메뉴 건너뛰기




Volumn 8, Issue 7, 2016, Pages

Leadership of information security manager on the effectiveness of information systems security for secure sustainable computing

Author keywords

Enforcement of information security policy; Information security effectiveness; Information security manager; Relevance of information security policy; Sustainable computing; Transformational leadership

Indexed keywords

ALGORITHM; DATA ACQUISITION; INFORMATION SYSTEM; LEADERSHIP; POLICY IMPLEMENTATION; SECURITY; STAKEHOLDER; SUSTAINABLE DEVELOPMENT;

EID: 84982693888     PISSN: 19370695     EISSN: None     Source Type: Journal    
DOI: 10.3390/su8070638     Document Type: Article
Times cited : (22)

References (81)
  • 2
    • 84874586939 scopus 로고    scopus 로고
    • E-Government Adoption in Public Administration Organizations: Integrating Institutional Theory Perspective and Resource-Based View
    • Zheng, D.; Chen, J.; Huang, L.; Zhang, C. E-Government Adoption in Public Administration Organizations: Integrating Institutional Theory Perspective and Resource-Based View. Eur. J. Inf. Syst. 2013, 22, 221-234.
    • (2013) Eur. J. Inf. Syst. , vol.22 , pp. 221-234
    • Zheng, D.1    Chen, J.2    Huang, L.3    Zhang, C.4
  • 5
    • 84886220343 scopus 로고    scopus 로고
    • accessed on 9 June
    • Clifford, A. Sustainable IT. Available online: http://it.toolbox.com/blogs/minimalit/sustainable-it-30157 (accessed on 9 June 2009).
    • (2009) Sustainable IT
    • Clifford, A.1
  • 6
    • 41149125559 scopus 로고    scopus 로고
    • Models of e-government: Are they correct? An empirical assessment
    • Coursey, D.; Norris, D.F. Models of E-Government: Are They Correct? An Empirical Assessment. Public Adm. Rev. 2008, 68, 523-536.
    • (2008) Public Adm. Rev. , vol.68 , pp. 523-536
    • Coursey, D.1    Norris, D.F.2
  • 7
    • 31344436619 scopus 로고    scopus 로고
    • Information privacy in organizations: Empowering creative and extrarole performance
    • Alge, B.J.; Ballinger, G.A.; Tangirala, S.; Oakley, J.L. Information Privacy in Organizations: Empowering Creative and Extrarole Performance. J. Appl. Psychol. 2006, 91, 221-232.
    • (2006) J. Appl. Psychol. , vol.91 , pp. 221-232
    • Alge, B.J.1    Ballinger, G.A.2    Tangirala, S.3    Oakley, J.L.4
  • 9
    • 84887227513 scopus 로고    scopus 로고
    • A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
    • Feng, N.;Wang, H.J.; Li, M.Q. A Security Risk Analysis Model for Information Systems: Causal Relationships of Risk Factors and Vulnerability Propagation Analysis. Inf. Sci. 2014, 256, 57-73.
    • (2014) Inf. Sci. , vol.256 , pp. 57-73
    • Feng, N.1    Wang, H.J.2    Li, M.Q.3
  • 10
    • 84945237161 scopus 로고    scopus 로고
    • Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations
    • Choi, M.; Lee, C.H. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations. Sustainability 2015, 7, 12032-12051.
    • (2015) Sustainability , vol.7 , pp. 12032-12051
    • Choi, M.1    Lee, C.H.2
  • 11
    • 67650100804 scopus 로고    scopus 로고
    • If someone iswatching, i'll do what i'm asked: Mandatoriness, control, and information security
    • Boss, S.R.; Kirsch, L.J.; Angermeier, I.; Shingler, R.A.; Boss, R.W. If Someone isWatching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security. Eur. J. Inf. Syst. 2009, 18, 151-164.
    • (2009) Eur. J. Inf. Syst. , vol.18 , pp. 151-164
    • Boss, S.R.1    Kirsch, L.J.2    Angermeier, I.3    Shingler, R.A.4    Boss, R.W.5
  • 12
    • 84982723008 scopus 로고
    • Information security: An overview and resource guide for information managers
    • Hill, L.B.; Pemberton, J.M. Information Security: An Overview and Resource Guide for Information Managers. Rec. Manag. Q. 1995, 29, 14-24.
