메뉴 건너뛰기




Volumn 23, Issue 4, 2012, Pages 941-953

An analysis on effects of information security investments: A BSC perspective

Author keywords

Balanced score card (BSC); Critical success factors (CSF); Empirical analysis; Information security investments; Key performance indicators (KPI); Structural equation model (SEM)

Indexed keywords

BALANCED SCORECARDS; CRITICAL SUCCESS FACTOR; EMPIRICAL ANALYSIS; INFORMATION SECURITY INVESTMENT; KEY PERFORMANCE INDICATORS; STRUCTURAL EQUATION MODELS;

EID: 84865215063     PISSN: 09565515     EISSN: 15728145     Source Type: Journal    
DOI: 10.1007/s10845-010-0402-7     Document Type: Review
Times cited : (30)

References (48)
  • 1
    • 84865253334 scopus 로고    scopus 로고
    • A model of return on investment for information systems security
    • M. Al-Humaigani D. B. Dunn 2003 A model of return on investment for information systems security Circuits and Systems 1 483 485
    • (2003) Circuits and Systems , vol.1 , pp. 483-485
    • Al-Humaigani, M.1    Dunn, D.B.2
  • 2
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard-an economic perspective
    • Anderson, R. (2001). Why information security is hard-an economic perspective. Computer Security Application Conference (pp. 358-365).
    • (2001) Computer Security Application Conference , pp. 358-365
    • Anderson, R.1
  • 3
    • 41649112685 scopus 로고
    • Structural equation modeling in practice: A review and recommended two-step approach
    • 10.1037/0033-2909.103.3.411
    • J. C. Anderson D. W. Gerbing 1988 Structural equation modeling in practice: a review and recommended two-step approach Psychological Bulletin 103 411 423 10.1037/0033-2909.103.3.411
    • (1988) Psychological Bulletin , vol.103 , pp. 411-423
    • Anderson, J.C.1    Gerbing, D.W.2
  • 5
    • 0000153880 scopus 로고
    • Multitrait-multimethod matrices in consumer research
    • 10.1086/208568
    • R. P. Bagozzi Y. Yi 1991 Multitrait-multimethod matrices in consumer research Journal of Consumer Research 17 4 426 439 10.1086/208568
    • (1991) Journal of Consumer Research , vol.17 , Issue.4 , pp. 426-439
    • Bagozzi, R.P.1    Yi, Y.2
  • 6
    • 0037786271 scopus 로고
    • Performance and satisfaction in and industrial sales force: An examination of their antecedents and simultaneity
    • 10.2307/1249978
    • R. P. Bagozzi 1988 Performance and satisfaction in and industrial sales force: An examination of their antecedents and simultaneity Journal of Marketing 44 65 77 10.2307/1249978
    • (1988) Journal of Marketing , vol.44 , pp. 65-77
    • Bagozzi, R.P.1
  • 7
    • 84865226671 scopus 로고    scopus 로고
    • Returns on security investment: An imprecise but necessary calculation
    • B. Blakely 2001 Returns on security investment: An imprecise but necessary calculation Secure Business Quarterly 1 2 27
    • (2001) Secure Business Quarterly , vol.1 , Issue.2 , pp. 27
    • Blakely, B.1
  • 8
    • 58149320754 scopus 로고
    • Information Security Controls Are They Cost-effective
    • 10.1016/0960-2593(95)90080-2
    • C. Blatchford 1995 Information Security Controls Are They Cost-effective Computer Audit Journal 3 11 19 10.1016/0960-2593(95)90080-2
    • (1995) Computer Audit Journal , vol.3 , pp. 11-19
    • Blatchford, C.1
  • 9
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • 10.1145/1042091.1042094
    • L. D. Bodin L. A. Gordon M. P. Loeb 2005 Evaluating information security investments using the analytic hierarchy process Communications of the ACM 48 79 83 10.1145/1042091.1042094
    • (2005) Communications of the ACM , vol.48 , pp. 79-83
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 10
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • K. Campbell L. A. Gordon M. P. Loeb L. Zhou 2003 The economic cost of publicly announced information security breaches: Empirical evidence from the stock market Journal of Computer Security 11 3 431 448
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 13
    • 4243109556 scopus 로고    scopus 로고
    • A model for evaluating IT security investments
    • 10.1145/1005817.1005828
    • H. Cavusoglu B. Mishra S. Raghunathan 2004 A model for evaluating IT security investments Communications of the ACM 47 7 87 92 10.1145/1005817. 1005828
    • (2004) Communications of the ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 15
    • 29344445891 scopus 로고    scopus 로고
    • Return on security investment-proving it's worth it
    • 10.1016/S1353-4858(05)70301-9
    • A. Davis 2005 Return on security investment-proving it's worth it Network Security 2 8 10 10.1016/S1353-4858(05)70301-9
    • (2005) Network Security , vol.2 , pp. 8-10
    • Davis, A.1
  • 16
    • 0036738975 scopus 로고    scopus 로고
    • Antecedent of B2C channel satisfaction and preference: Validating e-Commerce metrics
    • 10.1287/isre.13.3.316.77
    • S. Devaraj M. Fan R. Kohli 2002 Antecedent of B2C channel satisfaction and preference: Validating e-Commerce metrics Information Systems Research 13 3 316 333 10.1287/isre.13.3.316.77
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 316-333
    • Devaraj, S.1    Fan, M.2    Kohli, R.3
  • 17
    • 0000009769 scopus 로고
    • Evaluating structural equations models with unobservable variables and measurement error
    • 10.2307/3151312
    • C. Fornell D. Larcker 1981 Evaluating structural equations models with unobservable variables and measurement error Journal of Marketing Research 18 39 50 10.2307/3151312
