{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:41:36Z","timestamp":1651819296014},"reference-count":109,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>Information systems (IS) have become an integral part of many organizations as they depend on it to execute their critical business function. The purpose of this research was to explore the enablers and inhibitors of information systems disaster recovery planning in organizations in the Ghanaian banking sector. In order to achieve this purpose, the protection motivation theory and the theory of planned behavior was used as the theoretical lens for this study. Eight hypotheses were developed to test the research conceptualization. Data analysis was performed using SPSS version 20.0. Using a survey of 207 managers in the Ghanaian banking sector, this article shows the factors such as perceived vulnerability, perceived severity, response efficacy, self-efficacy, attitude, subjective norms and perceived behavioral control positively influences motivation and intention to develop an information systems disaster recovery plan in Ghanaian banking industries.<\/jats:p>","DOI":"10.4018\/ijsds.2018070107","type":"journal-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T14:43:36Z","timestamp":1529937816000},"page":"127-144","source":"Crossref","is-referenced-by-count":0,"title":["Factors Influencing the Development of Information Systems Disaster Recovery Plan in the Ghanaian Banking Industry"],"prefix":"10.4018","volume":"9","author":[{"given":"Frederick","family":"Pobee","sequence":"first","affiliation":[{"name":"Faculty of Business and Economics, University of P\u00e9cs, P\u00e9cs, Hungary"}]},{"given":"Daniel","family":"Opoku","sequence":"additional","affiliation":[{"name":"School of Business, Department of Human Resource, University of Education, Winneba, Ghana"}]}],"member":"2432","reference":[{"key":"IJSDS.2018070107-0","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"IJSDS.2018070107-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.07.001"},{"key":"IJSDS.2018070107-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.09.003"},{"key":"IJSDS.2018070107-3","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1070.0306"},{"key":"IJSDS.2018070107-4","doi-asserted-by":"publisher","DOI":"10.1080\/03610918.2015.1053925"},{"key":"IJSDS.2018070107-5","doi-asserted-by":"crossref","unstructured":"Azadegan, A., & Jayaram, A. (2017). Resiliency in Supply Chain Systems: A Triadic Framework Using Family Resilience Model. In Supply Chain Risk Management (pp. 269-288). Springer.","DOI":"10.1007\/978-981-10-4106-8_16"},{"key":"IJSDS.2018070107-6","doi-asserted-by":"publisher","DOI":"10.1007\/s13187-016-1004-7"},{"key":"IJSDS.2018070107-7","doi-asserted-by":"publisher","DOI":"10.1177\/0013916502250134"},{"key":"IJSDS.2018070107-8","author":"A.Bandura","year":"1997","journal-title":"Self-efficacy: The exercise of control"},{"key":"IJSDS.2018070107-9","first-page":"1","article-title":"Impact of Users\u2019 Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective.","volume":"33","author":"H.Bartlomiej","year":"2015","journal-title":"Information Systems Management"},{"key":"IJSDS.2018070107-10","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"IJSDS.2018070107-11","unstructured":"Castillo, J. (2009). Convenience sampling. Experiment Resources. Retrieved Feb 27, 2014 from http:\/\/www.experiment-resources.com\/convenience-sampling.html"},{"key":"IJSDS.2018070107-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.07.012"},{"key":"IJSDS.2018070107-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibusrev.2012.01.002"},{"key":"IJSDS.2018070107-14","doi-asserted-by":"publisher","DOI":"10.1108\/NFS-06-2017-0123"},{"key":"IJSDS.2018070107-15","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-017-3071-4"},{"key":"IJSDS.2018070107-16","author":"J.Cohen","year":"1983","journal-title":"Applied multiple regression\/correlation analysis for the behavioral sciences"},{"key":"IJSDS.2018070107-17","unstructured":"Creswell, J. W. (2009). Research design: Qualitative, Quantitative and Mixed Methods Approaches (3rd ed.). London: Sage Publication."},{"key":"IJSDS.2018070107-18","first-page":"1","author":"R.Crossler","year":"2017","journal-title":"The quest for complete security: An empirical analysis of users\u2019 multi-layered protection from security threats. In"},{"key":"IJSDS.2018070107-19","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1397193"},{"issue":"2","key":"IJSDS.2018070107-20","first-page":"38","article-title":"Beyond disaster recovery.","volume":"23","author":"G.Curtis","year":"2008","journal-title":"Directorship"},{"key":"IJSDS.2018070107-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002"},{"key":"IJSDS.2018070107-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2015.03.005"},{"key":"IJSDS.2018070107-23","first-page":"1","article-title":"Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model.","author":"Y.Dwivedi","year":"2017","journal-title":"Information Systems Frontiers"},{"key":"IJSDS.2018070107-24","article-title":"Summarizing Data","author":"A. P.Field","year":"2007","journal-title":"Complete Psychology"},{"issue":"2","key":"IJSDS.2018070107-25","first-page":"79","article-title":"From risk to resilience: Learning to deal with disruption.","volume":"56","author":"J.Fiksel","year":"2015","journal-title":"MIT Sloan Management