Browse > Article
http://dx.doi.org/10.4218/etrij.15.0114.1042

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry  

Kong, Heekyung (Department of Information & Communication Engineering, Chungbuk National University)
Jung, Suhyun (HR Development, Chungbuk Regional HR Development Council)
Lee, Insung (Department of Information Communication Engineering, Chungbuk National University)
Yeon, Seung-Jun (Future Research Creative Laboratory, ETRI)
Publication Information
ETRI Journal / v.37, no.2, 2015 , pp. 428-437 More about this Journal
Abstract
This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.
Keywords
Information security; IT service; information sharing; transaction stability; organizational performance; security industry;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Kim "[Proper Knowledge of the ICT Act] The Crisis of Electronic Financial Transactions: Phishing, Pharming, and Smishing." Accessed Mar. 16, 2013. http://www.ddaily.co.kr/news/news_view.php?uid=102313
2 D.B. Parke, "The Strategic Values of Information Security in Business," Comput. Security, vol. 16, no. 7, 1997, pp. 572-582.   DOI
3 J.D. Kim and J.E. Park, "A Study on ROSI of TCO-Based Information Protection," Collection Papers Digit. Policy Soc. Inauguration Symp., Seoul, Rep. of Korea, Dec. 12, 2003, pp. 251-261.
4 C.C. Wood, "Part of the Foundation for Secure Systems: Separation of Duties Policy," Inf. Manag. Comput. Security, vol. 5, no. 1, 1997, pp. 18-19.   DOI
5 H. Kong, T.S. Kim, and J.D. Kim, "An Analysis on Effects of Information Security Investments: A BSC Perspective," J. Intell. Manuf., vol. 23, no. 4, Aug. 2012, pp. 941-953.   DOI
6 G.L. Urban, F. Sultan, and W.J. Qualls, "Placing Trust at the Center of Your Internet Strategy," Sloan Manag. Rev., vol. 42, no. 1, 2000, pp. 39-48.
7 S. Jeong, "A Study on the Effect of Organizational Support and Service Activities on Corporate Performance in the Securities Industry," Service Manag. Soc. J., vol. 13, no. 3, 2012, pp. 275-292.
8 F. Herzberg, B. Mauner, and B.B. Snyderman, "The Motivation to Work," New York, NY, USA: John Wiley & Sons, 1959.
9 F. Herzberg, "Work and the Nature of Man," New York, NY, USA: World Publishing Co., 1966.
10 T.M. Amabile et al, "The Work Preference Inventory: Assessing Intrinsic and Extrinsic Motivational Orientations," J. Pers. Soc. Psychology, vol. 66, no. 5, 1994, pp. 950-967.   DOI
11 M. Tampoe, "Motivating Knowledge Workers - the Challenge for the 1990s," Long Range Planning, vol. 26, no. 3, June 1993, pp. 49-55.   DOI
12 C. Janssen, "IT Infrastructure," Techopedia TM, Janalta Interactive Inc. Accessed Aug. 14, 2013. http://www.techopedia.com/definition/29199/it-infrastructure
13 D.J. Bowersox and P.J. Daugherty, "Logistics Paradigms: The Impact of Information Technology," J. Business Logistics, vol. 16, no. 1, 1995, pp. 65-80.
14 R.P. Derocher and J. Kilpatrick, "Six Supply Chain Lessons for the Millennium," Supply Chain Manag. Rev., vol. 3, no. 4, 2000, pp. 34-40.
15 J.Y. Son, S. Narasimhan, and F.J. Riggins, "Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship," J. Manag. Inf. Syst., vol. 22, no. 1, 2005, pp. 321-353.
16 R. Patnayakuni, A. Rai, and N. Seth, "Relational Antecedents of Information Flow Integration for Supply Chain Coordination," J. Manag. Inf. Syst., vol. 23, 2006, pp. 13-49.
17 R.M. Monczka et al., "Success Factors in Strategic Supplier Alliances: The Buying Company Perspective," Decision Sci., vol. 29, no. 3, June 2007, pp. 533-577.
18 K. Sengupta, D.R. Heiser, and L.S. Cook, "Manufacturing and Service Supply Chain Performance: A Comparative Analysis," J. Supply Chain Manag., vol. 42, no. 4, Oct. 2006, pp. 4-15.
19 R.E. Spekman, J.W. Kamauff Jr, and N. Myhr, "An Empirical Investigation into Supply Chain Management: A Perspective on Partnership," Supply Chain Management: Int. J., vol. 3, no. 2, 1998, pp. 53-67.   DOI
20 J.H. Lee, "The Impact of Security and the Control of Financial Institutions on ERP System Performance," J. Korean Academic Soc. Accounting, vol. 15, no. 1, 2010, pp. 309-329.
21 D. Scott, "Best Practice and Trends in Business Continuity Planning," presented at the U.S. Symposium/ITxpo, Gartner, Inc., Orlando, FL, USA, 2002.
22 R.F. Falk and N.B. Miller, "A Primer on Soft Modeling," Akron, OH, USA: The University of Akron Press, 1992.
23 C. Fornell and F.L. Bookstein, "Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory," J. Marketing Res., vol. 19, no. 4, 1982, pp. 440-452.   DOI
24 W.W. Chin and A. Gopal, "Adoption Intention in GSS: Relative Importance of Beliefs," ACM SIGMIS Database, vol. 26, no. 2, 1995, pp. 42-64.   DOI
25 W.W. Chin, "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, vol. 22, no. 1, Mar. 1998, pp. 7-16.
26 C. Fornell and D.F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," J. Marketing Res., vol. 18, no. 1, Feb. 1981, pp. 39-50.   DOI
27 J.C. Nunnally and I.H. Bernstein, "Psychometric Theory," New York, NY, USA: McGraw-Hill, 1987.
28 D. Barclay, C. Higgins, and R. Thompson, "The Partial Least Squares Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration," Technol. Studies, vol. 2, no. 2, 1995, pp. 285-309.
29 M. Tenenhaus et al., "PLS Path Modeling," Comput. Statistics Data Anal., vol. 48, no. 1, Jan. 2005, pp. 159-205.   DOI
30 M. Wetzels, G. Odekerken-Schroder, and C. Oppen, "Using PLS Path Modeling for Assessing Hierarchical Construct Models: Guidelines and Empirical Illustration," MIS Quarterly, vol. 33, no. 1, Mar. 2009, pp. 177-195.   DOI