메뉴 건너뛰기




Volumn 1, Issue 2, 2007, Pages 37-60

Information Security Effectiveness: Conceptualization and Validation of a Theory

Author keywords

information security; organizational effectiveness; organizational IS; structural equation modeling; survey development; top management support

Indexed keywords


EID: 85001799501     PISSN: 19301650     EISSN: 19301669     Source Type: Journal    
DOI: 10.4018/jisp.2007040103     Document Type: Article
Times cited : (42)

References (54)
  • 1
    • 0036644509 scopus 로고    scopus 로고
    • Computer monitoring: Benefts and pitfalls facing management
    • Ariss, S.S. (2002). Computer monitoring: Benefts and pitfalls facing management. Information & Management, 39(7), 553–558.
    • (2002) Information & Management , vol.39 , Issue.7 , pp. 553-558
    • Ariss, S.S.1
  • 2
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and internet security breaches
    • Bagchi, K., & Udo, G. (2003). An analysis of the growth of computer and internet security breaches. Communications of the AIS, 12(46), 684–700.
    • (2003) Communications of the AIS , vol.12 , Issue.46 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 3
    • 16344391307 scopus 로고    scopus 로고
    • Special issue on action research in information systems: Making IS research relevant to practice. Forward
    • Baskerville, R.L., & Myers, M.D. (2004). Special issue on action research in information systems: Making IS research relevant to practice. Forward. MIS Quarterly, 28(3), 329–335.
    • (2004) MIS Quarterly , vol.28 , Issue.3 , pp. 329-335
    • Baskerville, R.L.1    Myers, M.D.2
  • 4
    • 0002624070 scopus 로고    scopus 로고
    • Empirical research in information systems: The practice of relevance
    • Benbasat, I., & Zmud, R.W. (1999). Empirical research in information systems: The practice of relevance. MIS Quarterly, 23(1), 3–16.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 3-16
    • Benbasat, I.1    Zmud, R.W.2
  • 6
    • 33751224822 scopus 로고
    • Convergent and discriminant validation by the multi-trait-multimethod matrix
    • Campbell, D.T., & Fiske, D.W. (1959). Convergent and discriminant validation by the multi-trait-multimethod matrix. Psychological Bulletin, 56(2), 81–105.
    • (1959) Psychological Bulletin , vol.56 , Issue.2 , pp. 81-105
    • Campbell, D.T.1    Fiske, D.W.2
  • 7
    • 33644519719 scopus 로고    scopus 로고
    • Retrieved May 2004, from http://www.cert.org/stats/ cert_stats.html#incidents.
    • Computer Emergency Response Team (CERT). (2004). CERT statistics. Retrieved May 2004, from http://www.cert.org/stats/ cert_stats.html#incidents.
    • (2004) CERT statistics
  • 8
    • 0001840539 scopus 로고    scopus 로고
    • Scale development
    • 2nd ed Thousand Oaks, CA: Sage Publications
    • DeVellis, R.F. (2003). Scale development. Theory and applications (2nd ed.) (Vol. 26). Thousand Oaks, CA: Sage Publications.
    • (2003) Theory and applications , vol.26
    • DeVellis, R.F.1
  • 9
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Towards socio-organizational perspectives. Information Systems Journal, 11(2), 127–153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 10
    • 0001313519 scopus 로고
    • The infuence of general perceptions of training environment on pretraining motivation and perceived training transfer
    • Facteau, J.D., Dobbins, G.H., Russell, J.E.A., Ladd, R.T., & Kudisch, J.D. (1995). The infuence of general perceptions of training environment on pretraining motivation and perceived training transfer. Journal of Management, 21(1), 1–25.
    • (1995) Journal of Management , vol.21 , Issue.1 , pp. 1-25
    • Facteau, J.D.1    Dobbins, G.H.2    Russell, J.E.A.3    Ladd, R.T.4    Kudisch, J.D.5
  • 12
    • 0842346778 scopus 로고    scopus 로고
    • Testing moderator and mediator effects in counseling psychology
    • Frazier, P.A., Barron, K.E., & Tix, A.P. (2004). Testing moderator and mediator effects in counseling psychology. Journal of Counseling Psychology, 51(1), 115–134.
    • (2004) Journal of Counseling Psychology , vol.51 , Issue.1 , pp. 115-134
    • Frazier, P.A.1    Barron, K.E.2    Tix, A.P.3
  • 13
    • 24044457431 scopus 로고    scopus 로고
    • From contexts to constructs: The use of grounded theory in operationalising contingent process models
    • Galal, G.H. (2001). From contexts to constructs: The use of grounded theory in operationalising contingent process models. European Journal of Information Systems, 10, 2–14.
    • (2001) European Journal of Information Systems , vol.10 , pp. 2-14
    • Galal, G.H.1
  • 14
    • 85013136025 scopus 로고    scopus 로고
    • The fnancial impact of IT security breaches: What do investors think?
