DOI QR코드

DOI QR Code

The Study on Financial Firm's Performance Resulting from Security Countermeasures and the Moderating Effect of Transformational Leadership

금융기업의 보안대책이 금융 IT 보안책임과 위험감소 그리고 기업성과에 미치는 영향:변혁적 리더십의 조절효과

  • Kim, Geuna (School of Business Administration, Kyungpook National University) ;
  • Kim, Sanghyun (School of Business Administration, Kyungpook National University) ;
  • Park, Keunjae (Lundquist College of Business, University of Oregon)
  • 김근아 (경북대학교 경영학부) ;
  • 김상현 (경북대학교 경영학부) ;
  • 박근재 (오레곤대학교 란드퀘스트 경영대학)
  • Received : 2013.09.29
  • Accepted : 2013.12.09
  • Published : 2013.12.31

Abstract

Information system (IS) security continues to present a challenge for firms. Especially, IT security accident is recently taking place successively in the financial sector. Thus, a comprehensive measure on this is demanded. A large part of a research on security relies upon technical design in nature and is restrictive in a consideration of person and organizational issue. To achieve a goal of firm security, it is possible with an effort of organizational management and supervision for maintaining the technical and procedural status. Based on a theory of accountability, we propose that the security countermeasures of organization lead to an increase in accountability and reduction in risk of IT security in a financial firm and further to firm performance like promotion in firm reliability. In addition, we investigate which difference a theoretical model shows by comparison between South Korean and American financial firms. As a result of analysis, it found that South Korea and America have significant difference, but that a measure on the financing IT security is important for both countries. We aim to enhance interpretability of a research on security by comparatively analysis between countries and conducting a study focus on specific firm called financial business. Our study suggest new theoretical framework to a research of security and provide guideline on design of security to financial firm.