    • (1995) Rec. Manag. Q. , vol.29 , pp. 14-24
    • Hill, L.B.1    Pemberton, J.M.2
  • 15
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality based beliefs and information security awareness
    • Bulgurcu, B.; Cavusoglu, H.; Benbasat, I. Information Security Policy Compliance: An Empirical Study of Rationality Based Beliefs and Information Security Awareness. MIS Q. 2010, 34, 523-548.
    • (2010) MIS Q. , vol.34 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 16
    • 84887697195 scopus 로고    scopus 로고
    • Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
    • Posey, C.; Roberts, T.L.; Lowry, P.B.; Bennett, R.J.; Courtney, J.F. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors. MIS Q. 2013, 37, 1189-1210.
    • (2013) MIS Q. , vol.37 , pp. 1189-1210
    • Posey, C.1    Roberts, T.L.2    Lowry, P.B.3    Bennett, R.J.4    Courtney, J.F.5
  • 17
    • 84905975061 scopus 로고    scopus 로고
    • Control-related motivations and information security policy compliance: The role of autonomy and efficacy
    • Wall, J.D.; Palvia, P.; Lowry, P.B. Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. J. Inf. Priv. Secur. 2013, 9, 52-79.
    • (2013) J. Inf. Priv. Secur. , vol.9 , pp. 52-79
    • Wall, J.D.1    Palvia, P.2    Lowry, P.B.3
  • 18
    • 56649107890 scopus 로고    scopus 로고
    • Sociopolitical dynamics in relations between top managers and security analysts: Favor rendering, reciprocity, and analyst stock recommendations
    • Westphal, J.D.; Clement, M.B. Sociopolitical Dynamics in Relations between Top Managers and Security Analysts: Favor Rendering, Reciprocity, and Analyst Stock Recommendations. Acad. Manag. J. 2008, 51, 873-897.
    • (2008) Acad. Manag. J. , vol.51 , pp. 873-897
    • Westphal, J.D.1    Clement, M.B.2
  • 19
    • 84921472616 scopus 로고    scopus 로고
    • An implementation framework for e-government 2.0
    • Sun, P.L.; Ku, C.Y.; Shih, D.H. An Implementation Framework for E-Government 2.0. Telemat. Inform. 2015, 32, 504-520.
    • (2015) Telemat. Inform. , vol.32 , pp. 504-520
    • Sun, P.L.1    Ku, C.Y.2    Shih, D.H.3
  • 20
    • 84982932433 scopus 로고    scopus 로고
    • UNPOG. E-Government of Korea: Best Practices; Ministry of Public Administration and Security, National Information Society Agency: Seoul, Korea, 2009
    • UNPOG. E-Government of Korea: Best Practices; Ministry of Public Administration and Security, National Information Society Agency: Seoul, Korea, 2009.
  • 21
    • 84982671195 scopus 로고    scopus 로고
    • Ways to establish public authorities information security governance utilizing e-government information security management system (G-ISMS)
    • Ryu, S.H.; Jeong, D.R.; Jung, H.K.Ways to Establish Public Authorities Information Security Governance Utilizing E-Government Information Security Management System (G-ISMS). Korea Inst. Inf. Commun. Eng. 2013, 17, 769-774.
    • (2013) Korea Inst. Inf. Commun. Eng. , vol.17 , pp. 769-774
    • Ryu, S.H.1    Jeong, D.R.2    Jung, H.K.3
  • 22
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in is security research: Towards socio-organizational perspectives
    • Dhillon, G.; Backhouse, J. Current Directions in IS Security Research: Towards Socio-Organizational Perspectives. Inf. Syst. J. 2001, 11, 127-153.
    • (2001) Inf. Syst. J. , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 23
    • 84863542038 scopus 로고    scopus 로고
    • Managing employee compliance with information security policies: The critical role of top management and organizational culture
    • Hu, Q.; Dinev, T.; Hart, P.; Cooke, D. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture. Decis. Sci. 2012, 43, 615-660.
