Browse > Article
http://dx.doi.org/10.9716/KITS.2011.10.2.141

The Measurement Model for the Evaluation of Information Systems Service : The Case of Chinese SI Company  

Lee, Sang-Jae (세종대학교 경영학과)
Lim, Gyoo-Gun (한양대학교 기술경영전문대학원/경영대학)
Publication Information
Journal of Information Technology Services / v.10, no.2, 2011 , pp. 141-162 More about this Journal
Abstract
The controls of Information Systems (IS) have been an more critical issue controls as the sophistication and integration of IS is more proceeded. ITGI (The Information Technology Governance Institute) of ISACA (Information Systems Audit and Control Association) has suggested COBIT (Control Objectives for Information and related Technology) and this has been widely recognized the evaluation model of IS controls. In COBIT, IS was evaluated in terms of process, information quality, and IT resources. This study used COBIT in order to suggest and empirically test an evaluation model of IS service. The data was collated from one major Chinese SI (Systems Integration) company in four domains of processes : planning and organization, acquisition and implementation, delivery and support, and monitoring. Seven factors are extracted using an exploratory factor analysis as follows : Overall IT planning process, technological assessment process in IT planning of IT, cost-benefit assessment process in IT planning, implementation process, support process, monitoring process, post-implementation evaluation process. The results of confirmatory analysis of three alternative measurement models indicated that the measurement model with one inherent or conceptual variable has greater model fitness than the other models. This study suggests the logical and general way to test and apply COBIT in evaluating IS services.
Keywords
COB IT; Chineses SI Company; an Evaluation Model of IS Services; IS Controls; Confirmatory Factor Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yeh, Q.-J. and A. J.-T. Chang, "Threats and countermeasures for information system security:A cross-industry study", Information and Management, Vol.44, No.5 (2007), p.491.
2 Siponen, T. M., "On the role of human mortality in information system security:From the problems of descriptivism to nondescriptive foundations", Information Resources Management Journal, Vol.14, No.4 (2001), pp.15-23.
3 Suh, B. and I. Han, "The impact of customer trust and perception of security control on the acceptance of electronic commerce", International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.135-161.
4 Weber, R., Information Systems Control and Audit, Prentice Hall Inc., Upper Saddle River, New Jersey, 1999.
5 Werts, C. E., R. L. Linn, and K. G. Jöreskog, "Interclass reliability estimates:Testing structural assumptions", Educational and Psychological Measurement, Vol.34(1974), pp. 25-33.   DOI
6 Whitman, M. E., "In defense of the realm:Understanding the threats to information security", International Journal of Information Management, Vol.24(2004), pp.43-57.   DOI   ScienceOn
7 Nunnally, J. C., Psychometric Theory, New York:McGraw-Hill, 1978.
8 Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Alternative scales for measuring service quality:A comparative assessment based on psychometric and diagnostic criteria", Journal of Retailing, Vol.70, No.3(1994), pp.201-230.   DOI   ScienceOn
9 Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Refinement and reassessment of the SERVQUAL scale", Journal of Retailing Vol.67(1991), pp.420-450.
10 Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "A conceptual model of service quality and its implications for future research", Journal of Marketing, Vol.49(1985), pp.41-50.
11 Lee, Y. and Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communication of the ACM, Vol.488 (2005), pp.72-78.
12 Piccoli, G. and B. Ives, "Trust and the unintended effects of behavior control in virtual teams", MIS Quarterly, Vol.27, No.3 (2003), pp.365-395.   DOI
13 Simons, R., "The role of management control systems in creating competitive advantage: New perspectives", Accounting, Organizations and Society, Vol.15, No.1/2(1990), pp.127-143.   DOI
14 Lee, S. M., Lee, and Yoo, "An integrative model of computer abuse based on social control and general deterrence theories", Information and Management, Vol.41(2004), pp.707-718.   DOI   ScienceOn
15 Markus, M. L. and J. Pfeffer, "Power and the design and implementation of accounting and control systems", Accounting, Organizations and Society, Vol.82, No.3(1983), pp.205-218.
16 Lee, S., Han, and Kym, "The impact of EDI controls on EDI implementation", International Journal of Electronic Commerce, Vol. 24(1998), pp.71-98.
17 Merchant, K. A., "The design of the corporate budgeting system:Influences on managerial behavior and performance", Accounting Review, Vol.56(1981), pp.813-829.
18 Nidumolu, S. R. and Subramni, "The matrix of control:Combining process and structure approaches to managing software development", Journal of Management Information Systems, Vol.203(2003), pp.159-196.
19 Kirsch, L. J., "Deploying common systems globally:The dynamics of control", Information Systems Research, Vol.154(2004), pp.374-395.
20 Kirsch, L. J., "Portfolios of control modes and IS project management", Information Systems Research, Vol.83(1997), pp.215-239.
21 ITGI(IT Governance Institute), Information Systems Audit and Control Association, 2007.
22 Jaworski, B. J., "Toward a theory of marketing control:Environmental context, control types, and consequences", Journal of Marketing, Vol.52(1988), pp.23-39.   DOI   ScienceOn
23 Anderson, J. and Gerbing, "Structural equation modeling in practice:A review and recommended two-step approach", Psychological Bulletin, Vol.1033(1988), pp.411-423.
24 Jiang, J. J., Klein, and Carr, "Measuring Information Systems Quality:SERVQUAL from the Other Side", MIS Quarterly, Vol. 262(2002), pp.145-166.
25 Joreskog, K. G. and Sorbom, 2nd ed., SPSS Inc., 1989.
26 Kettinger, W. J. and Lee, "Zones of tolerance: Alternative scales for measuring information systems service quality", MIS Quarterly, Vol.29, No.4(2005), pp.607-623.   DOI
27 Henderson, J. C. and Lee, "Managing I/S design teams:a control theories perspective", Management Science, Vol.38(1992), pp.757-777.   DOI   ScienceOn
28 Choudhury, V. and Sabherwal, "Portfolios of control in outsourced software development projects", Information Systems Research, Vol.14, No.3(2003), pp.291-314.   DOI   ScienceOn
29 Cook, T. D. and Campbell, Boston, MA: Houghton Mifflin, 1979.
30 Hair, J. F., T. Anderson, and T. Grablowsky, OK; PPC Books, 1979.
31 중국 SI 시장 현황보고서, 한국소프트웨어진흥원, 마켓리서치팀, 2003.