메뉴 건너뛰기




Volumn 106, Issue 3, 2006, Pages 345-361

Organizational factors to the effectiveness of implementing information security management

Author keywords

Data security; Information management; Information systems; Organizational effectiveness

Indexed keywords

INFORMATION SYSTEMS; ORGANIZATIONAL EFFECTIVENESS;

EID: 33645031405     PISSN: 02635577     EISSN: None     Source Type: Journal    
DOI: 10.1108/02635570610653498     Document Type: Article
Times cited : (141)

References (70)
  • 1
    • 18844427282 scopus 로고    scopus 로고
    • A benchmarking framework for information systems management issues in Kuwait
    • Alshawaf, A.H., Ali, J.M.H. and Hasan, M.H. (2005), "A benchmarking framework for information systems management issues in Kuwait", Benchmarking: An International Journal, Vol. 12 No. 1, pp. 30-44.
    • (2005) Benchmarking: An International Journal , vol.12 , Issue.1 , pp. 30-44
    • Alshawaf, A.H.1    Ali, J.M.H.2    Hasan, M.H.3
  • 2
    • 0942268246 scopus 로고    scopus 로고
    • The influence of business managers' IT competence on championing IT
    • Bassellier, G., Benbasat, I. and Reich, B.H. (2003), "The influence of business managers' IT competence on championing IT", Information Systems Research, Vol. 14 No. 4, pp. 317-36.
    • (2003) Information Systems Research , vol.14 , Issue.4 , pp. 317-336
    • Bassellier, G.1    Benbasat, I.2    Reich, B.H.3
  • 3
    • 0034900328 scopus 로고    scopus 로고
    • Information technology competence of business managers: A definition and research model
    • Bassellier, G., Reich, B.H. and Benbasat, I. (2001), "Information technology competence of business managers: a definition and research model", Journal of Management Information Systems, Vol. 17 No. 4, pp. 159-82.
    • (2001) Journal of Management Information Systems , vol.17 , Issue.4 , pp. 159-182
    • Bassellier, G.1    Reich, B.H.2    Benbasat, I.3
  • 4
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • Bishop, M. (2003), "What is computer security?", IEEE Security and Privacy, Vol. 1 No. 1, pp. 67-9.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 5
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-95 SIM Delphi results
    • Brancheau, J.C., Janz, B.D. and Wetherbe, J.C. (1996), "Key issues in information systems management: 1994-95 SIM Delphi results", MIS Quarterly, Vol. 20 No. 2, pp. 225-42.
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 225-242
    • Brancheau, J.C.1    Janz, B.D.2    Wetherbe, J.C.3
  • 8
    • 2442654928 scopus 로고    scopus 로고
    • Perceived information security, financial liability and consumer trust in electronic commerce transactions
    • Chellappa, R.K. and Pavlou, P.A. (2002), "Perceived information security, financial liability and consumer trust in electronic commerce transactions", Logistics Information Management, Vol. 15 Nos 5/6, pp. 358-68.
    • (2002) Logistics Information Management , vol.15 , Issue.56 , pp. 358-368
    • Chellappa, R.K.1    Pavlou, P.A.2
  • 9
    • 20444475693 scopus 로고    scopus 로고
    • A generic service model for secure data interchange
    • Chiu, R-K. and Chen, J.C.H. (2005), "A generic service model for secure data interchange", Industrial Management & Data Systems, Vol. 105 No. 5, pp. 662-81.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.5 , pp. 662-681
    • Chiu, R.-K.1    Chen, J.C.H.2
  • 12
    • 7444270789 scopus 로고    scopus 로고
    • Performance outcomes of strategic and IT competencies alignment
    • Croteau, A-M. and Raymond, L. (2004), "Performance outcomes of strategic and IT competencies alignment", Journal of Information Technology, Vol. 19, pp. 178-90.
    • (2004) Journal of Information Technology , vol.19 , pp. 178-190
    • Croteau, A.-M.1    Raymond, L.2
  • 13
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute San Francisco, CA available at: www.gocsi.com/
    • CSI/FBI (2004), 2004 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, San Francisco, CA, available at: www.gocsi.com/.