Review"},{"issue":"3","key":"IJSDS.2018070107-26","first-page":"25","article-title":"Security still tops tech concerns.","volume":"22","author":"L.Gold","year":"2008","journal-title":"Accounting Today"},{"key":"IJSDS.2018070107-27","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0205"},{"key":"IJSDS.2018070107-28","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr2603_7"},{"key":"IJSDS.2018070107-29","author":"S. B.Green","year":"2005","journal-title":"Using SPSS for Windows and Macintosh: Analyzing and Understanding Data"},{"key":"IJSDS.2018070107-30","author":"H.Greene","year":"2000","journal-title":"Econometric Analysis"},{"issue":"4","key":"IJSDS.2018070107-31","first-page":"63","article-title":"A cost effective, safe, and simple method to provide a disaster recovery plan to small and medium businesses.","volume":"8","author":"D.Guster","year":"2008","journal-title":"Review of Business Research"},{"key":"IJSDS.2018070107-32","first-page":"731","article-title":"Self-efficacy and pro-environmental intentions: The case of commuting-mode choice.","volume":"39","author":"C.Gwaltney","year":"2009","journal-title":"Environment and Behavior"},{"key":"IJSDS.2018070107-33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1999.tb00123.x"},{"key":"IJSDS.2018070107-34","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"IJSDS.2018070107-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.09.001"},{"key":"IJSDS.2018070107-36","first-page":"183","article-title":"Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.","volume":"3","author":"P.Ifinedo","year":"2012","journal-title":"Computers & Security"},{"issue":"1","key":"IJSDS.2018070107-37","first-page":"31","article-title":"The association of perceived disaster recovery plan strength with organisational characteristics.","volume":"12","author":"D.Ivancevich","year":"2001","journal-title":"Journal of Information Systems"},{"key":"IJSDS.2018070107-38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.003"},{"key":"IJSDS.2018070107-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.10.022"},{"key":"IJSDS.2018070107-40","doi-asserted-by":"crossref","unstructured":"Johnston, A. & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566.","DOI":"10.2307\/25750691"},{"key":"IJSDS.2018070107-41","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"IJSDS.2018070107-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.08.007"},{"issue":"2","key":"IJSDS.2018070107-43","first-page":"1","article-title":"Identifying users\u2019 behavior on purchasing virtual items.","volume":"2","author":"E. R.Kaburuan","year":"2011","journal-title":"Res. World"},{"key":"IJSDS.2018070107-44","doi-asserted-by":"publisher","DOI":"10.1108\/03074800910941365"},{"key":"IJSDS.2018070107-45","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.009"},{"key":"IJSDS.2018070107-46","doi-asserted-by":"publisher","DOI":"10.2307\/20650325"},{"key":"IJSDS.2018070107-47","author":"R. B.Kline","year":"2005","journal-title":"Principles and practice of structural equation modeling"},{"key":"IJSDS.2018070107-48","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1110.0707"},{"key":"IJSDS.2018070107-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.10.002"},{"key":"IJSDS.2018070107-50","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.4"},{"key":"IJSDS.2018070107-51","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.4"},{"key":"IJSDS.2018070107-52","doi-asserted-by":"publisher","DOI":"10.1108\/14684520911001873"},{"key":"IJSDS.2018070107-53","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781318"},{"key":"IJSDS.2018070107-54","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.086"},{"key":"IJSDS.2018070107-55","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.02.007"},{"key":"IJSDS.2018070107-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.07.009"},{"key":"IJSDS.2018070107-57","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"IJSDS.2018070107-58","author":"A. M.Levitt","year":"1997","journal-title":"Disaster Planning and Recovery: A Guide for Facility Professionals"},{"key":"IJSDS.2018070107-59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2017.11.017"},{"key":"IJSDS.2018070107-60","doi-asserted-by":"publisher","DOI":"10.1080\/10810730701266299"},{"key":"IJSDS.2018070107-61","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"IJSDS.2018070107-62","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-016-0785-2"},{"key":"IJSDS.2018070107-63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2009.10.004"},{"key":"IJSDS.2018070107-64","author":"P.Miller","year":"2010","journal-title":"The Smart Swarm: How Understanding Flocks, Schools, and Colonies Can Make Us Better at Communicating, Decision Making, and Getting Things Done"},{"key":"IJSDS.2018070107-65","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.2007.tb00272.x"},{"key":"IJSDS.2018070107-66","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208668"},{"key":"IJSDS.2018070107-67","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23699"},{"key":"IJSDS.2018070107-68","author":"J. C.Nunnally","year":"1994","journal-title":"Psychometric theory"},{"key":"IJSDS.2018070107-69","first-page":"156).","article-title":"Employee\u2019s behavior towards IS security policy compliance.","author":"S.Pahnila","year":"2007","journal-title":"Proceedings of the 40th Hawaii international conference on system sciences"},{"key":"IJSDS.2018070107-70","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.67.2.1.18607"},{"key":"IJSDS.2018070107-71","doi-asserted-by":"publisher","DOI":"10.1080\/08870449508401959"},{"key":"IJSDS.2018070107-72","doi-asserted-by":"publisher","DOI":"10.1080\/08870449808407300"},{"key":"IJSDS.2018070107-73","doi-asserted-by":"publisher","DOI":"10.1080\/13548500120101586"},{"key":"IJSDS.2018070107-74","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2009.01.001"},{"key":"IJSDS.2018070107-75","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"IJSDS.2018070107-76","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2013.03.001"},{"key":"IJSDS.2018070107-77","unstructured":"Rice, D. (2012). 