Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Using information security to achieve competitive advantage
Computers and Security
Multivariate data analysis (4th ed.): with readings
Multivariate data analysis (4th ed.): with readings
Using information security as a response to competitor analysis systems
Communications of the ACM
ACM SIGMIS Database - Special issue on adoption, diffusion, and infusion of IT
Emergent maintenance of ERP: new roles and relationships
Journal of Software Maintenance: Research and Practice - Large packaged application software maintenance
Security threats to internet: a Korean multi-industry investigation
Information and Management
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
The Illusory Diffusion of Innovation: An Examination of Assimilation Gaps
Information Systems Research
Information Systems Research
Why there aren't more information security research studies
Information and Management
A model for evaluating IT security investments
Communications of the ACM - Has the Internet become indispensable?
The Value of Intrusion Detection Systems in Information Technology Security Architecture
Information Systems Research
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
An analysis of the traditional IS security approaches: implications for research and practice
European Journal of Information Systems
An examination of factors contributing to South Korea's global leadership in broadband adoption
Telematics and Informatics - Special issue: The World summit on the information society (WSIS) from an Asian-Pacific region perspective
The Journal of Strategic Information Systems
Journal of Management Information Systems
Information Systems Research
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
An integrative study of information systems security effectiveness
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
This research investigates information security management as an administrative innovation. Although a number of institutional theories deal with information systems (IS) innovation in organizations, most of these institutional-centered frameworks overlook external economic efficiency and internal organizational capability in the presence of pressures of institutional conformity. Using Korea as the institutional setting, our research model posits that economic-based consideration will moderate the institutional conformity pressure on information security adoption while organization capability will influence the institutional confirmation of information security assimilation. The model is empirically tested using two-stage survey data from a field study of 140 organizations in Korea. The results indicate that in addition to institutional influences, our six proposed economic-based and organizational capability moderating variables all have significant influences on the degree of the adoption and assimilation of information security management. We conclude with implications for research in the area of organizational theory and the information security management literature, and for practices regarding how managers can factor into their information security planning the key implementation variables discovered in this study. The robust setting of the study in Korean firms allows us to generalize the theory to a new context and across cultures.