DOI QR코드

DOI QR Code

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry

  • Kong, Heekyung (Department of Information & Communication Engineering, Chungbuk National University) ;
  • Jung, Suhyun (HR Development, Chungbuk Regional HR Development Council) ;
  • Lee, Insung (Department of Information Communication Engineering, Chungbuk National University) ;
  • Yeon, Seung-Jun (Future Research Creative Laboratory, ETRI)
  • Received : 2014.09.22
  • Accepted : 2014.11.04
  • Published : 2015.04.01

Abstract

This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.

Keywords

References

  1. K. Kim "[Proper Knowledge of the ICT Act] The Crisis of Electronic Financial Transactions: Phishing, Pharming, and Smishing." Accessed Mar. 16, 2013. http://www.ddaily.co.kr/news/news_view.php?uid=102313
  2. D.B. Parke, "The Strategic Values of Information Security in Business," Comput. Security, vol. 16, no. 7, 1997, pp. 572-582. https://doi.org/10.1016/S0167-4048(97)80793-6
  3. J.D. Kim and J.E. Park, "A Study on ROSI of TCO-Based Information Protection," Collection Papers Digit. Policy Soc. Inauguration Symp., Seoul, Rep. of Korea, Dec. 12, 2003, pp. 251-261.
  4. C.C. Wood, "Part of the Foundation for Secure Systems: Separation of Duties Policy," Inf. Manag. Comput. Security, vol. 5, no. 1, 1997, pp. 18-19. https://doi.org/10.1108/09685229710167999
  5. H. Kong, T.S. Kim, and J.D. Kim, "An Analysis on Effects of Information Security Investments: A BSC Perspective," J. Intell. Manuf., vol. 23, no. 4, Aug. 2012, pp. 941-953. https://doi.org/10.1007/s10845-010-0402-7
  6. G.L. Urban, F. Sultan, and W.J. Qualls, "Placing Trust at the Center of Your Internet Strategy," Sloan Manag. Rev., vol. 42, no. 1, 2000, pp. 39-48.
  7. S. Jeong, "A Study on the Effect of Organizational Support and Service Activities on Corporate Performance in the Securities Industry," Service Manag. Soc. J., vol. 13, no. 3, 2012, pp. 275-292.
  8. F. Herzberg, B. Mauner, and B.B. Snyderman, "The Motivation to Work," New York, NY, USA: John Wiley & Sons, 1959.
  9. F. Herzberg, "Work and the Nature of Man," New York, NY, USA: World Publishing Co., 1966.
  10. T.M. Amabile et al, "The Work Preference Inventory: Assessing Intrinsic and Extrinsic Motivational Orientations," J. Pers. Soc. Psychology, vol. 66, no. 5, 1994, pp. 950-967. https://doi.org/10.1037/0022-3514.66.5.950
  11. M. Tampoe, "Motivating Knowledge Workers - the Challenge for the 1990s," Long Range Planning, vol. 26, no. 3, June 1993, pp. 49-55. https://doi.org/10.1016/0024-6301(93)90006-2
  12. C. Janssen, "IT Infrastructure," Techopedia TM, Janalta Interactive Inc. Accessed Aug. 14, 2013. http://www.techopedia.com/definition/29199/it-infrastructure
  13. D.J. Bowersox and P.J. Daugherty, "Logistics Paradigms: The Impact of Information Technology," J. Business Logistics, vol. 16, no. 1, 1995, pp. 65-80.
  14. R.P. Derocher and J. Kilpatrick, "Six Supply Chain Lessons for the Millennium," Supply Chain Manag. Rev., vol. 3, no. 4, 2000, pp. 34-40.
  15. J.Y. Son, S. Narasimhan, and F.J. Riggins, "Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship," J. Manag. Inf. Syst., vol. 22, no. 1, 2005, pp. 321-353.
  16. R. Patnayakuni, A. Rai, and N. Seth, "Relational Antecedents of Information Flow Integration for Supply Chain Coordination," J. Manag. Inf. Syst., vol. 23, 2006, pp. 13-49.
  17. R.M. Monczka et al., "Success Factors in Strategic Supplier Alliances: The Buying Company Perspective," Decision Sci., vol. 29, no. 3, June 2007, pp. 533-577.
  18. K. Sengupta, D.R. Heiser, and L.S. Cook, "Manufacturing and Service Supply Chain Performance: A Comparative Analysis," J. Supply Chain Manag., vol. 42, no. 4, Oct. 2006, pp. 4-15.
  19. R.E. Spekman, J.W. Kamauff Jr, and N. Myhr, "An Empirical Investigation into Supply Chain Management: A Perspective on Partnership," Supply Chain Management: Int. J., vol. 3, no. 2, 1998, pp. 53-67. https://doi.org/10.1108/13598549810215379
  20. J.H. Lee, "The Impact of Security and the Control of Financial Institutions on ERP System Performance," J. Korean Academic Soc. Accounting, vol. 15, no. 1, 2010, pp. 309-329.
  21. D. Scott, "Best Practice and Trends in Business Continuity Planning," presented at the U.S. Symposium/ITxpo, Gartner, Inc., Orlando, FL, USA, 2002.
  22. C. Fornell and F.L. Bookstein, "Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory," J. Marketing Res., vol. 19, no. 4, 1982, pp. 440-452. https://doi.org/10.2307/3151718
  23. W.W. Chin and A. Gopal, "Adoption Intention in GSS: Relative Importance of Beliefs," ACM SIGMIS Database, vol. 26, no. 2, 1995, pp. 42-64. https://doi.org/10.1145/217278.217285
  24. W.W. Chin, "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, vol. 22, no. 1, Mar. 1998, pp. 7-16.
  25. R.F. Falk and N.B. Miller, "A Primer on Soft Modeling," Akron, OH, USA: The University of Akron Press, 1992.
  26. C. Fornell and D.F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," J. Marketing Res., vol. 18, no. 1, Feb. 1981, pp. 39-50. https://doi.org/10.2307/3151312
  27. J.C. Nunnally and I.H. Bernstein, "Psychometric Theory," New York, NY, USA: McGraw-Hill, 1987.
  28. D. Barclay, C. Higgins, and R. Thompson, "The Partial Least Squares Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration," Technol. Studies, vol. 2, no. 2, 1995, pp. 285-309.
  29. M. Tenenhaus et al., "PLS Path Modeling," Comput. Statistics Data Anal., vol. 48, no. 1, Jan. 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
  30. M. Wetzels, G. Odekerken-Schroder, and C. Oppen, "Using PLS Path Modeling for Assessing Hierarchical Construct Models: Guidelines and Empirical Illustration," MIS Quarterly, vol. 33, no. 1, Mar. 2009, pp. 177-195. https://doi.org/10.2307/20650284

Cited by

  1. A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study vol.11, pp.9, 2017, https://doi.org/10.3837/tiis.2017.09.022
  2. A Structural Model Approach for Assessing Information Security Value in Organizations : vol.9, pp.4, 2018, https://doi.org/10.4018/ijsds.2018100104
  3. Cybercrime: an emerging threat to the banking sector of Pakistan vol.26, pp.1, 2015, https://doi.org/10.1108/jfc-11-2017-0118
  4. Determinants of Bank Competitiveness in Digital Era A Case Study of South Korea vol.2019, pp.2, 2015, https://doi.org/10.7172/2353-6845.jbfe.2019.2.3