    • (2004) 2004 CSI/FBI Computer Crime and Security Survey
  • 14
    • 84989104427 scopus 로고
    • Chief executive scanning, environmental characteristics, and company performance: An empirical study
    • Daft, R., Sormunem, J. and Parks, D. (1988), "Chief executive scanning, environmental characteristics, and company performance: an empirical study", Strategic Management Journal, Vol. 9 No. 2, pp. 123-39.
    • (1988) Strategic Management Journal , vol.9 , Issue.2 , pp. 123-139
    • Daft, R.1    Sormunem, J.2    Parks, D.3
  • 15
    • 0036398120 scopus 로고    scopus 로고
    • Policy enforcement in the workplace
    • David, J. (2002), "Policy enforcement in the workplace", Computers & Security, Vol. 21 No. 6, pp. 506-13.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 506-513
    • David, J.1
  • 17
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G. and Backhouse, J. (2000), "Information system security management in the new millennium", Communications of the ACM, Vol. 43 No. 7, pp. 125-8.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 18
    • 84953510404 scopus 로고
    • Environment as an influence on managerial autonomy
    • Dill, W.R. (1958), "Environment as an influence on managerial autonomy", Administrative Science Quarterly, Vol. 2 No. 4, pp. 409-43.
    • (1958) Administrative Science Quarterly , vol.2 , Issue.4 , pp. 409-443
    • Dill, W.R.1
  • 19
    • 0347308731 scopus 로고    scopus 로고
    • Information security and the internet
    • Doddrell, G.R. (1996), "Information security and the internet", Internet Research, Vol. 6 No. 1, pp. 5-9.
    • (1996) Internet Research , vol.6 , Issue.1 , pp. 5-9
    • Doddrell, G.R.1
  • 20
    • 0001380781 scopus 로고
    • Characteristics of organizational environments and perceived environmental uncertainties
    • Duncan, R. (1972), "Characteristics of organizational environments and perceived environmental uncertainties", Administrative Science Quarterly, Vol. 17 No. 3, pp. 313-27.
    • (1972) Administrative Science Quarterly , vol.17 , Issue.3 , pp. 313-327
    • Duncan, R.1
  • 21
    • 0036765493 scopus 로고    scopus 로고
    • Management's role in information security in a cyber economy
    • Dutta, A. and McCrohan, K. (2002), "Management's role in information security in a cyber economy", California Management Review, Vol. 45 No. 1, pp. 67-87.
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 22
    • 0034516080 scopus 로고    scopus 로고
    • Information security management: An approach to combine process certification and product evaluation
    • Eloff, M.M. and von Solms, S.H. (2000), "Information security management: an approach to combine process certification and product evaluation", Computers & Security, Vol. 19 No. 3, pp. 698-709.
    • (2000) Computers & Security , vol.19 , Issue.3 , pp. 698-709
    • Eloff, M.M.1    Von Solms, S.H.2
  • 23
    • 0030684254 scopus 로고    scopus 로고
    • A management view of internet electronic commerce security
    • Farmer, D. and Warburg, S.G. (1997), "A management view of internet electronic commerce security", Computers & Security, Vol. 16 No. 4, pp. 316-20.
    • (1997) Computers & Security , vol.16 , Issue.4 , pp. 316-320
    • Farmer, D.1    Warburg, S.G.2
  • 24
    • 18844456006 scopus 로고    scopus 로고
    • Have you met your organization's computer usage policy?
    • Foltz, C.B., Cronan, T.P. and Jones, T.W. (2005), "Have you met your organization's computer usage policy?", Industrial Management & Data Systems, Vol. 105 No. 2, pp. 137-46.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.2 , pp. 137-146
    • Foltz, C.B.1    Cronan, T.P.2    Jones, T.W.3
  • 26
    • 0042468094 scopus 로고    scopus 로고
    • Paper: A study on the certification of the information security management systems
    • Fung, A.R-W., Farn, K-J. and Lin, A.C. (2003), "Paper: a study on the certification of the information security management systems", Computer Standards & Interfaces, Vol. 25 No. 5, pp. 447-61.