    • (2012) Decis. Sci. , vol.43 , pp. 615-660
    • Hu, Q.1    Dinev, T.2    Hart, P.3    Cooke, D.4
  • 25
    • 0001983842 scopus 로고    scopus 로고
    • Social role theory of sex differences and similarities: A current appraisal
    • Eckes, T., Trautner, H.M., Eds.; Psychology Press: New York, NY, USA
    • Eagly, A.H.; Wood, W.; Diekman, A.B. Social Role Theory of Sex Differences and Similarities: A Current Appraisal. In The Developmental Social Psychology of Gender; Eckes, T., Trautner, H.M., Eds.; Psychology Press: New York, NY, USA, 2000; Volume 5, pp. 123-174.
    • (2000) The Developmental Social Psychology of Gender , vol.5 , pp. 123-174
    • Eagly, A.H.1    Wood, W.2    Diekman, A.B.3
  • 27
    • 67649116155 scopus 로고    scopus 로고
    • Educational requirement analysis for information security professionals in korea
    • Kim, S.; Choi, M. Educational Requirement Analysis for Information Security Professionals in Korea. J. Inf. Syst. Educ. 2002, 13, 237-248.
    • (2002) J. Inf. Syst. Educ. , vol.13 , pp. 237-248
    • Kim, S.1    Choi, M.2
  • 28
    • 33947135863 scopus 로고    scopus 로고
    • Curriculum design and evaluation for e-commerce security education using ahp
    • Kim, H.; Han, Y.; Choi, M.; Kim, S. Curriculum Design and Evaluation for E-Commerce Security Education Using AHP. IEICE Trans. Inf. Syst. 2007, 90, 668-675.
    • (2007) IEICE Trans. Inf. Syst. , vol.90 , pp. 668-675
    • Kim, H.1    Han, Y.2    Choi, M.3    Kim, S.4
  • 29
  • 32
    • 0242721359 scopus 로고    scopus 로고
    • Applying information security governance
    • Moulton, R.; Coles, R.S. Applying Information Security Governance. Comput. Secur. 2003, 22, 580-584.
    • (2003) Comput. Secur. , vol.22 , pp. 580-584
    • Moulton, R.1    Coles, R.S.2
  • 33
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub, D.W.; Nance,W.D. Discovering and Disciplining Computer Abuse in Organizations: A Field Study. MIS Q. 1990, 14, 45-60.
    • (1990) MIS Q. , vol.14 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 34
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub, D.W. Effective IS security: An empirical study. Inf. Syst. Res. 1990, 1, 255-276.
    • (1990) Inf. Syst. Res. , vol.1 , pp. 255-276
    • Straub, D.W.1
  • 35
    • 0031288375 scopus 로고    scopus 로고
    • Preventive and deterrent controls for software piracy
    • Gopal, R.D.; Sanders, G.L. Preventive and Deterrent Controls for Software Piracy. J. Manag. Inf. Syst. 1997, 13, 29-47.
    • (1997) J. Manag. Inf. Syst. , vol.13 , pp. 29-47
    • Gopal, R.D.1    Sanders, G.L.2
  • 36
    • 0041426663 scopus 로고    scopus 로고
    • Software piracy in the workplace: A model and empirical test
    • Peace, A.G.; Galletta, D.F.; Thong, J.Y. Software Piracy in the Workplace: A Model and Empirical Test. J. Manag. Inf. Syst. 2003, 20, 153-177.
    • (2003) J. Manag. Inf. Syst. , vol.20 , pp. 153-177
    • Peace, A.G.1    Galletta, D.F.2    Thong, J.Y.3
  • 37
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M.; Vance, A. Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Q. 2010, 34, 487-502.
    • (2010) MIS Q. , vol.34 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 38
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information security policy abuse by employees?
    • Hu, Q.; Xu, Z.; Dinev, T.; Ling, H. Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? Commun. ACM 2011, 54, 54-60.
    • (2011) Commun. ACM , vol.54 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 39
    • 24644439555 scopus 로고    scopus 로고
    • Information security policy's impact on reporting security incidents
    • Wiant, T.L. Information Security Policy's Impact on Reporting Security Incidents. Comput. Secur. 2005, 24, 448-459.