2011 was costliest year in world disasters. USA Today. Retrieved from http:\/\/www.usatoday.com\/weather\/news\/extremes\/story\/2012-01-04\/world-disasters-costliestearthquake tsunami\/52377642\/1"},{"key":"IJSDS.2018070107-78","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.3.596"},{"key":"IJSDS.2018070107-79","doi-asserted-by":"publisher","DOI":"10.4236\/iim.2015.74017"},{"key":"IJSDS.2018070107-80","author":"E. M.Rogers","year":"2003","journal-title":"Diffusion of Innovations"},{"issue":"4","key":"IJSDS.2018070107-81","first-page":"35","article-title":"Be prepared for IT disasters.","volume":"32","author":"P.Saccomanno","year":"2008","journal-title":"Canadian Consulting Engineer"},{"key":"IJSDS.2018070107-82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.006"},{"key":"IJSDS.2018070107-83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.012"},{"key":"IJSDS.2018070107-84","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.09.055"},{"key":"IJSDS.2018070107-85","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2011.04.001"},{"key":"IJSDS.2018070107-86","author":"K.Schwalbe","year":"2010","journal-title":"Information Technology Project Management"},{"key":"IJSDS.2018070107-87","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.306"},{"key":"IJSDS.2018070107-88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2017.10.011"},{"key":"IJSDS.2018070107-89","doi-asserted-by":"crossref","unstructured":"Shropshire, J., Warkentin, M. & Sharma, S. (2015). Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Computer Security, 49:1 77\u201391.","DOI":"10.1016\/j.cose.2015.01.002"},{"key":"IJSDS.2018070107-90","unstructured":"Sieglar, K., & Gaughan, B. (2008). A practical approach to Green IT. Webinar, Retrieved August 18, 2017 from http:\/\/www.itmanagement.com\/land\/green-it-webinar\/?tfso=2058"},{"key":"IJSDS.2018070107-91","doi-asserted-by":"crossref","unstructured":"Smith, G., Martin, A., & Wenger, D. E. (2018) Disaster Recovery in an Era of Climate Change: The Unrealized Promise of Institutional Resilience. In Handbook of Disaster Research (pp. 595-619).","DOI":"10.1007\/978-3-319-63254-4_28"},{"key":"IJSDS.2018070107-92","doi-asserted-by":"publisher","DOI":"10.1207\/s15324834basp0702_2"},{"key":"IJSDS.2018070107-93","author":"B. G.Tabachnick","year":"2001","journal-title":"Using Multivariate Statistics"},{"key":"IJSDS.2018070107-94","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00247-7"},{"key":"IJSDS.2018070107-95","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.144"},{"key":"IJSDS.2018070107-96","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"IJSDS.2018070107-97","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"issue":"1","key":"IJSDS.2018070107-98","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance & use of information Technology: Extending the unified theory of acceptance & use of technology.","volume":"36","author":"V.Venkatesh","year":"2012","journal-title":"Management Information Systems Quarterly"},{"key":"IJSDS.2018070107-99","doi-asserted-by":"publisher","DOI":"10.1177\/0013916506294594"},{"key":"IJSDS.2018070107-100","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00424"},{"key":"IJSDS.2018070107-101","doi-asserted-by":"crossref","unstructured":"Willison, R., Warkentin, M. & Johnston, A. (2018). Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28, 266\u2013293.","DOI":"10.1111\/isj.12129"},{"key":"IJSDS.2018070107-102","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"IJSDS.2018070107-103","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.6.5.453"},{"key":"IJSDS.2018070107-104","doi-asserted-by":"publisher","DOI":"10.12973\/eurasia.2017.00951a"},{"key":"IJSDS.2018070107-105","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9594-x"},{"key":"IJSDS.2018070107-106","first-page":"1","article-title":"A method to measure and test the damage of multicollinearity to parameter estimation.","volume":"2","author":"G.Yong-wei","year":"2008","journal-title":"Science of Surveying and Mapping"},{"key":"IJSDS.2018070107-107","doi-asserted-by":"publisher","DOI":"10.2307\/20721425"},{"key":"IJSDS.2018070107-108","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2015.09.005"}],"container-title":["International Journal of Strategic Decision Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=208683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:11:48Z","timestamp":1651817508000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSDS.2018070107"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":109,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijsds.2018070107","relation":{},"ISSN":["1947-8569","1947-8577"],"issn-type":[{"value":"1947-8569","type":"print"},{"value":"1947-8577","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}