Browse > Article
http://dx.doi.org/10.15813/kmr.2020.21.1.003

An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance  

Kim, Kihyun (강릉원주대학교 사회과학대학 무역학과)
Cho, Hyejin (고려대학교 경영대학 국제경영학과)
Lim, Sohee (고려대학교 경영대학 국제경영학과)
Publication Information
Knowledge Management Research / v.21, no.1, 2020 , pp. 41-59 More about this Journal
Abstract
This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.
Keywords
The fourth industrial revolution; Knowledge management; Information security organization; Firm performance;
Citations & Related Records
Times Cited By KSCI : 10  (Citation Analysis)
연도 인용수 순위
1 Teece D. J. 1986. "Profiting from Technological Innovation: Implications for Integration, Collaboration, Licensing and Public Policy," Research Policy (15:6), pp.285-305.   DOI
2 Teece D. J. 2000. "Strategies for Managing Knowledge Assets: The Role of Firm Structure and Industrial Context," Long Range Planning (33:1), pp.35-54.   DOI
3 Tippins M. J. and Sohi R. S. 2003. "It Competency and Firm Performance: Is Organizational Learning a Missing Link?" Strategic Management Journal (24:8), pp.745-761.   DOI
4 Tsai K. H. and Wang J. C. 2007. "Inward Technology Licensing and Firm Performance: A Longitudinal Study," R&D Management (37:2), pp.151-160.   DOI
5 Wernerfelt B. 1984. "A Resource-Based View of the Firm," Strategic M anagement Journal (5:2), pp.171-180.   DOI
6 Wiseman C. 1985. Strategy and Computer. Dow Jones Irwin: New York.
7 백민정, 손승희 2011. "중소규모 조직구성원의 정보보안인식과 행동이 정보보안성과에 미치는 영향에 관한 연구," 중소기업연구 (33:2), pp.113-132.
8 고형석, 이홍제, 임화연, 한정석 2018. "4차 산업혁명시대의 빅데이터 정보자원 관리전략에 관한 연구," 정보화연구 (15:2), pp.119-131.   DOI
9 김경규, 신호경, 박성식, 김범수 2009. "정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로," 정보관리연구 (40:3), pp.61-77.   DOI
10 김승래 2017. "AI 시대의 지식재산권 보호전략과 대책," 지식재산연구 (12:2), pp.145-176.
11 서성웅, 박병규, 지대환 2017. "인공지능(AI) 융합기술 기반의 기업형 챗봇(Chatting Robot) 개발을 통한 일반업무 디지털트랜스포메이션 효과에 관한 연구," 2017년 경영정보관련 추계학술대회 논문집, pp.284-289.
12 이강백, 김태환, 이상용 2015. "기업보안투자가 기업성과에 끼치는 영향," 2015년 한국경영정보학회춘계학술대회 논문집, pp.354-359
13 손인수, 김대길 2017. "클라우드 컴퓨팅 도입이 기업의 시장가치에 미치는 영향: 이벤트 스터디를 활용한 분석," 인터넷전자상거래연구 (17:1), pp.1-21.
14 심혜정, 김건우 2018. "우리 기업의 인공지능(AI)을 활용한 비즈니스 모델," Trade Focus, 국제무역연구원, pp.1-26
15 유성민 2014. "ICBM 산업육성 방안 및 기술도입 전략," 한국정보기술학회지 (12:2), pp.9-16.
16 이종화, 이현규 2018. "빅테이터 분석을 위한 비용효과적 오픈 소스 시스템 설계," 지식경영연구 (19:1), pp.119-132   DOI
17 임재수, 오재인 2017. "클라우드 컴퓨팅 서비스의 도입특성이 기업의 인지된 기대성과에 미치는 영향," Information Systems Review (19:1), pp. 75-100.   DOI
18 정현준, 신우철, 홍정민, 이운호, 이용희, 변종석, 박민규 2018. "ICT부문 분석용 마이크로데이터 구축", 정책연구, pp. 18-76, 정보통신정책연구원.
19 조일형, 김진, 유진호 2019. "개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구," 지식경영연구 (20:3), pp.91-104.   DOI
20 최병구 2016. "정보기술 개발 유형과 기업성과 간의 관계에 대한 실증적 고찰: 자원준거 이론 관점에서," 지식경영연구 (17:4), pp.163-189.   DOI
21 최은수, 이윤철 2009. "정보기술이 지식경영활동과 성과에 미치는 효과에 대한 실증분석," 지식경영연구 (10:3), pp.51-80.