    • (2005) Comput. Secur. , vol.24 , pp. 448-459
    • Wiant, T.L.1
  • 40
    • 0004289281 scopus 로고
    • Reston Publication, Prentice-Hall: Reston, VA, USA
    • Parker, D.B. Computer Security Management; Reston Publication, Prentice-Hall: Reston, VA, USA, 1981.
    • (1981) Computer Security Management
    • Parker, D.B.1
  • 41
    • 60549111652 scopus 로고    scopus 로고
    • Leadership: Current theories, research, and future directions
    • Avolio, B.J.; Walumbwa, F.O.; Weber, T.J. Leadership: Current Theories, Research, and Future Directions. Annu. Rev. Psychol. 2009, 60, 421-449.
    • (2009) Annu. Rev. Psychol. , vol.60 , pp. 421-449
    • Avolio, B.J.1    Walumbwa, F.O.2    Weber, T.J.3
  • 42
    • 0003446464 scopus 로고    scopus 로고
    • Prentice-Hall: Upper Saddle River, NJ, USA
    • Yukl, G. Leadership in Organizations; Prentice-Hall: Upper Saddle River, NJ, USA, 2010.
    • (2010) Leadership in Organizations
    • Yukl, G.1
  • 43
    • 0003842485 scopus 로고
    • Harper & Row: New York, NY, USA
    • Burns, J.M. Leadership; Harper & Row: New York, NY, USA, 1978.
    • (1978) Leadership
    • Burns, J.M.1
  • 46
    • 0000476502 scopus 로고    scopus 로고
    • Ten years of the leadership quarterly: Contributions and challenges for the future
    • Lowe, K.B.; Gardner, W.L. Ten Years of the Leadership Quarterly: Contributions and Challenges for the Future. Leadersh. Q. 2000, 11, 459-514.
    • (2000) Leadersh. Q. , vol.11 , pp. 459-514
    • Lowe, K.B.1    Gardner, W.L.2
  • 47
    • 58149322472 scopus 로고
    • Relationship-based approach to leadership: Development of leader-member exchange (lmx) theory of leadership over 25 years: Applying a multi-level multi-domain perspective
    • Graen, G.B.; Uhl-Bien, M. Relationship-Based Approach to Leadership: Development of Leader-Member Exchange (LMX) Theory of Leadership over 25 Years: Applying a Multi-Level Multi-Domain Perspective. Leadersh. Q. 1995, 6, 219-247.
    • (1995) Leadersh. Q. , vol.6 , pp. 219-247
    • Graen, G.B.1    Uhl-Bien, M.2
  • 49
    • 7444265887 scopus 로고    scopus 로고
    • Transformational and Transactional Leadership: A Meta-Analytic Test of Their Relative Validity
    • Judge, T.A.; Piccolo, R.F. Transformational and Transactional Leadership: A Meta-Analytic Test of Their Relative Validity. J. Appl. Psychol. 2004, 89, 755-768.
    • (2004) J. Appl. Psychol. , vol.89 , pp. 755-768
    • Judge, T.A.1    Piccolo, R.F.2
  • 50
    • 38549155674 scopus 로고    scopus 로고
    • Authentic leadership: Development and analysis of a multidimensional theory-based measure
    • Walumbwa, F.O.; Avolio, B.J.; Gardner, W.L.; Wernsing, T.S.; Peterson, S.J. Authentic Leadership: Development and Analysis of a Multidimensional Theory-Based Measure. J. Manag. 2008, 34, 89-126.
    • (2008) J. Manag. , vol.34 , pp. 89-126
    • Walumbwa, F.O.1    Avolio, B.J.2    Gardner, W.L.3    Wernsing, T.S.4    Peterson, S.J.5
  • 51
    • 34548845567 scopus 로고    scopus 로고
    • Transforming service employees and climate: A multilevel, multisource examination of transformational leadership in building long-term service relationships
    • Liao, H.; Chuang, A. Transforming Service Employees and Climate: A Multilevel, Multisource Examination of Transformational Leadership in Building Long-Term Service Relationships. J. Appl. Psychol. 2007, 92, 1006-1019.
