Browse > Article
http://dx.doi.org/10.13088/jiis.2011.17.1.071

The Effect of Information Protection Control Activities on Organizational Effectiveness : Mediating Effects of Information Application  

Jeong, Gu-Heon (The Department of Police Administration Section, Central Police Academy)
Jeong, Seung-Ryul (Graduate School of Business Information Technology, Kookmin University)
Publication Information
Journal of Intelligence and Information Systems / v.17, no.1, 2011 , pp. 71-90 More about this Journal
Abstract
This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.
Keywords
Information Protection; Control Activities; Organizational Effectiveness; Information Application;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Hone, K. and J. H. Eloff, "Information Security policy-what do international information security standards say?", Computers and Security, Vol.21 No.5(2002), 402-409.   DOI   ScienceOn
2 Hoo, K. S., The Digital Security Debate : How to Manage Risk?, Secure Business Quarterly, First Quarter, 2002.
3 서보밀, "인지된 보안통제가 고객의 인터넷 뱅킹 수용에 미치는 영향", 한국전자거래학회지, 11권 1호(2006), 25-52.
4 석호익, 통신, 방송의 통합 요인과 결과에 관한 연구, 성균관대학교 대학원 박사학위논문, 2001.
5 선한길, 국내기업의 정보보호 정책 및 조직요인이 정보보호성과에 미치는 영향, 국민대학교 대학원 박사학위논문, 2005.
6 손달호, "웹거래의 신뢰성에 대한 보안요인의 영향에 관한 연구", 경영연구, 20권 1호(2005), 1-27.
7 Wiant, T. L., "Information security policy's impact on reporting security incidents", Computers and Security, Vol.24(2005), 448-459.   DOI   ScienceOn
8 Pastore, M., New Enterprise Focus : Building Securtiy Teams, eSecurtiy Planet, 2003.
9 Kevin Soo Hoo, How Much is Enough? A Risk-Management Approach to Computer, Security, working paper, CRISP, 2000.
10 Miles, R. H., Macro-Organizational Behavior, Santa Monica, California, Goodyear Pub, 1980.
11 Post, G. and A. Kagan, "Management tradeoffs in anti-virus strategies", Information and Management, Vol.37(2000), 13-24.   DOI   ScienceOn
12 Solms, B., "Corporate Governance and Information Securtiy", Computers and Securtiy, Vol. 20(2001), 215-218.   DOI   ScienceOn
13 Solms, R., "Information Securtiy Management: The Second Generation", Computer and Securtiy, Vol.15(1996), 281-288.   DOI   ScienceOn
14 Ariss, S. S., "Computer monitoring : Benefits and Pitfalls Facing Management", Information and Management, (2001), 1-6.
15 Straub, D. W. and W. D. Nance, "Discovering and Disciplining Computer Abuse in Organizations : A Field Study", MIS Quartery, (1990), 45-60.
16 Straub, D. W. and R. J. Welke, "Coping With Systems Risk : Security Planning Models for Management Decision Making", MIS Quarterly, Vol.22, No.4(1998), 441-469.   DOI   ScienceOn
17 Taher, E., Policy-Based Security, OECD Information Security Workshop in Tokyo, Japan, 2001.
18 Cohen, F., "Managing Network Security-Security Education in the Informantion Age", Network Security, (1999), 7-10.
19 Etzioni, A., Modern Organization, Englewood Cliffs, NJ : Prentice Hall, 1964.
20 Forte, S., "Vulnerability management : One problem, several potential approaches", Network Security, Vol.5(2002), 11-13.
21 Gerber, M., R. Von Solms, and P. Overbeek, "Formalizing information security requirements", Information Management and Computer Security, Vol.9 No.1(2001), 32-37.   DOI   ScienceOn
22 Goodhue, D. and D. Straub, "Security Concerns of System Users : A Study of Perception of the Adequacy of Security", Information and Management, Vol.20 No.1(1991), 13-27.   DOI   ScienceOn
23 Holmes, D., eGov : e-Business Strategy for Government, Nicholas Brealey Publishing, London, 2001.
24 행정안전부, 정보보호 중기 종합계획, 2008.
25 이상준, 정보보호는 기업을 살리는 전략적 투자, 보안뉴스, 2008.
26 한국정보보호산업협회, 정보보호 기술 동향 및 전망, 2008.
27 한국정보사회진흥원, 국가정보화백서, 2008.
28 홍기향, 정보보호 통제와 활동이 정보보호 성과에 미치는 영향에 관한 연구, 국민대학교 대학원 박사학위논문, 2003.
29 박태완, "정보시스템 보안 감리", 정보시스템 감리, 10권(1997), 815-837.
30 국가정보원, 2008년 국정감사 법제사법위원회 제출자료, 2008.