    • (2003) Computer Standards & Interfaces , vol.25 , Issue.5 , pp. 447-461
    • Fung, A.R.-W.1    Farn, K.-J.2    Lin, A.C.3
  • 29
    • 0039270128 scopus 로고    scopus 로고
    • Interorganizational links and innovation: The case of hospital services
    • Goes, J.B. and Park, S.H. (1997), "Interorganizational links and innovation: the case of hospital services", Academy of Management Journal, Vol. 40 No. 3, pp. 673-96.
    • (1997) Academy of Management Journal , vol.40 , Issue.3 , pp. 673-696
    • Goes, J.B.1    Park, S.H.2
  • 30
    • 0001823869 scopus 로고
    • Security concerns of system users: A study of perceptions of the adequacy of security
    • Goodhue, D.L. and Straub, D.W. (1991), "Security concerns of system users: a study of perceptions of the adequacy of security", Information & Management, Vol. 20 No. 1, pp. 13-27.
    • (1991) Information & Management , vol.20 , Issue.1 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 32
    • 9444231685 scopus 로고    scopus 로고
    • Managing agility and productivity in the electronics industry
    • Helo, P. (2004), "Managing agility and productivity in the electronics industry", Industrial Management & Data Systems, Vol. 104 No. 7, pp. 567-77.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.7 , pp. 567-577
    • Helo, P.1
  • 33
    • 0001900351 scopus 로고
    • Plugging into strategic partnerships: The critical IS connection
    • Henderson, J.C. (1990), "Plugging into strategic partnerships: the critical IS connection", Sloan Management Review, Vol. 31 No. 3, pp. 7-18.
    • (1990) Sloan Management Review , vol.31 , Issue.3 , pp. 7-18
    • Henderson, J.C.1
  • 34
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Hoffer, J.A. and Straub, D.W. (1989), "The 9 to 5 underground: are you policing computer crimes?", Sloan Management Review, Vol. 30 No. 4, pp. 35-43.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-43
    • Hoffer, J.A.1    Straub, D.W.2
  • 35
    • 33645025276 scopus 로고    scopus 로고
    • Information security management and assurance
    • Holzinger, A. (2000), "Information security management and assurance", Information Systems Security, Vol. 9 No. 2, pp. 32-9.
    • (2000) Information Systems Security , vol.9 , Issue.2 , pp. 32-39
    • Holzinger, A.1
  • 37
  • 38
    • 18844363640 scopus 로고    scopus 로고
    • Critical factors in adopting a knowledge management system for the pharmaceutical industry
    • Hung, Y-C., Huang, S-M., Lin, Q-P. and Tsai, M-L. (2005), "Critical factors in adopting a knowledge management system for the pharmaceutical industry", Industrial Management & Data Systems, Vol. 105 No. 2, pp. 164-83.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.2 , pp. 164-183
    • Hung, Y.-C.1    Huang, S.-M.2    Lin, Q.-P.3    Tsai, M.-L.4
  • 39
    • 33645034874 scopus 로고    scopus 로고
    • 2002 ISM survey: Does size matter?
    • September, available at: http://infosecuritymag.techtarget.com/2002/sep/ 2002survey.pdf
    • Information Security Magazine (2002), "2002 ISM survey: does size matter?", Information Security, September, available at: http://infosecuritymag.techtarget.com/2002/sep/2002survey.pdf.
    • (2002) Information Security
    • Security Magazine, I.1
  • 41
    • 34250421484 scopus 로고
    • An index of factorial simplicity
    • Kaiser, H. (1974), "An index of factorial simplicity", Psychometrika, Vol. 39, pp. 31-6.
    • (1974) Psychometrika , vol.39 , pp. 31-36
    • Kaiser, H.1
  • 43
    • 2342649504 scopus 로고    scopus 로고
    • The impact of industry contextual factors on IT focus and the use of IT for competitive advantage
    • Kearns, G.S. and Lederer, A.L. (2004), "The impact of industry contextual factors on IT focus and the use of IT for competitive advantage", Information & Management, Vol. 41 No. 7, pp. 899-919.