    • (2007) J. Appl. Psychol. , vol.92 , pp. 1006-1019
    • Liao, H.1    Chuang, A.2
  • 52
    • 33646550159 scopus 로고    scopus 로고
    • Transformational leadership and job behaviors: The mediating role of core job characteristics
    • Piccolo, R.F.; Colquitt, J.A. Transformational Leadership and Job Behaviors: The Mediating Role of Core Job Characteristics. Acad. Manag. J. 2006, 49, 327-340.
    • (2006) Acad. Manag. J. , vol.49 , pp. 327-340
    • Piccolo, R.F.1    Colquitt, J.A.2
  • 53
    • 22944482170 scopus 로고    scopus 로고
    • Leader-member exchange as a mediator of the relationship between transformational leadership and followers' performance and organizational citizenship behavior
    • Wang, H.; Law, K.S.; Hackett, R.D.; Wang, D.; Chen, Z.X. Leader-Member Exchange as a Mediator of the Relationship between Transformational Leadership and Followers' Performance and Organizational Citizenship Behavior. Acad. Manag. J. 2005, 48, 420-432.
    • (2005) Acad. Manag. J. , vol.48 , pp. 420-432
    • Wang, H.1    Law, K.S.2    Hackett, R.D.3    Wang, D.4    Chen, Z.X.5
  • 54
    • 0037396266 scopus 로고    scopus 로고
    • Predicting unit performance by assessing transformational and transactional leadership
    • Bass, B.M.; Avolio, B.J.; Jung, D.I.; Berson, Y. Predicting Unit Performance by Assessing Transformational and Transactional Leadership. J. Appl. Psychol. 2003, 85, 207-218.
    • (2003) J. Appl. Psychol. , vol.85 , pp. 207-218
    • Bass, B.M.1    Avolio, B.J.2    Jung, D.I.3    Berson, Y.4
  • 55
    • 34548814132 scopus 로고    scopus 로고
    • Embracing transformational leadership: Team values and the impact of leader behavior on team performance
    • Schaubroeck, J.; Lam, S.S.; Cha, S.E. Embracing Transformational Leadership: Team Values and the Impact of Leader Behavior on Team Performance. J. Appl. Psychol. 2007, 92, 1020-1030.
    • (2007) J. Appl. Psychol. , vol.92 , pp. 1020-1030
    • Schaubroeck, J.1    Lam, S.S.2    Cha, S.E.3
  • 56
    • 58349086999 scopus 로고    scopus 로고
    • Strategic leadership for exploration and exploitation: The moderating role of environmental dynamism
    • Jansen, J.J.; Vera, D.; Crossan, M. Strategic Leadership for Exploration and Exploitation: The Moderating Role of Environmental Dynamism. Leadersh. Q. 2009, 20, 5-18.
    • (2009) Leadersh. Q. , vol.20 , pp. 5-18
    • Jansen, J.J.1    Vera, D.2    Crossan, M.3
  • 57
    • 10744219817 scopus 로고    scopus 로고
    • Effects of leadership style, anonymity, and rewards on creativity-relevant processes and outcomes in an electronic meeting system context
    • Kahai, S.S.; Sosik, J.J.; Avolio, B.J. Effects of Leadership Style, Anonymity, and Rewards on Creativity-Relevant Processes and Outcomes in an Electronic Meeting System Context. Leadersh. Q. 2003, 14, 499-524.
    • (2003) Leadersh. Q. , vol.14 , pp. 499-524
    • Kahai, S.S.1    Sosik, J.J.2    Avolio, B.J.3
  • 58
    • 0037398619 scopus 로고    scopus 로고
    • The two faces of transformational leadership: Empowerment and dependency
    • Kark, R.; Shamir, B.; Chen, G. The Two Faces of Transformational Leadership: Empowerment and Dependency. J. Appl. Psychol. 2003, 88, 246-255.
    • (2003) J. Appl. Psychol. , vol.88 , pp. 246-255
    • Kark, R.1    Shamir, B.2    Chen, G.3
  • 59
    • 0041905260 scopus 로고    scopus 로고
    • Leadership, values, and subordinate self-concepts
    • Lord, R.G.; Brown, D.J. Leadership, Values, and Subordinate Self-Concepts. Leadersh. Q. 2001, 12, 133-152.
