IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v10y2018i5p1555-d146182.html
   My bibliography  Save this article

Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism

Author

Listed:
  • Myeonggil Choi

    (Department of Business Administration, Chung-Ang University, Seoul 06974, Korea)

  • Jungwoo Lee

    (Graduate School of Information, Yonsei University, Seoul 03722, Korea)

  • Kumju Hwang

    (Department of Business Administration, Chung-Ang University, Seoul 06974, Korea)

Abstract

This study investigated information systems security (ISS) as one of the important issues of e-government for sustainable development. ISS is becoming increasingly important in the discourse on information technology-related organizational transformation, and governments need to undergo organizational transformation to establish an effective ISS system for advancing e-government capacity which plays a vital role in achieving sustainability. Furthermore, ISS breaches are becoming the norm rather than the exception, but ISS can only be achieved when employees fully and firmly embrace the concept by changing their behavior to comply with advanced ISS technologies. A research model is theoretically developed in this context based on institution theory, which proposes a dual path model consisting of legitimacy-leading organizational citizenship behaviors (OCB) and organizational cynicism-causing counterproductive work behaviors (CWB) in the process of innovating ISS for e-government. This dual-path model is empirically tested against 388 data collected from information security managers in 30 departments and councils within Korea’s central government. A structural model evaluation of the collected data principally validates the research model. The results indicate that the path through legitimacy, influenced by normative and coercive isomorphism, is stronger than that through organizational cynicism. The data largely supports the proposed research model, confirming the applicability of institutional theory in explaining the institutionalization processes in effective ISS compliance at the organizational and individual levels. The implications of these findings are then discussed in detail.