    • Garg, A., Curtis, J., & Halper, H. (2003). The fnancial impact of IT security breaches: What do investors think? Information Systems Security, 12(1), 22–34.
    • (2003) Information Systems Security , vol.12 , Issue.1 , pp. 22-34
    • Garg, A.1    Curtis, J.2    Halper, H.3
  • 15
    • 20344406702 scopus 로고    scopus 로고
    • Assessing unidimensionality through LISREL: An explanation and example
    • Gefen, D. (2003). Assessing unidimensionality through LISREL: An explanation and example. Communications of the AIS, 12, 23–46.
    • (2003) Communications of the AIS , vol.12 , pp. 23-46
    • Gefen, D.1
  • 16
    • 0000249403 scopus 로고    scopus 로고
    • Computer-based monitoring: Common perceptions and empirical results
    • George, J.F. (1996). Computer-based monitoring: Common perceptions and empirical results. MIS Quarterly, 20(4), 459–480.
    • (1996) MIS Quarterly , vol.20 , Issue.4 , pp. 459-480
    • George, J.F.1
  • 17
    • 33845358961 scopus 로고    scopus 로고
    • Bad management theories are destroying good management practices
    • Ghoshal, S. (2005). Bad management theories are destroying good management practices. Academy of Management Learning & Education, 4(1), 75–91.
    • (2005) Academy of Management Learning & Education , vol.4 , Issue.1 , pp. 75-91
    • Ghoshal, S.1
  • 21
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S.J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257–278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 22
    • 0003054486 scopus 로고    scopus 로고
    • A brief tutorial on the development of measures for use in survey questionnaires
    • Hinkin, T.R. (1998). A brief tutorial on the development of measures for use in survey questionnaires. Organizational Research Methods, 1(1), 104–121.
    • (1998) Organizational Research Methods , vol.1 , Issue.1 , pp. 104-121
    • Hinkin, T.R.1
  • 23
    • 0002390117 scopus 로고
    • Cultural constraints in management theories
    • Hofstede, G. (1993). Cultural constraints in management theories. Academy of Management Journal, 7(1), 81–94.
    • (1993) Academy of Management Journal , vol.7 , Issue.1 , pp. 81-94
    • Hofstede, G.1
  • 24
    • 0039396840 scopus 로고
    • Executive involvement and participation in the management of information technology
    • Jarvenpaa, S.L., & Ives, B. (1991). Executive involvement and participation in the management of information technology. MIS Quarterly, 15(2), 205–221.
    • (1991) MIS Quarterly , vol.15 , Issue.2 , pp. 205-221
    • Jarvenpaa, S.L.1    Ives, B.2
  • 27
    • 84900037986 scopus 로고    scopus 로고
    • Methodological issues in MIS crosscultural research
    • In M.E. Whitman & A.B. Woszczynski (Eds.) Hershey, PA: Idea Group Publishing
    • Karahanna, E., Evaristo, R., & Srite, M. (2004). Methodological issues in MIS crosscultural research. In M.E. Whitman & A.B. Woszczynski (Eds.), The handbook of information systems research (pp. 166–177). Hershey, PA: Idea Group Publishing.
    • (2004) The handbook of information systems research , pp. 166-177
    • Karahanna, E.1    Evaristo, R.2    Srite, M.3
  • 28
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A.G., & Clark, J.G. (2004). Why there aren't more information security research studies. Information & Management, 41(5), 597–607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 29
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behavior
    • Leach, J. (2003). Improving user security behavior. Computers & Security, 22(8), 685–692.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 30
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S.M., Lee, S.G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41(6), 707–718.
    • (2004) Information & Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 31
    • 84900223393 scopus 로고    scopus 로고
    • Mediation, confounding, and suppression: Different names for the same effect
    • MacKinnon, D.P., Krull, J.L., & Lockwood, C. (2000). Mediation, confounding, and suppression: Different names for the same effect. Prevention Science, 2, 15–27.
    • (2000) Prevention Science , vol.2 , pp. 15-27
    • MacKinnon, D.P.1    Krull, J.L.2    Lockwood, C.3
  • 34
    • 1542493643 scopus 로고
    • CASE tools as organizational change: Investigating incremental and radical changes in systems development
    • Orlikowski, W. (1993). CASE tools as organizational change: Investigating incremental and radical changes in systems development. MIS Quarterly, 17(3), 309–340.
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 309-340
    • Orlikowski, W.1
  • 37
    • 0141907688 scopus 로고    scopus 로고
    • Common method bias in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., & Podsakoff, N.P. (2003). Common method bias in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 38
