Information technology security task-technology fit based on the technology-to-performance chain theory

  • Authors:
  • Carole C. Angolano;Indira R. Guzman;Michael S. Garmon;Carlos J. Navarrete

  • Affiliations:
  • Trident University International, Cypress, CA, USA;Trident University International, Cypress, CA, USA;Trident University International, Cypress, CA, USA;California State Polytechnic Univ Pomona, Pomona, CA, USA

  • Venue:
  • Proceedings of the 50th annual conference on Computers and People Research
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This research study explored the information security technologies that are currently being used within organizations; attempted to determine if, according to information technology security professionals, these technologies are performing the security tasks they were designed to perform; and evaluated the survivability of the infrastructure network after the infrastructure has been attacked or penetrated. The Technology-to-Performance Chain and the fit between tasks, technologies, and individual characteristics (Task-Technology Fit) are the theoretical basis for this study. This study incorporated the methodology of previous studies, but added the evaluations of security technologies and tasks by the IT professionals, which contributes to the existing knowledge base of information security. Structural equation modeling was used to determine the strength of the relationships between Task-Technology Fit, perceived performance impacts, and utilization of security technologies. Not all hypotheses were supported due to the re-specification of the original model.