    • (2004) Information & Management , vol.41 , Issue.7 , pp. 899-919
    • Kearns, G.S.1    Lederer, A.L.2
  • 44
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A.G. and Clark, J.G. (2004), "Why there aren't more information security research studies", Information & Management, Vol. 41 No. 5, pp. 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 45
    • 3242727463 scopus 로고    scopus 로고
    • Assessing responsiveness of the food industry in Thailand
    • Kritchanchai, D. (2004), "Assessing responsiveness of the food industry in Thailand", Industrial Management & Data Systems, Vol. 104 No. 5, pp. 384-95.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.5 , pp. 384-395
    • Kritchanchai, D.1
  • 47
    • 3242801473 scopus 로고    scopus 로고
    • Technochange management: Using IT to drive organizational change
    • Markus, M.L. (2004), "Technochange management: using IT to drive organizational change", Journal of Information Technology, Vol. 19, pp. 4-20.
    • (2004) Journal of Information Technology , vol.19 , pp. 4-20
    • Markus, M.L.1
  • 48
  • 49
    • 0028713556 scopus 로고
    • Development of security policies
    • Olnes, J. (1994), "Development of security policies", Computers & Security, Vol. 13 No. 8, pp. 628-36.
    • (1994) Computers & Security , vol.13 , Issue.8 , pp. 628-636
    • Olnes, J.1
  • 50
    • 67649718927 scopus 로고    scopus 로고
    • Preparing for ISO17799
    • Peltier, T.R. (2003), "Preparing for ISO17799", Information Systems Security, Vol. 11 No. 6, pp. 21-8.
    • (2003) Information Systems Security , vol.11 , Issue.6 , pp. 21-28
    • Peltier, T.R.1
  • 51
    • 70449781351 scopus 로고
    • Organizational context and information systems success: A contingency approach
    • Raymond, L. (1990), "Organizational context and information systems success: a contingency approach", Journal of Management Information Systems, Vol. 6 No. 4, pp. 5-20.
    • (1990) Journal of Management Information Systems , vol.6 , Issue.4 , pp. 5-20
    • Raymond, L.1
  • 52
    • 0001940135 scopus 로고    scopus 로고
    • Factors that influence the social dimension of alignment between business and information technology objectives
    • Reich, B.H. and Benbasat, I. (2000), "Factors that influence the social dimension of alignment between business and information technology objectives", MIS Quarterly, Vol. 24 No. 1, pp. 81-111.
    • (2000) MIS Quarterly , vol.24 , Issue.1 , pp. 81-111
    • Reich, B.H.1    Benbasat, I.2
  • 53
    • 0002290655 scopus 로고    scopus 로고
    • Eight imperatives for the new IT organization
    • Rockart, J.F., Earl, M.J. and Ross, J.W. (1996), "Eight imperatives for the new IT organization", Sloan Management Review, Vol. 38 No. 1, pp. 43-55.
    • (1996) Sloan Management Review , vol.38 , Issue.1 , pp. 43-55
    • Rockart, J.F.1    Earl, M.J.2    Ross, J.W.3
  • 54
    • 0035589929 scopus 로고    scopus 로고
    • Alignment between business and IS strategies: A study of prospectors, analyzers and defenders
    • Sabherwal, R. and Chan, Y.E. (2001), "Alignment between business and IS strategies: a study of prospectors, analyzers and defenders", Information Systems Research, Vol. 12 No. 1, pp. 11-33.
    • (2001) Information Systems Research , vol.12 , Issue.1 , pp. 11-33
    • Sabherwal, R.1    Chan, Y.E.2
  • 59
    • 0036955834 scopus 로고    scopus 로고
    • The role of trust, quality, value and risk in conducting e-business
    • So, M. and Sculli, D. (2002), "The role of trust, quality, value and risk in conducting e-business", Industrial Management & Data Systems, Vol. 102 No. 9, pp. 503-12.
