Browse > Article
http://dx.doi.org/10.7737/JKORMS.2013.38.4.095

The Study on Financial Firm's Performance Resulting from Security Countermeasures and the Moderating Effect of Transformational Leadership  

Kim, Geuna (School of Business Administration, Kyungpook National University)
Kim, Sanghyun (School of Business Administration, Kyungpook National University)
Park, Keunjae (Lundquist College of Business, University of Oregon)
Publication Information
Abstract
Information system (IS) security continues to present a challenge for firms. Especially, IT security accident is recently taking place successively in the financial sector. Thus, a comprehensive measure on this is demanded. A large part of a research on security relies upon technical design in nature and is restrictive in a consideration of person and organizational issue. To achieve a goal of firm security, it is possible with an effort of organizational management and supervision for maintaining the technical and procedural status. Based on a theory of accountability, we propose that the security countermeasures of organization lead to an increase in accountability and reduction in risk of IT security in a financial firm and further to firm performance like promotion in firm reliability. In addition, we investigate which difference a theoretical model shows by comparison between South Korean and American financial firms. As a result of analysis, it found that South Korea and America have significant difference, but that a measure on the financing IT security is important for both countries. We aim to enhance interpretability of a research on security by comparatively analysis between countries and conducting a study focus on specific firm called financial business. Our study suggest new theoretical framework to a research of security and provide guideline on design of security to financial firm.
Keywords
Financial Firm; Firm Performance; Accountability; Security Countermeasures; Transformational Leadership; Cross-National Research;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 천성용, "금융 소비자 만족도에 영향을 미치는 요인", 한국경영과학회지, 제38권, 제1호(2013), pp.89-101.   과학기술학회마을   DOI   ScienceOn
2 하홍열, "은행서비스 산업에서 범주형 회귀분석을 이용한 지속적 거래의도 평가", 한국경영과학회지, 제37권, 제3호(2012), pp.1-12.   과학기술학회마을   DOI   ScienceOn
3 Bass, B.M., Leadership and Performance Beyond Expectations, New York : Free Press, 1985.
4 Bovens, M., "Two Concepts of Accountability : Accountability as a Virtue and as a Mechanism," West European Politics, Vol.33, No.5(2010), pp.946-967.   DOI   ScienceOn
5 Carmines, E.G. and R.A., Zeller, Reliability and Validity Assessment, Newbury Park, CA : Sage Publications, 1979.
6 Carte, T.A. and C.J. Russell, "In Pursuit of Moderation : Nine Common Errors and Their Solutions," MIS Quarterly, Vol.27, No.3(2003), pp.479-501.   DOI
7 Chin, W.W. and J. Dibbern, A Permutation Based Procedure for Multi-Group PLS Analysis : Results of Tests of Differences on Simulated Data and a Cross of Information System Services between Germany and the USA, in Handbook of Partial Least Squares : Concepts, Methods and Applications in Marketing and Related Fields, V.E. Vinzi, W.W. Chin, J. Henseler, and H. Wang(eds), Berlin : Springer, 2009.
8 Cho, J., I. Park, and J.W. Michel, "How Does Leadership Affect Information Systems Success? The Role of Transformational Leadership," Information and Management, Vol.48, No.7(2011), pp.270-277.   DOI   ScienceOn
9 D'Arcy, J., A. Hovav, and D. Galletta, "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse : A Deterrence Approach," Information Systems Research, Vol.20, No.1(2009), pp.79-98.   DOI   ScienceOn
10 Deng, X., W.J. Doll, S.S. Al-Gahtani, T.J. Larsen, J.M. Pearson, and T.S. Raghunathan, "A Cross-Cultural Analysis of the End-User Computing Satisfaction Instrument : A Multi- Group Invariance Analysis," Information and Management, Vol.45, No.4(2008), pp.211-220.   DOI   ScienceOn
11 Fornell, C. and D.F. Larcker, "Evaluating Structural Equation Models with Unobserva ble Variables and Measurement Error," Journal of Marketing Research, Vol.18, No.1(1981), pp.39-50.   DOI   ScienceOn
12 Gallagher, S.E. and T. Savage, "Cross-Cultural Analysis in Online Community Research : A Literature Review," Computers in Human Behavior, Vol.29, No.3(2013), pp.1028-1038.   DOI   ScienceOn
13 김상현, 김근아, "정보보안관리에 영향을 미치는 기업환경요소와 규제자 영향의 조절효과", 한국경영과학회지, 제37권, 제3호(2012), pp.79-94.   과학기술학회마을   DOI   ScienceOn
14 Gefen, D. and D. Straub, "A Practical Guide to Factorial Validity Using PLS Graph : Tutorial and Annotated Example," Communications of the Association for Information Systems, Vol.16, No.5(2005), pp.91-109.