    • (2001) Leadersh. Q. , vol.12 , pp. 133-152
    • Lord, R.G.1    Brown, D.J.2
  • 61
    • 0033249338 scopus 로고    scopus 로고
    • Re-examining the components of transformational and transactional leadership using the multifactor leadership
    • Avolio, B.J.; Bass, B.M.; Jung, D.I. Re-Examining the Components of Transformational and Transactional Leadership Using the Multifactor Leadership. J. Occup. Organ. Psychol. 1999, 72, 441-462.
    • (1999) J. Occup. Organ. Psychol. , vol.72 , pp. 441-462
    • Avolio, B.J.1    Bass, B.M.2    Jung, D.I.3
  • 62
    • 0005049310 scopus 로고    scopus 로고
    • Effective correlation of transformational and transactional leadership: A meta-analytical review
    • Lowe, K.B.; Kroeck, K.G.; Sivasubramaniam, N. Effective Correlation of Transformational and Transactional Leadership: A Meta-Analytical Review. Leadersh. Q. 1996, 7, 385-425.
    • (1996) Leadersh. Q. , vol.7 , pp. 385-425
    • Lowe, K.B.1    Kroeck, K.G.2    Sivasubramaniam, N.3
  • 63
    • 24044451509 scopus 로고    scopus 로고
    • Beyond trust: Security policies and defence in depth
    • Kemp, M. Beyond Trust: Security Policies and Defence in Depth. Netw. Secur. 2005, 2005, 14-16.
    • (2005) Netw. Secur. , vol.2005 , pp. 14-16
    • Kemp, M.1
  • 64
    • 33744520370 scopus 로고    scopus 로고
    • Towards an information security competence maturity model
    • Thomson, K.L.; von Solms, R. Towards an Information Security Competence Maturity Model. Comput. Fraud Secur. 2006, 2006, 11-15.
    • (2006) Comput. Fraud Secur. , vol.2006 , pp. 11-15
    • Thomson, K.L.1    Von Solms, R.2
  • 65
    • 85001799501 scopus 로고    scopus 로고
    • Information security effectiveness: Conceptualization and validation of a theory
    • Knapp, K.J.; Marshall, T.E.; Rainer, R.K., Jr.; Ford, F.N. Information Security Effectiveness: Conceptualization and Validation of a Theory. Int. J. Inf. Secur. Priv. 2007, 1, 37-60.
    • (2007) Int. J. Inf. Secur. Priv. , vol.1 , pp. 37-60
    • Knapp, K.J.1    Marshall, T.E.2    Rainer, R.K.3    Ford, F.N.4
  • 67
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy-what do international security standards say?
    • Hone, K.; Eloff, J.H.P. Information Security Policy-What Do International Security Standards Say? Comput. Secur. 2002, 21, 402-409.
    • (2002) Comput. Secur. , vol.21 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 68
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security policies: A contextual perspective
    • Karyda, M.; Kiountouzis, E.; Kokolakis, S. Information Systems Security Policies: A Contextual Perspective. Comput. Secur. 2005, 24, 246-260.
    • (2005) Comput. Secur. , vol.24 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 69
    • 54949146918 scopus 로고    scopus 로고
    • Implementation and effectiveness of organizational information security measures
    • Hagen, J.M.; Albrechtsen, E.; Hovden, J. Implementation and Effectiveness of Organizational Information Security Measures. Inf. Manag. Secur. 2008, 16, 377-397.
    • (2008) Inf. Manag. Secur. , vol.16 , pp. 377-397
    • Hagen, J.M.1    Albrechtsen, E.2    Hovden, J.3
  • 70
    • 0037400028 scopus 로고    scopus 로고
    • An integrative study of information systems security effectiveness
    • Kankanhalli, A.; Teo, H.H.; Tan, B.C.; Wei, K.K. An Integrative Study of Information Systems Security Effectiveness. Int. J. Inf. Manag. 2003, 23, 139-154.
    • (2003) Int. J. Inf. Manag. , vol.23 , pp. 139-154
    • Kankanhalli, A.1    Teo, H.H.2    Tan, B.C.3    Wei, K.K.4
  • 71
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W. Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Q. 1998, 22, 441-469.