    • (1981) Journal of Marketing Research , vol.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.2
  • 21
    • 84865265876 scopus 로고    scopus 로고
    • The effect of information security breach and security investment announcement on the market value of Korean firms
    • (in Korean)
    • Gwon, Y. O.; & Kim, B. D. (2007) The effect of information security breach and security investment announcement on the market value of Korean firms. Information Systems Review, 9(1), 105-120. (in Korean).
    • (2007) Information Systems Review , vol.9 , Issue.1 , pp. 105-120
    • Gwon, Y.O.1    Kim, B.D.2
  • 24
    • 33846138611 scopus 로고    scopus 로고
    • Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    • 10.1007/s10796-006-9011-6
    • K. Hausken 2006 Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability Information System Frontiers 8 5 338 349 10.1007/s10796-006-9011-6
    • (2006) Information System Frontiers , vol.8 , Issue.5 , pp. 338-349
    • Hausken, K.1
  • 30
    • 84865242079 scopus 로고    scopus 로고
    • A study on TCO-based return on security investment (ROSI)
    • (in Korean)
    • Kim, J. D.; & Park, J. E. (2003) A study on TCO-based return on security investment (ROSI). In Proceedings of the Korea Digital Policy Conference (Vol. 1, pp. 251-261) (in Korean).
    • (2003) Proceedings of the Korea Digital Policy Conference , vol.1 , pp. 251-261
    • Kim, J.D.1    Park, J.E.2
  • 32
    • 7444249783 scopus 로고    scopus 로고
    • A framework for assessing the business value of information technology infrastructures
    • K. L. Kumar 2004 A framework for assessing the business value of information technology infrastructures Journal of management Information Systems 21 2 11 32
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 11-32
    • Kumar, K.L.1
  • 33
    • 35048852594 scopus 로고    scopus 로고
    • A fuzzy multi-criteria decision model for information system security investment
    • 10.1007/978-3-540-45080-1-58
    • V. C. S. Lee 2003 A fuzzy multi-criteria decision model for information system security investment Lecture Notes in Computer Science 2690 436 441 10.1007/978-3-540-45080-1-58
    • (2003) Lecture Notes in Computer Science , vol.2690 , pp. 436-441
    • Lee, V.C.S.1
  • 35
    • 79958862451 scopus 로고    scopus 로고
    • A goal-oriented trust model for virtual organization creation
    • Mun, J. T.; Shin, M. S.; & Jung, M. Y. (2009). A goal-oriented trust model for virtual organization creation. Journal of Intelligent Manufacturing. http://www.springerlink.com/content/03685347x1837440/.
    • (2009) Journal of Intelligent Manufacturing
    • Mun, J.T.1    Shin, M.S.2    Jung, M.Y.3
  • 38
    • 70449132594 scopus 로고    scopus 로고
    • Virtual organisation breeding environments value system and its elements
    • Romero, D.; Galeano, N.; & Molina1, A. (2008). Virtual organisation breeding environments value system and its elements. Journal of Intelligent Manufacturing. http://www.springerlink.com/content/x2374786057w57j3/.
    • (2008) Journal of Intelligent Manufacturing
    • Romero, D.1    Galeano, N.2    Molina, A.3
  • 42
    • 84865220015 scopus 로고    scopus 로고
    • Review the economics means to information security
    • (in Korean)
    • Shin, I. S. (2004). Review the economics means to information security. Information Security Review, 1(1), 27-40. (in Korean).
    • (2004) Information Security Review , vol.1 , Issue.1 , pp. 27-40
    • Shin, I.S.1
  • 44
    • 84865259414 scopus 로고    scopus 로고
    • A Study on the effect of information security policy and organization on the performance of information security
    • (in Korean)
    • Sun, H. G. (2005). A Study on the effect of information security policy and organization on the performance of information security. In Proceedings of the Korea management information system international conference, (pp. 1087-1095) (in Korean).
    • (2005) Proceedings of the Korea Management Information System International Conference , pp. 1087-1095
    • Sun, H.G.1
  • 45
    • 12144285368 scopus 로고    scopus 로고
    • Vulnerability and information security investment: An empirical analysis of E-local government in Japan
    • 10.1016/j.jaccpubpol.2004.12.003
    • H. Tanaka K. Matuura O. Sudoh 2005 Vulnerability and information security investment: An empirical analysis of E-local government in Japan Journal of Accounting and Public Policy 24 37 59 10.1016/j.jaccpubpol.2004.12.003
    • (2005) Journal of Accounting and Public Policy , vol.24 , pp. 37-59
    • Tanaka, H.1    Matuura, K.2    Sudoh, O.3
  • 46
    • 17844396492 scopus 로고    scopus 로고
    • The economic approach of information security
    • 10.1016/j.cose.2005.02.001
    • T. Tsiakis G. Stephanides 2005 The economic approach of information security Computers and Security 24 2 105 108 10.1016/j.cose.2005.02.001
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 105-108
    • Tsiakis, T.1    Stephanides, G.2
  • 48
    • 23844552166 scopus 로고    scopus 로고
    • Extending the TAM for a t-commerce
    • 10.1016/j.im.2004.11.001
    • J. E. Yu M. K. Ha Choi J. J. Rho 2005 Extending the TAM for a t-commerce Information and Management 42 965 976 10.1016/j.im.2004.11.001
    • (2005) Information and Management , vol.42 , pp. 965-976
    • Yu, J.E.1    Ha Choi, M.K.2    Rho, J.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.