Keywords

References

  1. 김상현, 김근아, "정보보안관리에 영향을 미치는 기업환경요소와 규제자 영향의 조절효과", 한국경영과학회지, 제37권, 제3호(2012), pp.79-94. https://doi.org/10.7737/JKORMS.2012.37.3.079
  2. 천성용, "금융 소비자 만족도에 영향을 미치는 요인", 한국경영과학회지, 제38권, 제1호(2013), pp.89-101. https://doi.org/10.7737/JKORMS.2013.38.1.089
  3. 하홍열, "은행서비스 산업에서 범주형 회귀분석을 이용한 지속적 거래의도 평가", 한국경영과학회지, 제37권, 제3호(2012), pp.1-12. https://doi.org/10.7737/JKORMS.2012.37.3.001
  4. Bass, B.M., Leadership and Performance Beyond Expectations, New York : Free Press, 1985.
  5. Bovens, M., "Two Concepts of Accountability : Accountability as a Virtue and as a Mechanism," West European Politics, Vol.33, No.5(2010), pp.946-967. https://doi.org/10.1080/01402382.2010.486119
  6. Carmines, E.G. and R.A., Zeller, Reliability and Validity Assessment, Newbury Park, CA : Sage Publications, 1979.
  7. Carte, T.A. and C.J. Russell, "In Pursuit of Moderation : Nine Common Errors and Their Solutions," MIS Quarterly, Vol.27, No.3(2003), pp.479-501. https://doi.org/10.2307/30036541
  8. Chin, W.W. and J. Dibbern, A Permutation Based Procedure for Multi-Group PLS Analysis : Results of Tests of Differences on Simulated Data and a Cross of Information System Services between Germany and the USA, in Handbook of Partial Least Squares : Concepts, Methods and Applications in Marketing and Related Fields, V.E. Vinzi, W.W. Chin, J. Henseler, and H. Wang(eds), Berlin : Springer, 2009.
  9. Cho, J., I. Park, and J.W. Michel, "How Does Leadership Affect Information Systems Success? The Role of Transformational Leadership," Information and Management, Vol.48, No.7(2011), pp.270-277. https://doi.org/10.1016/j.im.2011.07.003
  10. D'Arcy, J., A. Hovav, and D. Galletta, "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse : A Deterrence Approach," Information Systems Research, Vol.20, No.1(2009), pp.79-98. https://doi.org/10.1287/isre.1070.0160
  11. Deng, X., W.J. Doll, S.S. Al-Gahtani, T.J. Larsen, J.M. Pearson, and T.S. Raghunathan, "A Cross-Cultural Analysis of the End-User Computing Satisfaction Instrument : A Multi- Group Invariance Analysis," Information and Management, Vol.45, No.4(2008), pp.211-220. https://doi.org/10.1016/j.im.2008.02.002
  12. Fornell, C. and D.F. Larcker, "Evaluating Structural Equation Models with Unobserva ble Variables and Measurement Error," Journal of Marketing Research, Vol.18, No.1(1981), pp.39-50. https://doi.org/10.2307/3151312
  13. Gallagher, S.E. and T. Savage, "Cross-Cultural Analysis in Online Community Research : A Literature Review," Computers in Human Behavior, Vol.29, No.3(2013), pp.1028-1038. https://doi.org/10.1016/j.chb.2012.09.011
  14. Gefen, D. and D. Straub, "A Practical Guide to Factorial Validity Using PLS Graph : Tutorial and Annotated Example," Communications of the Association for Information Systems, Vol.16, No.5(2005), pp.91-109.
  15. Gefen, D., E. Karahanna, and D. Straub, "Inexperience and Experience with Online Stores : The Importance of TAM and Trust," IEEE Transactions on Engineering Management, Vol.50, No.3(2003), pp.307-321. https://doi.org/10.1109/TEM.2003.817277
  16. Gewald, H. and J. Dibbern, "Risks and Benefits of Business Process Outsourcing : A Study of Transaction Services in the German Banking Industry," Information and Management, Vol.46, No.4(2009), pp.249-257. https://doi.org/10.1016/j.im.2009.03.002
  17. Hovav, A. and J. D'Arcy, "Applying and Extended Model of Deterrence Across Cultures : An Investigation of Information Systems Misuse in the U.S. and South Korea," Information and Management, Vol.49, No.2(2012), pp.99-110. https://doi.org/10.1016/j.im.2011.12.005
  18. Jacobs, B.A., "Deterrence and Deterrability," Criminology, Vol.8, No.2(2010), pp.417-441.
  19. Jung, D.I., C. Chow, and A. Wu, "The Role of Transformational Leadership in Enhancing Organizational Innovation : Hypotheses and Some Preliminary Findings," The Leadership Quarterly, Vol.14, No.4/5(2003), pp.525-544. https://doi.org/10.1016/S1048-9843(03)00050-X
  20. Kotulic, A.G. and J.G. Clark, "Why There aren't More Information Security Research Studies," Information and Management, Vol. 41, No.5(2004), pp.597-607. https://doi.org/10.1016/j.im.2003.08.001
  21. Ku, Y.C., R. Chen, and H. Zhang, "Why Do Users Continue Using Social Networking Sites? An Exploratory Study of Members in the United States and Taiwan," Information and Management, Vol.50, No.7(2013), pp.571-581. https://doi.org/10.1016/j.im.2013.07.011