    • (1998) MIS Q. , vol.22 , pp. 441-469
    • Straub, D.W.1
  • 72
    • 1642374239 scopus 로고    scopus 로고
    • The relevance of transformational leadership to nontraditional accounting services: Information systems assurance and business consulting
    • Viator, R.E. The Relevance of Transformational Leadership to Nontraditional Accounting Services: Information Systems Assurance and Business Consulting. J. Inf. Syst. 2001, 15, 99-125.
    • (2001) J. Inf. Syst. , vol.15 , pp. 99-125
    • Viator, R.E.1
  • 73
    • 0000893909 scopus 로고
    • Transformational leader behavior and their effects on followers' trust in leader, satisfaction, and organizational citizenship behaviors
    • Podsakoff, P.M.; MacKenzie, S.B.; Moorman, R.H.; Fetter, R. Transformational Leader Behavior and Their Effects on Followers' Trust in Leader, Satisfaction, and Organizational Citizenship Behaviors. Leadersh. Q. 1990, 1, 107-142.
    • (1990) Leadersh. Q. , vol.1 , pp. 107-142
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Moorman, R.H.3    Fetter, R.4
  • 74
    • 43249115124 scopus 로고    scopus 로고
    • Organizational culture and leadership in erp implementation
    • Ke, W.; Wei, K.K. Organizational Culture and Leadership in ERP Implementation. Decis. Support Syst. 2008, 45, 208-218.
    • (2008) Decis. Support Syst. , vol.45 , pp. 208-218
    • Ke, W.1    Wei, K.K.2
  • 75
    • 33749347189 scopus 로고    scopus 로고
    • Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
    • Pavlou, P.A.; Fygenson, M. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior. MIS Q. 2006, 30, 115-143.
    • (2006) MIS Q. , vol.30 , pp. 115-143
    • Pavlou, P.A.1    Fygenson, M.2
  • 76
    • 0002042337 scopus 로고    scopus 로고
    • Issues and opinion on structural equation modeling
    • Chin, W.W. Issues and Opinion on Structural Equation Modeling. MIS Q. 1998, 22, 7-16.
    • (1998) MIS Q. , vol.22 , pp. 7-16
    • Chin, W.W.1
  • 77
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
    • Baron, R.M.; Kenny, D.A. The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations. J. Personal. Soc. Psychol. 1986, 51, 1173-1182.
    • (1986) J. Personal. Soc. Psychol. , vol.51 , pp. 1173-1182
    • Baron, R.M.1    Kenny, D.A.2
  • 78
    • 49249127269 scopus 로고    scopus 로고
    • Information security management objectives and practices: A parsimonious framework
    • Ma, Q.; Johnston, A.C.; Pearson, J.M. Information Security Management Objectives and Practices: A Parsimonious Framework. Inf. Manag. Comput. Secur. 2008, 16, 251-270.
    • (2008) Inf. Manag. Comput. Secur. , vol.16 , pp. 251-270
    • Ma, Q.1    Johnston, A.C.2    Pearson, J.M.3
  • 79
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • Von Solms, B.; von Solms, R. The 10 deadly sins of information security management. Comput. Secur. 2004, 23, 371-376.
    • (2004) Comput. Secur. , vol.23 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2
  • 80
    • 4344705413 scopus 로고    scopus 로고
    • Institutional isomorphism and public sector organizations
    • Frumkin, P.; Galaskiewicz, J. Institutional Isomorphism and Public Sector Organizations. J. Public Adm. Res. Theory 2004, 14, 283-307.
    • (2004) J. Public Adm. Res. Theory , vol.14 , pp. 283-307
    • Frumkin, P.1    Galaskiewicz, J.2
  • 81
    • 16544376163 scopus 로고    scopus 로고
    • Transactional versus transformational style of leadership-employee perception of leadership efficacy in public and private hospitals in Kuwait
    • Al-Mailam, F.F. Transactional versus Transformational Style of Leadership-Employee Perception of Leadership Efficacy in Public and Private Hospitals in Kuwait. Qual. Manag. Health Care 2004, 13, 278-284.
    • (2004) Qual. Manag. Health Care , vol.13 , pp. 278-284
    • Al-Mailam, F.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.