22 MiHye Yang, Wonho Nam, Taegon Kim and Yonghwa Kim. 2019. "Machine learning application for predicting the strawberry harvesting time," Korean Journal of Agriculture Science (46:2), pp.381-393
23 편용범, 강수경, 김광복, 김종진, 차형기, 이형준 2019. "딥러닝 기업을 이용한 정량적 어획물 분류를 위한 기반 연구," 한국수산과학회 양식분과 학술대회, p.120.
24 현정훈 2018. "4차산업혁명과 기업보안의 현시점," 한국멀티미디어학회지 (22:2), pp.6-12.
25 Anat Hovav, 한진영 2013. "정보보안 사고가 기업의 주식가치에 미치는 영향: 한국기업 중심으로," 인터넷전자상거래연구 (13:3), pp.43-67.
26 Ahuja G. and Katila R. 2001. "Technological Acquisitions and the Innovation Performance of Acquiring Firms: A Longitudinal Study," Strategic Management Journal (22:3), pp.197-220.   DOI
27 Ashford W. 2012. Many UK Firms Underestimate Cost of Data Breaches, Study Finds.
28 Barney J. 1986. "Strategic Factor Markets: Expectations, Luck, and Business Strategy," Management Science (32:10), pp.1231-1241.   DOI
29 Barney J. 1991. "Firm Resources and Sustained Competitive Advantage," Journal of Management (17:1), pp.99-120.   DOI
30 Belissent J. 2010. "Getting Clever About Smart Cities: New Opportunities Require New Business Models," Cambridge, Massachusetts, USA.
31 Berchicci L. 2013. "Towards an Open R&D System: Internal R&D Investment, External Knowledge Acquisition and Innovative Performance," Research Policy (42:1), pp.117-127.   DOI
32 Bharadwaj A. S., Bharadwaj S. G. and Konsynski B. R. 1999. "Information Technology Effects on Firm Performance as Measured by Tobin's Q," Management Science (45:7), pp.1008-1024.   DOI
33 Nord W. R. and Tucker S. 1987. Implementing Routine and Radical Innovations. Lexington Books: Lexington, MA.
34 Chang S. E. and Ho C. B. 2006. "Organizational Factors to the Effectiveness of Implementing Information Security Management," Industrial Management & Data Systems (106:3), pp.345-361.   DOI
35 Candelin-Palmqvist H., Sandberg, B., and Mylly U. M. 2012. "Intellectual Property Rights in Innovation Management Research: A Review," Technovation (32:9-10), pp.502-512   DOI
36 Im K. S., Dow K. E. and Grover V. 2001. "Research Report: A Reexamination of IT Investment and the Market Value of the Firm-an Event Study Methodology," Information Systems Research (12:1), pp.103-117.   DOI
37 Jones G. K., Lanctot A. and Teegen H. J. 2001. "Determinants and Performance Impacts of External Technology Acquisition," Journal of Business Venturing (16:3), pp.255-283.   DOI
38 Kayworth T. and Whitten D. 2010. "Effective Information Security Requires a Balance of Social and Technology Factors," MIS Quarterly executive (9:3), pp.2012-2052.
39 Penrose R. 1959. The Theory of the Growth of the Firm. Oxford University Press: Oxford.
40 Piccoli G. and Ives B. 2005. "It-Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review and Synthesis of the Literature," MIS quarterly (29:4), pp.747-776.   DOI
41 Piccoli G. and Lui T-W. 2014 "The Competitive Impact of Information Technology: Can Commodity IT Contribute to Competitive Performance?" European Journal of Information Systems (23:6), pp.616-628   DOI
42 Root F. R. 1994. Entry Strategies for International Markets. Lexington books New York.
43 Plummer D. C. 2008. Cloud Computing: Definition and Describing an Emerging Phenomenon, Gartner Group: Stamford, CT.
44 Dutot V., Bergeron F. and Raymond L. 2014. "Information Management for the Internationalization of Smes: An Exploratory Study Based on a Strategic A lignment Perspective," International Journal of Information Management (34:5), pp.672-681.   DOI
45 Prahlad, K. and Hamel, G. 1990. "The core competence of the corporation," Harvard Business Review (90), pp.79-91.
46 Richardson V. J. and Zmud R. W. 2002. "The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role," in Proceedings of the Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, Hwaii, USA.
47 Ring T. 2013. "A Breach Too Far?," Computer Fraud & Security (2013:6), pp.5-9.   DOI
48 Roth K. 1995. "Managing International Interdependence: CEO Characteristics in a Resource-Based Framework," Academy of Management Journal (38:1), pp.200-231.   DOI
49 Rumelt R. P. 1991. "How Much Does Industry Matter?," Strategic Management Journal (12:3), pp.167-185.   DOI
50 Soomro Z. A., Shah M. H. and Ahmed J. 2016. "Information Security Management Needs More Holistic Approach: A Literature Review," International Journal of Information Management (36:2), pp.215-225.   DOI