  22. Lerner, J.S. and P.E. Tetlock, "Accounting for the Effects of Accountability," Psychological Bulletin, Vol.125, No.2(1999), pp.255-275. https://doi.org/10.1037/0033-2909.125.2.255
  23. Li, Y., C.H. Tan, and H.H. Teo, "Leadership Characteristics and Developers' Motivation in Open Source Software Development," Information and Management, Vol.49, No.5(2012), pp.257-267. https://doi.org/10.1016/j.im.2012.05.005
  24. Lowry, P.B., G. Moody, A. Vance, M. Jensen, J.L. Jenkins, and T. Wells, "Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers," Journal of the American Society for Information Science and Technology, Vol.63, No.4(2012), pp.755-766. https://doi.org/10.1002/asi.21705
  25. Mulgan, R., "'Accountability' : An Ever-Expanding Concept?," Public Administration, Vol.78, No.3(2000), pp.555-573. https://doi.org/10.1111/1467-9299.00218
  26. Parker, D.B., Fighting Computer Crime : A New Framework for Protecting Information, Hoboken, NJ : Wiley, 1998.
  27. Scholten, L., D.V. Knippenberg, B. Nijstad, and C.D. Dreu, "Motivated Information Processing and Group Decision-Making : Effects of Process Accountability on Information Processing and Decision Quality," Journal of Experimental Social Psychology, Vol.43, No.4 (2007), pp.539-552. https://doi.org/10.1016/j.jesp.2006.05.010
  28. Sedikides, C., K.C. Herbst, D.P. Hardin, and G.J. Dardis, "Accountability as a Deterrent to Self-Enhancement : The Search for Mechanisms," Journal of Personality and Social Psychology, Vol.83, No.3(2002), pp.592-605. https://doi.org/10.1037/0022-3514.83.3.592
  29. Seron, C., J. Pereira, and J. Kovath, "How Citizens Assess just Punishment for Police Misconduct," Criminology, Vol.44, No.4(2006), pp.925-960. https://doi.org/10.1111/j.1745-9125.2006.00068.x
  30. Shao, Z., Y. Feng, and L. Liu, "The Mediating Effect of Organizational Culture and Knowledge Sharing on Transformational Leadership and Enterprise Resource Planning Systems Success : An Empirical Study in China," Computers in Human Behavior, Vol. 28, No.6(2012), pp.2400-2413. https://doi.org/10.1016/j.chb.2012.07.011
  31. Tadmor, C. and Tetlock, P.E. Accountability, In D. Matsumoto(ed.), The Cambridge Dictionary of Psychology, Cambridge : Cambridge University Press, 2009.
  32. Tand, H.T. and A. Kao, "Accountability Effects on Auditors' Performance : The Influence of Knowledge, Problem-Solving Ability, and Task Complexity," Journal of Accounting Research, Vol.37, No.1(1999), pp.209-223. https://doi.org/10.2307/2491404
  33. Tetlock, P.E. Accountability Theory : Mixing Properties of Human Agents with Properties of Social Systems, In L.L. Thompson, J.M. Levine, and D.M. Messick(eds.), Shared Cognition in Organizations : The Management of Knowledge, Hillsdale, NJ : Lawrence Erlbaum, (1999), pp.117-137.
  34. Tetlock, P.E., L. Skitka, and R. Boettger, "Social and Cognitive Strategies for Coping with Accountability : Conformity, Complexity, and Bolstering," Journal of Personality and Social Psychology, Vol.57, No.4(1989), pp.632-640. https://doi.org/10.1037/0022-3514.57.4.632
  35. Vance, A., P.B. Lowry, and D. Eggett, "Using Accountability to Reduce Access Policy Violations in Information Systems," Journal of Management Information Systems, Vol.29, No.4(2013), pp.263-289. https://doi.org/10.2753/MIS0742-1222290410
  36. Vatanasombut, B., M. Igbaria, A.C. Stylianou, and W. Rodgers, "Information Systems Continuance Intention of Web-Based Applications Customers : The Case of Online Banking," Information and Management, Vol.45, No.7 (2008), pp.419-428. https://doi.org/10.1016/j.im.2008.03.005
  37. Willison, R. and M. Warkentin, "Beyond Deterrence : An Expanded View of Employee Computer Abuse," MIS Quarterly, Vol.37, No.1(2013), pp.1-20. https://doi.org/10.25300/MISQ/2013/37.1.01
  38. Zhang, J., B.J. Reithel, and H. Li, "Impact of Perceived Technical Protection on Security Behaviors," Information Management and Computer Security, Vol.17, No.4(2009), pp. 330-340. https://doi.org/10.1108/09685220910993980
  39. Zhao, X. and M.E. Johnson, "Managing Information Access in Data-Rich Enterprises with Escalation and Incentives," International Journal of Electronic Commerce, Vol.15, No.1 (2010), pp.79-112.