Suggested Citation

  • Myeonggil Choi & Jungwoo Lee & Kumju Hwang, 2018. "Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism," Sustainability, MDPI, vol. 10(5), pages 1-25, May.
  • Handle: RePEc:gam:jsusta:v:10:y:2018:i:5:p:1555-:d:146182
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/10/5/1555/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/10/5/1555/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Kenneth J. Knapp & Thomas E. Marshall & R. Kelly Rainer Jr. & F. Nelson Ford, 2007. "Information Security Effectiveness: Conceptualization and Validation of a Theory," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 1(2), pages 37-60, April.
    2. Choi, Hyeri & Park, Min Jae & Rho, Jae Jeung & Zo, Hangjung, 2016. "Rethinking the assessment of e-government implementation in developing countries from the perspective of the design–reality gap: Applications in the Indonesian e-procurement system," Telecommunications Policy, Elsevier, vol. 40(7), pages 644-660.
    3. Helen Irvine, 2007. "Corporate Creep: An Institutional View Of Consultancies in a Non-Profit Organisation," Australian Accounting Review, CPA Australia, vol. 17(41), pages 13-25, March.
    4. Young Bum Lee, 2017. "Exploring the Relationship between E-Government Development and Environmental Sustainability: A Study of Small Island Developing States," Sustainability, MDPI, vol. 9(5), pages 1-16, May.
    5. Wendy Currie, 2012. "Institutional isomorphism and change: the national programme for IT - 10 years on," Post-Print hal-00956939, HAL.
    6. Irene Bernhard & Elin Wihlborg, 2015. "Municipal Contact Centres: A Slower Approach Towards Sustainable Local Development by E-government," European Planning Studies, Taylor & Francis Journals, vol. 23(11), pages 2292-2309, November.
    7. Blake E. Ashforth & Barrie W. Gibbs, 1990. "The Double-Edge of Organizational Legitimation," Organization Science, INFORMS, vol. 1(2), pages 177-194, May.
    8. Hayagreeva Rao, 1994. "The Social Construction of Reputation: Certification Contests, Legitimation, and the Survival of Organizations in the American Automobile Industry: 1895–1912," Strategic Management Journal, Wiley Blackwell, vol. 15(S1), pages 29-44, December.
    9. Crowe, Ellen & Higgins, E. Tory, 1997. "Regulatory Focus and Strategic Inclinations: Promotion and Prevention in Decision-Making," Organizational Behavior and Human Decision Processes, Elsevier, vol. 69(2), pages 117-132, February.
    10. Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
    11. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    12. Michel Lander & Pursey Heugens, 2009. "Structure! Agency! (And Other Quarrels): Meta-Analyzing Institutional Theories of Organization," Post-Print hal-00623835, HAL.
    13. Alan Lawton & David McKevitt & Michelle Millar, 2000. "Developments: Coping with Ambiguity: Reconciling External Legitimacy and Organizational Implementation in Performance Measurement," Public Money & Management, Taylor & Francis Journals, vol. 20(3), pages 13-20, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Cham, Dawda, 2022. "Exploring the efficacy of e-government models through information systems management-case of The Gambia," MPRA Paper 113400, University Library of Munich, Germany.
    2. Ambika Zutshi & Andrew Creed & Brian L. Connelly, 2018. "Education for Sustainable Development: Emerging Themes from Adopters of a Declaration," Sustainability, MDPI, vol. 11(1), pages 1-15, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    2. Maurer, Joshua D. & Creek, Steven A. & Allison, Thomas H. & Bendickson, Joshua S. & Sahaym, Arvin, 2023. "Affiliation rhetoric and digital orientation in crowdfunding appeals," Technological Forecasting and Social Change, Elsevier, vol. 190(C).
    3. Alex Nicholls, 2010. "The Legitimacy of Social Entrepreneurship: Reflexive Isomorphism in a Pre–Paradigmatic Field," Entrepreneurship Theory and Practice, , vol. 34(4), pages 611-633, July.
    4. Jo-Ellen Pozner & Aharon Mohliver & Celia Moore, 2019. "Shine a Light: How Firm Responses to Announcing Earnings Restatements Changed After Sarbanes–Oxley," Journal of Business Ethics, Springer, vol. 160(2), pages 427-443, December.
    5. Adelaide Martins & Delfina Gomes & Manuel Castelo Branco, 2020. "Managing Corporate Social and Environmental Disclosure: An Accountability vs. Impression Management Framework," Sustainability, MDPI, vol. 13(1), pages 1-15, December.
    6. Fisher, Greg & Kuratko, Donald F. & Bloodgood, James M. & Hornsby, Jeffrey S., 2017. "Legitimate to whom? The challenge of audience diversity and new venture legitimacy," Journal of Business Venturing, Elsevier, vol. 32(1), pages 52-71.
    7. Li, Jing & Xia, Jun & Shapiro, Daniel & Lin, Zhouyu, 2018. "Institutional compatibility and the internationalization of Chinese SOEs: The moderating role of home subnational institutions," Journal of World Business, Elsevier, vol. 53(5), pages 641-652.
    8. Jon Reast & François Maon & Adam Lindgreen & Joëlle Vanhamme, 2013. "Legitimacy-Seeking Organizational Strategies in Controversial Industries: A Case Study Analysis and a Bidimensional Model," Journal of Business Ethics, Springer, vol. 118(1), pages 139-153, November.
    9. Laura Schons & Maria Steinmeier, 2016. "Walk the Talk? How Symbolic and Substantive CSR Actions Affect Firm Performance Depending on Stakeholder Proximity," Corporate Social Responsibility and Environmental Management, John Wiley & Sons, vol. 23(6), pages 358-372, November.
    10. Karen D. W. Patterson & David Eduardo Cavazos & Marvin Washington, 2014. "It Does Matter How You Get to the Top: Differentiating Status from Reputation," Administrative Sciences, MDPI, vol. 4(2), pages 1-14, April.
    11. Wesley D. Sine & Robert J. David & Hitoshi Mitsuhashi, 2007. "From Plan to Plant: Effects of Certification on Operational Start-up in the Emergent Independent Power Sector," Organization Science, INFORMS, vol. 18(4), pages 578-594, August.
    12. Jaime Gómez & Raquel Orcos & Henk W. Volberda, 2021. "How imitation of multiple reference groups drives the evolution of firm strategy," Review of Managerial Science, Springer, vol. 15(8), pages 2319-2350, November.
    13. Lauren Lanahan & Daniel Armanios, 2018. "Does More Certification Always Benefit a Venture?," Organization Science, INFORMS, vol. 29(5), pages 931-947, October.
    14. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    15. Florian Überbacher, 2014. "Legitimation of New Ventures: A Review and Research Programme," Journal of Management Studies, Wiley Blackwell, vol. 51(4), pages 667-698, June.
    16. Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
    17. Weiping Liu & Yanling Lian & Cuili Qian, 2022. "Buffering and bridging: How firms manage the burden of celebrity," Asia Pacific Journal of Management, Springer, vol. 39(2), pages 483-513, June.
    18. Myeonggil Choi, 2016. "Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing," Sustainability, MDPI, vol. 8(7), pages 1-21, July.
    19. Aerts, Walter & Cormier, Denis, 2009. "Media legitimacy and corporate environmental communication," Accounting, Organizations and Society, Elsevier, vol. 34(1), pages 1-27, January.
    20. Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:10:y:2018:i:5:p:1555-:d:146182. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.