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • Podsakoff, P.M., & Organ, D.W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531–544.
    • (1986) Journal of Management , vol.12 , Issue.4 , pp. 531-544
    • Podsakoff, P.M.1    Organ, D.W.2
  • 39
    • 9744262493 scopus 로고    scopus 로고
    • Strategic information systems planning success: An investigation of the construct and its measurement
    • Segars, A.H., & Grover, V. (1998). Strategic information systems planning success: An investigation of the construct and its measurement. MIS Quarterly, 22(2), 139–163.
    • (1998) MIS Quarterly , vol.22 , Issue.2 , pp. 139-163
    • Segars, A.H.1    Grover, V.2
  • 40
    • 9744271734 scopus 로고    scopus 로고
    • The contingent effects of management support and task interdependence on successful information systems implementation
    • Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS Quarterly, 27(4), 533–555.
    • (2003) MIS Quarterly , vol.27 , Issue.4 , pp. 533-555
    • Sharma, R.1    Yetton, P.2
  • 41
    • 84985286296 scopus 로고
    • Using self-report questionnaires in OB research: A comment on the use of a controversial method
    • Spector, P.E. (1994). Using self-report questionnaires in OB research: A comment on the use of a controversial method. Journal of Organizational Behavior, 15, 385–392.
    • (1994) Journal of Organizational Behavior , vol.15 , pp. 385-392
    • Spector, P.E.1
  • 42
    • 0000199952 scopus 로고
    • Alternative measures of system effectiveness: Associations and implications
    • Srinivasan, A. (1985). Alternative measures of system effectiveness: Associations and implications. MIS Quarterly, 9(3), 243–253.
    • (1985) MIS Quarterly , vol.9 , Issue.3 , pp. 243-253
    • Srinivasan, A.1
  • 43
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 44
    • 13244286108 scopus 로고    scopus 로고
    • Validating guidelines for IS positivist research
    • Straub, D.W., Boudreau, M.C., & Gefen, D. (2004). Validating guidelines for IS positivist research. Communications of the AIS, 13(24), 380–427.
    • (2004) Communications of the AIS , vol.13 , Issue.24 , pp. 380-427
    • Straub, D.W.1    Boudreau, M.C.2    Gefen, D.3
  • 45
    • 0003196246 scopus 로고
    • Measuring system usage: Implications for IS theory testing
    • Straub, D.W., Limayem, M., & Karahanna-Evaristo, E. (1995). Measuring system usage: Implications for IS theory testing. MIS Quarterly, 41(8), 1328–1342.
    • (1995) MIS Quarterly , vol.41 , Issue.8 , pp. 1328-1342
    • Straub, D.W.1    Limayem, M.2    Karahanna-Evaristo, E.3
  • 46
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A feld study
    • Straub, D.W., & Nance, W.D. (1990). Discovering and disciplining computer abuse in organizations: A feld study. MIS Quarterly, 14(1), 45–60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 47
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W., & Welke, R.J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 50
    • 84970314226 scopus 로고
    • Measurement of business economic performance: An examination of method convergency
    • Venkatraman, N., & Ramanujam, V. (1987). Measurement of business economic performance: An examination of method convergency. Journal of Management, 13(1), 109–122.
    • (1987) Journal of Management , vol.13 , Issue.1 , pp. 109-122
    • Venkatraman, N.1    Ramanujam, V.2
  • 52
    • 84886183445 scopus 로고
    • Plugging the leaks in computer security
    • Wasserman, J.J. (1969). Plugging the leaks in computer security. Harvard Business Review, 47(5), 119–129.
    • (1969) Harvard Business Review , vol.47 , Issue.5 , pp. 119-129
    • Wasserman, J.J.1
  • 53
    • 0000712087 scopus 로고
    • Lack of method variance in self-reported affect and perceptions at work: Reality or artifact?
    • Williams, L.J., Cote, J.A., & Buckley, M.R. (1989). Lack of method variance in self-reported affect and perceptions at work: Reality or artifact? Journal of Applied Psychology, 74, 462–468.
    • (1989) Journal of Applied Psychology , vol.74 , pp. 462-468
    • Williams, L.J.1    Cote, J.A.2    Buckley, M.R.3
  • 54
    • 0002861762 scopus 로고
    • Will societal modernization eventually eliminate cross-cultural psychological differences
    • In M.H. Bond (Ed.) Newbury Park, CA: Sage
    • Yang, K.S. (1986). Will societal modernization eventually eliminate cross-cultural psychological differences. In M.H. Bond (Ed.), The cross-cultural challenge to social psychology. Newbury Park, CA: Sage.
    • (1986) The cross-cultural challenge to social psychology
    • Yang, K.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.