    • (2002) Industrial Management & Data Systems , vol.102 , Issue.9 , pp. 503-512
    • So, M.1    Sculli, D.2
  • 61
    • 0001771191 scopus 로고
    • Organizational differences in ISO 9000 implementation practices
    • Taylor, W.A. (1995), "Organizational differences in ISO 9000 implementation practices", International Journal of Quality & Reliability Management, Vol. 12 No. 7, pp. 10-17.
    • (1995) International Journal of Quality & Reliability Management , vol.12 , Issue.7 , pp. 10-17
    • Taylor, W.A.1
  • 62
    • 12444320402 scopus 로고    scopus 로고
    • Succession management practices in Australian organizations
    • Taylor, T. and McGraw, P. (2004), "Succession management practices in Australian organizations", International Journal of Manpower, Vol. 25 No. 8, pp. 741-58.
    • (2004) International Journal of Manpower , vol.25 , Issue.8 , pp. 741-758
    • Taylor, T.1    McGraw, P.2
  • 63
    • 84890025144 scopus 로고    scopus 로고
    • Implementation of ISO17799 and BS7799 in picture archiving and communication system: Local experience in implementation of BS7799 standard
    • Tong, C.K.S., Fung, K.H., Huang, H.Y.H. and Chan, K.K. (2003), "Implementation of ISO17799 and BS7799 in picture archiving and communication system: local experience in implementation of BS7799 standard", International Congress Series, Vol. 1256, pp. 311-8.
    • (2003) International Congress Series , vol.1256 , pp. 311-318
    • Tong, C.K.S.1    Fung, K.H.2    Huang, H.Y.H.3    Chan, K.K.4
  • 64
    • 85023799077 scopus 로고    scopus 로고
    • Information resource management: Stewards of data
    • van den Hoven, J. (1999), "Information resource management: stewards of data", Information Systems Management, Vol. 16 No. 1, pp. 88-90.
    • (1999) Information Systems Management , vol.16 , Issue.1 , pp. 88-90
    • Van Den Hoven, J.1
  • 65
    • 0036067283 scopus 로고    scopus 로고
    • The information security management toolbox - Taking the pain out of security management
    • Vermeulen, C. and von Solms, R. (2002), "The information security management toolbox - taking the pain out of security management", Information Management & Computer Security, Vol. 10 Nos 2/3, pp. 119-25.
    • (2002) Information Management & Computer Security , vol.10 , Issue.23 , pp. 119-125
    • Vermeulen, C.1    Von Solms, R.2
  • 66
    • 0030377647 scopus 로고    scopus 로고
    • Information security management: The second generation
    • von Solms, R. (1996), "Information security management: the second generation", Computers & Security, Vol. 15 No. 4, pp. 281-8.
    • (1996) Computers & Security , vol.15 , Issue.4 , pp. 281-288
    • Von Solms, R.1
  • 67
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • von Solms, B. and von Solms, R. (2004), "The 10 deadly sins of information security management", Computers & Security, Vol. 23 No. 5, pp. 371-6.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2
  • 68
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding the threats to information security
    • Whitman, M. (2004), "In defense of the realm: understanding the threats to information security", International Journal of Information Management, Vol. 24 No. 1, pp. 43-57.
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 43-57
    • Whitman, M.1
  • 69
    • 18844455453 scopus 로고    scopus 로고
    • The impacts of establishing enterprise information portals on e-business performance
    • Yang, S-M., Yang, M-H. and Wu, J-T.B. (2005), "The impacts of establishing enterprise information portals on e-business performance", Industrial Management & Data Systems, Vol. 105 No. 3, pp. 349-68.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.3 , pp. 349-368
    • Yang, S.-M.1    Yang, M.-H.2    Wu, J.-T.B.3
  • 70
    • 9144222725 scopus 로고    scopus 로고
    • Management of information technology and business process re-engineering: A case study
    • Zhao, F. (2004), "Management of information technology and business process re-engineering: a case study", Industrial Management & Data Systems, Vol. 104 No. 8, pp. 674-80.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.8 , pp. 674-680
    • Zhao, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.