15 Gefen, D., E. Karahanna, and D. Straub, "Inexperience and Experience with Online Stores : The Importance of TAM and Trust," IEEE Transactions on Engineering Management, Vol.50, No.3(2003), pp.307-321.   DOI   ScienceOn
16 Gewald, H. and J. Dibbern, "Risks and Benefits of Business Process Outsourcing : A Study of Transaction Services in the German Banking Industry," Information and Management, Vol.46, No.4(2009), pp.249-257.   DOI   ScienceOn
17 Hovav, A. and J. D'Arcy, "Applying and Extended Model of Deterrence Across Cultures : An Investigation of Information Systems Misuse in the U.S. and South Korea," Information and Management, Vol.49, No.2(2012), pp.99-110.   DOI   ScienceOn
18 Jacobs, B.A., "Deterrence and Deterrability," Criminology, Vol.8, No.2(2010), pp.417-441.
19 Jung, D.I., C. Chow, and A. Wu, "The Role of Transformational Leadership in Enhancing Organizational Innovation : Hypotheses and Some Preliminary Findings," The Leadership Quarterly, Vol.14, No.4/5(2003), pp.525-544.   DOI   ScienceOn
20 Kotulic, A.G. and J.G. Clark, "Why There aren't More Information Security Research Studies," Information and Management, Vol. 41, No.5(2004), pp.597-607.   DOI   ScienceOn
21 Ku, Y.C., R. Chen, and H. Zhang, "Why Do Users Continue Using Social Networking Sites? An Exploratory Study of Members in the United States and Taiwan," Information and Management, Vol.50, No.7(2013), pp.571-581.   DOI   ScienceOn
22 Lerner, J.S. and P.E. Tetlock, "Accounting for the Effects of Accountability," Psychological Bulletin, Vol.125, No.2(1999), pp.255-275.   DOI   ScienceOn
23 Li, Y., C.H. Tan, and H.H. Teo, "Leadership Characteristics and Developers' Motivation in Open Source Software Development," Information and Management, Vol.49, No.5(2012), pp.257-267.   DOI
24 Lowry, P.B., G. Moody, A. Vance, M. Jensen, J.L. Jenkins, and T. Wells, "Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers," Journal of the American Society for Information Science and Technology, Vol.63, No.4(2012), pp.755-766.   DOI   ScienceOn
25 Mulgan, R., "'Accountability' : An Ever-Expanding Concept?," Public Administration, Vol.78, No.3(2000), pp.555-573.   DOI   ScienceOn
26 Parker, D.B., Fighting Computer Crime : A New Framework for Protecting Information, Hoboken, NJ : Wiley, 1998.
27 Scholten, L., D.V. Knippenberg, B. Nijstad, and C.D. Dreu, "Motivated Information Processing and Group Decision-Making : Effects of Process Accountability on Information Processing and Decision Quality," Journal of Experimental Social Psychology, Vol.43, No.4 (2007), pp.539-552.   DOI   ScienceOn
28 Sedikides, C., K.C. Herbst, D.P. Hardin, and G.J. Dardis, "Accountability as a Deterrent to Self-Enhancement : The Search for Mechanisms," Journal of Personality and Social Psychology, Vol.83, No.3(2002), pp.592-605.   DOI   ScienceOn
29 Seron, C., J. Pereira, and J. Kovath, "How Citizens Assess just Punishment for Police Misconduct," Criminology, Vol.44, No.4(2006), pp.925-960.   DOI   ScienceOn
30 Shao, Z., Y. Feng, and L. Liu, "The Mediating Effect of Organizational Culture and Knowledge Sharing on Transformational Leadership and Enterprise Resource Planning Systems Success : An Empirical Study in China," Computers in Human Behavior, Vol. 28, No.6(2012), pp.2400-2413.   DOI   ScienceOn
31 Tadmor, C. and Tetlock, P.E. Accountability, In D. Matsumoto(ed.), The Cambridge Dictionary of Psychology, Cambridge : Cambridge University Press, 2009.
32 Tand, H.T. and A. Kao, "Accountability Effects on Auditors' Performance : The Influence of Knowledge, Problem-Solving Ability, and Task Complexity," Journal of Accounting Research, Vol.37, No.1(1999), pp.209-223.   DOI   ScienceOn
33 Tetlock, P.E. Accountability Theory : Mixing Properties of Human Agents with Properties of Social Systems, In L.L. Thompson, J.M. Levine, and D.M. Messick(eds.), Shared Cognition in Organizations : The Management of Knowledge, Hillsdale, NJ : Lawrence Erlbaum, (1999), pp.117-137.
34 Tetlock, P.E., L. Skitka, and R. Boettger, "Social and Cognitive Strategies for Coping with Accountability : Conformity, Complexity, and Bolstering," Journal of Personality and Social Psychology, Vol.57, No.4(1989), pp.632-640.   DOI
35 Vance, A., P.B. Lowry, and D. Eggett, "Using Accountability to Reduce Access Policy Violations in Information Systems," Journal of Management Information Systems, Vol.29, No.4(2013), pp.263-289.   DOI   ScienceOn
36 Vatanasombut, B., M. Igbaria, A.C. Stylianou, and W. Rodgers, "Information Systems Continuance Intention of Web-Based Applications Customers : The Case of Online Banking," Information and Management, Vol.45, No.7 (2008), pp.419-428.   DOI   ScienceOn
37 Willison, R. and M. Warkentin, "Beyond Deterrence : An Expanded View of Employee Computer Abuse," MIS Quarterly, Vol.37, No.1(2013), pp.1-20.   DOI
38 Zhang, J., B.J. Reithel, and H. Li, "Impact of Perceived Technical Protection on Security Behaviors," Information Management and Computer Security, Vol.17, No.4(2009), pp. 330-340.   DOI   ScienceOn
39 Zhao, X. and M.E. Johnson, "Managing Information Access in Data-Rich Enterprises with Escalation and Incentives," International Journal of Electronic Commerce, Vol.15, No.1 (2010), pp.79-112.