enrione, A., Mazza, C., & Zerboni, F. 2006.
Institutionalizing codes of governance. American
Behavioral Scientist, 49(7), 961-973.
Fomin, V. V., de Vries, H. J., & Barlette, Y. (2008,
September 17-19). ISO/IEC 27001 information
systems security management standard: Exploring the
reasons for low adoption. Paper presented at the third
European Conference on Management of Technology
(EUROMOT), Nice, France.
Franceschini, F., Galetto, M., & Cecconi, P. 2006. A
worldwide analysis of ISO 9000 standard diffusion.
Considerations and future development.
Benchmarking: An International Journal, 13(4), 523-
541.
Franceschini, F., Galetto, M., & Gianni, G. 2004. A new
forecasting model for the diffusion of ISO 9000
standard certifications in European countries.
International Journal of Quality & Reliability
Management, 21(1), 32-50.
Gillies, A. 2011. Improving the quality of information
security management systems with ISO27000. TQM
Journal, 23(4), 367-376.
Greenwood, R., Suddaby, R., & Hinings, C. R. 2002.
Theorizing change: The role of professional
associations in the transformation of institutionalized
fields. Academy of Management Journal, 45(1), 58-80.
Heras-Saizarbitoria, I., & Boiral, O. 2013. Symbolic
adoption of ISO 9000 in small and medium-sized
enterprises: The role of internal contingencies.
International Small Business Journal, (Forthcoming),
1-22.
Hone, K., & Eloff, J. H. P. 2002. Information security
policy - What do international information security
standards say? Computers & Security, 21(5), 402-409.
Hu, Q., Xu, Z., Dinev, T., & Ling, H. 2011. Does
Deterrence Work in Reducing Information Security
Policy Abuse by Employees? Communications of the
ACM, 54(6), 54-60.
Lawrence, T. B., Winn, M. I., & Jennings, P. D. 2001. The
temporal dynamics of institutionalization. The
Academy of Management Review, 26(4), 624-644.
Marimon, F., Casadesús, M., & Heras, I. 2010.
Certification intensity level of the leading nations in
ISO 9000 and ISO 14000 standards. International
Journal of Quality & Reliability Management, 27(9),
1002-1020.
Marimon, F., Llach, J., & Bernardo, M. 2011.
Comparative analysis of diffusion of the ISO 14001
standard by sector of activity. Journal of Cleaner
Production, 19(15), 1734-1744.
Orlowski, S. 1997. Government initiatives in information
technology security. Information Management &
Computer Security, 5(3), 111-118.
Pekovic, S. 2010. The determinants of ISO 9000
certification: A comparison of the manufacturing and
service sectors. Journal of Economics Issues, XLIV(4),
895-914.
Poore, R. S. 1999. Generally accepted system security
principles. Information Systems Security, Fall, 27-77.
PwC. (2013). Key findings from the 2013 US state of
cybercrime survey Retrieved from
https://www.pwc.com/en_US/us/increasing-it-
effectiveness/publications/assets/us-state-of-
cybercrime.pdf.
Sarker, S., & Lee, A. S. 2002. Using a positivist case
research methodology to test three competing theories-
in-use of business process redesign. Journal of the
Association for Information Systems, 2(Article 7), 1-
72.
Scott, W. R. 1987. The adolescence of institutional theory.
Administrative Science Quarterly, 32(4), 493-511.
Singleton, T. (2013). The top 5 cybercrimes. Retrieved
from http://www.aicpa.org/interestareas/forensicand
valuation/resources/electronicdataanalysis/downloadab
ledocuments/top-5-cybercrimes.pdf.
Siponen, M. 2006a. Information security standards focus
on the existence of process, not its content.
Communications of the ACM, 49(8), 97-100.
UnderstandingInformationTechnologySecurityStandardsDiffusion-AnInstitutionalPerspective
15